BeZhare to Japan

Give moral support to our brothers in Japan to be able to bounce back. Stay strong and steadfast in the face of temptation.
Showing posts with label Computers and Gadget Tips. Show all posts
Showing posts with label Computers and Gadget Tips. Show all posts

BeZhare: Sony NGP Spesification Details

For those of you who want to understand the specifications of the successor to the Playstation Portable (PSP), which is called the PSP2 or NGP (Next Generation Portable) is worth reading this article to find out what that greatness is in the machine.

* Specification:
- CPU 
ARM ® CortexTM-A9 core (4 cores)
- GPU 
SGX543MP4 + External
- Dimensions 
Approx. 182.0 x 18.6 x 83.5mm (width x height x depth) (tentative, excludes Largest projection)
- Screen 
(Touch Screen) 5 inches (16:9), 960 x 544, Approx. 16 million colors, OLED Multi touch screen (capacitive type)
- Rear touch pad 
Multi touch pad (capacitive type)
- Cameras 
Front camera, Rear camera
- Sound 


Built-in stereo speakers Built-in microphone
- Sensors 
Six-axis motion sensing system (three-axis gyroscope, three-axis accelerometer), Three-axis electronic compass
- Location 
Built-in GPS Wi-Fi location service support
- Keys / Switches 
PS button Power button Directional buttons (Up / Down / Right / Left) Action buttons (Triangle, Circle, Cross, Square) Shoulder buttons (Right / Left) Right stick, Left stick START button, SELECT button Volume (+/-) buttons Wireless communications
- Mobile network connectivity 
(3G) IEEE 802.11b/g/n (n = 1 × 1) (Wi-Fi) (Infrastructure mode / Ad-hoc mode) Bluetooth ® 2.1 + EDR? A2DP/AVRCP/HSP? "

You can find more in the Official Link Sony NGP
Can you imagine what it was like the power of the PSP is the next generation, ready to buy it?
Just wait for the release date of the hearing will hear the release later this year. ----------------------------------------------------------------------------------------------------------------
Article was written and circulated by Guntur Suhada on BeZhare from source of Sony NGP to your knowledge, please do not take and pass on any sites without the knowledge of this site. Or if necessary, you can pass it on any site to include the name of the author of this article. We appreciate the authenticity of writings that we make here. Thank you for your attention.
----------------------------------------------------------------------------------------------------------------
Continue Reading »

BeZhare: Maybe You Want Know How to Hacking Through the LAN

[Attention to All: This Article Just for Knowledge Don't Try it for Others People] 
How to hacking via the LAN (to steal a longer pass people browsing). First of all sorry if repost because this technique is not a fresh technique in the world of hacking but this technique has not been spoiled because until now still be used because most networks use a network of hubs and switches that are not encrypted.

Why not encrypted?
* Network Admins were mainly IT specialists in making the program, not in Network Security
* If the encrypted need bandwidth will increase and certainly that has been slow inet will increasingly slow and eventually an error page.
* The price is not cheap to obtain the encrypted The difference between a network Hub and Switch:
* At the network hub of all data flowing on the network can be viewed / picked up by any computer on the network computer must be requesting such data, if not requested it will not come.
* The only computer network switches which exchange of data that can see the data, other computers not entitled to requesting the data. The problem is the price of routers hubs and switches do not differ much so that most places are now using a switch that makes it difficult for network hacking.

Hacking is using technique: 
* Sniffing
* ARP Poison Routing The two techniques above will not be prevented by any firewall on the victim's computer, guaranteed.
Important Note: ARP Poison Routing can cause denial of service (dos) on one / all the computers on your network Pros:
  * It will not be detected by the firewall types and any series because of the weakness lies in not on the computer network system.
  * You can steal all kinds of login passwords through the HTTP server.
  * You can steal all those login passwords on the network hub for the program is activated.
  * For the ARP Poisoning can be used to steal passwords in HTTPS.

* All free programs Disadvantages: 


  * To network switch must be in the ARP poisoning one by one and your bandwidth will be consumed a lot for it (if inet super fast do not matter)
  * Caught / not by the network administrator outside of my responsibilities Start here assume that the network in this story there are 3 computers, namely:
  - Computer Victims
  - Computer Hacker
  - Servers The differences between the network switches and network hubs:
First Steps:
1. Check your network type, you have the network switch / hub. If you are in the network hub thankful because the process of hacking you will be much easier.
2. Download the required programs of Wireshark and Cain & Abel. Code: http://www.wireshark.org/download.html http://www.oxid.it/cain.html

* How to Use Wireshark:
  - Run the program wireshark
  - Press the Ctrl + k (capture and then click option)
  - Make sure the content on your Card Ethernet interfaces are bound to the network, if not replace and make sure that "Capture packets in promiscuous mode" on
  - Click the start button
  - Click the stop button after you feel confident that no password is entered as long as you press the start button
  - You can see all types of incoming and outgoing packets on the network (or on your computer only if your network uses Swtich
  - To analyze data right click on the data you want in the analysis and click "Follow TCP Stream" and congratulations to analyze the package (I will not explain how because I can not)
  - What is clear from the data contained therein must the information entered the victim to the website and vice versa Way above applies only if your network is not a switch hub From the above you can find out that your network is a hub / switch by looking at the column IP Source and Destination IP.
If at each line one of them is your ip it is certain that your network is a network switch, if not ya mean the opposite.

