Halaman

BitDefender Internet Security 2012 Review

Kamis, 20 Oktober 2011


Internet Security 2012 suite is marked as BitDefender’s most popular product, and the list of features sure seems to back this up. The bundle is versatile and integrates not only defense against all types of malware, but also spam filtering, firewall protection, parental controls and firewall protection.


Priced at $49.95 (€30) 1 year/1 PC, the suite features an easier install procedure that requires little input from the user. You don’t have to go through complicated configuration wizards and the initial scan takes place before the actual installation of the product begins.

The method takes advantage of cloud-scanning technology included in the installer file, which also doubles as a downloader. The result is simultaneous verification of the system and downloading of the application files. You can see the progress for both activities and monitor the advancement of the installation.

If you have Opera, Thunderbird or Firefox running you’ll be prompted to close them for the entire procedure to complete. On clean systems no restart is required, but if malware is encountered you have to reboot the computer in order to clean up the threats.

The interface is extremely attractive and handling of all protection layers has been drastically simplified up to the point that even a beginner user can deal with most of the options.

With Auto Pilot turned on by default you won’t be bothered by any popups as the application automatically fixes critical issues for you. It may not take the best of decisions at all times, as we’ve seen during our tests, but it will definitely block anything acting suspicious on your system.

Should something not work right, you can correct the problem by simply finding it in the events list, in the main application window. From this panel you can allow the blocked actions for specific programs or restore false positive, if it’s the case, and in our case it was the case several times.

The suite comes with a versatile scan module, which offers all regular checks (quick scan, full scan, custom and vulnerability scan) and something on the side, called Rescue Mode. This is a powerful option as it can verify your system offline, before Windows kicks in, without the need to create a boot rescue disc.

Review image Review image Review image Review image Review image


During our on-demand tests BitDefender showed similar detection rate as in the case of Kaspersky and Panda equivalents, but lower than what the double-engine powering Emsisoft Anti-Malware managed to uncover.

We used the larger sample base, which included 371 threats. After the scan and the cleaning routine, BitDefender left standing a number of 27 items. However, its work was not done, yet, because it reported threats it could not eliminate on the spot and required a system restart to carry out the job.

After the reboot the total amount of malware still available on our disks was 18, 9 less than what it had left initially. All this adds up to a pretty good detection rate, of 95.1%, second highest in our testing until now.

The firewall was not as great as the antivirus engine, but it did a good job when faced against our leak tests. It prevented modification of the physical memory and injecting malicious DLLs as well as modification of the default browser in order to connect to the Internet.

On the other hand, it failed to block injection attempts, which is not too bad since behavior-based detection would report the threats. More elaborate methods like modifying an operating system object in memory, however, could not be stopped.

Tweaking up this module is accessible to beginner users by setting different sprotection levels for the Intrusion Detection System, as well as experts through the advanced configuration panel.

Review image Review image Review image Review image Review image


Users falling in the latter category are able to define rules for applications and restrict connections based on protocol, local and remote address, type of event or IP version. Network adapter rules can also be enforced.

Anti-spam module does not present a challenge as far as configuration is concerned, either. You have three sensitivity levels and on/off knobs for heuristic filtering, link filtering and blocking emails written in Asian and Cyrillic characters.

Spam filtering relies on detection in the cloud for speedy processing and low impact on performance. Our recommendation is to keep this setting enabled. Also, you can choose to submit spam samples to BitDefender cloud for a closer analysis and improved filtering in the future.

It integrates in Outlook, Windows Mail and Thunderbird, the result being a toolbar pinned in these applications’ interface. The toolbar allows you to mark messages as spam or legitimate email as well as create a list of spammers and friends.

During our tests on a batch of over 1000 emails we noticed that the filtering is accurate enough not to mistreat legitimate email. This does not mean you don’t have to deal with spam anymore, since it did let some of it into our inbox. However, this is better than having to fish them out of the trash folder.

The package comes with pretty good parental controls. The module is highly intuitive and does not require too much effort or time to configure. It comes with predefined profiles, each having restrictions imposed according to the age of the user.

You have the possibility to create your own list of websites that should be allowed or blocked as well as impose restrictions to application usage. Keyword control is also available in the module allowing you to block inappropriate words.

A very important part of this layer is the Categories section, where you can impose restrictions to websites with a certain specific: gambling, online shopping, social networks (Facebook and Twitter), news and even search engines (the popular ones as long as it is not an encrypted connection (https://, as well less popular ones such as Yandex).

Review image Review image Review image Review image Review image


Internet access can also be subject to restrictions, so you can set up a schedule and impose time limits. Unfortunately, the interface may give you trouble with the selection of days and hours as deselecting the boxes is not done as smoothly as in other suites featuring this component.

Prevention leakage of personal information is included in the Privacy Control module of the suite. This includes protection against phishing, which is one of the best we’ve seen. Additionally, you can safeguard data such as email addresses, PINs, SSNs, passwords, phone numbers and anything else you wish; it will not be delivered outside your computer via HTTP, SMTP or IM traffic.

BitDefender toolbar is among the top features of this module, as it integrates in the browser and keeps an eye on the traffic and also lets you start a virtualized instance of the web browser. It is responsible to uncover phishing attempts, block pages that contain malware and offer warnings about shady results in the search engines.

We spotted it placed comfortably in all four major browsers, IE, Chrome, Firefox and Opera. However, in the case of the latter integration is not one of the best. It took several attempts to start a virtualized session of Opera, whereas with the other everything worked fine most times. You’ll notice you running the application in the sandbox because the app is enclosed in a black and white border.

Still on the downside, you may not see it tucked in the upper part of the screen on websites featuring dark colored bands like the navigation bar in Google.


Review image Review image Review image Review image Review image


The Good

Great detection rate combined with a pretty good firewall and the possibility to sandbox your default browser make from this security a wise choice. Rescue Mode allows you to run scans before booting into Windows, without burning a bootable disc.

Also, it comes with Safego utility, which is designed to keep your Facebook social life safe from online threats. The intuitive interface makes every module easy to handle and configure.

When in Auto Pilot mode you will not be bothered by messages or alerts. All events are handled automatically based on the current settings and actions are recorded; you also have the possibility to correct misclassification of files and actions.

The Bad

BitDefender Toolbar gave us trouble with the latest Opera and failed to launch a sandboxed instance of the browser on multiple terms. Also, there is no virtualization for running suspicious programs.

Setting up web access schedule in Parental Control module could be done in an easier fashion.

