Search This Blog

Jan 27, 2010

Swing files with the network using Download Master


I, like many Internet users, the first time a lot of downloading various files from the network. These were the books, videos, music, photos and drawings, presentations, programs, abstracts ... In general, the list is great. How great now and the meeting "garbage" in my computer - delete sorry, but it was with most of these files, no :-). Of course, very soon, I no longer meet the browser's capabilities in this regard. Moreover, it was then the Internet Explorer 6, then MyIE2, and then, and until now, Opera.

 As always, the help came from search engine Google. On request: "Program for downloading files" - find many sites with information on such programs. The most popular were free FlashGet (http://www.flashget.com/index_en.htm) and Download Master (http://www.westbyte.com/dm/). Of which I chose the latter, and use for several years, and invite you to advise. Let's talk about where to get and how to download files from the network, using Download Master. She created Ukrainian programmers, and it can be downloaded from the official site WestByte Software.

Download the file distribution program "dmaster.exe", it should be run (two clicks the left mouse button or pressing the right button, select "Open"). Installation is simple and is interactively in steps. In the general case, simply click "Next" to all agreeing.

After installing the program on the desktop, you will see a shortcut, clicking on which you can run the program. During the first run the program prompts you to indicate what type of Internet connection you use - it is necessary for correct operation of the program.




In order to download the file (file, document, and so on), you must:

  • Copy the link address to download the clipboard
  • Run;
  • In the menu choose "download";
  • Then choose "Add download";
  • In the window that appears in the "Link (URL)" right click and select "Paste" (Note: The program intercepts the link with the eminent her file extensions, and in this field, already can not stand this link);
  • Choose a file category (optional);
  • Choose where to save the file (optional, but remember where to save);
  • Add a comment (optional);
  • Click "Start download"
  • Open the program and in the left menu click on the button on the tab "All the download. See the process of downloading files. This option is available: "File Name", "Status", "Size", "Left", "Speed".
 By default, the end of the injection, is a text message and a beep. If you happen to forget where you saved the file, then open the tab "History", locate the download, click it with the right mouse button and select "Open Folder".

Program settings are available in the menu: select "Tools" and then "Options." Settings lot and advise them to study. otyustirovat program to fit their needs, although it is not necessary. All questions on the program are discussed at the official forum WestByte

In general, for me, this program has been irreplaceable and indispensable tool for working on the Internet. With it you can also download videos from online services such as YouTube, Google Video, Video@mail.ru, Rambler Vision, and others, simply pointing page address with video. In addition, another possible mass downloading of files, subject to certain conditions (see under "download" - "Add a group uploads").

In the English language version of this program is distributed as "Internet Download Accelerator"

In the first part of the download and install the program:




In the second part we study the process of downloading files and some settings:





In the third part of the tune on the program "under itself":





Make a backup images ladies and gentlemen ...


Well, no, really. Probably the most valuable thing on your computer from an ordinary user - a personal digital photos and video. Themselves think about what percentage of photos taken with digital cameras you have printed and put in a photo album? I, for example, from more than ten thousand photographs taken over the past five years of his soap box, opened barely more than two hundred. Yes, and it took more than friends and relatives. Yes, and I did it only because I had some time was a printer Epson, who made quite acceptable for the home photo album pictures.

The rest of the dusty where? True, the hard disk - it is the screw, it is hard. And one day it may be that including a computer, you will see the inscription: "Reboot and select proper Boot device or Insert Boot Media in selected Boot device and press a key". With roughly means: "Reboot and select proper boot device (in BIOS), or insert boot disk in the drive and press (any)". In essence, the problem with the hard disk of your PC, or an inability to find the operating system to boot. And then abruptly ponder why not buy a few discs and recorded valuable data for you.

Why am I all this? Just the other day with a friend in a phone mode, tried to start the computer, which after loading the BIOS has issued such a message. In parallel, rummaging through the Internet and found many reports of this error. I myself am in this business pros are not, therefore, lay out, as it is, all that I found and in what direction to dig. Can anyone come in handy.

This message is in the worst case may mean that your hard disk was covered with a copper basin. And you, respectively, have lost all "acquired by hard labor." That is, photos, videos, your work, diploma, project, contacts and so on. Any difference between the kind of movies, programs, photo wallpapers and other things we do not take into account. It's easy to be restored, even with the improvement. But the pictures ...

At best, you have a problem: with connectors, ribbon cable, power supply, the lack of launching files in the system Windows. Maybe, some problems with the settings in the BIOS - the wrong priorities for download from the carriers. In general, all that is being or settings or replacement iron.

The first thing to check - does the computer hard disk in the BIOS. You can go in there, pressing the button "Delete", at boot time. In the first section, you will see what the media is inserted - disk drives, hard disk drives. If it is not there, it's worth your hard disk to a computer companion, and, if he has a hard drive is not detected, you will need to service. If there is a guarantee on the screw, then you may someday and it will change. In the same BIOS setup in the section "BOOT" to look at priorities boot OSes with the carriers. The first to go the hard drive, namely: in "Boot device Priority" must be established "First (1) Boot Device - hard draw (HDD)" - a different motherboard can be different

As a result, determined that flew propeller. Although hard drive and showed signs of life, but all interviewed experts available in one voice said that judging by the click when it starts in Winchester flew head. They say that may have been hit, but I think the blame "gray" iron. Naturally, the mother and on another computer, he also has not been defined. Fortunately, the majority of the material was still on the disk and in the camera (there is a benefit from the bulk of modern  flash drives).

