Wednesday, March 24, 2010

RootKit: Digital Voodoo

0 comments
Rootkit was first introduced in SunOS operating system by Lane Davis and Steven Dake. This technology is used by Root on Unix (equivalent to the System Administrator on Windows) to recovery (restore) the root password they forget. To be able to restore the root password is not easy because it needs authorization and unlimited access to a system. Finally, a special technology was discovered that can do that later known as this rootkit.

The term rootkit is so famous after a world-class music companies who apply to secure the CD music from piracy. The case has become a very horrendous scandal because even though the goal to avoid piracy, the use of this technique allows malicious applications rootkits planted aboard the music companies.


Rootkit techniques are prone to be used for evil purposes. If you remember, a virus such as Alman or Bacalid using rootkit techniques so difficult to detect. Removal of his application could not finish 100% due to a virus of malware that uses rootkit technology to walk residents and difficult to detect. He runs invisibly, silently without a sound, and did attack you never know. No wonder so many who think like voodoo rootkit in the computer world. In fact, the rootkit is basically a technology and can be used for good and useful. An example is the use of applications rootkir antivirus, firewall, software protection, DRM (Digital Right Management), and simulation applications such as daemontools disc media. The problem, rootkit techniques can also be used to create malicious applications are difficult to overcome.

Rootkit various

Like viruses, rootkits also has many variants. Classified according to the target being attacked, rootkits distributed into 6 kinds, namely:

1. Application Rootkit
Rootkits are made by modifying the binary code of an application directly or commonly referred to as binary code patching. This type of rootkit is usually found in the type of trojan malware to inject the virus into an object or system.

2. Library rootkit
This is a rootkit targeting libraries. Library itself is a file such as a library function that has been collected into one with a view to memermudah programmers in creating and developing an application. Library marked with the suffix "etc." as "kernel.dll".

3. Kernel Rootkit
Kernel rootkit is a type of rootkit is more terrible than the previous types. Kernel rootkits run at the kernel level (mode
not protected), or on the x86 architecture system known as ring 0. About how rootkits work will be presented at next month InfoKomputer.

4. Bootloader Rootkit
Is the type of rootkit that resides on the MBR (Master Boot Records), so as to control the course of booting the operating system. This type of rootkit is also known as Bootkit or "Evil Maid Attack",

5. Level hypervisor rootkit
This type of rootkit capable memvirtualisasikan original operating system so that the guest operating system, so that the entire control of the operating system can be taken over by this type of rootkit. One of the existing rootkit is a type SubVirt, are virtual machine based rootkits are developed by Microsoft and the University of Michigan.

6. BIOS rootkits
BIOS rootkits, collectively, the firmware rootkit, the rootkit that was the most horrible deepest level, living in the neighborhood and began active firmware when all computer activity occurred early initialization.

Poverty
There are several ways to clean up malware that uses rootkit technology on an infected computer. But the method used depends on the type of rootkit that infects, so as to overcome a bit difficult when we can not exactly know what type of rootkit that may be infecting our computers. To detect a rootkit, you should run the infected computer as a slave and use the operating system of PE (preinstalled environment) or liveCD to menginvestigasinya. There are many types of this LiveCD operating system such as DSL (Damn Small Linux)-had bundled the DVD edition of congenital magazine InfoKomputer ago - and many more. Perform scanning using special software designed to clean the rootkit, then do an investigation on areas inhabited by vulnerable rootkit. Since cleaning a rootkit is operating very close relationship with the system configuration, I suggest you ask for help to people who are experts to do so. If not careful, the consequences would be fatal.

AVI vs Rootkit
For now AVI not designed to deal with rootkits, but we will continue to develop AVI to possess anti-rootkit feature. AVI itself is currently in transition or developing the latest version (version 3), which features one of the Anti-Rootkit. Not only that, AVI version 3 also has many new features that will optimize your computer security from the attacks malicious programs. Just wait for the game date.

Next month, we will explain in more detail about how each of our rootkit described above. So, do not miss!
Read more...

Challenger Little Wormwood W32/Email-Worm.Assiral Antivirus

0 comments
Let the little, tiny worm will turn off a process related to antivirus. Small chili?
Unlike the discussions on malicious programs at the previous articles, this time I am not discussing local malware, but malware is no less foreign cried with locally made.

Which will be discussed this time was W32/Email-Worm.Assiral. He is a type of malware worm that comes from abroad and the small body size, this is why I call it a small worm. Created using programming language C + +, up to now has many variants emerged. Assiral name itself is taken from the name Larissa is reversed, showing the maker's name used to introduce himself.

Endemic and Assault

Although small, this worm has the ability to spread itself via a USB Flash storage, share directories (shared directory), and e-mail. In addition he also will try to beat the antivirus in a way to stop (kill) any process which has one of the following names: 
 
AGENTSVR.EXE, ANTI-TROJAN.EXE, ANTIVIRUS.EXE, ANTS.EXE, APIMONITOR.EXE, APLICA32.EXE, APVXDWIN.EXE, ATCON.EXE, ATGUARD.EXE, ATRO55EN.EXE, ATUPDATER.EXE, ATWATCH.EXE, AUPDATE.EXE, AUTODOWN.EXE, AUTOTRACE.EXE, AUTOUPDATE.EXE, AVCONSOL.EXE, AVGSERV9.EXE, AVLTMAIN.EXE, AVPUPD.EXE, AVSYNMGR.EXE, AVWUPD32.EXE, AVXQUAR.EXE, AVprotect9x.exe, Au.exe, BD_PROFESSIONAL.EXE, BIDEF.EXE, BIDSERVER.EXE, BIPCP.EXE, BIPCPEVALSETUP.EXE, BISP.EXE, BLACKD.EXE, BLACKICE.EXE, BOOTWARN.EXE, BORG2.EXE, BS120.EXE, CCAPP.exe, CDP.EXE, CFGWIZ.EXE, CFIADMIN.EXE, CFIAUDIT.EXE, CFINET.EXE, CFINET32.EXE, CLEAN.EXE, CLEANER.EXE, CLEANER3.EXE, CLEANPC.EXE, CMGRDIAN.EXE, CMON016.EXE, CPD.EXE, CPF9X206.EXE, CPFNT206.EXE, CV.EXE, CWNB181.EXE, CWNTDWMO.EXE, D3dupdate.exe, DEFWATCH.EXE, DEPUTY.EXE, DPF.EXE, DPFSETUP.EXE, DRWATSON.EXE, DRWEBUPW.EXE, ENT.EXE, ESCANH95.EXE, ESCANHNT.EXE, ESCANV95.EXE, EXANTIVIRUS-CNET.EXE, FAST.EXE, FIREWALL.EXE, FLOWPROTECTOR.EXE, FP-WIN_TRIAL.EXE, FRW.EXE, FSAV.EXE, FSAV530STBYB.EXE, FSAV530WTBYB.EXE, FSAV95.EXE, GBMENU.EXE, GBPOLL.EXE, GUARD.EXE, HACKTRACERSETUP.EXE, HTLOG.EXE, HWPE.EXE, IAMAPP.EXE, IAMSERV.EXE, ICLOAD95.EXE, ICLOADNT.EXE, ICMON.EXE, ICSSUPPNT.EXE, ICSUPP95.EXE, ICSUPPNT.EXE, IFW2000.EXE, IPARMOR.EXE, IRIS.EXE, JAMMER.EXE, KAVLITE40ENG.EXE, KAVPERS40ENG.EXE.

