Copyright By www.surfhealthytips.blogspot.com. Diberdayakan oleh Blogger.

Popular Posts Today

Mercedes-Benz Mobil Mewah

Written By RajaBlog on Selasa, 21 Juni 2011 | 22.22

Mercedes-Benz Mobil Mewah Terbaik Indonesia adalah Julukan/ Slogan Yang cocok dan patut di Berikan Untuk Alat transfortasi Mobil yang sehebat, Termewah, dan Ternyaman, Terbaik serta berteknologi handal siapa lagi yang memilik Julukan /Slogan selain hanya Mercedes-Bend.

logo web Mercedes Benz Mobil Mewah Terbaik Indonesia

Mercedes-Benz


Sejarah Butut Mobil Mewah Terbaik Indonesia :

Disini Komputerbutut akan mempaparkan mengenai history, Sejarah dan Pengalaman dari Kepala Negara Indonesia yang Menggunakan Alat transportasi Kebanggan nya dan juga kebanggan bangsa Indonesia yang tidak boleh dilupakan menggunakan Mobil Mewah Mercedes-Benz Terbaik Indonesia.

  • Presiden Presiden Soekarno diketahui memiliki satu Mercedes-Benz 600 limousine di antara berbagai merk mobil-mobil dinasnya. Namun, selama ia berkuasa (1945-1967), tidak ada foto atau berita di media massa yang memperlihatkan atau menyebutkan bahwa Presiden Soekarno pernah menggunakan mobil tersebut.
Sukarno Mercedes Benz 300x225 Mercedes Benz Mobil Mewah Terbaik Indonesia

Sukarno Mercedes-Benz

Satu-satunya cerita yang mengisahkan bahwa Presiden Soekarno menggunakan Crown Imperial Limousine diperoleh dari tulisan drg. Oei Hong Kian, yang sempat merawat gigi Presiden Soekarno selama beberapa bulan, menjelang dan sesudah kekuasaannya berakhir.

Dalam tulisannya yang dimuat di majalah Intisari bulan Oktober 1988, drg Oei Hong Kian mengisahkan, awal September 1967, tepat pukul 09.00 WIB, Soekarno, yang kekuasaannya berakhir pada awal Maret 1967, datang ke rumahnya untuk berobat dengan menggunakan Mercedes-Benz 600, diiringi lima jip penuh dengan tentara, yang menjaganya dengan ketat.

  • Presiden Soeharto (1967-1998), pertama kali menggunakan Mercedes-Benz 600 limousine pada waktu dia menerima kunjungan Ratu Belanda Juliana ke Jakarta pada 26 Agustus 1971.

suharto Mercedes Benz 600 limousine Mercedes Benz Mobil Mewah Terbaik Indonesia

suharto Mercedes-Benz 600 limousine

Foto Mercedes-Benz 600 itu terpampang ,Selama memegang kekuasaan sebagai Presiden, Soeharto menggunakan Mercedes-Benz S-Class sebagai kendaraan resminya. Tipenya berganti-ganti dari waktu ke waktu.


Dan, dalam perjalanannya yang terakhir dari Istana Merdeka menuju ke kediamannya di Jalan Cendana 8-10, Jakarta Pusat, setelah mengundurkan diri dari jabatannya sebagai Presiden, ia menggunakan Mercedes-Benz S600 V12. Setelah Soeharto mengundurkan diri,

  • Dan sampai sekarang Hampir Semua Kepala Pemerintahan RI dari Sukarno sampai Presiden Susilo Bambang Yudhoyono menggunakan Menggunakan Alat transforrasi menggunaka Mercedes-Benz. Mobil Mercedes-Benz Presiden Susilo Bambang Yudhoyono adalah Mercedes-Benz tipe S600L model W221. Dengan lisensi plat RI 1, yang mempunyai Banyak Kehebatannya antar lain
S600L model W221 Mercedes Benz Mobil Mewah Terbaik Indonesia

S600L model W221

Mobil ini merupakan kendaraan lapis baja dengan tingkat resistensi Eropa B6/B7. Mercedes-Benz ini tahan terhadap senjata militer standar dan memberikan perlindungan terhadap fragmen yang muncul dari granat tangan, serta bahan peledak lainnya.



Fitur keamanan tambahan termasuk ban run-flat, tanki bahan bakar 90L dan sistem pemadam kebakaran otomatis. Selain itu, mobil ini juga menggunakan ban Michelin PAX 245-700 R470 AC, sistem pengaturan udara segar darurat, sistem kontrol pneumatik darurat untuk membuka jendela (beroperasi secara tersendiri dari sistem elektronik), serta Panic Alarm System tambahan.



