BLOGGER TEMPLATES AND TWITTER BACKGROUNDS »

Sabtu, 12 September 2009

5 Tips For Disassembling
A Computer System

Disassembling a computer can be a painful task. If you're planning to slot in a new hardware component or want to look inside your PC, disassembly cannot be avoided.

Although disassembling a computer can appear to be a daunting task for beginners, it is really not that difficult.

Well fret not. This article covers are some important tips which you should remember. These include things like cutting off the power supply, opening the case slowly and disconnecting various components.

1. Cut Off The Power

Now pay attention. This is important. The first thing to do when disassembling a PC is to disconnect your computer from all power sources. Rip out that power cord - I've had too many occasions when my PC was still connected to the wall outlet and I accidentally stated disassembly - with disastrous results. So always remember to do this step first.

2. Open the Case Slowly

Next, you want to open the computer case slowly. Some PCs slide off the side - and you may need to remove some screws before the cover can come off. Others open in different ways. You need to check your specific computer case.

Some cases (e.g. those from Antec) are in fact better designed and allow you to open the case easily. I always like to go for such computer cases - you can check them out at this link.

3. Learn What is Inside the Case

Once that computer case comes off, you need to familiarize yourself with the internals of your PC. If you want, you can take photos. Usually, the things to look out for are you video card, hard drives, sound card, CPU, memory modules.

4. Disconnecting Adapter Cards

If you need to remove adapter cards, e.g. a PCI based sound card, you will need to take note of the screw at the top of the bracket. Remove that screw first, then you'll be ready to disconnect the card.

5. Disconnecting Disk Drives

The other point to note is regarding disk drives. Disk drives (hard disks and floppy disks) usually have screws at the side to secure them in the PC's drive bays. Make sure you unscrew those carefully and hang on to the drive while doing it. You certainly don't want you precious hard disk dropping on the motherboard.

Conclusion

You now know some tips for disassembling a PC. Its important to bear the above points in mind when opening up your PC - it will save you a lot of headache and avoiding any potential problems. Good luck and happy computing!

Disassembling the Computer

It's Not a Race
If you are familiar with the procedure of disassembling a computer, then you can skip this section. If you are a beginner and actually want to learn something, then document well, and learn or re-affirm your knowledge about everything you see inside. Given a screwdriver, a 10-year old could probably have the computer apart in a half-hour or so. If you're using this section as a lab or learning assignment, and you have your computer apart in the same time as a 10-year old, then that's the level you'll be at. But if you take a slow relaxed approach, discuss, question and research each component as it's removed, you'll learn alot. Read the sections on What's Inside and What You See, fall back on your own knowledge, use the Internet, your books and resource material. It's impossible to retain all the information, so one of the most important computer skills you can learn is how to research and use your resources to find what you need. Here's an example of some questions to think about or discuss as you proceed:

  • Should I document everything I do or everything I remove?
  • Am I taking the best ESD precautions available to me right now.
  • When you remove an expansion card what kind of card is it? What kind of expansion slot did it come from? How many bits wide is that slot? What is the bus speed? What does the card do? If there's any wires attached to the card, what's the other end attached to and what are the wires or cables for. What kind of port is on the end of the card?
  • When removing a drive, what kind of drive is it? Is there information documented right on the drive itself? What kind of power connector does it use? Are there jumper settings on the drive? What for? Are any drives connected together or do they all have their own cable? Does it matter which cable I hook up when I reassemble? What are some of the things I know about this particular type of drive?
  • When removing wires or cables, what are the cables for? Which connectors are actually being used and what could the other ones be for? Are they following the pin-1 rule? Is pin-1 actually designated on the device the cable is attached to? Is it designated in more than one way?
  • Am I still taking proper ESD precautions and is my antistatic strap still hooked up?
  • Look at the motherboard again when there's not so much in the way. Can you point out the CPU? How about the BIOS chip, the battery, cache RAM, keyboard connector? Is it an AT, Baby AT, or ATX format? Is there a math coprocessor? Where is it? Is the system memory supplied on SIMMs or DIMMs? How many pins on the memory module? How many memory slots are thee for each bank of system memory? Is the CPU installed in a ZIF socket or a friction socket? Are there any jumpers on the motherboard? Is there any information silk-screened on the board itself?

This is just an example of the questions you should be asking yourself. Try to come up with lots more. Even if you are not prepared to actually take your computer apart at this time, just take the cover off and ask yourself these questions as you visualize the various steps involved. Remember, not all questions can be answered by a single resource. Look in your notes, check out your manuals and resource material, ask questions.