In general, the main causes of frequent errors: "Reboot and select proper Boot device or Insert Boot Media in selected Boot device and press a key", - may be the following.
You got out of the sockets or damaged power cord from the power supply or cable from the motherboard to the disk. It is necessary to check it all. Personally, I have such a precedent.
The wrong order of boot devices in the BIOS (hard disk, floppy disk, floppy drive). Perhaps it could happen as a result of shutting down your computer with speakers in it (floppy, CD, stick). Select the first HDD. Also, the order of loading can be found by clicking during startup F2 key or TAB (where both) - just specify the computer where to be loaded. If all goes well, you need to change the priority of all.
If the BIOS hard drive visible and the boot order is correct, then most likely you have flown the operating system. It is treated reinstalling. I once had a case where somehow erased from friends in the computer launching Windows files. Perhaps some malware tried.
You still covered his hard drive. Contact the seller for warranty or service. The probability of restoring the hard drive is low, and the price issue can be considerably more expensive than a new hard drive. Better to buy a new better, but if the same back-guarantee, then install additional it into your computer or sell.

And the conclusion of this article is that still need to periodically make backups on external media ( "Backup" - backing up your valuable data). What I soon again and loans.

Jan 22, 2010

The new version of the browser Mozilla Firefox 3.6


It will not take root in my Mozilla browser. Although this browser is one of the most popular in the world. His popularity is due to the fact that it has developed a huge number of add-ons. They significantly expand its functionalities and capabilities. And the browser can become an indispensable tool. And since January 21 this year, it was reported the issuance of the final version of Mozilla Firefox 3.6, I decided to try to "number eleven". But at the same time a bit to develop a theme on the blog.

Download the distribution program, visit the product page on ofsayte "Russian Firefox 3.6". Weighs program 8.18MB.

Installing the browser is simple:
Run the downloaded file "Firefox Setup 3.6.exe". We look forward to unpack the installer. (I for some reason this was 20 minutes).
A window installation. You must click on the button "Next" to install.
In the next window, select "Normal" or "Custom" installation. Click on "Next".
In the next window, choose the folder to install the program or agree with the proposal. If you do not want the browser to work by default, then click "Install".
There will be installation and will appear with the message of the completion of the installation. To start the browser in the work, click "Finish".
When you first start the browser request to import the different settings (bookmarks, passwords, etc.) from Internet Explorer or Opera. Can refuse to import and click "Next.
A message appears on the import was successful. Click "Finish"
When you start, you may receive a window to check whether a program default browser. Again, decide at its discretion, and click "Yes" or "No".
Now you can freely browse the web with Mozilla Firefox.


All would be good, but I for some reason, start the browser in the work going on too long. The same problem observed with other users. Intelligible recipes solution I have found. A supplement to the browser to stimulate the desire to use it. After all, many other users ognelis works successfully.

For example easy to install such popular add-ons like Adblock Plus and Video DownloadHelper. Adblock Plus is designed to block unwanted ads, pop-up banners, and Video DownloadHelper - download streaming online video and audio.

Installing add-ons in Firefox is also not difficult:

Working in Firefox, go to the website of the "Supplement for Firefox "
Select the desired addition and clicked on the button "+ Add to Firefox"
A window installation of software in which you want to click "Install Now"
A window with an indicator of the installation process. File that is uploaded an average of 500 KB - depends on the specific addon.
After the installation to complete it you need to restart the program. Click "Restart Firefox"
After starting the browser window appears with the message of successful installation of add-ons.
Shut it down and use the opportunities have emerged.

The browser is very good, quick and invisible ranks second in popularity in the world. But did I "in hand" does not bear ...

Video podcast: "overview of the new version of the browser Mozilla Firefox 3.6. Where to download, how to install, review of the interface:



Video podcast: "The process of installing applications (add-ons, plugins, add-ons) in the browser Mozilla Firefox 3.6. For example Adblock Plus and Video DownloadHelper":


Jan 21, 2010

Services online diaries. How to open a personal page


Own online diary now to start easy. Mass services provided free to create your blog, diary, realize your desire to speak. I have already considered the possibility of creating mikroblog on Twitter, and full-fledged blog site on the Blogger service. Today I try to open the question of blogging, from which the blogosphere and actually began to develop. They are now very popular among people who do not need to starts a separate site, but there is a desire to express their views on various everyday issues.

If you look at the rating blogservisov to search for blogs by Yandex, you will see not only leaders like: LiveJournal, Блоги@Mail.Ru, Ya.ru, LiveInternet - but also many other smaller services. You can choose the service online journals with topics close to you, that will provide you and visitors and the interlocutors is in your interests.

Typically, registration of such services is very simple. Generally, you specify:


Username
Email address
Password (twice)
Date of Birth
Specify the various settings to receive messages from the service
Enter the captcha (an alphanumeric code from the image)
Put a tick in agreement with the Terms of Service
Press the button with the words like: "Create Account"


If at this stage, everything is fine, then you will be prompted to configure your profile in the service. Usually, this: name, sex, country and city of residence, hobbies and interests. After filling the data they need to keep pressing the button labeled "Save / Continue.