List the name of antivirus programs are just a small part, actually still very much to save the page so not all written here. But if you notice, a process that killed the processes related to anti-virus. So it seems this worm to disable the antivirus application to then make a larger attack.

Besides trying to attack antivirus programs, this worm also tried to beat the seperjuangannya friend who has W32/Worm.Bropia another name IM-Worm.Win32.VB.a. W32/Worm.Bropia also a propertied foreign worm spreading ability itself through instant messenger or Intant Messenger. This is why there is a sign of "IM-Worm" at the beginning of its name, the sign that usually provided by antivirus developers to mark the characteristics of a malicious program.


When first run, will create bookmarks W32/Email-Worm.Assiral himself a mutex (Mutual Exclusion) with the name "-)(-=| L4r1 $ $ 4 Note |=-)(-". mutex is typically used for inter singkronisasi application or thread reply contained in most multi-threading applications. But here, mutex Assiral worm used to mark him with the intention to prevent re-infection (reinfection) on washed-infected computers.

For the sake of keeping himself in order to keep running every time the computer is turned on, this worm will create 3 triggers by adding value to the address registry: HKLM \ Software \ Microsoft \ Windows \ CurrentVersion \ Run

Registry keys made, among others:

* "MSLARISSA" => leads to: "[system-dir] \ MSLARISSA.pif"
* "Command Prompt32" => leads to: "[system-dir] \ CmdPrompt32.pif"
* "($ 4 $ L4r1) (4nt1) (V1ruz)" => leads to: "[a win-dir] \ SP00Lsv32.pif"
* Try to open the browser directly to the destination address "http://roattack.go.ro".
* Trying to convey a message to the user and antivirus products by writing a message in the file "C: \ MESSAGE_TO_USER.txt", "C: \ MESSAGE_TO_AVs.txt", and "C: \ MESSAGE_TO_BROPIA.txt" which contains: 
 
C:\MESSAGE_TO_USER.txt:
Greetz to infected user!
I will survive
In this moment in time.
Your computer will crash,
So, you will be mine.
I will not crash,
I will not fail.
So, in this moment in time,
I will survive...
– LARISSA AUTHOR

C:\MESSAGE_TO_AVs.txt:
Greetz to AVs!
I wanna be in AV industry when I grow up :-)
  ---------------------------------------- 
       - LARISSA AUTHOR

C:\MESSAGE_TO_BROPIA.txt:
Hey Bropia.. stop making MSN worms it's stupid...
... lol -- Larissa Anti Bropia... -- Saving the world from BROPIA!!!
         - LARISSA AUTHOR

Cleaning and Prevention

To clean this worm, you can simply run the AVI which was updated you can get the DVD of this magazine innate or download at: http://www.infokomputer.com/avi/download-avi/download-link-for-avi. For prevention, install AVI as a real-time protection, and do not forget to always update your AVI to always up-to-date.
Read more...

W32/Moonlight.L: Moon Light Hazardous

0 comments
Although classified as a veteran, this worm still exist thanks to the emergence of variants. Do not want exposed to the harmful rays? Be careful and put AVI.

"Moonlight", so the worm type malware is named herself. Local worm actually been around since W32/Brontok or W32/Rontokbro era, but still exist until now. This is because variants that keep coming up now, even many reports from users of computer AVI infected by this worm. Because of that, I was interested to discuss the issue of Moonlight at this time.


Characteristic

Made using the compiler W32/Moonlight mainstay vxer (term for malicious programmers) that local VB6 (Visual Basic 6) and compressed using FSG packer PE programs. Original size of 324 KB, and after compressed to 144 KB. Its own identity using Windows XP folder icon standard.

Action (Payload)
When first run, W32/Moonlight.L will create the file "systear.dll" in a system directory, example: "C: \ WINDOWS \ system32 \ systear.dll". This file is an initialization file so that the worm can identify himself and to mark the position where the worm has spread. After that, create a file of supporting Moonlight shaped dynamic link library (DLL) "moonlight.dll" in the Windows directory (example: "C: \ WINDOWS \ moonlight.dll") and extract the MIDI-formatted music files "onceinabluemoon.mid" to the Windows directory . After that, the worm makes a directory with a random name in Windows and System subdirectory in the format "C: \ WINDOWS \ [random]". Mean "[random]" here contains random names such as:
"C: \ WINDOWS \ FLR1S4G"
"C: \ WINDOWS \ system32 \ LDF6I7R"
Use a random name is probably intended to complicate the process of investigation and cleanup.
Then the worm will reproduce itself in the following places:
* C: \ WINDOWS \ [random] \ service.exe
* C: \ WINDOWS \ [random] \ smss.exe
* C: \ WINDOWS \ [random] \ system.exe
* C: \ WINDOWS \ [random] \ winlogon.exe
* C: \ WINDOWS \ lsass.exe
* C: \ WINDOWS \ system32 \ [random] \ [random]. Cmd
* C: \ WINDOWS \ [random]. Exe
* C: \ WINDOWS \ system32 \ [random]. Exe
* C: \ WINDOWS \ [random] \ [random]. Com

W32/Moonlight.L deliberately duplicate themselves with names similar to the Windows services such as innate "smss.exe", "service.exe" with the intention that the process is not easy to stop using the Windows Task Manager built. Keep in mind, the Task Manager will refuse to stop the process with the name include: "service.exe", "smss.exe", "system.exe", "winlogon.exe", and "lsass.exe".