ESD
Read the section on Electrostatic Discharge and always take ESD precautions. Remember, if you can feel a static shock its probably close to 3000 volts. Some ICs can be affected by as little as 30 volts.

  • Always use an antistatic wrist strap.
  • Keep a supply of antistatic bags to place components in as they are removed.
  • Leaving the computer plugged in is a recommended procedure. However, make sure it's switched off and remember that the cable going to the remote switch on the front of the case carries AC current at house voltage. Also, ATX motherboards have power to them all the time, even when the switch is off. Before beginning to remove a power supply or an ATX motherboard, always make sure your computer is unplugged.

Before Beginning
You want to make sure you have what you need. Your wrist strap is attached to the computer, you don't want to have to run to the other side of the room or to another room to get something. Forget about the strap and your computer may follow you.

  • Have a pen and paper ready. Documentation is real important. After you've changed a few jumpers or removed or replaced a few cables and cards, you probably will have to put some back the way they were. If you have documentation, putting things back together can be a simple reverse process. This is true of software troubleshooting as well.
  • Make sure you have the tools you need and they're all close by and handy.
  • Be sure to have a container to keep the screws in so you have them when you want to put things back together.
  • Make sure you have the resource material, drivers or software that you may need.
  • If possible, enter the CMOS setup and record the information available. At least record the floppy and hard drive configuration and any settings that may be different from the default. You want to be careful not to remove the battery and lose these settings, but stuff happens.
  • Disassembly is major surgery, do a full backup of the system. Programs that you have the original disks for can always be replaced, but any upgrades for those programs and any programs that have been downloaded from the Internet may or may not still be available. Bookmarks, e-mail addresses, phone and fax numbers, dial-up connections, DNS settings and networking protocols can be a real pain to replace. Even the best technicians cannot guarantee your data, so back it up. Also, in Windows9x, all the IRQ, I/O addresses, and DMA settings can be found (and printed) from the Device Manager in Control Panel. In Windows98 check out Start/Programs/Accessories/System Tools/System Information.
  • Close all programs, shut down Windows, and turn off your computer. Then remove the cables from the back of the case.
  • One other thing: you have to use a little common sense. Don't necessarily follow this information to the letter, it's only meant to be a guide. If you think it would be easier to remove some expansion cards before removing the drive bay, then do it. If you can better access the data cables after the drive is out, then do it that way. If it would be easier to disconnect the power cables and remove the power supply before accessing DIMMs or SIMMs …..
    I think you get the point.

Removing the Cover
The standard way of removing tower cases used to be to undo 4-6 screws on the back of the case, slide the cover back about an inch and lift it off. Manufacturers are beginning to come up with trickier and more intricate methods of assembling these cases all the time. If there is no manual, then a little time taken for careful inspection may be in order. Here are some things to remember:

  • Don't Force Anything. If it has to be forced, it will probably break. If there are no screws on the back of the case for the cover, check the plastic faceplate on the front. Some pry off to reveal screws or release levers (remember, careful inspection). If everything on the front has its own bezel around it (including the LEDs) then maybe the plastic front pops off (or maybe the case slides off the front).
  • If you notice a separation between the sides and the top, then they must come off separately. My favorite ATX case allows you to remove two screws from the back, then slide the side panel to the rear an inch and remove it. The other side removes the same way. It's a good, solid, well built case.
  • Make sure any screws removed are for the cover. You don't want to unscrew the power supply by accident and have it fall inside your computer. That's a bad thing.
  • After the case is removed, place it in a safe place, where it won't get knocked of a table, kicked or stepped on and bent.

Removing Adapter Cards

  • Again, documentation is very important. Yes, that 16-bit ISA card will probably work in any 16-bit ISA slot, but there may be a reason it's in that particular one. Document the type of card and which slot it comes from.
  • Check the card for any cables or wires that might be attached and decide if it would be easier to remove them before or after you remove the card.
  • Undo the screw that holds the card in place.
  • Grab the card by its edges, front and back, and gently rock it lengthwise to release it. Do not wiggle it side to side as you can break the card, the slot, or the solder. Sometimes it helps to grasp the inside corner of the card with one hand and place a finger from the other hand under the associated port out the back of the computer to pry up the one end of the card.
  • Once the card is removed, you may want to record any jumper settings you see, just in case one is accidentally dislodged. Try to store the card in an antistatic bag. If you don't plan on replacing the card then a cover should be installed over the slot opening.