The Truth

BitDefender Internet Security 2012 has everything a user needs to keep the computer safe from malware. It is designed with the home user in mind but does not neglect the needs of a savvy computer user, either.

In terms of features there is little it falls short of compared to other security suite on the market, but compensates through ease of use and the Auto Pilot which takes good decisions automatically.

Sony Ericsson Plans Ice Cream Sandwich Updates for Xperia Devices

During the ongoing year, Sony Ericsson brought to the market over half a dozen handsets running under Google's Android operating system and included in its Xperia lineup, and the company has just confirmed plans to bring the new Android 4.0 Ice Cream Sandwich OS flavor on them.

It does not come too much as a surprise that the Japanese Swedish handset vendor will make this move, since they are trying to gain more ground on the smartphone market, and they will need to make their devices as competitive as possible for that.

At the moment, the company is rolling-out the Android 2.3.4 OS flavor on its Xperia devices launched this year, but it will also make the new OS version available in the near future.

“Sony Ericsson is currently rolling out the upgrade to Gingerbread 2.3.4 across its entire 2011 Xperia smartphone portfolio,” the company reportedly stated.

“This software upgrade will be available through a phased roll out in select markets. Beyond Gingerbread 2.3.4, we plan to upgrade our 2011 Xperia smartphone portfolio to the next Android platform made available to us.”

Sony Ericsson seems to be the first vendor to confirm actual plans on making the new OS version available as an update for its devices.

Other companies are also expected to make the move, though they did not make specific announcements on the matter.

HTC, for example, said that it was still weighing the benefits of delivering the new OS flavor to its customers, while Motorola Mobility confirmed the arrival of this update only for their latest smartphone, the Motorola RAZR.

Samsung is another vendor expected to make the Ice Cream Sandwich OS available for its existing users, but only Nexus S was said to receive the update for the time being.

Ice Cream Sandwich will arrive on shelves on Samsung GALAXY Nexus in the coming weeks, and more on when it is released on various other devices on the market today will be unveiled at that time, so stay tuned.

kumpulan game java gratis

Senin, 17 Oktober 2011

kumpulan game java gratis
ada PES2011
SIM 3
NFS most wanted
ASPHALT 5
dan bnyak lagiii ayooo go ke web iniGOOOO

Asus UX21 and UX31 Zenbook to Reach Europe in November

Rabu, 12 Oktober 2011

Recently launched by the notebook maker in the US, Asus UX21 and UX31 Ultrabooks won't become available in Europe until November of this year and their starting price will be set at 999 Euros.

In the US, Asus has said that its two Ultrabooks will reach retail today, but a quick Google search and e-tailer scan hasn't managed to find any of these notebooks on sale.

The main difference between the UX21 and UX31 ZenBook is the diagonal of the screen used, as the first one carries a 12.1-inch display while the latter is slightly larger measuring 13.3-inch (1600x900 resolution).

Despite this difference, both designs use a thin and light anodized aluminum uni-body chassis that measures no more than 17mm at its thickest point, with an all-aluminum keyboard and glass touchpad, which were designed to accentuate the style of the unit.

At the heart of both of these laptops stand ULV Intel Core processors from the i5 and i7 ranges, which can be paired with 128GB or 256GB solid state drives, stereo speakers with Bang and Olufsen's ICEpower technology, and various connectivity options including Bluetooth, WiFi and USB 3.0.

In addition to the powerful hardware, Asus' Ultrabooks are also tweaked to resume from a sleep state in less than two seconds.

Battery run time is estimated at five hours for the Zenbook UX21, while its older brother can go up to seven hours without requiring a recharge.

Just like in the US, Asus European customers will have five Zenbook models to choose from, two UX21 and three UX31, with prices starting at 999 Euros (in US the cheapest Zenbook is priced at $999).

What's interesting to note is that in Europe both the UX21-KX400V and the UX31E-RY009V can be had for 999 Euros, while in the US users have to pay $100 extra for the UX31. (via Ultrabook News)

Nokia PC Suite 7.1.62.1

Free application for Nokia phones that lets you edit, synchronize and back up many of your phone's files
Written by Bogdan Popa on October 11th, 2011

As a Nokia phone owner, you're surely proud of your device, no matter how old and outdated it is. And of course, because mobile phones have evolved so much in the last few years, owners are always looking to connect their gadgets to computer, some for downloading the latest software update and others for backing up their contacts, files or messages.

This is why Nokia developed the so-called Nokia PC Suite, a software application that's already famous among fans of the Finnish company. The tool is supposed to provide some new functions to those who purchased a Nokia phone, including editing, backing up and synchronizing the files.

And it pretty much does that, as Nokia PC Suite is a pretty easy to use application. The interface is very pleasant and intuitive and it shouldn't take more than a few minutes to get used to it. Plus, all functions could be accessed from the main interface, just after the phone is successfully connected to the computer.

The main problem is actually the fact that it sometimes doesn't work the way it is supposed to. During our test, we encountered several problems connecting the mobile phone to the computer, although it worked good the first time. Afterwards, if the connection was established, file transfer or other functions of the application were not available.

Not to mention the messaging function that has one major downside. Although it allows users to write a SMS message on their computer and send it to someone in the address book, the message isn't also moved to the phone's “Sent” menu, so you can keep track of the conversation.

Otherwise, Nokia PC Suite is a great app, when it works, and taking into account that it's free and you don't have to pay a cent for it, it's worth a try.
Here are some key features of "Nokia PC Suite":

· Back up and restore phone files
· Transfer information, pictures, and music from phone to phone or phone to PC
· Synchronize your phone and PC calendars
· Edit contacts, pictures, and phone file names
· Install Java-based applications in your phone
· Convert ringing tone formats
· Play multimedia messages and videos
· Send text messages from the PC
· Connect by using your phone as a modem

Requirements:

· Nokia Mobile Phone connected to your PC
· Available hard disk space: At least 300 MB of free disk space
· Connection methods: USB cable, infrared (IrDA), or Bluetooth


DOWNLOAD NOW

October 6th, 2011, 21:58 GMT · By Ionut Ilascu and softpedia.com Panda Internet Security 2012 Review

Selasa, 11 Oktober 2011


Panda Internet Security 2012 comes as a complete protection solution, ready to tackle all sorts of digital threats and prevent sensitive information from leaking outside the system.


The price for having the suite protecting your machine for one year is $60.99 (€49,99). Installation is not a complicated process and can be completed even by a beginner user with no problems.

