Jumat, 25 Februari 2011

JavaRa

image

JavaRa is a free tool that can cleanup older versions of Sun�s Java, as they seem to be too lazy to have their updates cleanup after themselves. With every Java update the old versions of the files and registry entries are left on your system, never to be used again and just taking up space and hogging up your computer. The creator of this application also had enough of this and instead of waiting forever until the people at Sun fix this, he created a tool that cleans this mess up. Make sure you check for updates first and then remove older versions. You can check the log file after cleanup and see for yourself how much stuff was cleaned up.

READ MORE - JavaRa

Kamis, 24 Februari 2011

Glary Utilities

image

Glary Utilities is a free toolbox for your computer. It comes with some very useful features to help you in cleaning and maintaining your computer to run at it�s most optimal performance. Here are some of the useful features.

1-Click Maintenance
Scans your registry for invalid and incorrect entries, cleans up invalid shortcuts, dangerous startup items, temporary files, activity history and spyware.

Disk Cleaner, Registry Cleaner, Shortcuts Fixer
There are all executed in the 1-Click Maintenance. You can also run them manually if you wish.

Uninstall Manager
Allows you to quickly see what programs you have installed and uninstall them one by one or in a batch. The only extra feature this uninstaller has that the Windows uninstaller does not is to remove uninstallers. This can be handy if a certain uninstaller no longer works and is �stuck� in the list. I would recommend to use Revo Uninstaller instead though.

Startup Manager
Lists all the startup entries from your startup folder and registry. You can easily disable entries by unchecking the box or delay entries so that they start a bit later to speed up your boot.

Memory Optimizer
Automatic optimize your memory and runs in the background. Not the best memory optimizer in my opinion and not very useful if you have over 2Gb of ram. If you believe you need a good memory optimizer, then I would recommend Cleanmem. It�s faster, and a lot more efficient.

Context Menu Manager
The more programs you install, the longer your context menu becomes (right-click menu on desktop / a file or folder). Many times there are entries in this menu that you would never use and you have to look though all the useless options to find the one that you do want to use. With the context menu manager you can disable those entries that you do not need.

Registry Defrag
Check for registry errors and defragment your registry. This can improve performance as the system does not have to look though a fragmented registry and thus it can find what it is looking for a lot faster.

Tracks Eraser
Optionally comes with the 1-Click Maintenance (disabled by default). Cleans up your personal activity history on your computer.

File Shredder
Allows you to delete files and folders without being able to recover them by any means.

File Undelete
Allows you to undelete files that you have accidentally deleted using the �delete� function from Windows and cannot find the file in the recycle bin. The File Undelete will not work if you deleted files with the File Shredder.

File Encrypter and Decrypter
Can encrypt and decrypt files and folders and create self-extracting encrypted executable files. The encryption uses the Blowfish algorithm.

Disk Analysis
Shows you the disk space usage of your files and folders and allows you to explore and delete. Personally I would recommend using Space Monger as it is highly intuitive and you can clearly see what uses most of the space on your disk by using a �bird�s eye� view of your disk, rather than an explorer like structure.

Duplicate Files Finder
Could be useful if you know that you probably have duplicate files somewhere. However I would not recommend using it on your entire system as sometimes certain programs come with self-repairing backups of their own files and these are seen as duplicate files (which they are). These files are needed for self-preservation though.

Empty Folders Finder
This is a very handy tool that searches for folders that are empty and allows you to remove them. Why keep empty boxes if you no longer need them?

Files Splitter and Joiner
This allows you to split large files and join them again. This can be very handy if you have limited space on your portable media disks (like floppy or zip disks).

Process Manager
Like the Windows Task Manager but more intuitive. Shows you a �threat� level progress bar that indicates if the process is harmful or not and allows you to quickly lookup the process on Google, kill it or block it. I prefer to use Anvir Task Manager though as it has a lot more features and can monitor and prompt for new found startup entries.

Internet Explorer Assistant
Very useful tool if you are a frequent Internet Explorer user. This tool allows you to clean up toolbars, addons, context menu entries, etc� Use this tool if your Internet Explorer is �hijacked� by malware (startup page is changed, search provider, popups, etc�) Personally I prefer using FireFox with Adblock Plus and other addons to greatly enhance my browsing experience.