Removing Drives
Removing drives is not that difficult. They usually have a power connector and a data cable attached from the device to a controller card or a connector on the motherboard. CD-ROMs may have an analog cable connected to the sound card.

  • The power will be attached using one of two connectors, a large Molex connector or a smaller Berg connector for the floppy drive. The Molex connector may need to be wiggled slightly from side to side while applying gentle pressure outwards. The Berg connector may just pull straight out or it may have a small tab that has to be lifted with a tiny flat screwdriver.
  • The data cables need to be documented. Remember the pin one rule. Know where each one goes before you pull it out and record its orientation (which side is the stripe on, where is pin 1?). Pull data cables gently and carefully. In other words, don't yank them off, and pull level and in the direction of the pins.
  • Now you need to do a little more inspection, can the entire drive bay be removed? Does that particular drive come out the back of the bay or does it slide out the front before the bay is removed. If a bay is removable, you may have to remove some screws or unclip a lever then slide the bay back and off. If the bay is not removable, there should be access ports on the other side of the case that allow for access to those screws (there should be, I've seen some that you just about have to remove the motherboard to access these screws). Now you can remove the screws and slide the drive out the back of the bay. If the drive slides out the front of the case, then remove the screws and gently slide it forward.

Removing the Memory Modules
Memory modules are one of the chips that can be damaged by as little as 30 volts. Be careful of ESD and handle them only by the edges. SIMMs and DIMMs are removed differently:

  • SIMM - gently push back the metal tabs holding the SIMM in the socket. Tilt the SIMM away from the tabs to about a 45% angle. It should now lift out. Put each SIMM in its own protective bag.
  • DIMM- There are plastic tabs on the end of the DIMM socket. Push the tabs down and away from the socket. The DIMM should lift slightly. Now you can grab it by the edges and place it in a separate antistatic bag.

Removing the Power Supply

  • Make sure it's unplugged.
  • All power connectors should be removed, including the connection to the motherboard and any auxiliary fans. Watch the little plastic tabs on ATX connectors (you'ld rather not break them). AT power supplies have a two piece power connector that may be labeled P-8 and P-9. Make note of the orientation. The black wires should be in the middle, black to black.
  • Remove the connection to the remote power switch at the front of the case. Orientation of the colored wires at this switch is critical. If you remove them, make sure you document well, and during re-assembly plug the computer into a fused surge protector before turning it on (this could save your motherboard and components from melting if you've reconnected improperly). If you're putting the same power supply back, it's better to remove the entire switch and leave the connectors entact. The remote switch on an ATX form factor attaches to the motherboard.
  • Remove the four screws at the back of the case and gently slide the power supply out of the case. While removing these screws, hold onto the power supply. You don't want it falling into the case.

Removing the Motherboard

  • Document and remove all wire attachments to the motherboard. (Some of these have Pin 1 designations also.)
  • Most cases have a removable panel that the motherboard is attached to. By removing a couple of screws the panel can be taken off and you can gain much better access to the motherboard. Again, a little investigation can save a lot of trouble.
  • There is usually 2 or 3 screws holding down newer motherboards. Make sure you've got the right ones and remove them.
  • Motherboards sit on plastic or brass standoffs that keep the traces and solder from touching the metal case and grounding out. Once the screws are removed you can lift the motherboard out. In other cases, the motherboard has to be slid horizontally towards the bottom of the case to unclip the plastic standoffs and then lifted out.
  • Place the motherboard in an antistatic bag.

Jumat, 11 September 2009

Pemeliharaan Komputer

COMPUTER MAINTENANCE

Several studies such material and tips about ways that can be done in the treatment of both in terms of Computer Hardware and Software.
Here are some ways or tips that can be done:
1. Data backup strategy
Although computers are now used by almost anyone and is used to store a variety of important data, but I see there are very many people who forget to take into account the possibility of data disappearance tsb. Computers remained a complex electronic devices no matter how Microsoft Windows made simple visible / not complicated; and occurs many opportunities for things not on your data terdua very large - viruses, hard disk damage, damage to data files; all of which can occur in many ways.
For that is the important thing for you to create a data backup strategy, to prevent loss of data from the computer. I will be listing the various things you can do the following with different strengths and weaknesses.
1. Diskette
In general this is a bad idea. Floppy disk is a medium which is not reliable, so many things that can break it - scratched a little, get a magnet, got hot, folded / terduduki / crushed, head drive yg no longer accurate - and you even set aside only your data is corrupted (due to mold) . ALWAYS AVOID STORE IN YOUR IMPORTANT DATA disks.
2. Another hard disk.
If you have more than one hard disk, this is the way of data backup most feasible; faster and cheaper (no need to purchase additional equipment). Collect your important data in a directory on your hard disk first, and are routinely duplicated the directory to the second disk. The downside, your data is still collected on the same computer, so problems such as surge / spike (surge current) is likely to damage the hard disk simultaneously.
3. CD-R (Recordable CD).
With the proliferation of CD-R drive so even if you do not have it but you probably have friends who have. Take advantage to backup your data, because such strengths cheap prices (CD-R blank if not wrong the price is