Along the way you get to choose the components you want on the system and tweak the firewall so that it won’t ask for your opinion in the case of common programs (Panda Labs maintains a list of programs you can trust). The entire procedure ends with a system restart, which seems to no longer be common practice, even for Internet Security suites.

The interface is no different than what the heftier suite, Panda Global Protection 2012, offers, but the differences consist in the number of tools and modules available: Internet security 2012 does not come with system optimization utilities, file encryption and file shredding.

Under the Scan menu, besides the regular options (quick, full and custom), you’ll find the possibility to check the system for vulnerabilities. This is actually verification for new updates for the operating system.

Scanning with Panda Internet Security 2012 does not put too much strain on the computer, system resources being maintained under decent values during our tests; CPU held around 50%, on a Dual Core 2GHz system.

Our batch test of samples was the same as in the case of Kaspersky, so it included 304 hand-picked samples. After on-demand scan completed (and it did it very fast), we counted 32 threats left undetected, making an initial detection rate of 89.4%.

The number boiled down to 21 samples the moment we launched them, as the behavioral analysis engine caught them red-handed, thus improving the detection rate to 93.1%. However, elimination rate was not consistent with this value as the application failed to remove all the threats from the computer.

Review image Review image Review image Review image Review image


The firewall included in the bundle is not too elaborate, allowing less experienced users (some basic concepts still have to be known, though) to toy around with the settings quite at ease. You can set inbound/outbound communication, define the ports and protocols that should be used.

During our testing the component showed some flaws as it reported suspicious behavior, but it did not suspend the activity in order to take action according to our answer. Thus, the connection was up and running before we could block it; also, it would take a decision on its own and enable the outbound connection, if we made no effort to set up a rule.

But that was possible only because the network had been set to a trusted location. The moment we switched to a public one the connection was automatically blocked and no communication occurred.

As far as the overall efficiency of the firewall is concerned our results showed that there are still problems with more elaborate attacks like modifying AppinnitDlls or sending info over the Internet using Windows DNS APIs. The results were similar to what we recorded when we evaluated the heftier suite, Panda Global Protection 2012.

With Identity Protection module, bent to identify sensitive details and prevent their transmission, things are fairly the same, as we noticed no improvement. The component would still react in no way when sending passwords and info supposed to be confidential over an encrypted connection (https://).

Review image Review image Review image Review image Review image


On the upside, as long as the information is not encrypted, Panda Internet Security 2012 will prevent it from being sent. This includes the normal channels of communication, like email, supported instant messaging programs (from Yahoo! and Microsoft) or search engines. The sensitive details can be anything from PIN, credit card and bank account numbers, passwords, email and postal addresses, phone numbers or names.

Panda Internet Security’s ability to fight off spam is not the bundle’s strongest point. Outlook 2010 or the latest Thunderbird are not supported and in our tests, with over 1200 email messages we found some valid messages thrown into the junk folder, while very few spam reached our inbox.

Sending legitimate emails to trash kind of defeats the purpose of spam filtering, and we’d rather clean the inbox folder of spam manually rather than search for important messages in the junk.

Although not desirable, if relying on Panda’s spam classification, you have to look into the spam folder every now and then and fish out valid items. By reclassifying them yourself as legitimate, emails sharing the same characteristics will no longer be misjudged.

There aren’t too many settings to explore and the filtering is automatically managed through Panda’s own detection algorithm. But you can build a list of email addresses or domains you trust, which will not be filtered out of your inbox.

Parental controls are the same as in PG 2012. We found it is not too easy to reach specific restricted content, but you can get access to banned material.

Besides the modules encompassed by the suite, Panda IS 2012 also makes available a virtual environment specifically designed for safe browsing. Safe Browser is not inherent in the suite and can be downloaded separately, and is actually a modified version of VirtualBox with Firefox browser in it.

USB Vaccine, the second extra tool that you also can use individually, will remove autorun capability from removable drives, thus eliminating the threat of auto-executing malware.

An additional instrument is the virtual keyboard, available in the package to keep loggers from capturing your key strokes.

Review image Review image Review image Review image Review image


The Good

It is a comprehensive security suite that encompasses plenty of protection layers that keep the computer safe from malware. You can easily navigate from one module from another and configuring the suite does not require excessive knowledge.

Sensitive information can be prevented from leaking outside the computer. The set of extra tools (local and online backup, Safe Browser, USB Vaccine, Virtual Keyboard) add to the value of the suite.

The Bad

Panda permanent protection crashed on us twice. Info about the state of each module is not accurately displayed at times, or it may take a while for the screen to refresh and show the correct state.

The firewall did not work as expected and showed that it cannot face more elaborate forms of attack. There is no anti-spam support for Outlook 2010 or Mozilla Thunderbird.

The Truth

Panda Internet Security 2012 is not the best suite on the market. It is capable to protect a system, but only up to a point. Not all the modules are adapted to current time and we experienced some trouble on our test system. However, malware detection rate is quite good and positions it among the best products users can grab.

SMART LOGO WIN 7 32bit (ASUS K42F only)

Smart logon adalah fitur andalan ASUS karena sistem security ini sangat di minati banyak orang karena mampu mengaman kan laptop orang dari tangan2 jahil dan tidak bertangguang jawab

APLIKASI CHAT HP PALING POPULER

Senin, 10 Oktober 2011

TAUKAH ANDA APLIKASI CHAT DI HP YANG PALING POPULER SAAT INI??
1.MIG33
paling populer di lengkapi dengan fitur game dan chat FB dan bnyak lagi fitur2 laen nya dan memakai sistem CASH GET UP TO APLIKASI
2.NIMBUZZ
nimbuz nie sangat populer karena memiliki fitur yang tidak terlalu lengkap
3.ebuddy
siapa yangh g pernah menggunakan aplikasi ini karena bisa buat online langsng di FB TWITTER MSN GOOGLETALK DLL



itu lah tips dari kami
resouce : SMKN 5 MALANG THE BEST SCHOOL

Windows 8 Send Feedback Tool

resouce: SOFTPEDIA
microsoft.com

Plain vanilla testers need to stick to the official Windows 8 blog and forum to share feedback with Microsoft, but some lucky early adopters get to send input on the next version of Windows directly to the company.

As far as Steven Sinofsky, president, Windows and Windows Live Division is concerned, the “Windows Developer Preview: General OS questions” is the best place to share Windows 8 suggestions, requests, bug reports, etc.