Because the worm is made using VB6, and because each application requires VB6 runtime named "msvbvm60.dll", the worm is smart strategy to make the runtime file is not deleted or deleted (which makes the worm can not run). Way, by making backups of the runtime files to "C: \ WINDOWS \ system \ msvbvm60.dll".
Another thing done is to make Moontime file named "MooNlight.txt" in the Windows directory (example: "C: \ Windows \ MooNlight.txt"). This file contains a message from the creators who called himself the nick "Lunalight" aka "Moonlight":


Endemic

W32/Moonlight.L dissemination is very similar to the worm aka W32/Brontok legendary W32/Rontokbro, by doubling itself to every directory with a name similar to the parent directory.

Cleaning and prevention

Fairly easy to clean, you need to do is run the AVI (Antivirus Info Computer) that has been bundled into one DVD inherent in this magazine. Run, and do checks to each location and storage media connected to your computer. Keep in mind, do not do any activity during the review process. For prevention we recommend you to install the AVI as a guard to prevent your computer infected by this worm again.


AVI 2.0.4.9 Changelog:
* Improved buffer overflow bug that caused crashes when AVI to update online.
* Improved compatibility bug with Windows Vista / 7.
* Improved access violation bug that caused crashes AVI while scanning.
* Improvement of detection of some Windows system files 7.
Read more...

AVI + Clamav: Tens of thousands Tree Attack

0 comments
One of the advantages is the existence AVI add-on (plugin). Thanks to this facility, capacity can be improved AVI easily. One of the latest add-on is owned AVI Clamsav. This is the add-ons that integrate the database into a database Clamav AVI. That way, AVI now can ward off tens of thousands of types of attacks, both locally and internationally. One who makes a good antivirus in detecting computer viruses is the definition of the threat they have. The more definition, the better antivirus in a variety of threats facing trying to enter into the computer.


AVI is one of the local antivirus that has a number of threats that limited definition. So far, the database contains AVI more local viruses. This limitation is because the number of new viruses AVI users reported only ranges from Indonesia alone. This is why many people consider the local anti-virus only works to overcome local virus alone.

And vice versa, only a potent antiviral out beyond just tackle the virus. Based on these facts, many people who eventually install two antivirus at once: one local antivirus, antivirus one out.

But the AVI has a smart solution for solving this problem. AVI now have add-on (plugin) that integrates new AVI with Clamav antivirus engines. What is Clamav? Clamav antivirus which is developed by the developers of the open source community http://www.clamav.net GPL (General Public License). You can get more information about Clamav on his official website. Current definition of a recognizable threat Clamav approximately 49 thousand threats mostly dominated by foreign viruses. Now, by combining the original database and Clamav AVI, AVI is now able to recognize approximately 50 thousand threats!

 How to Use Clamsav Plugin

To take advantage of add-on Clamav, ekstraklah file "plugin-0.4-clamsav-avi.zip" into the directory "plugins" which can be found at the location where AVI installed. For example you install the AVI in the directory "C: \ Program Files \ AVI" then ekstraklah to "C: \ Program Files \ AVI \ plugins".

Clamav add this file yourself you can get here. Make sure the add-on has been successfully integrated. How to run the AVI, then see the "Plugins". If you see a new add-shell-shaped symbol, it means that add Clamav has been successfully integrated with AVI. To make sure whether the add-Clamsav been able to work well, try double-click on the icon shaped shells. I'll get a window with information about add-on version, version of the definition of the threat, the number of threats, and info about the last definition update.


















To determine whether the definition of threats that can be recognized by the AVI has increased, you can see it in the "Signature". When we use the definitions of August 13, 2009, the number of definitions reaching over 64 thousand pieces. After the successful add-on installed, AVI automatically be able to detect foreign viruses or viruses that have not been recognized by the AVI using Clamav engine. The threat is successfully detected by Clamsav have a mark on the columns of information as you can see in the picture below. You still can disable the add-on that does not come Clamsav scanning by removing the check mark on the window Clamsav the "Settings"> "Enable plugin".










Threat definition update Clamav

You can update Clamav definitions of threats in a way to download the file "daily.cvd" and "main.cvd" Clamav site. Put the two files in the directory where the add-Clamsav placed. Please note that the file "daily.cvd" is always updated every day.
Read more...

Beware! Presence of a trigger VoIP Spammers

0 comments
As we know, spam is an "enemy" email users. Her presence was already terendus for years. Then, still remember you with 419 spam? Yes, spam related to the 419 present the emergence of spam Harry Porter, a name of "slippage" of the Harry Potter character. In July, the spam is claimed amounted to 419 for 9% of all spam.

419 spammers usually enter the users email through a text-based email, document, document in the form of word, PDF format, and even now they are also often appear on sites such as Facebook friends.

Well, of all attempts to send spam is 419, found a similarity, namely false story about the inheritance money in large quantities, familial and financial aid are notified through written messages.

However the business of the owner to block the arrival of email spam, but spammers have a thousand ways and continue to seek techniques that can bring them to the owner of the inbox. The way the other can not avoid anti-spam filters.

Recently, Symantec found a new variant of spam 419, which in this case spammers trying to exploit the service Voice over Internet Protocol (VoIP). From there, spammers will create fake accounts on sites that provide VoIP services, then this false account used to send users email invitations to invite friends using the function / invite friends via VoIP services.

On the face of spam messages that have signed the invitation will look like the original VoIP, but here in action with a slipped spammers 419 stories related to the fund or inheritance in the invitation email message.
Read more...

Virus alert "Deadlock", The message is positive but Destroy Computers

0 comments
KOMPAS.com - The message was positive with words that evoke patriotism. However, do not be lulled into sweet words that brought a new local computer virus called Deadlock. Check out the following message.

Indonesia freed our country from terrorism, Anarchists, and CCN (Collusion, Corruption & Nepotism) at the Government of the Republic of Indonesia Kubu (Civil, Army & Police) and the Catch, Fight and spacing? Without exception. Clean us from Portitusi Affairs, Social Gambling and Crime. Merdekakan ourselves from Poverty, Misery and Injustice! Along with the Democratic Party? SBY & BOEDIONO, Indonesia Joint Building Fair, Makmur & Prosperous

In the Name of the Indonesian nation
Prince Deadlock

I? M Everyone, but No one
I? M Everything, but Nothing
I? M Everywhere, but Nowhere

If your computer suddenly displays a picture with the message (see picture), you are advised to immediately take action. The reason your computer is attacked by a virus that is active and deadly.