:: Computer maintenance

under USD $ 10-thousand now), very reliable (data on CD-Rs can last for decades if stored according to recommendations of its manufacturer), and its capacity is large enough if only to simply save the file Microsoft Word (640 MB) . One more thing is that you can access your data2 simply inserting the CD into the CD drive tsb on any computer - it's easy to return access your data. The drawback is the speed of backups is a bit slow (640 MB will usually take about 1 hour), a limited capacity to backup large amounts of data (not feasible to backup data in gigabytes), are easily damaged (dropped to the floor, or let the kids You are playing with the CD - good-bye data), and drives an expensive price (even though it is far cheaper when compared to some years ago).
4. Zip drive.
Pros: Pretty fast for data backup, drive prices quite cheap now. Disadvantages: 100 MB is sometimes not enough to save all your data, Zip disk can not be guaranteed reliability, ratio disk price / capacity is too expensive, the technology was already obsolete.
5. Jaz drives.
Pros: Pretty fast to backup the data, large capacity (2 GB). Disadvantages: Price disks are still expensive - the ratio of the disk price / capacity lost from the hard disk (!), Maish long-term reliability is questionable.
6. QIC tape drives.
Pros: Price drives are cheaper than DLT drives, cartridge prices are much cheaper, can backup the data only via the parallel port Cons: Capacity is not for DLT (maximum at the time of this writing is 30 GB), very slow backup speed, sometimes not reliable ( !).
7. DLT tape drives.
Pros: Very fast in data backup, huge capacity, reliable. Disadvantages: Price VERY expensive (usually around a thousand U.S. dollars).
8. Internet.
This new alternative that may be quite feasible, thanks to the emergence of various websites that provide data storage services free of charge on the Internet. Some examples, Briefcase (http://briefcase.yahoo.com - 25 MB), Freediskspace (http://www.freediskspace.com - max. 300 MB), X-Drive (http://www.xdrive.com - about 50 MB), and others.
Excess; free, and backup your data can be accessed from around the world. Disadvantages: not efficient for large amounts of data, especially when your Internet connection via a modem.
Also very important not to ONLY backup the data on the Internet, because this is a free service that if suddenly (for example) they are having problems then nothing that you can also lakukan.Backup your data with other alternatives.
One thing that is important for you to remember always:
There is no "too many backup" for your data is always duplicate your important data as many
Personal experience, I made a few copies of my important data2. My first copy it to my hard disk is one more. My second copy it to your hard disk in the computer my brother. My third copy it to CD, and stored at home. My fourth copy it to CD and I take if