When he announced the launch of the Windows Developer Preview in mid-September 2011 at BUILD, the Windows chief also pointed potential testers to the forums with the following message:

“I wanted to offer a pointer to the best place to have discussions about Windows 8. Please head over to the forums we have set up to discuss the product and answer questions. As we have seen, the commenting mechanism is not a great place to have a wide variety of topics different than the topic of the post while keeping track of the discussion. We set up this short URL to be easy to remember: http://win8.ms/forums gets you to the general forum.”

Things are a tad different for BUILD participants, for example. BUILD attendees received instructions on how to leverage Microsoft Connect in order to share their feedback with Microsoft.

MSDN subscribers also have access to a more direct live to the software giant when it comes down to testing Windows 8 and providing input, namely the Windows Send Feedback Tool.

The company is offering the Windows 8 Send Feedback Tool exclusively through Microsoft Connect.

As I’ve already said, those that attended BUILD already have the instructions to get to the Windows 8 Send Feedback Tool downloads.

For subscribers to MSDN is almost just as simple. They need to sign in using their Windows Live ID, make their way to subscriber downloads, and find the Windows Developer Preview bits.

Some of the downloads offered via MSDN, under Product Keys, offer a small code snipped designed to let testers join the Windows Developer Preview feedback program. What this means is that they get access to the Windows 8 Send Feedback Tool through Connect, and they can start leveraging it to send their input to Microsoft.

Download SQL Server 2008 Service Pack 3 (SP3) RTM

resouce: SOFTPEDIA.com

Microsoft wrapped up and released the third upgrade to SQL Server 2008. Along with SQL Server 2008 Service Pack 3, customers running this version of the company’s data platform can also download SQL Server 2008 SP3 Express Edition.

As it was the case with SP2, and similar upgrades, SP3 is provided free of charge to all existing SQL Server 2008 customers. Nor will existing users have to ink any additional service contract, according to Abhishek Sinha, program manager SQL Server Sustained Engineering.

The Microsoft Download Center offers Service Pack 3 standalone releases for all flavors of SQL Server 2008, and links are also included at the bottom of this article.

Sinha stresses that customers should not expect a major upgrade from SQL Server 2008 SP3. This particular service pack release is focused more on centralizing all bug fixes and updates for the data platform than on the evolution of SQL Server 2008.

Here are a number of updates in SQL Server 2008 SP3 as highlighted by Sinha:

“• Enhanced upgrade experience from previous versions of SQL Server to SQL Server 2008 SP3. In addition, we have increased the performance & reliability of the setup experience.

• In SQL Server Integration Services logs will now show the total number of rows sent in Data Flows.

• Enhanced warning messages when creating the maintenance plan if the Shrink Database option is enabled.

• Resolving database issue with transparent data encryption enabled and making it available even if certificate is dropped.

• Optimized query outcomes when indexed Spatial Data Type column is referenced by DTA (Database Tuning Advisor).

• Superior user experience with Sequence Functions (e.g Row_Numbers()) in a Parallel execution plan.”

In addition to the changes enumerated above, SQL Server 2008 SP3 also contains fixes for a number of issues that were reported to Microsoft through the company’s customer feedback platforms.

The service pack also includes all the hotfixes that the software giant provided with the four Cumulative Updates issued after the release of SQL Server 2008 SP2. DOWNLOAD NOW

Red Orchestra 2: Heroes of Stalingrad Gets Glitch Fixes, Player Stats Reset

resouce SOFTPEDIA

The developers at Tripwire Interactive have announced that they are planning to reset the stats of all the players who are engaged with their Red Orchestra 2: Heroes of Stalingrad first person shooter as they are deploying a number of fixes for some of the biggest glitches that affected the game.

Ever since the game was launched during the early days of September players have complained that some gamers received stats boosts and achievements without actually winning them on the battlefield.

The game has also been affected by glitches and performance problems.

Since then the developers at Tripwire Interactive have launch a number of game updates.

All those who have played the game until now will get a special achievement, called “In B4 Reset”, which will certify their time spent playing the game even if their progress is wiped out.

The developers are saying that this achievement might bring in some bonuses in the near future and Red Orchestra 2 will also have double experience play for the next few weeks.

A statement from Tripwire Interactive says, “This was not an easy decision for us to make, but one we felt we needed to do to preserve the integrity of the stats and ranking system, and to provide all of the players the best experience with the game over the long term.”

Despite the problems that affected Red Orchestra 2: Heroes of Stalingrad Tripwire Interactive says that it has managed to get more sales than the first game in the series during the first two weeks on sale.

It has been the biggest launch for Tripwire so far in their history, with three times the sales created by Killing Floor.

The developers have made it clear that they will be offering long term support for Red Orchestra 2.

Accelerate Your Downloads

All web browsers have the capability to download files from the Internet. But more important is the speed reached for getting the data on your computer. Internet Download Manager has been created with the sole purpose of shortening the download times by dynamically segmenting the target file and initiating multiple connections to get it.


The price tag for the application reads $29.95 (€21.95). Installation process, although not complicated, is old-school and takes you through plenty of screens. The good news is that you do not have to worry about third party code being pushed onto your system.

As soon as the installation completes you will be notified that Internet Download Manager replaces the download manager of your web browsers. The application supports all major browsers on the market, from Google Chrome, Internet Explorer and Firefox to Opera and Safari, but you can add new navigation tools as well.

IDM is not intrusive and sits in the system tray waiting for a download job. You don’t have to do anything extra for this since the app automatically takes over the task; the only difference is that instead of the web browser’s download manager IDM will kick in with its own download screen.

This lets you set the download location for the file, shows the size of the download job and the URL. The options available let you initiate the task or postpone it for a later time. Going with the second choice allows adding the file to a download queue, which can be processed at a time you define in the scheduler.

Review image Review image Review image Review image


With support for creating multiple queues, Internet Download Manager proves to be a very versatile program, ready to tackle any need. It organizes the files into predefined folders, according to their type. All default download locations can be changed to places that suit you best.

Looks are not impressive, but the layout of the interface is easy to handle and intuitive. Download categories and available queues run down in the left hand part of the screen while in the right there are all the items that have been downloaded or waiting to get to your system (queued).

In order to preserve your bandwidth for other tasks as well, IDM comes with the possibility to impose speed limits. These can be applied individually, per each download, or you can set the same limit for all of them.