After that, the message usually goes on the successful creation of the account and sent to the registration e-mail address of the activation e-mail message. The letter will contain a link after clicking on which the service will confirm your email. Then you can freely use their blog diary. Now you can configure the design of the proposed options and the structure of the diary. Depending on the service such opportunities may differ materially.

Post messages in such services easily. It is not necessary to know the program code. All services use WYSIWYG editor for design publications. Click the "New Entry" and you will be able to: insert images from your computer or photo hosting, insert a window with film clips, format the text.

Each message will need to add tags. For this purpose a special form made the words that you think relate to the topic. This is done to ensure that your blog can be found through the search engine service, other users. After processing the message must click "Send". Then the paper will appear in your diary.

To be read, you need to read and comment on the publication of other people. Add them "as a friend (frend), and they will do in response, too. As a result of your publication will appear in their Friends page. They see friends of friends, and gradually you have any readers and commentators. This, of course, if the ideal. In reality the number of people you have added "to friends" and that you add will be different.

I also have the account's in several of these services that I use to advertise out articles blog. For example, on LiveJournal. Registration on it, I actually above and described. Joined on other services may be different, retaining the essence of the procedure.

Apart from the above set out, people who have accounts on multiple services, with the same publications, should learn the procedure Crossposting. This is when you create a message on LiveJournal or LiveInternet, and it automatically appears on other services. The mechanism of this, as a rule, can be found in the settings for services.

Here, briefly, so are online diaries. Nothing difficult, you just start trying to do.


Course in one file (Weight - 28.29 MB)





Video podcast: "How to create and maintain a blog at LiveJournal":



Video podcast: "How to create a blog at LiveInternet":



Video podcast: "Creating a blog at Blog.ru":



Video podcast: "How can you start a blog on Moskva.com":


Jan 20, 2010

Download Master and massive downloading files from the network



This article goes on some sort of secret technologies that allow to download entire websites. Although there are technologies such course, but I do not use them, much less talk about them will not. And in this case is due to staffing function of the program download manager Download Master. If necessary, and some practice, using it can be pumped in large pictures, small-scale online games, articles, documents. In principle, the mass can download any files unless to comply with one condition.

This chance might be the case if the files have names in block numbering or alphabetical designation and are in one folder on the site. That is, they are in order, with a specific pitch numbers (1, 2, 5, 10 and so on) or by order of the alphabet. Available setting process download manager DMaster in the menu: "Downloading" - "Add a group uploads.

If you find exactly what you want with similar names, in which changes only the number, you can easily download them. File names can be like these: "001.jpg, 002.jpg ... 099.jpg" or "imag001.jpg, imag002.jpg ... imag100.jpg", and "im_a.jpg, im_b.jpg, im_c.jpg ... im_z.jpg ". Here we must understand that instead. Jpg can be any extension for a specific file type: ". Gif", ".3 gp", ". Avi", ". Swf", ". Rar", ". Zip", ". Html "and the like. But I will consider the example download galleries of images and used with the browser "Opera".

Let's get started. Suppose that you have found a gallery of images (wallpapers, graphics, pictures). And you really want to download them all, and not just selected ones. That can be saved and the following method: right click on the image - "Save image" - select the folder on comp - click on "Save."

For the same, to download all you need to first decide on the way image files are named. To do this, open the final image. Here I note that should open up the big picture, not the thumbnails (small image of the picture). Depending on where to open large image in a separate window or embedded in the page file, you can find the address differently.

If the image is opened in a separate window on a white background, then in the address bar of your browser you will see its direct address, type: "http://sait.com/papka/vpapke/imag001.jpg". If the image on the page, then right click the mouse on the image and click "Copy image address" or "Open image (imag001.jpg)". In the first case, you can open in any text document, insert the address and see. In the second - the picture will open in a new window and its address will be visible in the browser address bar.

In order to see the sequence in which other files are named, you must do the same job with other images. You must learn step between rooms, as well as the first and last number. It is necessary to configure the program for mass download. If each file has its own unique name, then using Download Master massive jumps will not work. 'll Have to work manually.

Having all the options you want, do the following steps:


copy one of the links (for example, will tell "http://sait.com/papka/vpapke/imag001.jpg".)
open the program DM
open the tab "Downloading"
click on "Add a group uploads"


In the resulting window, under "Link (URL)" insert the address of the file. In exile all the changing numbers or letters should be noted icons "$" (press the key combination Shift +4 to the English keyboard layout). In my case, get: "http://sait.com/papka/vpapke/imag $ $ $. Jpg". Under a field of reference type: "From:" = 001, "to:" = 100, Step = 1. You have those figures may be others. And if the numbers do not consist of an equal number of digits, but are consistently (eg: imag0.jpg, imag1.jpg, imag2.jpg ... imag50.jpg ... imag100.jpg,), then the link will have type: "http://sait.com/papka/vpapke/imag $. jpg", and the 'From: "= 1. If you have a variable portion of alphabetic title that rarity, then switch to enter the relevant parameters.

After entering all necessary parameters, click the "OK". In the next window you will see from what addresses the program will pump files. You can clear the checkboxes on the unnecessary. If you agree with all zhmete "OK" and get the window "Add download". If you agree to download, then click "Start download". The program will ask you: "Do you want to automatically add the remaining files with similar settings?". If you agree, click "Yes" and download will begin.