The virus will display the message in the desktop that has taken over. Usually this message will only appear at the appointed time. Along with the emergence of this message, then all files in all drives will be deleted, including the program and the file system of Windows.

So, if you see this message on your computer, chances are it's too late for a minute of data on your computer will be destroyed. Like the saying goes "calm waters washed away", apparently in these viruses keep silent time bomb in the victim computer to be activated in accordance with the time specified.

Peak, on 12 and 13 later, Deadlock will make your computer completely destroyed deadlock aka all the data, good data throughout the hard drive, flash, and Windows file that displays the message "NTLDR is Missing".

Recognize characteristic

The virus is actually still go to the family of Visual Basic program is compressed using 2.x Petite sizes around 80 KB. Icons that are used are also not camouflaged, still use the application icon and probably came from one of the cities in Kalimantan (Samarinda).

If the virus is active on the computer, it will create some files that will run on your computer when switched on.
- C:-Windows-system32-apache.exe
- C:-Windows-system32-mysql.exe

Selection name apache and mysql likely aimed at disguising himself as a popular programs Apache and Mysql. In order for these files can be automatically activated when the computer starts, he will make a few strings in the following registry:
-HKEY_LOCAL_MACHINE-SOFTWARE-Microsoft-Windows-CurrentVersion-Run
-mysql = C:-Windows-system32-mysql.exe
-HKEY_LOCAL_MACHINE-SOFTWARE-Microsoft-Windows-CurrentVersion-Run
-apache = C:-Windows-system32-apache.exe

The virus is quite clever in fooling the user. Users will not be suspicious if the computer is actually infected because there are no signs that usually done by other local viruses, such as disable the Task Manager / Msconfig / Regedit or Folder Options, other than that created the file did not suspicious because it seems to be the program Apache and MySql. Users realized that the computer has been infected at the time of late, which at that time will appear the message from the virus makers are then followed by the emergence of the message "Windows File Protection error". This indicates that there is a program that seeks to remove the Windows system files.

This virus will start automatically each time users access a drive / flash disk by using the Windows autorun by making fruit 3 files, namely:
- [Desktop.ini] that contains the script to run the file [folder.htt]
- [Folder.htt], contains the script to run the main file ie [flashguard.exe]
- [Flashguard.exe] is a master file that will be run.

Flash media is one of the most widely used by the user. This is what will be used by some even virtually all of the virus to spread itself. This will also be carried out by a virus Deadlock by making some of the following files.
-Desktop.ini
-Folder.htt
-Flashguard.exe

Time bomb

Virus Deadlock like a time bomb that will destroy the target computer at the appointed time. This virus will execute the action every 12-13 dated at about 08.00-09.00 each month by ALL ERASE FILE / DATA INCLUDING WINDOWS FILE SYSTEM in all drives, including flash media using the command cmd.exe / c del / f / s / q / a and cmd.exe / c rd / s / q so that, if the computer is restarted, it will display the message "error".

So, the best way to anticipate, do not forget to do a back-up data. To prevent this viral infection, you are advised to use antivirus program that can detect this virus very well.

According Vaksincom Lab testing, current viruses detected by Norman as Deadlock not detected by the majority of existing anti-virus in Indonesia, both local and antivirus antivirus abroad. Norman Endpoint Protection detected the virus as Tibs.DKKR Deadlock.

If you want your data to be victims of this Deadlock again, never to reinstall your operating system to a hard drive that contains your data is lost. Perform critical data recovery process by using a data recovery and true methods.

If you reinstall your operating system to a hard drive that contains data you want to save, likelihood of successful recovery will be very low. If you are not experienced in data recovery and want to get professional help with data recovery of reasonable price, please contact the division Vaksincom Data Recovery in an e-mail info [at] vaksin.com.
Read more...

Time To

0 comments
As a complement and companion you every time, take advantage of Time To free the application of this. There are facilities "Memorizes" that will remind you of the commitments and agreements meeting.

There is also a menu "Balance" which can be used to mencata priorities, deadlines, and time budget. If there is a commitment which ultimately clashed job, you will be given a warning

This application is equipped with a calendar and notes, but unfortunately no list of contacts. However, this application is equipped with an alarm facility reminders, notes web page, pendata files, until the facilities Skype calls. You can also use it to install it on a portable flash disk. Facilities to import and export-related applications are also available.

Although slengkap facility, unfortunately, the visual appearance is rather tersepelekan applications. These applications seem outdated when viewed from its interface. To use, in the beginning you may be confusing and need to habituation process.

There are options to balance the schedule of activities, but still done manually. You can move the schedule from one time to another time if necessary simply by clicking on the entry attracted to schedule another time. Time for business, the stopwatch facility was very helpful. This timer will calculate an activity or project work.

As pendata schedule, Time To be very useful. Indeed, without the facility contact list, this application was lame. However, given the complete features, plus features synchronization with handheld devices, support 17 languages, and others, not easily turned away from Time To.
Read more...

Smart Diary

0 comments
View SmartDiary not much different from any other PIM tools. There are calendar schedule that accommodates all the folders plus the storage of various records.

This one is also like SmartPIM, more functions as a PIM for personal affairs, because there are categories of records for medical and food problems. Perhaps you can make it as a Personal Trainer.

Even so, Smart Diary also used to keep business. There are facilities such as word processing Word Pad equipped premises spelling talker.
This facility is in the Diary or journal maker. Note that the graph can be development or your daily activities.

Other facilities include a calendar schedule of activities, which can be arranged appearance daily, weekly, or monthly. Calendar entry can also be categorized so easily traceable. Schedule tasks, contact lists, and notes (notes) is a standard feature. What's interesting is Nutrition and mediation menu that you can use to adjust the intake of nutrients to the body (plus collection of food shopping) and regulator of health inspectors schedule.

At first glance, penggunannya controls similar to Microsoft Outlook. But because of its full features, it looks a little more solid. Relax, this does not make you confused menggunannya kok. The concept of the creator's easy for you to record and track the activity your life every time and analyze the results.

The development of your life are shown in graphical form. For some people is even less understandable because the graphics are somewhat less detail ditampilan. However, this graph you can use some components menlihat data connection.
Read more...

EssentialPIM Free

0 comments
Brief application reminiscent of Microsoft Outlook view. But this one was free, you can get without paying.

If you want more information, please buy a professional version. In addition to a manageable, fairly complete amenities. Plus the ease, EssentialsPIM fairly steady.

Almost all of the need to manage work and personal data available here. The application is actually provides features such as data encryption, sticky notes for desktop, send the data directly via e-mail, to the facility and the synchronization to PDA Outlok. Only those facilities not available in free version.