:: Computer maintenance

travel far, so in theory even if the worst happens (such as burning houses, etc.) I still data2 important will be safe.
Maybe you'll think, "Boy trouble at all". But what happened? My hard disk crash, so the data is lost. Then the data in other hard disk is also lost / corrupted. And, backup data on the CD in my house could not be found ....
Fortunately, there are backup data on CD that I carry, and finally the important data collected over the years come back safely. I can not imagine what it would be if I did not do the data backup processes such as these 4 layers. After that I was getting to intensify and oversee my data backups are more stringent.
This is just for personal data, to company data should be more comprehensive, longer procedure. But still, too often I hear how the company refused to backup their data because "they're expensive tape drive", etc.. Same name for this problem.
Some TIPS:
• Gather important data you have in one directory; example: C: MyDocument. Disciplines such as this would be easier for you to do backups of data tsb. (imagine for example your data is in C: /, D: / MyDocument, C: / ProgramFiles / MicrosoftOffice / Word, and C: / ProgramFiles / MicrosoftOffice / Excel? you will first reluctant to trigger backup tsb data2)
• How data backup interval is good?
Actually it depends on how often you update your data. If your data is mostly just arsip2 rare files are updated, then maybe once a month should suffice, but if every day there's always the addition / update of data, so my experience is maximal once every 3 days. For companies; standard strategy is to use a backup system grandfather-father-son, the fruit of tape 5 is used for data backup (incremental) each day, and 4 pieces of data backup tapes for each weekend (1 tape each week, so the data cover the for one month) for a full backup, then 1 piece of tape for a full backup monthly.
• Test your data backups!
There is no point you have dozens of backup data if it can not be accessed anyway? But in reality there are many people who only backup their data without test whether these data it can be accessed again. This point was particularly relevant to the QIC tape drive, I personally have experienced myself how corporate data over the years that every day turned out to be a backup when needed could not be restored, really scary. (although in the end can also be accessed by using the other tape drives, but maybe I'm just lucky it).
2. Anticipation Computer Virus
Did you know that a proper antivirus program can protect your data can also be dangerous if not used correctly?. Why? What can we do as a user?, What should we do as a programmer antivirus?.
Since first discovered the virus has undergone technological developments large enough, so that there Antivirus program. Unfortunately development Antivirus usually only pursue the development of the virus and not to precede it. Antivirus is missing (the technology) can actually invite danger to the user.
When the viruses successfully detected its presence, that viruses are always emerging with a new more advanced technology that makes antivirus become helpless. Old antivirus for example, always be on-'tipu 'with stealth technology, so when this antivirus

:: Computer maintenance

trying to detect files that other stealth viruses had just spread itself to every file checked.
In various magazines of course you've seen any antivirus programs "unit" (specific) which aim to detect one type of virus. Antivirus products usually do not make the ways the right to use this antivirus program, although specific antiviral great risk if not used correctly.
Specific antivirus can detect only one type of virus (and perhaps some of its variants) and is usually able to disable the virus in memory. If you find a virus and you are sure the virus name you can use these Antivirus, but if you do not know, you should not try. If you find that active virus is another virus, which certainly was not this detected by antivirus, the antivirus is a virus it can spread throughout the existing program files examined.
A more sinister danger is if the antivirus detect a virus one and one to clean so that the program file you're trying to fix it become damaged. This incident never happened for example in the case of DenHard virus, the virus is really similar to die hard, but this virus uses different techniques to restore the original header file, some antivirus just trying to clean up corrupted files where the virus program is. In addition to the cases of the virus occurred DenHard, the program cases ever (and probably still will continue to) occur in some viruses. One reason for the virus makers make a similar virus is so difficult to clean the virus, because the antivirus makers do not like it if the virus can easily be cleaned by the user.
HAZARD SOURCE ANTIVIRUS PROGRAM
Antivirus programs can be dangerous for the following reasons:
• Some antivirus programs using only simple techniques that can easily be deceived by the makers, for example virus antivirus program to check only a few bytes at the beginning of the virus, the virus-makers could have made another version of the virus in the early part of the same but different in other parts of the important , for example in routine encryption / decryption original file header. This would make a destroyer antivirus program file rather than rescue the files. Some anti-virus also can be deceived by varying the antivirus signature files. Signature file is a file that contains the ID of all known viruses by antivirus, if the ID is in turn the antivirus would not know him. A good antivirus should be able to check if the file signature is changed.
• Antivirus programs do not make backups of the file is cleared. Often the antivirus program (especially the specific) does not provide the means to create a clean backup files, and it is very important if the cleaning process failed.
• Antivirus programs do not do self-check. Self check is necessary, the antivirus program can be modified by someone else before it reached the hands of users. Antivirus programs are usually commercially using self checks to make sure he was not modified by anyone, but some are not and it is harmful. In antivirus programs locally, which often included several articles on the computer, typically includes the source code, you should compile the source yourself if you doubt the authenticity of his exe files.
• Antivirus programs can turn off the resident easily the best residency Antivirus should not be detected and uninstalled easily. Examples of resident antivirus is less well VSAFE (in DOS package). VSAFE can be detected and disabled by using interrupt (you try to learn / debug vsafe program in DOS so you understand). Users will get a false sense of security by using this kind of antivirus. There is no sense of security it is better than a false sense of security.
• antivirus program does not give warning expired. Over time, viruses are popping up more and more and more sophisticated technique. A good antivirus program should give a warning if used Antivirus'm too out of date. This is important so that antiviral incident does not happen again spreading the virus.
HERE'S WHAT YOU NEED TO DO AS A USER
As a user antivirus program there are several things you can do to minimize the risk of the use of antiviral