If you have a program configured to simultaneously download multiple files, then you will begin to pop up information windows. They will be very let you simultaneously work on the computer. In order not to appear, and to optimize some other options of the program in this mode, you must:

go to "Tools"
select "Options"
in the "interface" remove a tick on "Open a message box when you start pumping"
in the "interface" - "Events" put a tick in the "Add new download in the beginning of the list"
in the "Downloads" - "Miscellaneous" put a tick in "Automatically rename files of the same name"
do not forget to click "OK" to save the settings.

Additionally, you may want to disable automatic checking of each downloaded file with antivirus software in the "Automation" - "Anti". Or naobotrot included if you need it.

Here on this principle is the mass downloading files using Download Master, in its simplest form. The hardest thing here is to find such "deposits" the files.

By the way, if the program DM, integrated in your browser, then you can use the option "Download all", while on the page with direct static links to the physical files. Option is usually available from the context menu when right-clicking on the page. I really do not use it. And my site all the files now have individual names:).



Video podcasts: How to mass download pictures from sites photo gallery via Download Master:


Jan 16, 2010

Swine influenza internet or lock Windows


In the Internet started up another infection. Not as terrible as swine flu, of course, but at least unpleasant. At this time, because of the virus in the system, there is the following scenario.


After starting the system, vynyrivayet window with the message that you are using unlicensed Windu, and must send SMSku for a specific number. What's it like he saw the owner just did a licensing system? The system no longer works.

The screen may display a window of this type (but not necessarily)



Why is such a long time I have encountered and described in one of the first articles of this blog. And about a relative of such malicious, wrote recently in the article about the removal of the informer, a news feed from your browser. But here problemma more serious than a banner on split-screen browser. Although you can catch her, just the same way, setting the video codec for viewing video on the sites.

Search the network gave several solutions the problem, and describe them.

Anywhere, no SMS not sent.
If you caught the Trojans Winlock.19, then you ... very lucky. In the literal sense. This malware is configured to self-destruct after two hours of work a computer. So the solution is simply the patience. Leave your computer on for several hours, and then restart. If the problem persists, try the following method.
Log in windose in safe mode. For this, during startup, press and hold down the F8 key on your keyboard, then select run in safe mode. On the C drive go at c: / documents and settings / all users / application data / and delete from there two files: blocker.exe and blocker.bin, or any file with the name of blocker. (Any extension). Also need to remove the registry reference to the file, such as HKLM \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ Userinit. After rebooting should work fine. Immediately do a search on the computer, searching for files blocker. (Any extension), and then remove. Just in case, take a deep test antivirus software. By the way, instead of the folder / all users / may need to go to the folder with your vindovsloginom, and then in / application data /.
Make attending disc Live CD (http://www.freedrweb.com/livecd/). Starts with him, and remove blocker.exe blocker.bin the folder: / documents and settings / all users / application data / and then on item 3.
You can also try to find the extra files called WINLOGON.EXE. Only the file has the right nasuschestvovanie in the system in the folder C: \ Windows \ System32. If you find it in another folder - removed immediately. Under this name can be masked by more than a hundred different viruses.

In general, I hope that you have a first or second case. In the future, do not install any video codec to view video on the sites - the virus is often there. To view the online video rather conventional flash player.

Jan 12, 2010

How and where to register the charge mailbox


Information on how to register your email inbox for free services Yandex, Rambler, Gmail, Yahoo, on the pages of the blog I wrote. Today we will go about creating a paid mailbox. Let's talk about services and network capabilities in solving this problem.


One might ask: "Why did he need the charge box? After so many good and completely free service! ". Let us consider the various options.


For example, you have a business in the offline and, accordingly, your company or private company has a name. And the name - is, in fact, your brand. At least not serious, if your correspondence will be coming to the client with the address type "shef@mayl.ru. Agree that "shef@vashbrend.com" - is much more solid. And most importantly, inspires more confidence in you and the company.
You - the author, and want to have a secure electronic mailbox to send their works to the customer and receiving letters from him. Also, in this case, your name - it is your brand. And, you may want to emphasize its importance.
You - webmaster. Well, here you have all possibilities in order to have an unlimited number of email addresses under your domain. But on this later.
You just nice to have a reliable email inbox under its own domain (domain is written the right of the "@-dog").
The most important thing. You want to have a mailbox for which someone will answer. That is, for all the information which it contains, the responsibility for service, which periodically makes a backup copy of the information. And, if the box is not used for spam or fraud, it will not close without warning, on cavil at you.


Well, actually considered the main "Why?" On the toll boxes. Of course you can be absolutely individual reason for opening a paid e-mail.

So you decided to get a paid account. Next, you need to register the desired domain for mail and opredilitsya with the service provider e-mail service for the money.

Domain You can register at any domain registrar or service administration domains, which cooperates with them. It so happened that I use for this service for automatic registration iDomen.ru. There you can register domain names in zones:. Ru, su., Com., Net., Org., Biz. The cost of registering the name for one year, on average ranges from 3 to 12 dollars, depending on the blast zone. It could be a big price for some domain zones.