You still get the facility of export-import data, scheduler, making the task (to-do list), contact manager aka contacts list, to access e-mail. Setup files and folders in the PIM tool uses multi-level structures such as root in Windows Explorer so easy to navigate.

This application is fairly intuitive to use. Toolbar is available on the left side of the application helps you to create a calendar, to-do list, contacts, notes, to thrash with ease. Likewise for entering input data into each type of record.

Next you live and information input data and time. To contact data, you can import it from Outlook Express, or CSV file to vCard format, commonly used in mobile phone contact data.

This application also provides a portable version so that you can take anywhere and used on any computer. Although without carrying a notebook, keep important notes recorded during meetings with clients. Oya, the documents in this application can be printed for the reserves in the form of hard copy.
Read more...

SmartPIM

0 comments
Software Personal Information Manager (PIM) which one is more dedicated to personal purposes. But do not close the possibility you can use it as a note to record the achievement of targets.

This application will remind us of jadul agendas are usually used to store a tear-tear newspaper article or just a place to collect records.

Although it looks simple, existing facilities in a complete count it as a PIM tools. Milai of personal notes, Appointments and meetings, reminders, birthdays (birthday reminders), to-do list, address books, database, calendar, bookmarks, and recipe storage. This application also has a storage facility password (password). You can store e-mail passwords, social networking accounts, internet banking until the PIN here.

Easy Use
Applications are available in a free and paid editions provide an easy way to pick the information from various sources. Suppose you find an interesting article about something on the internet, then you just press the Ctrl and D on the keyboard, then the data will automatically be recorded in SmartPIM agenda.

Notes can also be entered manually, which is typed. However, data and documents from Word documents, Excel, PDF, Outlook, and so also directly imported into this application and stored as a record.

This application is also portable. Besides can be installed into a PC, can also be saved to the flash drive (no need to be installed). Data so that this agenda can be taken anywhere as needed. So more like a diary is not it?
Read more...

Debrief

0 comments
Debrief you can use to store important data about the work and daily activities. You can keep track of ideas, journals, assignments, lists of contacts, appointments, change of plans, a list of decisions taken, the list of risks, the results of research, until Milestones job.

Ordering notes, folders, and calendar organized intuitively so you can use it without having to read the file "Help".
Almost all data can be connected, like a diary or a reference. After that, record the action can be combined with a record of work being cultivated.

Kalendarnya facility can be used to show notes and review the work report. Note also then be used as publicity material such as reports or newsletters. Features more complete because Debrief is able to accommodate records and documents for the purposes of employment, career, education, and personal life.

View the user interface is a bit noisy, but soon after using it a while, you will immediately get used to. If you still find it difficult, there are files that will help guide you to use all the features of the application. Each folder of documents and records can be modified as needed.

This application is actually paying and are shareware, but the shareware version can be used on. Only a few features that eventually disappeared after 30 days. At the beginning you will always be given the option to use Basic display (note the facility only), Standard (notes and calendar), and Professional (all of the features shown).
Read more...

Have a Personal Assistant

0 comments
What do you do at the beginning of last year? Exactly when the needle seconds, minutes, and hours together 12 points in the middle of the night numbers. Are you one of them who prayed for waged work and everything in this new year? If so, good luck to you.

All your work and career are not equal if not accompanied by prayer and hope. However, this course is also very dependent on how you set the career and job. Doing a good life management would impact on the ease of doing the job. Easy and comfortable job done, then the brilliance of his career was more easily grasped.

How to do the job management and effective activities for all to easy to do business and nothing is left behind? PDA (or smart phone) is one of the tools. PDA users typically use apliaksi PIM (Personal Information Manager) will help you to keep track of important things. Start of the promise of meeting with clients to schedule nge-gym.

Create your not using a PDA, so-so with the agenda. This is one of the tools to schedule and activities that have long been used. However, sometimes do not make records teroragnisir well. Understandably, often marks the user's hand moved frequently. The result, you could be confused to read it, emskipun write your own.

To be more organized, it's good to note that the agenda combined with PIM software on the computer. Or maybe just change the function directly agenda with the software. Example pengategorian facilities and more neat and orderly. Create your work in front of the computer for a long time, this will apliaksi PIM felt huge benefits.


Full function Management

What's on offer this PIM applications? Well, a lot. Understandably, a personal organizer functions that eventually also regulate matters pertaining to private. Unumnya, this type of application will manage and provide the function of journals (records), address book, task list (list jobs), and calendar (which will remind of important dates such as birthdays friends or relatives, a celebration, to schedule a meeting). Some software that provides facilities PIM data synchronization in mobile phones, PDAs, or other device can be shared or exchanged with PIM data on the main PC.

It was intended to organize everything? If you have, it's time to choose the right application. Remove the first option to buy the paid software. Because that was pretty much free. If you are using applications such as Microsoft Outlook mailer, a number of PIM functions are available there, if only its essential functions are available.

Some decent software you are trying to arrange all matters and achievement. Choose the right to demand and also easy to use. Some think InfoKomputer chose complete our facility here. Just choose a proper and fitting.
Read more...

PhotoEdit

0 comments
In the Microsoft Office package, we know the image editor program called Picture Manager. This application has simple functions in processing an image, such as cropping, Resizing, and file format conversion.

There is also a feature contrast settings and lighting levels and color images and color saturation. Far from the complete word, but for ordinary users to be sufficient.

But what if you do not have the package? For example you prefer Open Office Suite is not paid. Picture Manager is the program can be downloaded separately, but only in the shareware version. For a free application completely, Photo Edit may be one alternative.

These devices have almost the same capabilities with Microsoft homemade image editors. In fact there are some functions that are not owned by Picture Manager. For example correction level and intensity of color can be adjusted based on RGB color channels. Rather than fill the numbers, you can simply play the histograms and curves as needed. Another ability you had them Photo Edit sharpen or blur the image and standard features such as autolevel, autocontrast, color balancing, flip, and rotate.

With the relatively small size, only takes about 3MB hard disk space, accompanied PhotoEdit fairly decent photographer or beginner-level image editor. At least to learn to adjust the coloring.
Read more...

Ebook

0 comments
Read more...

Etc.

0 comments
Read more...