:: Computer maintenance
1. look for a good antivirus, both here means the program can be trusted to detect and eradicate the virus. Do not be lulled by the promises offered by the antivirus vendor, and do not be swayed by brand names are also quite popular. Try to find a comparison between the various anti-virus in various magazines / sites on the Internet.
2. always use the latest Antivirus, you can get it from the Internet or from some magazine. Antivirus old has a big risk if used (more than 6 months have been very dangerous).
3. create a backup for your data and programs are important.
4. virus cleaning process done correctly if you find a virus
5. Antivirus programs ensure that you get is the original, chances are someone has changed the antivirus, or perhaps menularinya with a virus.
6. Call an expert if you feel you can not overcome the virus on your computer or network.
Step a good cleaning process is as follows:
If you run a personal computer
1. Boot your computer with a clean startup disk from the virus (and the write protect)
2. Run the program virus scanner / cleaner in an infected file
3. Try running the file, if the file becomes corrupted, do not go on anymore
4. If the program can run smoothly, cobakan once again on some files (look for the small size, the medium and large). The larger size files need to be checked, this file usually contains internal overlay that makes the file damaged if exposed to the virus.
If you are a network administrator, you should take a sample of the virus to the disk and tried to clean it on another computer, this is not to interfere with the work may be done by someone else. It is also to anticipate, the possibility of new viruses that are similar to other viruses (imagine what would happen if there is any cleaning so the entire program on a network can not be used!). If you fail to be cleaned need to call an expert to deal with, or seek further information on the Internet. Experiments on some files aim to prevent any false detection and / or repaired by antivirus programs. If the virus is considered dangerous and network activity can be delayed temporarily, may temporarily shut down the network.
THIS PROGRAMMER AS YOU NEED TO DO
We have to be a good anti-virus programmer is not easy, you need to know programming techniques that every day the virus increasingly difficult. Antivirus program that you create should also follow the development of virus technology. To make a good antivirus program is not easy, but there are some things you need to remember as the creator Antivirus if you want to program you used someone else, and do not endanger the person
1. Your program should be able to turn off the virus in memory, and can give a warning if there is something strange on the user's computer memory (eg a large base to less than 640 Kb)
2. In making ID viruses choose several locations, both locations are in the early part of the virus and the virus is important (eg in the header decrypt the original program) is to make sure no one changed the location and encryption system (if any) the original program header.
3. If the data / header in enkrip, verify the data obtained from the calculation, for instance see whether the CS and the original IP to the calculation is still in the file size limit, or whether the first JMP instruction at reasonable COM files (less than a length of the file).
4. Create a backup file if the file is cleared feared damaged
5. Perform a self check at the beginning of the program. If not all parts of the program could be in a self check, the ID needs to be examined whether the virus changed or not (eg checksum).
6. Make a clear explanation of how the use of antiviral
7. If the program can only run in DOS always check when the program starts if the program is actually running in DOS
8. If you want to make the resident antivirus program, do not wear ID viruses which are not encrypted in the memory, another antivirus antivirus did not know you are, it will assume the existence of a (or several) active virus in memory. This can happen, because some anti-virus check all the memory of the ID virus.

:: Computer maintenance
9. For the non-resident antivirus technique No. 8 also needs to be used, it is necessary for the other antivirus programs do not think this program a virus. Sometimes the programs also left a scar on the memory, which may be suspected by the other antivirus as a virus. If you do not want to apply these techniques, you can delete the virus ID variable memory after use.
10. If possible, for polymorphic viruses using heuristic methods (and / or emulation) to scan and emulation techniques to decrypt, or restore the original program.
10 it should be enough, you can add it yourself if necessary. For example the problem of scanning speed and others.
TIPS
• Update anti-virus Anti-virus MUST be updated regularly, so that can always counteract new viruses that keep coming every day. Visit the site regularly used by antivirus products.
• Also to stop using Microsoft Outlook, then you will be safe from the virus. Use other software such as Eudora (http://www.eudora.com) or Pegasus Mail (http://www.pmail.com)
• Antivirals are relatively the same in essence, that is important you do regularly updated as described above. In addition to commercially available anti-virus anti-virus free and good enough to include Grisoft (http://www.grisoft.com) and Avast! 4 Home (http://www.avast.com).
• Physically clean the computer both the exterior and in the case of dust and foreign objects other, which can affect the performance and functions of computer equipment.
• Ensure the cooling system and air circulation in the well casing so that the temperature can be maintained computer. For computers that run 24 hours nonstop placed in the room suggested that use cooling (AC)
• Defrag should not be too frequent. Defrag is usually only done if the process of reading and writing to the hard drive was slow, will install a large program, or would mengkopikan large files to the hard drive.
Hard disks are now very fast, so the data is fragmented, usually not much to slow. The slow computer is often caused by something else; lack of memory, no viruses, and so on. Besides full defrag very intensive, so if done too often will shorten the age of the hard disk.
3. Your PC safe?
Do you have a lot of important data stored on your computer at home?, You are often annoyed with people who always disrupt the work, or you're often surprised with your data that is often missing. If your answer is yes, you need to read this article.
Maybe you've had your important data you store on your computer in the house suddenly disappeared or changed here and there. Sometimes you do not know who did it and sometimes you know that the culprit was a rookie who did not intentionally damage your data. Although you know the perpetrator and had advised him not guarantee that such things will not happen for the second time so you need to protect your computer. Actually there are enough articles that discuss computer security but I will try to discuss this in more detail along with the weaknesses of each way there and how overcoming it.
Who's Who Need in Beware