However, do not hurry to make the registration of the domain to select a paid service for mail. It is possible that the registration in the paid service, you may be granted the domain name for free. Usually, the condition for it is payment account for a considerable period. As a rule, no less than three months, and, often, and year.

So, look at the types of services that can be used to create a paid e-mail.
They are as follows:

Classical E-mail - service provides only for the creation and support of reception and transmission of letters. There may be options such as mail with the domain service, and with your domain (example - "Mail forever").
The mailbox at your ISP. If you are using to connect to the internet cable or telephone line, the ISP gives you one free email inbox and the ability to create a supplementary for a fee. In my opinion not a very good option, since your domain you are unlikely to be able to use.
The third option, which I think is best, is placing their e-mail account service provider hosting service to host websites. He will look further.


Typically, the cheapest fare hosting offers the possibility of establishing at least one site and mailbox. In most cases, number of mailboxes is only limited amount of space on the disk server hosting, tariff plan. Hostings much different, tariff schemes vary greatly, and minimum prices ranging from 0.95 to 5 dollars a month.

Regarding this blog, then, at the moment, he is placed on the hosting AGAVA.ru, on the tariff plan of Normal (299 rubles per month) - at 5 sites and an unlimited number of boxes. The domain name also has been granted conditionally for free for a year if paid hosting (then three months). The cheapest option there fare Lite (120-150 rubles per month) - perhaps placing one of your static site, and the number of e-mail accounts is not limited. Of course, if you search online, you can find cheaper rates, but that's your choice.

Well, poditozhim. You can create your site and, simultaneously, a mailbox for one price, or just a mailbox on the mail service. The choice of service to you.

Jan 10, 2010

How do I remove ticker (news block pop-up) with screen



Frankly, the problem of the informer in the pop-up Internet eksplorere I encountered only once, and then, not on your computer. Perhaps the time has established a firewall Outpost Firewall, blocking access to the computer network of the dirtiest. 
In general, this article has arisen because of, frequent in recent visits to the blog to, in fact, a search query. If it is to summarize, it sounds like: "help remove the virus or remove the pop-up a syndication feed it the same informer ruxvideosdghdfghdfgh with the Internet I have the screen of the computer code without free sms / sms». Approximately so, in different variants, and already a hundred times. A small search on the Internet showed that the problem is urgent, therefore, describe the symptoms and give its decision.

Let us briefly describe the problem. Often, in themselves guess what, sites and on sites with free programs, music, movies and so on, established special programs to be implemented in a user's computer informer adult sites, or the news stream. Alternatively, it may establish a virus, downloaded, along with any file from the Internet. Perhaps it will be installed along with a special video codec to view video from the site. In general, as it gets to you in the computer a lot of options. And after the next reboot the computer and launch IE browser, the bottom of the screen appears with a banner advertising that can not be closed.








In informers also have a suggestion to send an SMS, so that it can be removed. Of course not a fact that it will disappear after entering the code, and not the fact that this code, you generally get. But the creators of this program are beaten on the psychology - hardly a young man or a member of the office wants the parents, or boss, saw it in his computer. And accordingly sent smski. Do not do it! Must be protected, while in the network - antivirus and firewall. Alternatively, you may receive the informer, in general, blocking the work of the browser, and requires subscription fee for using them - this is also a divorce.
 
The most common solution of the following.

Open Internet Explorer.
We go in the top menu - clicked "Tools" - we click "Internet Options" - we click the Programs tab - we click "Add-Ins" - choose "Add-ins, used by Internet Explorer».
Find all the elements containing the name of ending * lib.dll.
Click on these add-ins one by one, and at the bottom of the page click "Disable"
Exit Options, click "OK".
In order to take effect, you need to close Internet Explorer and start it again.

Theoretically, ticker should disappear. You may have to try to disable all add-ons, in turn, to identify desired.
 
Also in the "Options" you can get without running explorer. To do this, click Start, then Control Panel, and to open a folder, "Internet Options".
 
Also recommended in the Internet Options to delete cookies and Internet files (General Tab). And also set all the defaults by clicking Reset in the Advanced tab. 

If the problem is in the Opera browser, it is better to simply reinstall the browser, for this:

to remove (uninstall) the program;
remove the remnants of the C: \ Programm Files \ Opera;
reinstall.
 
Hopefully, this technique will help you remove a syndication feed, or informer, with the screen of your computer.
 
And finally I repeat: "Always use antivirus and firewall (firewall) while working in the network!".

Blockers Windows and how to remove them available means


Beginning of the year was marked not only a fun holiday. Intensification of work the creators of various viruses, blocking the operating system. During the six months that have elapsed since publication of the article: "Swine flu Internet or blocking Windows", -, new versions, and techniques described in it may very well not work.

Recent following. At the end of the year began to work actively virus-blackmailer who claimed that you have violated the license agreement program Download Master and required to send SMS to number 4460. This at a time when the program is absolutely free. Accordingly, the forum company WestByte Software is topic on this subject. And with the beginning of a new intensified, which is disguised as Kaspersky Anti-Virus "Internet Sekurity". Emerging banner claims that you are again violated the license agreement or ended a license code. You, they say, 92 virus, and once again calling for SMS to get the unlock key. Moreover, short numbers and codes for SMS are constantly changing.