Games

0 comments
Mini Games


Farm Frenzy 2 (PC Arcade Game)
Pirates Carribean
Oriental.Dreams
Farm_Frenzy_Pizza_Party_cybermania
Farm Frenzy 3.01 (FINAL)
Alien Shooter II 20 Mb + Crack




Games PC

Art of Murder: Cards of Destiny (2010)
Size: 4.03GB

amcdg.part01
amcdg.part02
amcdg.part03
amcdg.part04
amcdg.part05
amcdg.part06
amcdg.part07
amcdg.part08
amcdg.part09
amcdg.part10
amcdg.part11
amcdg.part12
amcdg.part13
amcdg.part14
amcdg.part15
amcdg.part16
amcdg.part17
amcdg.part18
amcdg.part19
amcdg.part20
amcdg.part21
amcdg.part22


Star Wolves 3: Civil War (2010)
Size: 3.16 GB

Star.Wolves.3.Civil.War.part01
Star.Wolves.3.Civil.War.part02
Star.Wolves.3.Civil.War.part03
Star.Wolves.3.Civil.War.part04
Star.Wolves.3.Civil.War.part05
Star.Wolves.3.Civil.War.part06
Star.Wolves.3.Civil.War.part07
Star.Wolves.3.Civil.War.part08
Star.Wolves.3.Civil.War.part09
Star.Wolves.3.Civil.War.part10
Star.Wolves.3.Civil.War.part11
Star.Wolves.3.Civil.War.part12
Star.Wolves.3.Civil.War.part13
Star.Wolves.3.Civil.War.part14
Star.Wolves.3.Civil.War.part15
Star.Wolves.3.Civil.War.part16
Star.Wolves.3.Civil.War.part17
Star.Wolves.3.Civil.War.part18


Empire Earth III RELOADED
Size: 4.53 GB

Empire.Earth.III-RELOADED.part01
Empire.Earth.III-RELOADED.part02
Empire.Earth.III-RELOADED.part03
Empire.Earth.III-RELOADED.part04
Empire.Earth.III-RELOADED.part05
Empire.Earth.III-RELOADED.part06
Empire.Earth.III-RELOADED.part07
Empire.Earth.III-RELOADED.part08
Empire.Earth.III-RELOADED.part09
Empire.Earth.III-RELOADED.part10
Empire.Earth.III-RELOADED.part11
Empire.Earth.III-RELOADED.part12
Empire.Earth.III-RELOADED.part13
Empire.Earth.III-RELOADED.part14
Empire.Earth.III-RELOADED.part15
Empire.Earth.III-RELOADED.part16
Empire.Earth.III-RELOADED.part17
Empire.Earth.III-RELOADED.part18
Empire.Earth.III-RELOADED.part19
Empire.Earth.III-RELOADED.part20
Empire.Earth.III-RELOADED.part21
Empire.Earth.III-RELOADED.part22
Empire.Earth.III-RELOADED.part23
Empire.Earth.III-RELOADED.part24


Empire Earth II (PC Game Highly Compressed)
Size: 260 MB

Empire.Earth.II_gfx.part1
Empire.Earth.II_gfx.part2
Empire.Earth.II_gfx.part3
Empire.Earth.II_gfx.part4
Read more...

Movie

0 comments
Read more...

FotoSketcher 1.95

0 comments
Uploading photos in a virtual world has become a habit now. Happy moments with friends and relatives or just the photos themselves generally we find on Facebook, Twitter, Flickr, or a personal blog.

But the images with a standard pose kok taste just so-so. It would be more attractive if given the artistic touch.

No need to be a hero Photoshop to enhance photos. Thanks to the free application FotoSketcher, ordinary image display easily changed even more special.
The interface is easy to understand. Just open the image, select the desired artistic style, set the color detail if desired, add frames and text, and click the "Draw It!". Abracadabra! Your photos directly "painted" to be more beautiful and can be stored directly.

David Thoiron, FotoSketcher developers, offers a variety of unique artistic style. Ranging from pencil sketches, ink, watercolor and oil paint, to pixelation and colored dots. Every choice you can preview styles before execution. There are also framed photographs in a variety of styles, plain, classic, and modern. Remarkably, the transformation process is relatively short depending on the size of photos and spec computers. Changing some of the pictures at once in any one time is possible through batch processing capabilities.

This application is very useful for you who want to appear to be different among friends or other social networking narablog (bloggers). There is also a format portable enough to be stored in the flash to accompany you travel. With FotoSketcher, a collection of photographs now will never be the same again.
Read more...

Crystal Disk Info 3.3.0

0 comments
Storage is one of the most crucial components in a computer. Function as data storage to be used everyday. Currently, there are two most common form of storage, ie hard disk drive (HDD) and solid state drive (SSD).

Each has its own advantages and disadvantages, in terms of data transfer rates, access I / O, capacity, price, and the risk of damage.

Regardless of your choice in the use of storage, maintenance should not be forgotten. First step is to understand the specifications and storage conditions.
To find out, can use the Crystal Disk Info. This is a free utility that can display important data storage, such as firmware, serial number, support features, and rotation rate. Conditions "health" storage also can be known, including Good, Caution, Bad, and Unknown. Technical determination of different status, depending on the type of storage (HDD or SSD).

Crystal Disk Info SMART has supported, a surveillance system that can detect the possibility of damage to a storage. Indicators-indicators are many and can be viewed directly on the home page. Storage and condition reports can be copied into the form of text files if you want to print. Other functions include regulation owned noise and power consumption. Keep in mind, its storage performance is inversely proportional to the two.

Another interesting thing from this utility is its open source. Its source code placed on Sourceforge site so freely accessible. For convenience, this application is also available in portable format, in addition to stand-alone format that must be installed on the computer.
Read more...

IBM BladeCenter HS22

0 comments
The challenge was given by IBM to test Indonesia BladeCenter HS22 series servers are entered into the ranks of the product division STG (Systems and Technology Group) at IBM Indonesia. Of course, we do not miss this opportunity. Unit testing using a chassis series H.

In addition to 14 slot blade servers, chassis serial H able to load 2 fan or blower units that are redundant, the switches 4 units each with 4 LAN RJ45 slot, as well as 4 power supply units are redundant and hotswap plus have the ability to load balancing and fail-over. Each power supply also has an additional fan for cooling.


If the admin wants to use the console directly, the H series chassis is also available with a KVM station to the monitor port, USB port for keyboard and mouse, and the RJ45 port to enter into the web interface remote server management.

Through the web interface server administration, admin can do many things, including: selecting and activating each blade server, forming a series of hard disk (RAID), install the operating system, manage IP addresses on each LAN port, directing the blade server to storage, directing the use of the console (terminal) keyboard and mouse and VGA to a specific server blade, and so on.