As for the performance of the application, during our testing we noticed improved download speeds compared to what Chrome and Firefox offered. Internet Download Manager scored the best time for download jobs as large as 700MB.

The difference was as clear as possible, with Chrome taking as much as 6’22’’ to complete a job, Firefox recording about 5 minutes. On the other hand, IDM finished the same task in 3’10’’.

When retrieving a 700MB file, the average speed recorded by Google Chrome was 1.8MB, while Firefox was a bit faster at 2.4MB. However, Internet Download Manager came first, with an average speed of about 3.7MB/s.

However, IDM’s speed was calculated for the exact moment the download was completed. The application took another 27 seconds to join the segments. All managers were constant as far as the speed is concerned and very small variations were recorded.

Configuring IDM is no big thing. All options are easy to understand and you can refer to the help file for additional information. The settings include the possibility to set a key combination that prevents IDM from taking over the download task. The same is available to force the application to undertake the job.

Moreover, you can customize the type of files for which the download should start automatically as well as define the storage path for each file category predefined in the program.

Customization goes further, allowing you to define the maximum number of connection IDM should initiate. The default value is 8, but you can go enable as much as 16 simultaneous connections. Additionally, exceptions for the number of threads can be defined for specific servers that send the data. Should access to remote files require login credentials, IDM is ready to store and apply them automatically when necessary.

For each queue list created you can define a schedule and enforce an action (exit the application, turn off computer) when the download job completes. The program supports as many queue lists as you can create and offers easy management.

Review image Review image Review image Review image


The Good

During our tests it was the fastest download manager, recording speeds much over what competition attained. It is easy to handle and offers a rich diversity of options, from creating queue lists that can be scheduled to be processed at a specific time and with a specific frequency to setting up speed limits.

Integration with all popular web browsers also adds to its value. All downloaded data can be organized into categories according to their type.

The Bad

IDM download panel, designed to capture downloads for specific files, is enabled by default and is a bit annoying when browsing the web and it detects downloadable media content.

The Truth

If you’re hunting down big files on the web then Internet Download Manager is a way to go. It is easy to work with and does cut down the download times significantly.

During our tests it proved it can integrate with Chrome, Firefox and Internet Explorer beautifully, in a non-intrusive manner. It simply made its presence known only when we needed to download a file.

Customization settings and the features it comes with are great for users that require heavy downloading from the Web. Queues and storing files in categories provides a better management of the downloaded data.

free download






resauce : softpedia.com

SUMBER INFORMAI BLOG KAMI

Sabtu, 08 Oktober 2011

KAMI MENGAMBIL INFORMASI INI DARI
www.ASUS.co.id
www.softpedia.com

THANKSSS


trimakisih kepada www.ASUS.co.id
www.softpedia.com

Download NVIDIA Quadro/Tesla Driver 276.14 WHQL


It wasn't too long ago that NVIDIA released its newest Beta desktop and notebook display driver for GeForce and ION graphics, but now the company has brought forth a different software package, for the Quadro and Tesla product series.

The NVIDIA Quadro/Tesla Driver Release 276.14 WHQL is the latest installment of the enterprise-aimed software.

It does several things, not the least of which is adding 10-bit Greyscale support through DVI for Windows 7 (medical displays are one example where this helps).

Another useful thing is the implementation of G-Sync, which allows Direct3D application to synchronize back buffer presents across more than one GPU in a system, or even multiple systems, for both full-screen and multi-window programs.

Furthermore, the package installs a new OpenGL path rendering API, which allows OpenGL applications to render high-quality 2D and text.

Furthermore, the R275 ODE 'Optimal Drivers for Enterprise’ drivers are installed, as is the NVIDIA WMI service.

One will also benefit from updated NVIDIA Control Panel options to both the display and workstation sections.

All these and more are offered on top of the already existing support for CUDA 4.0, OpenGL 4.1, DirectX 11 and the Open Computing Language (OpenCL) 1.0 (this final asset is present only on the Quadro FX Series x700 and newer, as well as the FX4600 and FX5600).

These features are described in detail on the download pages listed below, so enterprise users who own a Quadro or Tesla product, or an NVS series, need only follow the appropriate links to the full list of changes.




NVIDIA Quadro/Tesla Display Driver 276.14 WHQL for XP

NVIDIA Quadro/Tesla Display Driver 276.14 WHQL for Vista/Windows 7 NVIDIA Quadro/Tesla Display Driver 276.14 WHQL for Vista64/Windows x64

Explaining the Configurations Uranus and Mercury


Astronomers have been struggling to explain numerous odd properties displayed by Mercury and Uranus for many years now, but leading theories were just discredited over the past few days. Now, astronomers begin to search for new explanations of what actually happened.

This line of inquiry is very difficult to push forward, since obtaining answers would require a deep understanding of how the solar system looked like in its earliest days, when the planets were just forming. This is obviously impossible to figure out in minute detail.

In other words, the way the solar system and its planets look like now was decided more than 4 billion years ago. The thing that puzzles experts most about Mercury is its large iron core, which lies close to the surface, Similarly, they cannot explain why Uranus lies at a steep angle while orbiting the Sun.

In the past, scientists have proposed that a huge portion of Mercury's crust may have been stripped away following a monumental cosmic collision that involved another protoplanet in the early solar system.

The same type of event may have contributed to tilting Uranus' axis in orbit, forcing the gas giant to exhibit its current weird looks. But these scenarios fell in 2011, as new data became available for study.

The NASA Mercury Surface, Space Environment, Geochemistry and Ranging (MESSENGER) space probe provided data that utterly contradict the impact theory for the solar system's innermost planet.

As for Uranus, the thing that drove the final nail through the previous theory's coffin was the discovery that its moons still orbited in its equatorial plane. If an impactor had slammed the gas giant, then the moons would have had no reason to be in this position.

According to University of California in Santa Barbara (UCSB) physicist Stanton Peale, the impact hypothesis also can't explain why Pluto's moons orbit so weirdly around the dwarf planet. At a recent convention, astronomers proposed new explanations for the oddities these space bodies display.

Harvard University planetary scientist Sarah Stewart said that Mercury could have been impacted by another object in a manner that allowed it to retain the volatile compounds MESSENGER discovered.

The announcement was made a joint meeting of the European Planetary Science Congress and the Division for Planetary Sciences of the American Astronomical Society, ScienceNow reports.

French astronomer Alessandro Morbidelli, who is based at the Observatoire de la Côte d'Azur in Nice, also presented new data to indicate what kind of impact may have modified the entire Uranian system the way it did.