Against this background, deleting the old version of the banner-informer described in the article: "How to remove pop-up news ticker tape from the screen - already seems to be simple and easy. The site Dr.Web, on this occasion, even an article: "Windows Blockers and other viral threats in December 2009". As in many other forums dealing with computer security.

Examples of discussions on the question, where you can find the solution to your problem, see the following topic:
IXBiT.ru - "Windows is locked. To unlock about to send sms. What to do? Help is" 

VirusInfo - imax Download Manager or iLite Net Accelerator (Packed.Win32.Krap.w): description and treatment
Kaspersky Lab Forum - If your PC is locked Get Accelerator, Digital Access, File Downloader, iMax Download Manager, etc. Instructions for unlocking
Dr.Web users' forum - now under the guise of Internet Security, sms K206614300 of 4460 and Ekav, Screen Saver requests to send sms
One of the main methods to combat banner, accessible to ordinary users, at the moment is the selection of the key. To do this you can go to the page with forms of selection on sites Dr.Web and Kaspersky Lab. Also in the network may find the methodology of selection of the key code for SMSki as on the discussions in these forums above, and on simple sites (example).

The next step, after the successful selection of the code is the complete scrutiny of your hard drive for viruses. This should be done more recent versions of antivirus software. On Web sites like "Doctor Web" and "Kaspersky Lab's free curing utility that you can download and do a system scan: "Dr.Web CureIt!" And "Kaspersky Virus Removal Tool". Or, you can download the trial versions of antivirus software license. And then set free, but not bad, antivirus Avast, or buy a license for professional programs. Also, one must have a firewall ( "fire wall") at work on the Internet.

If the code is not able to pick up, then at the various sites that offer various solutions, including those described by me earlier in the previous article in this series.
For example (please note that this information is provided "as is"):
"... It may help to restore the system in the early period, then complete check for viruses ..."
"... Try to start Windu in safe mode and there in the Add or Remove Programs to remove the program that appears ..."
"... Went into safe mode, start the Automatic via msconfig (Start-Run) has all that there is a launch, lost, one by one began to include, what I do not know. Plugin.exe calculate the file sitting on your C: drive in Program Files , removed in the checked startup included, d *** ma no work. Good luck, can help someone. You can also delete the search for a specific date and time through Total komander ... "

Recall that the removal of the last date of files in the folder "C: \ Windows \ System32" could end tragically for your operating system. Even if you are an experienced user. As a result, still may have to reinstall Windu.

I hope that your problem is with the emergence of such blocking would be solved "small" efforts. Also recall that about how to determine the value SMSki and learn about billing, which serves the shortest possible number of articles: "SMS-trap, or, How to pay via SMS on the Internet". And knowing the contacts of the company, you will be able to claim they have the key to unlock the short number and code for SMS.

Overview of "How to unlock windose from banner-extortionist by selecting code"

 

Jan 5, 2010

How to download a file RuTracker.org (ex Torrents.ru)


CAUTION At the moment the site Torrents.ru moved to a new domain and is available at http://rutracker.org/. Everything described in the article is in force, but with the new address. 

This article will focus on how to download the file via Russia's largest bittorrent tracker Torrents.ru. Perhaps the most popular such service in runet. While there are, of course, and a number of similar resources. And many of their founders have positioned themselves as the fact that they come from Torrents.ru. However, the most popular and he has questions like: "How to download the file from torrent ru" - are related in time for him. Indeed, there can be found as new items (movies, books, music), and rare things that do not find anywhere else.

By default, in this article, I accept what you have already studied the article: "How to shake files using bittorrent-tracker". You have already installed the program BitComet and μTorrent (utorrent). And you know about how the system works peer data exchange network and the program itself μTorrent. If you want, then download the overview of a specified article, for clarity.

In fact, the whole physics of the process to know and do not need. Be aware that you will not only download files from a multitude of other people's computers (you - "peer"). You yourself have to pay a distribution already downloaded (you - "seeder"), at least in a proportion determined tracker. The proportion of this form your rating and the possibility of further download the files, if it is low.

But, let's start from the beginning. In order to even have access to the torrent files, you need to register for service. Perhaps this is the link "Register", which is located in the upper left menu forum, which publishes distribute torrents. There you can read the "Rules", then click on "I agree with these terms.

On the next page you will need to fill in the required fields (marked with an asterisk), the standard registration form: "Name", "Address email», «Password", "Confirm password", a confirmation code from the image. Optional fields are: "Where" and "Local Time". Checkbox under the form of familiarization with the user agreement already standing, so click the button "Send (I agree with the terms and conditions). If all goes well, then your mailbox will receive a letter with your login information (username and password), and a link to activate your account. The link in the letter should click the left mouse button - this will open the forum page in the browser. There you can find the results of registration and immediately start looking for ways to purchase or distribute files. A link can also copy, paste in the address bar of your browser and press «Enter» key on your keyboard.

Small note. At the time of this writing, the registration was free. A previously identified first two, but from a recent time one period of time when they could register for the service. Personally, I registered in the interval from 8 to 10 hours to Moscow.

Now you can find the topic on the forum with the distribution of file you're looking. And the bottom of the description of distribution to see the plaque on the right which will be a link "Download. Torrent». After clicking on the link, a window will appear "File Download" in the browser (I have Opera, and what you want). Of course, you can download and uploads manager of the browser, but if the torrent program you have installed correctly, you should not do this.