IBM provides an application called the IBM Server Guide that will make it easier if admin chose to use the Microsoft operating system Windows Server on one bay BladeServer HS22. This application provides a variety of hardware drivers that are generally required by the operating system.

No lag, IBM includes an application called IBM Systems Director to facilitate the management of virtualization. With this application, admin can view the status of each blade server that may use different operating systems are different. Admin can define how each system is connected. Visually, all the components can be monitored, including servers, storage and networks.

 HS22 blade servers that we tested uses IBM 59Y5667 motherboard, a processor socket 2. Test unit 1 is filled with quadcore processor E5530 Intel Xeon 2.4 GHz-speed computing and Gainestown codename. CPUZ tool that our latest release pairs used to recognize the chipset as an Intel motherboard Rev. 5520. Intel 13 and 82801JR southbridge (ICH 10R).

To support the main computing, HS22 Blade Server equipped with a chip RAM DDR3 triple channel types that can accommodate up to 96 GB. Meanwhile, our test unit with 6 GB of memory.

Pair disk hotswap SAS becomes the locus for the operating system on HS22 Blade Server. Each 146 GB hard drive capacity and speed turn 10,000 rpm. Thus, the two hard drives can be arranged in RAID systems RAID 0 or 1.

Okay, let's look at the performance of this server blade. We employ two types of tests. The first test aims to see the performance of each major hardware component separately. We used SiSoft Sandra Lite tool's latest.

While the second test aims to see the performance of the hardware in the run synergy between components of one server function, in this case as a web server. In this second test we installed IIS as a "machine" and put the web page HTML and ASP pages contain complex mathematical calculation. In the computer test, we installed a tool Paessler Webserver Stress Tool that will output Whack a target server with requests for HTML pages and ASP up to 2000 requests per second, for 10 minutes.

Optimal user (active user)
280
Maximum HTML user/client (active user)
973
Maximum ASP user/client (active user)
973

Web server stress test results show that the error handling of HTML pages occurs on the user to 973, as well as an ASP page error handling. Blade Server HS22 looks still pretty responsive handling requests, less than 1000 milliseconds, up to 280 users. From our observations, there is a very significant difference in the optimal components of a user between servers that use Intel Xeon processors that use the E5530 with Intel Xeon E5550.

So you can easily be listened to, we show the results of individual performance test every hardware component in table form. Broadly speaking, we see good performance on multicore efficiency components (processor), memory bandwidth (processor), and File Systems (hard disk).

IBM BladeCenter HS22 displays excellent performance that should be the choice solution to the needs of enterprise-class servers are fast, have the flexibility of expansion, practicality in virtualization, and integration management of many servers at once.
Read more...

Asus RT-N16

0 comments
Display Asus RT-N16 can be said to form a handsome large enough. Dimensions 216 x 161.9 x 40.5 mm, which is quite difficult if you would put in a limited space. Moreover, the wireless router also does not include an additional seat, so a bit difficult vertically positioned.

The front of Asus RT-N16 contains rows of LED lights, functioning as an indicator of ongoing activities. Wireless router that weighs about 470 grams of fruit has three antennas on the back. All three antennas are detachable so you can replace it with another antenna signal stronger. Besides the antenna, at the back of the wireless router also contains five RJ45 ports. One RJ45 port serves as the WAN (Internet via modem) and 4 LAN ports. There was also a WPS button and reset button to restore the default configuration.

Asus RT-N16 has been supports 802.11n wireless connection, but still supports the previous connection standard, the 802.11b and 802.11g. Wireless routers can also function as a switch using the 4 LAN ports are available.

We set the configuration, you will be faced with a control panel that is slightly different than usual. Display control panel interface Asus RT-N16 is very attractive and fairly intuitive. Even beginners will not be confusion in the make configuration settings.

Asus RT-N16 offers a variety of features which are generally offered by other wireless routers. Variety of standard features such as DHCP server present, WAN settings, LAN settings, and security settings. External security such as firewalls also present here. Internal security such as IP filtering, MAC address filtering, and URL filtering to restrict access to sites that allowed you can do on the security section.

With three large antenna gains, the wireless router ASUS RT-N16 has a good performance. We tested the data transfer speed (throughput) wireless router by plugging it into the client computer that uses wireless N adapter class and use the tool NetIQ Chariot. The resulting throughput is better with an average score of 37.553 Mbps, 46.811 Mbps maximum. Asus RT-N16 also has a good response, as evidenced by the value of response time average of 2.130 seconds (under 5 seconds).

To test the ability of the SPI firewall is owned by Asus RT-N16, we use the test facility in ShieldUp GRC.com and do port scanning. Result, there is only one port is not in Stealth status, but his condition remained closed (Closed). Various other ports are in Stealth conditions.

***

Asus RT-N16 wireless routers are reliable enough. Fast performance, it features abundant, and easy to use. Ordinary user will usually experience confusion when setting the configuration on the wireless router control panel, but Asus RT-N16 allows everything. Interesting control panel with a display that is not too complicated, so that ordinary users can quickly understand. Good performance with 3 antennas that can be exchanged. For a network of small or medium size such as home or office, Asus RT-N16 is sufficient.
Read more...

D-Link DIR685

0 comments
More wireless network devices are required to be multifunctional. Well, let's refer to bid on this one: a wireless router that can load and use shared-disk but also the aesthetic appearance as an electronic photo frame.

That's trilogy of functions that are presented by D-Link wireless routers in series and given the nickname DIR685 router storage. Not only 1-inch hard drive capable of 12 shared by this router to the network, but also a kind of portable media save flash (via the USB 2 ports on the back of the body). There is also thorough, there are 4 LAN RJ45 ports to support network connections via cable and RJ45 WAN port 1 to connect to the Internet via a modem.

For an aesthetic impression strengthened, D-Link DIR685 using internal antennas, which means Eliminating the possibility to replace the antenna with a more sensitive or more powerful radiance power. However, the 802.11n wireless standard speed 100 Mbps data transfer adopted by D-Link DIR685 is expected to compensate for this.

An LCD screen measuring 3.5 inches in addition to functions for managing network configurations, monitor status, and network conditions, as well as a media viewer, the pictures in the media store. System configuration settings using the four direction buttons in the next layer. Again, for the sake of aesthetics, the key used is not outstanding, but flat with the surface of the body of the router.