System Information
Gives you information on your hardware. What type of Graphics card do you have, Windows information, etc�

Windows Standard Tools
Quick access to built in Windows tools like �CheckDisk, Disk Defragmenter", System Restore, System File Checker and Backup�.

READ MORE - Glary Utilities

Rabu, 23 Februari 2011

ImgBurn

image

ImgBurn is a lightweight CD / DVD / HD DVD / Blu-ray burning application.

ImgBurn supports a wide range of image file formats - including BIN, CCD, CDI, CUE, DI, DVD, GI, IMG, ISO, MDS, NRG and PDI.

It can burn Audio CD's from any file type supported via DirectShow / ACM - including AAC, APE, FLAC, M4A, MP3, MP4, MPC, OGG, PCM, WAV, WMA and WV.

You can use it to build DVD Video discs (from a VIDEO_TS folder), HD DVD Video discs (from a HVDVD_TS folder) and Blu-ray Video discs (from a BDAV / BDMV folder) with ease.

READ MORE - ImgBurn

Selasa, 22 Februari 2011

SQL Dump Splitter 2

 

image

SQL Dump Splitter 2 might not be very interesting for the average computer user, but it can be a very handy tool for Web Developers (like me). Specially if you work with MySQL and large SQL dump files. Usually MySQL has a limit of 2Mb per SQL file. However you will need to manually cut the SQL file if you need to insert data from a file that is more than 2Mb. This tool can automagically cut the file into proper segments for you.

READ MORE - SQL Dump Splitter 2

Senin, 21 Februari 2011

HxD - Freeware Hex Editor and Disk Editor

image

HxD is a carefully designed and fast hex editor which, additionally to raw disk editing and modifying of main memory (RAM), handles files of any size.

The easy to use interface offers features such as searching and replacing, exporting, checksums/digests, insertion of byte patterns, a file shredder, concatenation or splitting of files, statistics and much more.

Editing works like in a text editor with a focus on a simple and task-oriented operation, as such functions were streamlined to hide differences that are purely technical.
For example, drives and memory are presented similar to a file and are shown as a whole, in contrast to a sector/region-limited view that cuts off data which potentially belongs together. Drives and memory can be edited the same way as a regular file including support for undo. In addition memory-sections define a foldable region and inaccessible sections are hidden by default.

Furthermore a lot of effort was put into making operations fast and efficient, instead of forcing you to use specialized functions for technical reasons or arbitrarily limiting file sizes. This includes a responsive interface and progress indicators for lengthy operations.

READ MORE - HxD - Freeware Hex Editor and Disk Editor

Selasa, 15 Februari 2011

Comodo Internet Security

Comodo Internet Security is probably the best free Internet Security Suite out there. It comes with tons of features that make Comodo Internet Security very effective. They have also challenged one of the market-leaders in antivirus; Norton and have yet to respond.

What amazes me about CIS is the effectiveness of the software is 100% (if you use it correctly) compared to other suites out there that cost over 80 euro (cough�.Norton�.cough�), while CIS is 100% free! What about support you ask? CIS comes with full customer support on the forums and for the paid version of CIS, they even fix your computer problems for you by remote if you want to. From infections to printer installations.

The video above shows that one fake AV software did get through because it had a digital signature. However, since then Comodo has removed the �Safeapp� company from it�s trusted list, so it will not get through again. The fake AV was not stopped by the AV or Defense+, because technically it is not classified as a virus, trojan or worm but rather a piece of software that looks like a real Antivirus and urges you to �buy� their product.

In short, it checks if the file you wish to run is safe or not (by antivirus signature, cloud scanning, digital signatures and other tecniques). If the file is not safe, it will either block it (if it is a known piece of malware) or it will run it in the sandbox (if it is unknown or unsigned). The sandbox prevents the program that you run to make any modifications to your system. You can however run the program outside the sandbox if you trust it. Comodo Internet Security also monitors your memory for attacks and exploits.

I recommend CIS for advanced users that know what to answer when you receive a notification from CIS. For example, you have to understand what a sandbox is and what it does, or you won�t be able properly install programs that are not digitally signed or trusted. You also have to know what to answer if CIS asks you what you want to do (block, trust, sandbox) when you run an unknown file. You can however disable all popups and set a password to CIS so that it will block all unknown and unsafe applications by default without popups. This can be handy if you want to install it for someone who is a computer novice and frequently has trouble with malware. However, if that someone does not have frequent problems with malware but wishes to have a simple and yet effective antivirus without popups, I would highly recommend Microsoft Security Essentials.