* How to Use Cain & Abel: 1. 
  - The use of this program is much easier and simpler than using wireshark, but if you want all packets that have been in and out is recommended that you use wireshark program
  - Open the program you Cain
  - Click on the Configure
  - In the "Sniffer" select ethernet card that you will use
  - In the "HTTP Fields" you should add your username and password fields his fields if you want is not listed. As an example I'll let you know that if you want to hack Friendster password you have to add in the username fields and fields passworsd word name, for others you can find it by pressing the right click view source and you should seek the input variables from the website login and password.
Already in default taste already quite complete, you can steal the pass that is in klubmentari without adding anything.
  - After that apply and click ok to the setting.
  - On the main menu, there are 8 tabs, and which will be discussed only 1 tab is the tab "Sniffer" because it is select that tab and do not change from that tab to prevent your own confusion
  - Activate the Sniffer sniffer by clicking the button at the top tab it, find the button that his writings "Start / Stop Sniffer"
  - If you're at a network hub at this time you already know the password can enter by clicking the tab (this time the tab at the bottom instead of in the middle, the middle is no need to click-click again) "Passwords"
  - You can just choose a password from which the connection you want to see will already listed there
  - If you were there at the network switch, it requires more struggle, you must activate the APR which is on the right tombolonya Sniffer (And is not guaranteed to succeed because the manage of the switch is much more comprehensive and secure from the hub)
  - Before activated at the bottom of the sniffer tab select APR
  - It will be seen 2 pieces that are still empty list, click an empty part of the list then click the "+" (shaped like it) in the ranks of the sniffer APR etc.
  - There will be 2 pieces of field containing all the available hosts on your network
  - Connect the victims ip address ip address and gateway servers (to know the address of the gateway server click start on the comp you select the run type cmd then type ipconfig at a command prompt)
  - After that activate the APR, and all the data from the comp victim to a server you can see in the same way. You can run both programs on simultaneously (for APR Cain and wireshark for packet sniffing) if you want maximum results.
Passwords can be stolen is the password in HTTP server (the server is not encrypted), if such data exist on the server that is encrypted then you have to decrypt the data before obtaining the password (and it will require a much longer steps of the way this hack )
For terms that do not understand can be found on wikipedia.
I hope you will know about this article and dont use it for bad activities. ----------------------------------------------------------------------------------------------------------------
Article was written and circulated by Guntur Suhada on BeZhare to your knowledge, please do not take and pass on any sites without the knowledge of this site. Or if necessary, you can pass it on any site to include the name of the author of this article. We appreciate the authenticity of writings that we make here. Thank you for your attention.
----------------------------------------------------------------------------------------------------------------
Continue Reading »

BeZhare: To Create a Secure Stick [Flash Disc] From the Virus

First tricks, steps should be done as follows:
1. Create a folder in your falshdisk, and give it the name "autorun.inf" (without the quotes).
2. Go into the folder you just created and create a notepad document therein. The trick right click, select NEW> TEXT DOCUMENT, and give any name for the file you just created (the final result as shown). This name later will we replace it with some special characters.
3. After that, we will open the CHARACTER MAP program that is on START> ALL PROGRAMS> ACCESORIES> SYSTEM TOOLS> CHARACTER MAP.
4. After CHARACTER MAP is open, select an existing font like Arial unicode the thing like Unicode or Lucida Sans Unicode. Scroll down until you see letters of Japan, Korea, China, or strange characters.
5. Choose 4 or 5 characters that you want, then click copy.
6. Or rename the text file that you created in step 2 above. Right-click on the file, select rename, then press [CTRL] + [V]. The file name was changed. Do not be surprised if later on you'll see characters like boxes sign only. dont worry that was normal.  