Parameters that can be displayed and arranged on the LCD display among others, Statistics including connection speed (cable, wireless and internet), which includes status and connection status of hard disk status, WPS to enable wireless security systems, point to Settings to set the time LCD and hard drive hibernation and LCD brightness levels, Photos to manage change interval display images and media source or penyimpannya, and Frame Channel.

Also there are several configurations, such as the establishment of user accounts and group NAS, the level of data access rights of each user, setting the FTP server function, other than formatting your hard disk menu interface via the web. Uniquely, the file system used to format the hard drive is EXT3, typical Linux or UNIX systems.

Routing the existing facilities on this router and is used to set the paths in the network data packet can not be considered trivial. In addition SPI firewall to protect against DoS attacks (Denial of service), this router provides a firewall that can be added to the rule. In addition, there are features Demilitarized Zone (DMZ) to isolate the computer within the network are allowed to be accessed directly from the Internet, Port Forwarding to direct requests from the Internet to computers in a network that are listening on port services, Web Filtering to filter the site address Web prohibited (blacklisted) or otherwise permitted (whitelist), and Dynamic Domain Name Service (DDNS).

Our initial suspicion of not maximum data transfer speed (throughput) wireless on D-Link DIR685 because it uses an internal antenna with irrefutable test results using the NetIQ Chariot tool. Recorded, on the condition of free space partition and 13 meters distance between the router with the computer examiner, D-Link DIR685 provide maximum throughput of 83.507 Mbps, 51.381 Mbps minimum, and average 76.029 Mbps.

Throughput numbers are not moving far, when we try to move the Dlink-DIR685 into an insulated space and a hole with the same distance. Maximum throughput remains located at 82,816 Mbps rate, a minimum of 39,043, and 76,610 Mbps on average.

The router shows a satisfactory test results, not just on the throughput performance, but also the performance of the SPI firewall. We are positioning this as a gateway router and connect it to the test facility's Shield Up Gibson Research Center (grc.com) through a public IP address. All the service port (service) is in hidden status (Stealth).

***

D-Link DIR685 presents a multi-functional aspects as better value product. This aspect does not reduce the basic performance, ie data transfer speeds (throughput) as an access point, various routing functions, and firewall security. Very suitable for use in the room, gallery, living room, even the extra wide space.
Read more...

NoTouch MyXerver MX3600

0 comments
In a computer network, usually in the client computer users often do retrieval and placement of data on a server, which often makes burdened server. Now the use of additional storage, or NAS is usually done NAS as though this is sometimes used only keep the no-frills other facilities. Well, MyXerver MX3600 offers quite interesting this time because in addition to functioning as a storage media, these devices also deliver music to the network and to download even though the PC was turned on.


To make it connected in a network, this desktop storage provides LAN port. Also available is a USB port that can be used to make printer sharing for each client connected. If desired, NAS can also be accessed via the Internet. All network activities are arranged through the application provided NoTouch.

***

Using NAS with flexible functions such as this MyXerver obviously easier for users to exchange data network. On data protection was carried out thanks to the support NTI Shadow software that is quite popular. Those who want to share process data more smoothly, proper use of NAS memertimbangkan like this.
Read more...

Rainer SV110C2-3.0 SATA35F

0 comments
For this reason, Rainer brings server package "frugal" which berbundel operating system Windows Server 2008 R2 original Foundation, aimed at the small and medium enterprises (SMEs). Why the label R2 Foundation? This means that this operating system will record the number of login sessions in the same time a maximum of 60 users.

Each purchase of this server package will be accompanied by a CD containing the operating system image as a backup. Installation requires re-arranging the operating system hard drive 2 Seagate Cheetah 250 GB ST 3250310NS SATA connection to the first RAID system through the BIOS. After that, then, the installation can be run by booting from a CD image of Windows Server 2008 R2 Foundation.


The circuit is bundled disk RAID uses only 1 of 5 SATA ports available on this server motherboard. SATA cables used to connect the branches 2 hard drive to one of the SATA ports.

What about the hardware specifications of its components? At first glance, this server looks like a regular desktop PC. But after opening the right side panel of its chassis, it would seem that the motherboard and processor are specific to the server. CPU Z Tool latest release we install the unit tests provide information that used a single processor is Intel's dual-core Xeon E3110 with 3.00 GHz clock speed and 6144 KB L2 cache and name password Wolfdale. While its motherboard is Intel 3210SH.

Although not as much memory slot series Rainer another server, 4 memory slots filled with 1 memory chip brands Visipro capacity of 1 GB DDR2 EEC PC6400 (error correction code) is sufficient for the SMEs.

Computing servers running heavy anticipated by 1 fan 9 cm in diameter attached to the processor heatsink, 1 fan 9 cm in diameter on the rear panel chassis, 1 fan diameter and 12 cm which is one of the power supply (PSU).

In addition to the fan, the chassis rear panel there are PS2 ports for keyboard and mouse. A pair of RJ45 port of the network card speed 1000 Mbps (gigabit Ethernet) is also available on this section to support the transfer of high-speed data packet.

Our time has come to test the performance SV110C2 Rainer server-3.0 SATA35F, either as a single unit in running a service function, as well as individually on each hardware component. Test results of individual hardware components through the tool SiSoft Sandra Lite tests we display in table form for easy listening to. In general, we found a good enough score on the element multicore efficiency, memory bandwidth, and memory latency. RAID performance elements reflected in the file system is also quite good in the buffered write, sequential write and random write.
Function as a web server we choose to test the performance of hardware synergy between the components. For that, we installed IIS Web server machine as well as HTML and ASP pages contain complex mathematical calculation. On the other hand, the test computer we installed a Web server stress tool that will spray the target server with requests for HTML and ASP pages as much as 2000 times per second for 10 minutes. In order to avoid the bottleneck of the data packet stream, we connect the server and test computer with gigabit ethernet devices and CAT5E cable.

Graph Web Server Stress Tool test showed that the error handling of HTML page requests occur on the user 404, whereas for an ASP page, place the user to 801. This server is also still capable of responding to requests web pages quickly (less than 1000 milliseconds) to the user to 253.

Bids bundle Windows Server 2008 Foundation is more value on the package server-3.0 Rainer SV110C2 this SATA35F. Performance as a web server pretty good, also his performance RAID, so take this server package as an alternative solution for the SMEs. In our opinion, to consider improving server performance with an additional investment DDR2 memory chips.
Read more...

Labels

 
Temporary © 2011 DheTemplate.com & Main Blogger. Supported by Makeityourring Diamond Engagement Rings

You can add link or short description here