:: Computer maintenance

Before performing the steps of the previous security we must know who the enemy we are in a secure computer. Which became the main opponent of the security of our computers are our own, our carelessness more often cause damage than others. Omission to scan new programs for example, can destroy all the data you have. Because of us is an enemy there is no other way than to apply the discipline to yourself.
The second enemy is near you, has been proven through research that the perpetrators of computer crimes are those near the victim, or in companies that the perpetrators are those who actually trusted to safeguard the company. It's also possible that your neighbor does not mean to spoil your data or see your data but they can still do it by accident. Another enemy is the stranger, this is the maker of their viruses, trojan horses, time bombs and others who use it only to destroy others without a clear purpose.
Physical Security
This is the first security level and the most secure, put your PC in a safe place. Lock the door when you leave. Maybe this is the most secure, but maybe there is a thief who steal your computer. If your data is important and that's only computer you will use this probably the most simple and most secure. However, it should be recognized that not all people have computers really for personal use or to have a private room to put it down.
BIOS password, the first defense
In terms of computers is your first defense. If you turn on your BIOS password facility, then the computer turned on so you'll be presented with a view to asking your password. Some people use this facility and see it as a safe way. But there is also refusing to wear, the reason is usually because it looks less cool. Usually the use of passwords can be arranged, can be used for securing the whole system or BIOS setup security enough. First I will discuss the weaknesses when you use security for the entire system.
Actually, the BIOS password has significant weaknesses. On output AWARD BIOS version 2.xx, 4.xxg version and version 5.xx or above have the password, called the default password. With this default password that everyone can break into without the original password. Initially the default password is only used by the technicians AWARD if being trapped, but apparently this has been used incorrectly by many people. For versions 2.xx and 4.xxg same default password for each computer (might be an article about this I will put on the homepage of this, if I've got time). For the version 5.xx or above the default password for each computer in the case of two characters behind him so that a total of 676 default password (for the last two characters only ranged from 'A' .. 'Z'). I myself still have not examined whether the two characters behind it depends on the BIOS serial number.
BIOS made by other manufacturers do not have weaknesses that are owned by AWARD, but you do not get too excited, there are other ways to bypass BIOS passwords. You need to know that the BIOS password is stored in a CMOS chip with the BIOS setup data, these chips get power from the CMOS battery so that the data stored in it remains secure even if the computer is turned off. Exceptions occur if the CMOS battery is running low or short circuit occurs. Well the last exception that is the problem, if there are people who open the case and connect the tip of your positive and negative end of the CMOS battery, all existing data in the CMOS will be lost including the BIOS password. If this data is lost people could freely enter.
Security to the problem is to put your system unit in a difficult place issued, or add the key to difficult to open. For the default password problem AWARD, you can update your BIOS or change the default password with a program from AWARD. But do not worry too much, not many people know this default password problem.
You can also make security setup at all, it is useful to avoid the people who have experienced varying the contents of the setup. The weakness of this technique is the password