Select the form of "use my default" and press "Open". Should you choose to start torrent program and see the window add a new torrent. In this window you can reach some configuration download, and most interesting choice of components that you want to download. Of course, if the dealer is set up correctly torrent file and what is heard, consists of several files. The most frequently so you can download selected songs from the whole album when all you do not need.

This technology helps speed up downloading it right parts and reduce the traffic flow. If you agree to download everything, then just click "OK" and start downloading immediately. By default, files are downloaded in the folder «C: \ Documents and Settings \ Admin \ My Documents \ Downloads». If you need to download to another location, then add a torrent in the window, you can change the destination folder to any other. There is such a possibility.

The condition of work Torrents.ru a rating not lower than 0.3. That is, at 1 GB downloaded should be saddled with 300MB issued. Rating begins to act after downloading 5 GB of information (this is approximately 3 movie in good quality). If you have a broadband connection, then you are lucky, and you can vote to hold easily, especially when shaking your popular distribution. But when you do not have the best connection and need a record of traffic, it is best to start with small files.

One of the nuances of downloading using torrent technology is that for unpopular files may be little dealer (oxides). It's entirely possible that the file, even at high speed your connection will swing slowly, and at worst, not entirely. This is due to the fact that you simply will not have sources, which will download the missing parts of a file, or inclusion in the network will have to wait a long time (not in minutes or even hours).

Also, a dealer can be a slow connection. Or a small number of the dealer will be many who wish to download. Accordingly, its narrow channel of distribution will be divided into many people. For example, if he set a speed limit distribution of 100 kbit / sec, then 50 people will receive a file with a rate of 2 kbit / sec per user. If the dealer will be hundreds of such parameters, you should ideally be able to get a file at a speed of 200 kbit / sec. You can, if you should not limit the program to download speeds and your connection is allows.

Such a situation I had when I download books on philately. Is torrent ru, a section of literature and catalogs for collectors. Some of the books rocked for a long time, due to lack of dealer. But occasionally people connected to the Internet, and the distribution took place. So, as the administration itself says: "Be men, do not go with the distribution" for unpopular files. Sometimes, and someone shakes.

Under the "withdraw from the distribution" refers to: Remove torrent file, deleting downloaded from torrents in the program, stop downloading / distribution, transport (with excision) downloaded from the uploads directory, turn off the program, exit from the Internet. Although, sometimes it is necessary, as the user. For example, in the case of services, from which you do not plan to download files.

In one section of the forum Torrents.ru has an excellent selection of answers to all possible questions related to the torrent of technology and specifically with the use of their tracker (link). I highly recommend reading. There is a good HELP for beginners.

His current rating for the tracker, you can see on the page "Rating / Downloads, when you are under the authorization on the site. There you can see it, what files you rocked and what sections they were.

Overview of "How to download from the site Torrents.ru using torrent program":

 

Jan 3, 2010

How to create your electronic mailbox on the Rambler


This article will talk about the registration of the mailbox on the service of one of the oldest search engines Runet Rambler. At the moment, it is more service portal, but also as a search engine, also works successfully. As in Yandex, check account's in Ramah makes it possible to use other system services.

To register, go to the start page of the site at http://www.rambler.ru/. On the left, under the cap site you will see form the entrance to the Rambler projects over which there is a link "Create your pochtu@rambler.ru", which have to click.





You should see the new user registration "Rambler ID". In the form on the page, enter the desired username in English letters and numbers, name and surname. Click "Continue".





If you login, you want is already taken, then the system will prompt you to another with the same word, but with the additional digits. Choose from a sentence, or invent a new, and again zhmete "Continue". If all goes well you will find yourself on a page with a detailed registration form for the mailbox.

The form must enter a password of at least 6 digits or English letters, and then repeat it again. (Note: Do not forget to write the login and password!). Then select the security question and enter the answer to it - maybe once, it will need to reset your password. For this purpose, enter additional emeyl, if any.





Then there is the possibility of registration ICQ, through service Rambler-ICQ. Here, if there is no need for additional room, you can refuse registration, or leave as is - you decide.

After forms ICQ is a form with personal information about a birthday, your floor. After - cell for show with the agreement to receive or not the news service. At the end of the picture in the form of an inscription to charge (when the article was written, used human test with numbers). To complete the registration click on the button "register name". If everything is correct you will transfer to the page with data checked the box and ICQ.

Since the time of registration you are automatically logged in the service, please go to the address http://mail.rambler.ru/ you get in your email inbox. His volume of 50 megabytes, the interface standard features. Spruce Inbox, Sent Mail, Drafts, Trash and the link "Send message" clicking on which you'll be taken to form letters.

To create a letter to
in the "To:" enter the email address of the recipient
in the Subject: "call letter
in the field "Message body" - enter the text of the letter
clicking on the "Attach a file", select the host in a computer file and click "Open"
Click the button "Send email" to send a message.


Here, in principle, and all. Use the boxes now and in the Rambler.

Look, I first created a mailbox on the Rambler:
(Warning: Weight Video - 9,5 MB if you have a weak connection, then after the start, press pause and wait for loading video!)


Jan 2, 2010

What is phishing, and protect him on Yahoo!