Selain itu, ada pula kamera belakang, kaca depan dan jendela depan yang tahan panas, sistem adjutable doorhold yang digunakan di keempat pintu, di pintu belakang yang dapat ditarik dan menutup secara otomatis, serta tirai belakang listrik.



Kendaraan ini memiliki kecepatan puncak 210 kilometer / jam dengan GVW 4.200 kilogram.



Mobil Presiden SBY ini juga memiliki pengatur komponen suspensi dan tubuh mobil, sebuah penjepit tambahan (strut tower brace) antara suspensi depan dan dua bahan tambahan di bagian belakang untuk melengkapi suspensi udara yang lebih besar

Ayoo Mau Pilih apa lagi Alat transfortasi yang Termewah,Terhandal,Ternyaman, berteknologi Terhebat di dunia dan terbaik diantara yang baik hanya Mercedes-Benz Mobil Mewah Terbaik Indonesia . Orang no 1 di Indonesia saja pilih Mercede-Benz, masa kita pake yang lain. Apa kata dunia icon biggrin Mercedes Benz Mobil Mewah Terbaik Indonesia (bangsa yang Bijak Adalah Bangsa yang Menghargai Sejarah)

22.22 | 0 komentar | Read More

Safety Tips Protect Accounts YM & up from Piracy

Written By RajaBlog on Rabu, 09 Maret 2011 | 06.28


Artist Jajang C. Noer missed. Yahoo Messenger (YM) and up his burglarized by unknown persons. Not only that, a number of colleagues Jajang had asked for money by the perpetrator. How do I avoid this?

According to antivirus and computer security analyst from PT Vaksincom, Alfons Tanujaya, there are a few things to note about the security of private account. Especially relevant ownership password or passwords.



Alfons added, if the user account it difficult to remember passwords, it would require a special application as a reminder. There is a password reminder program that can be downloaded for free from Windows sebabai alternative solution to this problem.

"We just need to know the password reminder that.'ll Stay in the copy-paste it for example for yahoo, twitter, mail server, hotspot, internet banking and others," he added.

Not only that, Alfons also reminded the public to make an email account with their own domain. According to him, free email accounts like Yahoo, Gmail and others at risk enough piracy.

"In addition, change passwords regularly and properly. Do not cuman periodically, but note the surroundings as well as change the password or pin number," he concluded.

Previously, artists Jajang C. Noor, wife of the late Tim Christensen, Damayanti Noor YM his account hijacked. Mode used by the actors is to pretend as the owner of the account and ask for money to a number of colleagues in the accounts. Actors admitted difficulties and asked to transfer money immediately.
06.28 | 0 komentar | Read More

'Diet' Instant with Slimpic


Sometimes someone will look fat when photographed. It may be that at the time of the shooting was finished eating a lot or a camera angle that is not profitable.

Fortunately, with digital camera technology, the resulting images can be easily manipulated. As long as they are not for the purpose of deception, manipulation is actually more or less legitimate.

Well, for the modification of body weight did not need any sophisticated software. A web service called Slimpic.com can be used to 'instant diet'.

Here are the steps:


1. Visit the site Slimpic.com
2. Click the 'Slim your Pics' or directly visit Slimpic.com / Slim
3. Select the photo you want dilangsingkan, can upload from your computer or take from the album on Facebook
4. After the photos uploaded, click Next
5. Select areas of the face or body of people who want to 'dilangsingkan'
6. Select the weight you want deducted (in addition to reducing, can also be added.) Maximum weight is 10 kg modification.
7. See the results, if you're satisfied click Finish
8. If completed, the picture can be saved (downloaded to the computer) and also included in the album on Facebook


Good luck!
06.27 | 0 komentar | Read More

3 How to Clean the Virus 'eaters Notebook'


Stuxnet Virus, or also known as Winsta, devouring all the vacant land on the hard drive until it is full. According to Alfons Tanujaya, antivirus analysts from Vaksincom, to ITGazine, Friday (07/30/2010), Indonesia is a country with the second largest number of victims Stuxnet in the world after Iran.

The virus initially spread from various porn sites, pirated programs and content 'gray' other was quite disturbing. Here are the steps eradicate the virus, such as antivirus Vaksincom spoken by the analyst Adi Saputra:

1. Using Dr. Web CureIt

Adi suggested the victim Winsta aka Stuxnet it to download the virus removal software. Removal Tools called Dr.Web CureIt it can be downloaded from the site FreeDrWeb.com

2. Registry Fix

Later, Adi suggested improvements to the modified Windows regitri by the virus. How, first of all, copy the script below into Wordpad files.