Second tricks, steps are as follows:


1. Click Start, Run 2. Type cmd, click OK, the command prompt window will appear
3. Moving to the drive where your FD; FD eg on drive G
4. Type G:
5. After that type "md autorun.inf" (without the quotes), then enter
6. Type, md autorun.inf \ autorun.ini, enter
7. Type, md autorun.inf \ autorun.ini \ con \ \. \ \, Enter.
Close the command prompt window Then in the FD will be no autorun.inf folder that can not be removed (by Windows) and also can not be replaced / overwritten by the virus hiding in autorun.inf  
Tricks based on the following: in off-the Windows / non-known files / folders the same.
Medium viruses infect the FD with how to create / replace / overwrite the file autorun.inf Jd bs ill virus infects the FD because Windows / virus can not delete / overwrite the 'con' folder is inside the folder autorun.inf You dont believe? Try to make a folder (in Windows) dg con name, surely it will not be.
Eiit, REMEMBER! Scan first flash (FD) it before applying this trick or if necessary your Flashdisc first format to be more confident if not already existing virus then virus try this trick, God willing, not 1000% guaranteed virus going on Flashdisc sticking. ----------------------------------------------------------------------------------------------------------------
Article was written and circulated by Guntur Suhada on BeZhare to your knowledge, please do not take and pass on any sites without the knowledge of this site. Or if necessary, you can pass it on any site to include the name of the author of this article. We appreciate the authenticity of writings that we make here. Thank you for your attention.
----------------------------------------------------------------------------------------------------------------
Continue Reading »

BeZhare: With FixShell You Can Repair Windows Blue Screen

Did you ever experience symptoms such as blue screen windows in the picture? Surely you've experienced it as well as my own beginian let alone fit playing game (RF Online) after a log out of the game do not immediately click the short cut the waiting game until the computer refresh a few seconds, if not surely you will experience the above ^ _ ^ And the easiest subject to diseases like this are usually to a computer using the OS system that is not standard with the capability of your computer.



Actually subject like this is easy if the computer restarts it immediately but if you still can not go back as before you can use the software call FixShell and more secure than restart your computer.

This software is able to fix the error due to windows sistes memory dumping causing blue screen. Usage is easy, just install and run software then click OK, then the computer will prompt you to restart, do it and survive your computer back to normal.

You can find this software from search engine and how to use it. 
Maybe this article can help you find the best way to solve your problem. ----------------------------------------------------------------------------------------------------------------
Article was written and circulated by Guntur Suhada on BeZhare to your knowledge, please do not take and pass on any sites without the knowledge of this site. Or if necessary, you can pass it on any site to include the name of the author of this article. We appreciate the authenticity of writings that we make here. Thank you for your attention.
----------------------------------------------------------------------------------------------------------------
Continue Reading »

BeZhare: The Method (Brontok of) to Eliminate the Virus Eagle

(Which is already provided in the update) of AVG Anti - Virus Using
1. Try to run antivirus, because if you use normal mode, the computer will be restarted when itself.
To use Safe Mode, Windows uses anti-virus was first documented when
2. Do to detect " safe mode "and turned to scan kompie, continually press F8.
3. Virus is therefore to remove viruses, virus eagle now, repair, and are the next step in the registry, the registry may be corrupted.


4. Register functions to continue to delete a value:
DisableRegistryTools = 1
The. HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ System
5. Remove the registry:
- Bron - SpizaetusHKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ Run
- Took - CirrhatusHKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Run
- Disable CMD = 0
The. HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ System
6. Options dialog box to explore the restoration, remove registry string
The NoFolderOptions = dword: 00000001
Register
KEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer
7. The msconfig Startup menu, click Delete Options.
NorBtok
Text messaging
Vacuum
8. Deleting a work schedule made by W32/RontokBro.B
Open [Explorer Windows]
In Control Panel,
Click 2 times the work schedule,
Click after all the tricks of running a PC computer is infected, make sure to reboot is still there.
I hope to help you solve your problem.
----------------------------------------------------------------------------------------------------------------
Article was written and circulated by Guntur Suhada on BeZhare to your knowledge, please do not take and pass on any sites without the knowledge of this site. Or if necessary, you can pass it on any site to include the name of the author of this article. We appreciate the authenticity of writings that we make here. Thank you for your attention.
----------------------------------------------------------------------------------------------------------------
Continue Reading »

BeZhare: Discover How Your PC Find the Driver Without Software

1. The right mouse button and click My Computer, choose Properties, select and press.
2. Device Manager to [tab] Material.
3. Right click the mouse is not recognized, then click the yellow like symbol is normal or click Properties and select.
4. Click the Advanced tab.
5. Press Ctrl + C Intence device ID at the cursor position.
6. Then go live http://devid.info/


7. Paste the device ID is copied.
8. Then download the drivers that has ready ^ _ ^
I hope this can help.
----------------------------------------------------------------------------------------------------------------
Article was written and circulated by Guntur Suhada on BeZhare to your knowledge, please do not take and pass on any sites without the knowledge of this site. Or if necessary, you can pass it on any site to include the name of the author of this article. We appreciate the authenticity of writings that we make here. Thank you for your attention.
----------------------------------------------------------------------------------------------------------------
Continue Reading »

BeZhare: Fixed Problem with ISUS.msi

ISUS.msi small files is always the InstallShield Update Manager is to their problems to use.
The easiest way to solve this problem, your files are available in the language C: \ Program Files \ Common Files \ InstallShield
Then save the file in a little more.