Antivirus
The antivirus consists of a traditional signature-based antivirus combined with a cloud scanning feature, rootkit-scanning and uploading of unknown files to the Comodo server for analysis. The scanner is very fast and can be set to exclude packed archives and specific folders.

Firewall
The firewall has several defense levels including auto-learn mode. Auto-learn is handy if you want the firewall to automatically allow and create rules for all programs that want to have internet access. Once you are done teaching the firewall you can switch back to normal mode by right-clicking on the Comodo icon and accessing the menu.

Defense+
This module gives you extra protection. Here you can see active processes that you can lookup online, terminate (and block), upload to Comodo and add to trusted files. You can view all the trusted files and make modifications, run a program in the sandbox, view a list of unrecognized files and send them to trusted or untrusted files. And tons of other features that you can customize.

READ MORE - Comodo Internet Security

Senin, 14 Februari 2011

Microsoft Security Essentials 2

image

Microsoft Security Essentials 2 is in my opinion the best free antivirus for people who want a simple, free and yet effective antivirus. The detection rates are high and it doesn�t bother you with complicated questions and recommendations, it simply does it�s job on keeping your computer clean.

However, like most free and paid AV products, there is always a chance that it might miss one or two intrusions. This usually happens with malware (viruses, trojans, etc..) that are so new that the AV�s have not yet added them to their database. I tested MSE myself with an unknown piece of malware and within 24 hours the malware was suddenly detected (when it did not recognize it less than 24 hour ago).

If you are an �aware� internet user (meaning that you understand security risks of opening email attachments from suspicious emails, messages and links and are not fooled by fake banners that pretend to be something they are not, or even better use an Ad Block plugin in your browser), then this AV might be the best choice for you.

However, if you are a more experienced user and understand concepts like �sandbox, host-intrusion-prevention, behaviour-blocking, spoofing, etc�, or you or someone you know frequently has problems with infected computers, then I would recommend Comodo Internet Security. I will talk about this in my next post.

READ MORE - Microsoft Security Essentials 2

Selasa, 08 Februari 2011

batik jawa timur

Motif Batik ciri khas dari kabupaten Pamekasan-Madura, Sekar Jagad





Batik dari kabupaten Pacitan




Batik tulis dari kabupaten tuban terbuat dari bahan katun

READ MORE - batik jawa timur

Sejarah Batik

Batik adalah salah satu cara pembuatan bahan pakaian. Selain itu batik bisa mengacu pada dua hal. Yang pertama adalah teknik pewarnaan kain dengan menggunakan malam untuk mencegah pewarnaan sebagian dari kain. Dalam literatur internasional, teknik ini dikenal sebagai wax-resist dyeing. Pengertian kedua adalah kain atau busana yang dibuat dengan teknik tersebut, termasuk penggunaan motif-motif tertentu yang memiliki kekhasan. Batik Indonesia, sebagai keseluruhan teknik, teknologi, serta pengembangan motif dan budaya yang terkait, oleh UNESCO telah ditetapkan sebagai Warisan Kemanusiaan untuk Budaya Lisan dan Nonbendawi (Masterpieces of the Oral and Intangible Heritage of Humanity) sejak 2 Oktober, 2009.