[Version]
Signature = "$ Chicago $"
Provider = Vaksincom Oyee
[DefaultInstall]
AddReg = UnhookRegKey
DelReg = del

[UnhookRegKey]
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced, ShowSuperHidden, 0x00010001, 1
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced, SuperHidden, 0x00010001, 1
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced, HideFileExt, 0x00010001, 0
HKLM, SOFTWARE \ CLASSES \ batfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, SOFTWARE \ CLASSES \ comfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, SOFTWARE \ CLASSES \ exefile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, SOFTWARE \ CLASSES \ piffile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, SOFTWARE \ CLASSES \ regfile \ shell \ open \ command,,, "regedit.exe"% 1 ""
HKLM, SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon, Shell, 0, "Explorer.exe"

[Del]
HKLM, SYSTEM \ CurrentControlSet \ Services \ MRxCls
HKLM, SYSTEM \ CurrentControlSet \ Services \ MRxNet
HKLM, SYSTEM \ ControlSet001 \ Services \ MRxCls
HKLM, SYSTEM \ ControlSet002 \ Services \ MRxNet
HKLM, SYSTEM \ CurrentControlSet \ Services \ Enum \ Root \ LEGACY_MRXClS
HKLM, SYSTEM \ CurrentControlSet \ Services \ Enum \ Root \ LEGACY_MRXNET
HKLM, SYSTEM \ ControlSet001 \ Services \ Enum \ Root \ LEGACY_MRXClS
HKLM, SYSTEM \ ControlSet002 \ Services \ Enum \ Root \ LEGACY_MRXNET

Then, save the file with the name 'repair.inf'. Use the option to Save as type Text Document to avoid mistakes. Then, right-click the file 'repair.inf', select 'Install' and restart the computer.

"Clean up temporary files, this is for to prevent the rest of the trojan that tries to be active again. Use tools such as the ATF Cleaner or use the Windows feature of the Disk Clean-Up," wrote Adi.

3. Emergency Solutions

In addition, here is the script that can be used in emergencies to prevent Winsta not re-infect. Save the following script with the name Winsta.bat (file type: Text)

@ Echo off
del / f c: \ windows \ system32 \ winsta.exe
brake rd c: \ windows \ system32 \ winsta.exe
md c: \ windows \ system32 \ winsta.exe
del / f c: \ windows \ system32 \ drivers \ mrxnet.sys
brake rd c: \ windows \ system32 \ drivers \ mrxnet.sys
md c: \ windows \ system32 \ drivers \ mrxnet.sys
del / f c: \ windows \ system32 \ drivers \ mrxcls.sys
brake rd c: \ windows \ system32 \ drivers \ mrxcls.sys
md c: \ windows \ system32 \ drivers \ mrxcls.sys
attrib + r + h + s c: \ windows \ system32 \ winsta.exe
attrib + r + h + sc: \ windows \ system32 \ drivers \ mrxnet.sys
attrib + r + h + sc: \ windows \ system32 \ drivers \ mrxnet.sys

When finished, double click the file Winsta.bat generated. For optimal cleaning and prevent re-infection, re-scan using updated antivirus and recognize this virus very well.
06.24 | 0 komentar | Read More

3 Leading Site for Finding Text Movies


The presence of virus W32/VBWorm.BEUA or better known as viruses that exploit security holes shortcut is quite disturbing. For, although labeled local virus, he not only take advantage of user negligence. But has 'first class' with a break through Windows security holes.

Consider the 8 practical steps to kick the virus is able to change the folder that is in the USB flash disk into the shortcut, according to Jauhar Adang Taufik, an analyst with Vaksincom:

1. Disable 'System Restore' for a while during the cleaning process.

2. Decide who will clean your computer from the network.

3. Turn off the virus active in memory by using the tools 'Ice Sword'. Once the tools are installed, select the file that has the icon 'Microsoft Visual Basic Project' and click 'Terminate Process'. Please download these tools at http://icesword.en.softonic.com/

4. Delete the registry that has been created by the virus by:
-. Click the [Start]
-. Click [Run]
-. Type Regedit.exe, and click the [OK]
-. In the Registry Editor application, browse the key [HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Run]
-. Then delete the key that has the data [C: \ Documents and Settings \% username%].