“You only lose volatiles if they somehow can get separated from the heavier, more refractory elements. For instance, our own moon is low in volatile elements because it slowly coalesced from a churning, hot disk of material surrounding the Earth,” Stewart says.

“But in the case of Mercury, the impact debris cooled pretty quickly, so most of the potassium and sulfur was preserved,” the expert adds, thus explaining MESSENGER's readings.

In turn, Morbidelli proposed that Uranus was indeed affected by a collision, but argued that the event occurred significantly earlier in time than first calculates. At the same time, changing this planetary system required multiple impacts.

“In the early days of the solar system, there may have been many hundreds of protoplanets drifting around in the system's outer regions. Giant collisions were, of course, more likely to occur very early on,” the astronomer concluded.

Microsoft Security Essentials 2.1 Updated to Resolve Chrome False Positive


free download Microsoft Security Essentials 2.1 has been updated in order to resolve a false positive involving Google’s open source browser, Chrome.

At the end of September 2011, MSE 2.1 began incorrectly detecting Chrome as malware, notifying users that they were infected with PWS:Win32/Zbot.

Microsoft Security Essentials 2.1 recommended that users remove the newly identified piece of malicious code, and deleted Chrome for those that agreed to get rid of PWS:Win32/Zbot.

Furthermore, the Redmond company’s free security solution for Windows also blocked installations of Chrome, warning users that their machines were at risk of infection from PWS:Win32/Zbot.

Once users began complaining about the issues they were coming across with Microsoft Security Essentials and Chrome, the software giant confirmed the problem and reacted quickly to resolve it.

The signatures of Microsoft Security Essentials were updated, and provided that the refresh is installed, Chrome is no longer detected as PWS:Win32/Zbot.

“On September 30th, 2011, an incorrect detection for PWS:Win32/Zbot was identified and as a result, Google Chrome was inadvertently blocked and in some cases removed. Within a few hours, Microsoft released an update that addresses the issue,” the company said.

“Signature versions 1.113.672.0 and higher include this update. Affected customers should manually update Microsoft Security Essentials with the latest signatures. After updating the definitions, reinstall Google Chrome. We apologize for the inconvenience this may have caused our customers.”

It sounds like this was simply a case of false positive due to incorrect virus signatures. According to AV-Test, Microsoft Security Essentials is one of the top security solutions worldwide efficiency-wise.

This means that MSE usually has a very low number of false positives, false warnings and false blockings, zero in fact, the vast majority of the time.

Here is what MSE 2.1 was thinking it was detecting instead of Chrome: “PWS:Win32/Zbot is a password-stealing trojan that monitors for visits to certain websites. It allows limited backdoor access and control and may terminate certain security-related processes,” Microsoft said.

Release Date: September 8, 2011 GOM Player 2.1.33.5071 (8.74MB)


System Requirements

Microsoft Windows 98SE, Me, 2000, XP, 2003, Vista or Windows 7
Intel-compatible CPU P3 or greater Minimum amount of RAM recommended by the operating system in use 20MB Hard Drive Space.
Some videos may require the newest version of DirectX or Windows Media Player.
Recommended settings may change according to different types of video files.
Modify 'Deadlock problem' occasionally happened when you shut down the player.
Improve Vorbis audio decoder performance.

FREE DOWNLOAD GOM

Camera (10) Version V5.8.54000.206 ASUS k42

Jumat, 07 Oktober 2011

Description Azurewave Camera Driver
Azurewave Camera Driver for WIN7 32 bit

1. Please refer to below FAQ to check your camera's PID code and install the driver correctly:

http://support.asus.com/Search/KDetail.aspx?SLanguage=en&no=DACB9270-6382-BC3B-5B91-50900D9F0041&t=2FREE DOWNLOAD



2. This driver is for below PID code:
HardwareID2=USB\VID_13D3&PID_5120&MI_00

HardwareID3=USB\VID_13D3&PID_5130&MI_00

WLAN ASUS K42 Azurewave NB037 Wireless Lan Driver and Application

63,81 (MBytes) di buat pada 2011.03.15 dan memiliki kualitas yang tinggi

DOWNLOAD NO "ASUS K42 ONLY"

VGA driver intel graphics Version V8.15.10.2125

driver VGA intel terbaru update 2010.06.23

ASUS K42 ONLY

Smadav 2011 Rev. 8.7

Rabu, 05 Oktober 2011

Penambahan database 100 virus baru, Teknik pendeteksian baru (FFD) : pencegahan total untuk virus dari USB Flashdisk, Fitur bahasa inggris sudah bisa digunakan di Smadav Free, Perubahan struktur settings, dsb.

Microsoft Security Essentials 2.1 Updated to Resolve Chrome False Positive

At the end of September 2011, MSE 2.1 began incorrectly detecting Chrome as malware, notifying users that they were infected with PWS:Win32/Zbot.

Microsoft Security Essentials 2.1 recommended that users remove the newly identified piece of malicious code, and deleted Chrome for those that agreed to get rid of PWS:Win32/Zbot.

Furthermore, the Redmond company’s free security solution for Windows also blocked installations of Chrome, warning users that their machines were at risk of infection from PWS:Win32/Zbot.

Once users began complaining about the issues they were coming across with Microsoft Security Essentials and Chrome, the software giant confirmed the problem and reacted quickly to resolve it.

The signatures of Microsoft Security Essentials were updated, and provided that the refresh is installed, Chrome is no longer detected as PWS:Win32/Zbot.

“On September 30th, 2011, an incorrect detection for PWS:Win32/Zbot was identified and as a result, Google Chrome was inadvertently blocked and in some cases removed. Within a few hours, Microsoft released an update that addresses the issue,” the company said.

“Signature versions 1.113.672.0 and higher include this update. Affected customers should manually update Microsoft Security Essentials with the latest signatures. After updating the definitions, reinstall Google Chrome. We apologize for the inconvenience this may have caused our customers.”

It sounds like this was simply a case of false positive due to incorrect virus signatures. According to AV-Test, Microsoft Security Essentials is one of the top security solutions worldwide efficiency-wise.

This means that MSE usually has a very low number of false positives, false warnings and false blockings, zero in fact, the vast majority of the time.

Here is what MSE 2.1 was thinking it was detecting instead of Chrome: “PWS:Win32/Zbot is a password-stealing trojan that monitors for visits to certain websites. It allows limited backdoor access and control and may terminate certain security-related processes,” Microsoft said.