Seni pewarnaan kain dengan teknik pencegahan pewarnaan menggunakan malam adalah salah satu bentuk seni kuno. Penemuan di Mesir menunjukkan bahwa teknik ini telah dikenal semenjak abad ke-4 SM, dengan diketemukannya kain pembungkus mumi yang juga dilapisi malam untuk membentuk pola. Di Asia, teknik serupa batik juga diterapkan di Tiongkoksemasa Dinasti T'ang (618-907) serta di India dan Jepang semasa Periode Nara (645-794). DiAfrika, teknik seperti batik dikenal oleh Suku Yoruba di Nigeria, serta Suku Soninke danWolof di Senegal.[2]. Di Indonesia, batik dipercaya sudah ada semenjak zaman Majapahit, dan menjadi sangat populer akhir abad XVIII atau awal abad XIX. Batik yang dihasilkan ialah semuanya batik tulis sampai awal abad XX dan batik cap baru dikenal setelah Perang Dunia Iatau sekitar tahun 1920-an.
Walaupun kata "batik" berasal dari bahasa Jawa, kehadiran batik di Jawa sendiri tidaklah tercatat. G.P. Rouffaer berpendapat bahwa tehnik batik ini kemungkinan diperkenalkan dari Indiaatau Srilangka pada abad ke-6 atau ke-7. Di sisi lain, J.L.A. Brandes (arkeolog Belanda) dan F.A. Sutjipto (arkeolog Indonesia) percaya bahwa tradisi batik adalah asli dari daerah sepertiTorajaFloresHalmahera, dan Papua. Perlu dicatat bahwa wilayah tersebut bukanlah area yang dipengaruhi oleh Hinduisme tetapi diketahui memiliki tradisi kuna membuat batik.
G.P. Rouffaer juga melaporkan bahwa pola gringsing sudah dikenal sejak abad ke-12 di Kediri,Jawa Timur. Dia menyimpulkan bahwa pola seperti ini hanya bisa dibentuk dengan menggunakan alat canting, sehingga ia berpendapat bahwa canting ditemukan di Jawa pada masa sekitar itu.Detil ukiran kain yang menyerupai pola batik dikenakan oleh Prajnaparamita, arca dewi kebijaksanaan buddhis dari Jawa Timur abad ke-13. Detil pakaian menampilkan pola sulur tumbuhan dan kembang-kembang rumit yang mirip dengan pola batik tradisional Jawa yang dapat ditemukan kini. Hal ini menunjukkan bahwa membuat pola batik yang rumit yang hanya dapat dibuat dengan canting telah dikenal di Jawa sejak abad ke-13 atau bahkan lebih awal.
Legenda dalam literatur Melayu abad ke-17, Sulalatus Salatin menceritakan Laksamana Hang Nadim yang diperintahkan oleh Sultan Mahmud untuk berlayar ke India agar mendapatkan 140 lembar kain serasah dengan pola 40 jenis bunga pada setiap lembarnya. Karena tidak mampu memenuhi perintah itu, dia membuat sendiri kain-kain itu. Namun sayangnya kapalnya karam dalam perjalanan pulang dan hanya mampu membawa empat lembar sehingga membuat sang Sultan kecewa.Oleh beberapa penafsir,who? serasah itu ditafsirkan sebagai batik.
Dalam literatur Eropa, teknik batik ini pertama kali diceritakan dalam buku History of Java (London, 1817) tulisan Sir Thomas Stamford Raffles. Ia pernah menjadi Gubernur Inggris di Jawa semasa Napoleon menduduki Belanda. Pada 1873 seorang saudagar Belanda Van Rijekevorsel memberikan selembar batik yang diperolehnya saat berkunjung ke Indonesia ke Museum Etnik di Rotterdam dan pada awal abad ke-19 itulah batik mulai mencapai masa keemasannya. Sewaktu dipamerkan di Exposition Universelle di Paris pada tahun 1900, batik Indonesia memukau publik dan seniman.
Semenjak industrialisasi dan globalisasi, yang memperkenalkan teknik otomatisasi, batik jenis baru muncul, dikenal sebagai batik cap dan batik cetak, sementara batik tradisional yang diproduksi dengan teknik tulisan tangan menggunakan canting dan malam disebut batik tulis. Pada saat yang sama imigran dari Indonesia ke Persekutuan Malaya juga membawa batik bersama mereka.


READ MORE - Sejarah Batik

Modul Lengkap Otomotif

READ MORE - Modul Lengkap Otomotif

Kamis, 03 Februari 2011

Icon lagi nich

READ MORE - Icon lagi nich

Icon icon Lucu

Mungkin anda sedang mencari icon-icon lucu untuk menghiasi blog atau website yang sedang anda bangun??
Atau mungkin anda bosan dengan icon di komputer atau laptop anda
silahkan anda download disini untuk mendapatkannya gratis... :D



Download link :
http://www.ziddu.com/download/13669724/spongebob.zip.html







Download Link :
http://www.ziddu.com/download/13669802/shinchan.zip.html







Cara penggantian icon pada laptop atau komputer dapat anda download di sini
READ MORE - Icon icon Lucu