First will explain what phishing (http://ru.wikipedia.org/wiki/Fishing). It's such a fraudulent Web technology, when users come to the letter, as it were, from the service (e-mail, forum, classmates, and even the banks). In a letter asking to pass on the link and log into your account. Clicking on the link, the user gets a page exactly like the login page on the service. 



You can not help noticing that the address in the Address bar to one letter different from the original, and enter a username and password in the form. As a result of your cabinet in the service falls into the hands of a rogue - he will get "keys" to lock in your account. As a result - lost money or sensitive data.


Return to your account in the service will be possible, as a rule, only referring to the administration for help. But it will take both time and nerves.


Phishing protection may be mainly only care user. We must remember that no one ever has to require you to enter personal data in any service, including the service itself that will not do. Also, some browsers can be integrated functional warning that the site is unreliable, and may work for anti-virus or firewall, if the phishing page from a computer virus climb.


But let me turn finally to Yahoo. To protect against phishing, they decided to make a "tag" for the computer. That is, you can set so that the entrance to the login page in the mailbox on the form will appear a special image.


The image may be as character text, and any image you downloaded. I only use numbers.


To create a print, go over the login form on the link "Create a personal seal ..", then select print what you create (text or upload an image). Print your text in the opened three ways to enter symbols (five each) and choose a background color Print this page (by clicking on "other colors ..."). To preview print click the button "Browse" button.


If satisfied, click "Save." Will show you the message that if you enter into the box from different computers, you need to create a print for everyone - click button "OK". You will transfer to the login page in the box. In the form of login and password, you will see you have created print - remember it and watch during the next authorization of Yahoo for its existence.


Here's a simple way to protect against phishing invented at Yahoo. To use or not - this is your choice. For access to the box, this chip does not affect.


And remember that the press is not tied to the mailbox, but to the user's computer, probably by setting a cookie (http://ru.wikipedia.org/wiki/Cookies) in your computer. If you are using print, then configure it on all computers used to access the box.



See ten-minute video on how to make a print in Yahoo!:


How to safely use the Internet


I will start from experience.

Almost immediately after their companies to connect homes to the network and the first visits to the Internet, the strangeness began. First, when downloading the browser started open any sites (of course "interesting" content), then began braking.


But patience was exhausted when the night before normal finishing work on the second day when you turn around I was greeted by a message reading: "In your computer downloaded a virus and that you would not have done it will slow down your system. In order to get medication Bring $ 20 on a purse WebMoney WMZxxxxxxxx or E-Gold xxxxxxx. ». And indeed PC was working very slowly, including when running in Safe Mode.


The only solution, then for me was to reinstall the operating system by formatting drive C.


Unfortunately I did not even think to photograph the message. Because the number of purse you can go to arbitration Vebmani to WM-keeper blocked the attacker.


As you may have guessed I think, this article will focus on the fight against malware such as (but head and share it): e-mail worms, Internet worms, file viruses, Trojans, stealth viruses, polymorphic viruses, bodiless viruses, macro viruses, viruses amazing documents of MS Office, script viruses, spyware (Spyware), program-kidnappers passwords, dialer, adware (Adware), a potentially dangerous software, hacking tools, programs, hatches, joke programs, malicious scripts and the like - helluva lot of common in the network.


But something happened that had happened, because of the lack of appropriate software installed on your computer, simply did the necessary with the walking on the network. These are prog, used in conjunction antivirus + firewall (also known as a firewall).


Anti-Virus detects and protects the system from malware already running on your computer (viruses, Trojans, etc.), check the incoming mail and downloadable files. For security but a deep analysis of the system once a week should do, and periodically update the antivirus database.


Firewall also protects against outside intrusion, scanning the computer will warn about the activities of programs seeking access to the network. You'd be surprised how many of them (Wind, for example, although Refresh - Immediately turn off the automatic update system, if you are not licensed windose!). Firewall will also show all the connections currently set to a network that will block unwanted ads, banners and popapy, the activity of malicious scripts running (an elementary example is the already described way to run an undesirable site when you start the browser, which quickly begins to irritate).

I personally use an antivirus program for protection of ESET NOD32 and firewall Outpost FireWall.

In addition to these widely used are: Kaspersky Anti-Virus, DrWeb, Panda Internet Security, Norton AntiVirus; firewall Zona Alarm Security, AGAVA FireWall and many others.

There is also a mass of niche programs. Some of them are struggling just like with keyloggers or block only advertising. Others block the work of trojans gather information about your passwords to access various resources on the Internet and purse payment systems, analyzing the clipboard, and transmitting information to the host of the virus.

So these findings:

Need to attend to secure the protection of your computer (install antivirus and firewall programs - very desirable, in order to guarantee database updates, license, configure your firewall to Windows).

From time to do deep analysis of antivirus and a firewall for malicious programs.

Scan all files downloaded from the Internet for viruses (includes setting up a program-rocking).

Check also all e-mail and download files if you are not sure of their "clean", do not go to suspicious links in the letters had come as "spam".

Immediately delete suspicious if an antivirus program "says" that they are infected. Consider but one thing: Do not use simultaneously two anti-virus software - may cripple the system (they do not play well with each other).

Be sure to keep active anti-virus and firewall when you are on different warez and "interesting" sites.

Therefore, safe walks in the network.