Microsoft Security Essentials (MSE) 2.1 is available for download here.

Avira Updates Product Line to Version 12

Enlarge picture - Avira comes with a new interface
The philosophy behind the new range of Avira products is “less is more”, and this means improved protection with less complex handling of features and options.

The new Avira model includes a redesigned interface and new detection mechanisms. Counter-measures against process termination or component deletion have also been taken in the latest release.

All products have been equipped with automatic detection and removal of potentially incompatible software, which means that the new line from Avira will not allow running of two security solutions on the same system.

Ask.com toolbar and changing the search engine to Ask is included in the installation process, but you have the option to opt-in for the modification.

Some changes in the names of the products also occurred. Thus, the latest set comprises Avira Antivirus Premium (€19.95), Avira Internet Security (€39.95), Avira Professional Security (€26.30 plus VAT) and Avira Server Security (€269 plus VAT). No modification has been made to Avira Free Antivirus’ name.

Adobe Flash Player 11.0.1.152

dobe Flash Player is the client runtime that delivers powerful and consistent user experiences across major operating systems, browsers, mobile phones, and devices.

Flash Player delivers beautiful HD video, faster graphics rendering, and high performance on mobile devices and personal computers and is designed to take advantage of native device capabilities — enabling richer, more immersive user experiences.

Due to security features in the Adobe Flash Player ActiveX Control, you must first remove all existing installations of Flash Player from your Windows system before installing prerelease versions of the Flash Player ActiveX Control:
· Download the uninstaller
· Open the Windows Command Prompt ( Run > cmd ).
· Navigate to the directory where the uninstaller was downloaded.
· Run "uninstall_flash_player.exe /clean."

Flash Player enables organizations and individuals to build and deliver great digital experiences to their end users.

Here are some key features of "Adobe Flash Player":

Support for mobile devices:
· Extend the reach of your content to users wherever they are. Flash Player delivers expressive content to personal computers, smartphones, tablets, smartbooks, and netbooks.

Mobile-ready features for unprecedented creative control:
· Take advantage of native device capabilities, including support for multitouch, gestures, mobile input models, and accelerometer input.

Hardware acceleration:
· Deliver smooth high-definition (HD) quality video with minimal overhead across mobile devices and personal computers using H.264 video decoding and Stage Video.

Expanded options for high-quality media delivery:
· Discover new ways to deliver rich media experiences with the Adobe Flash Media Server Family of products using HTTP Dynamic Streaming; content protection; and improved support for live events, buffer control, and peer-assisted networking.

Requirements:

· Processor Intel Pentium 4 2.33GHz, Athlon 64 2800+ or faster processor (or equivalent)
· Memory: 128 MB of RAM
· Graphics memory: 128 MB of graphics memory
· Internet Explorer 6.0 and above
· Mozilla Firefox 3.0 and above
· Google Chrome
· Safari 4.0 and above
· Opera 9.5 and above
· AOL 9.0 and above

What's New in This Release: [ read full changelog ]

· Critical vulnerabilities have been identified in Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris, and Adobe Flash Player 10.3.186.6 and earlier versions for Android. These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system.
· There are reports that one of these vulnerabilities (CVE-2011-2444) is being exploited in the wild in active targeted attacks designed to trick the user into clicking on a malicious link delivered in an email message. This universal cross-site scripting issue could be used to take actions on a user's behalf on any website or webmail provider if the user visits a malicious website.
· This update resolves an AVM stack overflow issue that may allow for remote code execution. (CVE-2011-2426).
· This update resolves an AVM stack overflow issue that may lead to denial of service and code execution. (CVE-2011-2427).
· This update resolves a logic error issue which ca...KLIK HERE FOR DOWNLOAD

AMD Catalyst Rage Performance Display Driver 11.9 for Windows 7

AMD Catalyst Rage Performance Driver Features:
- Significant performance gains for single GPU configurations
- Compatible with AMD Radeon 6000 and AMD Radeon 5000 series of graphics products
- Includes the latest OpenGL driver component for Rage performance optimizations



It is highly recommended to always use the most recent driver version available.

Do not forget to check with our site as often as possible in order to stay updated on the latest drivers, software and games.

Try to set a system restore point before installing a device driver. This will help if you installed a wrong driver. Problems can arise when your hardware device is too old or not supported any longer.DOWNLOAD

debiam command

II. Perintah Dasar
Perintah dasar yang sering digunakan dalam linux adalah sebagai berikut :
1. ls : melihat isi direktori yang aktif
Contoh : debian:/# cd /root
debian :/root# ls  menampilkan isi direktori root
2. cat : melihat isi file secara keseluruhan
Contoh : debian:/# cat [nama_file]
3. more : menampilkan isi file per layer
Contoh : debian:/#more [nama_file]
4. tail : menampilkan sepuluh baris terakhir
Contoh : debian:/#tail [nama_file]
5. less : melihat isi file tetapi yang bisa discroll
Contoh : debian:/#less [nama_file]
6. cp : mengkopi file
Contoh : debian:/#cp file1 /home  mengkopi file1 dari root ke direktori home
7. mv : memindahkan file
Contoh : debian:/#mv file1 /home
8. rm : menghapus file
Contoh : debian:/#rm [nama_file]
9. mkdir : membuat direktori
contoh: debian:/#mkdir [nama_direktori]
10. rmdir : menghapus direktori
contoh: debian:/#rmdir [nama_direktori]
11. cd : pindah direktori
contoh: debian:/#cd root  pindah ke direktori root
III. Filesystem Hierarchy Standard

Filesystem Hierarchy Standard (FHS) adalah standar yang digunakan oleh perangkat lunak dan pengguna untuk mengetahui lokasi dari file atau direktori yang berada pada komputer. Hal ini dilakukan dengan cara menetapkan prinsip-prinsip dasar pada setiap daerah pada sistem file, menetapkan file dan direktori minimum yang dibutuhkan, mengatur banyaknya pengecualian dan mengatur kasus yang sebelumnya pernah mengalami konflik secara spesifik.
Dokumen FHS ini digunakan oleh pembuat perangkat lunak untuk menciptakan suatu aplikasi yang compliant dengan FHS. Selain itu, dokumen ini juga digunakan oleh para pembuat sistem operasi untuk menyediakan sistem yang compliant dengan FHS.