Update Manager, if you request a file and again to lead the new file saved.
Several remove spyware, as spyware because they tend to lose ISUS, remove it, we recommend that you save the file with extra copies of a different name.
You can search the file in search engine by type the name.
I hope this can solve your problem.
----------------------------------------------------------------------------------------------------------------
Article was written and circulated by Guntur Suhada on BeZhare to your knowledge, please do not take and pass on any sites without the knowledge of this site. Or if necessary, you can pass it on any site to include the name of the author of this article. We appreciate the authenticity of writings that we make here. Thank you for your attention.
----------------------------------------------------------------------------------------------------------------
Continue Reading »

BeZhare: Tips for Taking Care of the Hard Disk

Hard Disc
1. Attack and destruction of data, it is possible that the antivirus must be updated regularly, there is a virus, if only for the antivirus, please install it later.
2. Please always backup your important data.
3. Whether the hard disk scan checks badsector.
4. Two weeks of data in hard times is always a neat optimization.
5. To copy files to clean up junk files, Recycle Bin, or using third-party software, you can use CCCleaner,visit they official site at http://ccleaner.en.softonic.com/.


6. dont have too often remove the hard disk, so sensitiv.if very exposed to shocks, CPU and hard drives replaced, and threatened to missing data on the hard disk.
7. Some kylobyte not store data not to be too much space on your hard disk before. Your case is full of hard drives in Windows OS, usually 20 to use the warning MB If gives little space on the hard disk is not full yet, and at least one book about it.
Hard disks are not useful in programs that do not bear.
8. Uninstall.
9. Using UPS and Stavolt.Point, when you use your computer will suddenly turn off the computer unexpectedly quits, the computer instead of immediately, the new data we can save the first time closing die.So damaged first to create a fast hard drive, if not used.
I can not get out so you can air, 10.Ventilasi enough, causing a quick hot Please do not implement the CPU crowded and narrow.
So have many fans, the CPU in place of the rather large hard drive should be selected.
I hope to be very useful.
----------------------------------------------------------------------------------------------------------------
Article was written and circulated by Guntur Suhada on BeZhare to your knowledge, please do not take and pass on any sites without the knowledge of this site. Or if necessary, you can pass it on any site to include the name of the author of this article. We appreciate the authenticity of writings that we make here. Thank you for your attention.
----------------------------------------------------------------------------------------------------------------
Continue Reading »

BeZhare: To Find the Best Quality of Any Mobile [HandPhone - HP]

To determine the type and quality at the mobile phone (or unknown origin), information about it here - let's start the test:
* International Mobile Equipment Identity number (IMEI) code and a device for an item or place that is confused, this method of clay:
-15 Digit serial number [In our example: 434,566,106,789,435] can not respond, HP battery can be seen in Cassing.
Number 02 -7 or 20 mob and 8, if the number of low quality, it means to be in Asia.
-7 08 or 80 horses and 8, if the number is a number that means Germany is one of decent quality.


-7 mob of 01 or 10 and 8 if the number means that the quality in Finland.
- If the number 7 and 8, the horsepower, the highest quality, this means that the number 00 in France.
- The absence of any of the above, it means that your HP is composed of unknown origin.
I hope that HP is better to get help.
----------------------------------------------------------------------------------------------------------------
Article was written and circulated by Guntur Suhada on BeZhare to your knowledge, please do not take and pass on any sites without the knowledge of this site. Or if necessary, you can pass it on any site to include the name of the author of this article. We appreciate the authenticity of writings that we make here. Thank you for your attention.
----------------------------------------------------------------------------------------------------------------
Continue Reading »

BeZhare: The Signs and Indicators of the Virus on Your Computer Look Like?

Sample
However, you can see the next sign.
- Your computer is slow, it was consistent.
- Your computer stops responding or unexpectedly, this happens often.
- On your computer or reboot unexpectedly, or crashing, it happened a few minutes.
- Your computer may restart unexpectedly normal, can not walk again.
- PC will not run the application successfully. Access to a hard disk drive or not.
- Activities to print does not work correctly.
- It's often a strange error message usually is not.
- It is, in many cases, there is a menu or dialog box is damaged.


Although these are common symptoms that your computer is infected, it can also be caused by interference from hardware and software. The main solution is to install anti-virus is always updated.
Maybe this article to solve your problem.
----------------------------------------------------------------------------------------------------------------
Article was written and circulated by Guntur Suhada on BeZhare to your knowledge, please do not take and pass on any sites without the knowledge of this site. Or if necessary, you can pass it on any site to include the name of the author of this article. We appreciate the authenticity of writings that we make here. Thank you for your attention.
----------------------------------------------------------------------------------------------------------------
Continue Reading »