5. Disable the autoplay / autorun Windows. Copy the script below in notepad and then save it as repair.inf, install the files in the following manner: Right-click repair.inf -> INSTALL


[Version]

Signature = "$ Chicago $"

Provider = Vaksincom


[DefaultInstall]
AddReg = UnhookRegKey
DelReg = del
[UnhookRegKey]
HKLM, Software \ CLASSES \ batfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ comfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ exefile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ piffile \ shell \ open \ command ,,,"""% 1 ""% * "
HKLM, Software \ CLASSES \ regfile \ shell \ open \ command,,, "regedit.exe"% 1 ""
HKLM, Software \ CLASSES \ scrfile \ shell \ open \ command ,,,"""% 1 ""% * "
HKCU, Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer NoDriveTypeAutoRun, 0x000000ff, 255
HKLM, SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer NoDriveTypeAutoRun, 0x000000ff, 255

6. Delete Files parent and duplicate files are created by the virus included in the flash disk. To expedite the search process, you can use the 'Search'. Before conducting the search should show all hidden files by changing the Folder Options settings.

Do not let an error occurs when deleting a master file and duplicate files that have been created by the virus. Then delete the master files that have virus characteristics:

-. Icon 'Microsoft Visual Basic Project'.
-. File Size 128 KB (for other variants will have varying sizes).
-. Ekstesi file '. EXE' or '. SCR'.
-. File type 'Application' or 'Screen Saver'.

Then delete the duplicate shortcut files that have the characteristics:

>. Folder Icon or icons
>. Extension. LNK
>. File Type 'Shortcut'
>. 1 KB file size

Delete the file. DLL (example: ert.dll) and Autorun.inf file on flash disk or a shared folder. Meanwhile, to avoid the virus is active again, delete the master file that has an EXE or SCR extensions first and then remove Shortcut file (. LNK).

7. Show re-folders have been hidden by the virus. To speed up the process, please download the tools Unhide Files and Folders in http://www.flashshare.com/bfu/download.html.

Once installed, select the directory [C: \ Documents and Settings] and folders that exist on the flash disk by moving into fields that are already available. In the [Attributes] clear all the options, then click the [Change Attributes].

8. Install security patches 'Microsoft Windows Shell shortcut handling remote code execution vulnerability, MS10-046'. Please download the security patch at http://www.microsoft.com/technet/security/Bulletin/MS10-046.mspx
06.19 | 0 komentar | Read More

7 Tips for Keeping Passwords


Passwords are secret codes that must be protected. Many negative things can happen when your password leak into the hands of others. Learn 7 tips to keep it brief.

1. Not Using Default Password
The default password is the password that we can be the first time. This default password should indeed be quickly replaced because of very vulnerable. The reason, the default password can be easily searched on google search, even there are listed the name of a machine, type and default password with a magnificent plastered on some website creators vendors.

Sometimes administrators fear of forgetting to change-change the default password, so that an intruder can take over the system with default passwords.

Wearing 2.Tidak Password Hint
Sometimes we are afraid to forget the password that was our entry into the system / account, so we need to create a reminder if we forget the password. Now this is called password reminder Hint, if we create a password hint question with this then we can quickly recall these forgotten passwords.

Likewise with the hackers, they'll experiment with us to guess the password in the password hint questions, over time the password will be predictable, if the questions listed in the password hint can be answered by the penebak password.

Writing 3.Tidak Password
Owners are often afraid to forget your password with the password has been entered, so the owner would write different passwords user id and password into other media such as a notebook, notepad, Stickies (mac), password folders, books, mobile phones and other.

It is also quite vulnerable to leaking. Why vulnerable? Because when a variety of equipment is lost, then all information about a user id and password are sooner or later will be known by the thief equipments / gadgets are missing.

4.Menggunakan a Strong Password
Owner passwords often using a short password only, if it could be shorter than 3 characters then the user will give a short password. Fortunately this time the system provides a minimum password length of 6 characters and a maximum of 254 characters. The longer a password the stronger it will be the password security.

Strong passwords can be created with a combination of numbers and letters and even a variety of other characters. Some admins are currently using a password that is long enough, coupled with encryption such as PGP key and others, so it is quite difficult to guess password.

5.Sering Change Password
Owners should periodically change your password for authentication password, the more frequent password changes, the better, because the more difficult the penebak password hacking account / your system. Changes to the password depends on the owner, could be a week, a month, three months, and others. Originally the owner does not forget the password that was changed earlier.

6.Tidak Using Same Password on Multiple Accounts
Owners often forget and sometimes passwords frequently enough to create an account, so they each create a new account using the same user id and password are the same, this is very vulnerable and dangerous. Because these passwords through a single account, all accounts will be taken by the hacker.

7. Using Password Management
To help recall the various passwords and various accounts, we are often very difficult, but not to worry because it has many current applications to help organize our passwords. This application can be downloaded for free from the internet and paid, so that regardless of our account and whatever we can with the password easy to remember and re-opened, of course, to open it with an encryption method as well.
06.03 | 0 komentar | Read More
techieblogger.com Techie Blogger