Direktori Deskripsi
/etc Berisi file administrative (konfigurasi dll) dan file executable atau script yang berguna untuk administrasi system.
/dev Berisi file khusus yang merepresentasikan peralatan hardware seperti memori, disk, printer, tape, floppy, jaringan dll.
/bin Berisi program standar Linux (binary).
/sbin Berisi perintah-perintah yang berhubungan dengan dengan system (hanya super user).
/lib Berisi program library yang diperlukan untuk kompilasi program (misalnya C). Berisi instruksi (command) misalnya untuk Print Spooler (lpadmin) dll.
/tmp Berisi file sementara, yang pada saat Bootstrap akan dihapus
/boot Berisi file yang sangat penting untuk proses bootstrap. Kernel vmlinuz disimpan di direktori ini.
/proc Berisi informasi tentang kernel Linux, proses dan virtual system file.
/var Direktori variable, artinya tempan penyimpanan LOG (catatan hasil output program), file ini dapat membengkak dan perlu dimonitor perkembangannya.
/home Berisi direktori untuk pemakai Linux (pada SCO diletakkan pada /usr)
/mnt Direktori untuk mounting system file
/root Home direktori untuk superuser (root)
/usr/bin/X11 Symbolic link ke /usr/X11R6/bin, program untuk X-Window
/usr/src Source code untuk Linux
/opt Option, direktori ini biasanya berisi aplikasi tambahan (“add-on”) seperti Netscape Navigator, kde, gnome, applix dll.
/usr Berisi subdirectory yang bisa di execute oleh semua user
/sys Berisi system, driver-driver yang aktif dan lebih tertata
lost+found Berisi informasi jika kita melakukan command fsck



Direktori /dev
Konsep Unix dan Linux adalah memperlakukan peralatan hardware sama seperti penanganan file. Setiap alat mempunyai nama file yang disimpan pada direktori /dev.
Peralatan Direktori
Floppy /dev/fd0
Harddisk IDE : /dev/had, /dev/hdb, /dev/hdc, /dev/hdd
SCSI : /dev/sda, /dev/sdb, /dev/sdc
CDROM SCSI : /dev/scd0, /dev/scd1
IDE : /dev/cdrom
Universal : /dev/cdrom (link dari actual cdrom ide atau scsi)
Mouse PS2 : /dev/psaux
Universal : /dev/mouse
Parallel Port LPT1 : /dev/lp0
LPT2 : /dev/lp1
Serial Port COM1 : /dev/ttyS0
COM2 : /dev/ttyS1
Universal : /dev/modem (link dari S0 atau S1)

Direktori /proc
Direktori /proc adalah direktori yang dibuat diatas RAM (Random Access Memory) dengan system file yang diatur oleh kernel. /proc berisi nomor proses dari system dan nama driver yang aktif di system. Semua direktori berukuran 0 (kosong) kecuali file kcore dan self. Setiap nomor yang ada pada direktori tsb merepresentasikan PID (Process ID).


IV.Editor vi
vim adalah perintah terbaru dari vi. Editor ini dapat digunakan untuk mengedit seluruh plain text seperti vi. Sangat bagus bagi pengedit program karena memberikan kemudahan secara cepat dalam hal pengeditan.
Bentuk umum:
vim [nama file]

vim terdiri dari 2 (dua) mode :
1. Mode Command
Pada mode ini hanya dapat melakukan pembacaan, dilakukan dengan menekan Esc.
2. Mode Insert
Pada mode ini kita dapat melakukan penulisan, dapat dilakukan dengan menekan Insert (i).

Tabel perintah-perintah vim editor pada mode command

Kunci Keterangan
:wq Write dan quite, simpan file dan keluar
:q! Keluar vi tanpa menyimpan
:se all Menampilkan semua pilihan set status
:se nu Menampilkan nomor baris pada kiri layar
:! Keluar untuk sementara dari editor vi dan menjalankan perintah yang lain
:w Untuk menyimpan file.
:? Untuk mencari sebuah kata.
:,s// Mencari dan merubah kata atau karakter
/ Untuk mencari karakter.
/string Mencari string ke arah depan
?string Mencari string ke arah belakang
K Pindah kursor ke atas
L Pindah kursor ke bawah
O Menyisipkan teks (satu baris setelah posisi kursor)

Untuk keluar dari 5 model kunci insert di samping ini dan mengaktifkan kunci-kunci lain, maka kita harus menekan tombol Esc terlebih dahulu.
I Menyisipkan teks (di sebelah kiri posisi kursor)
A Menyisipkan teks (di sebelah kanan posisi kursor)
I
(shift i) Menyisipkan teks (di posisi awal baris)
A
(shift a) Menyisipkan teks (di posisi akhir baris)
H Pindah kursor ke kiri satu karakter
X Menghapus 1 huruf (di sebelah kanan posisi kursor)
P (Paste) Menampilkan baris kalimat yang sudah dikopi dengan kunci yy
B Menggerakkan kursor ke kiri satu kata
N Meneruskan pencarian untuk arah yang sama
N Meneruskan pencarian untuk arah yang berbeda
W Manggerakkan kursor ke kanan satu kata
U Membatalkan perintah yang terakhir kali
U Membatalkan seluruh perubahan teks pada baris tempat kursor berada
J Pindah kursor ke kanan satu karakter
Dd Menghapus 1 baris (di sebelah kanan posisi kursor)
Dw Manghapus 1 kata (di sebelah kanan posisi kursor)
Yy Mengkopi 1 baris
2yy Mengkopi 2 baris
Cw Mengganti 1 kata yang telah ditulis di sebelah kanan posisi kursor dengan kata lain
Cc Mengganti 1 baris kalimat yang telah ditulis di sebelah kanan posisi kursor dengan kalimat lain
^ Pergi ke awal baris
$ Pergi ke akhir baris
ctrl-b Mundur satu layar
ctrl-f Maju satu layar
ctrl-d Maju setengah layar
Ctrl+v Blocking (Visual block)
Shift+v


IV. Keyboard Short Cut
Ctrl+P  untuk logout
Ctrl+l  untuk membersihkan layar
Ctrl+u  untuk menghapus command
Tab  untuk melengkapi


V. Debian Command
# apt-cache search [packet]
Digunakan untuk mencari paket-paket yang dibutuhkan.

# apt-get install [packet]
Digunakan untuk menginstall paket-paket yang diperlukan.

# apt-get remove [packet]
Digunakan untuk uninstall paket.

# dpkg
Digunakan untuk menginstall paket-paket dari dalam.

# dselect
Digunakan untuk add/remove program/paket-paket.