:: Computer maintenance

can be removed from the operating system. I know of no way to prevent a password to delete this program from the operating system. Many programs can be used to remove this password, even with BASIC or DEBUG can. The program is widely used to remove the password is usually the contents of CMOS timers programs (eg, from Norton Utilities), by entering data from the system CMOS berpassword not, then the password will be deleted.
Operating system level security
For you DOS users may be familiar with security by creating password in autoexec.bat. You need to know that the DOS versions of the latest (if not mistaken from version 5) can be inhibited autoexec.bat trip by pressing F5 or F8 (on MS-DOS), the purpose of this facility is to trace the course of the startup files but turns out this has been given a new problem. Another way is to put a password on boot program record or disk partition. Both ways are very insecure, because everybody could have the computer boot from a DOS diskette carried.
For the Windows operating system 3.1 or 3.11, both have a very big weakness. Because they stand on DOS, then all operations can be managed from DOS, for example, we create a password by putting the name of the program in RUN line in WIN.INI file, the file can be modified from DOS. Not much we can do with this weakness.
Windows 95 and Windows 98 also has the same weakness, although there are some people who claim to be able to protect Windows 95/98 with a password but I've never tried it, because I lack Percy with these programs. You need to know there are so many security lubing in Windows 95/98. You can press F8 at the beginning of the process that lets you boot into DOS and modify all Windows system files such as WIN.INI and registry files. You need to know also that in Windows 95/98 programs could be run by writing his name in the RUN line in the WIN.INI file, by putting them in the StartUp group or it could be by putting them in key RUN, RUNONCE, RUNSERVICES or in the branch RUNSERVICES ONCE HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion in the registry this way programs that always appears at startup in run (In addition to using both of the above). Maybe you think the registry can not be modified from DOS, you are wrong, the program regedit.exe in Windows 95/98 startup disk can change the registry file into plain text files and vice versa so you can change it, including removing the program line that password.
Emphasis F8 (And the other buttons) on Windows 95/98 could be turned off by putting a line BOOTKEYS = 0 in MSDOS.SYS file. As I've mentioned the way the program was still possible to enter using disknya own startup. You can just turn off the A drive that can not be used to boot, but you will be trouble if one day you experience problems Windows.
Linux is an operating system that is currently quite widely used and fairly safe, but for the laity operating system is still quite difficult to use. If not set properly on this operating system has a default feature that allows people to break into.
For other operating systems I mentioned are not here because most PC users in Indonesia is still wearing the three operating systems on top. As you can see the level of security in this operating system very easily breached. Solutions that really good I think hard, every operating system has weaknesses. And any operating system will not be able to resist an attack if the attacker has physical access to a computer.
Application-level protection
If you have important programs that you want to protect you can give a password. Some programs are dangerous or confidential password system has been implemented as a part of it, such as NU, PCTools and others. There are many DOS programs that can give passwords to the files EXE or COM. Unfortunately not many who can give the same thing for Windows EXE files. Oh yes, be careful with programs that provide a password on a DOS EXE file, first make a backup file because some files EXE files can be damaged if given a password. For the programmer assembly, unpacking such passwords is not difficult, because the way the program can be tracked by using the debugger.

Computer Maintenance

Document-level protection
This is the last level of protection, if it successfully dismantled the important data may be readable by others. For programs that provide the password when saving the files you can use this facility. But be careful a lot of programs that can unpack. Password in MS WORD, Lotus Organizer and others were not difficult to break into, so you need to be careful.
If your data is important too but you have to keep at home so that your data enkriplah use programs really safe if you need to put in the floppy disk and store in a safe place. Did you know that password PKZip / WinZip or ARJ, who thought safe, can also be dismantled? (although not easy). Therefore you need to ask the experts first before you use an encryption program.
Security accidental
Not forever you're dealing with a hacker, you probably just afraid of your child accidentally deleting your important documents or play games with pictures you have, or you have a collection of pictures that will make you be embarrassed if others found out.
For the problems mentioned above there are some things you can do. First create a special directory where you would put your files, move important files to the directory that your. These two attributes make it a hidden directory, system and read only, for all the files in it do the same thing, use attrib or similar programs. The third is just for you who use Windows 95/98 operating system, do not buy a program that will eliminate all warnings when you delete any files, use the explorer shell (95/980 windows default unless you have a shell that much better. Run explorer ( for you are using explorer as shellnya) and then select the menu view | options on the View tab select hide files of these types and click OK. You can change your file extensions with a list posted on the above steps so that your files will not be displayed.
This method is quite safe, people will not be able to accidentally delete these files. However, these files can be deliberately changed or deleted on. So the security at this level just to avoid the accident. Other things to consider include:
1. Change the file name so that malicious programs could not run such FORMAT.EXE and FDISK.EXE files. Some beginners like to experiment programs, including this dangerous program.
2. Make a backup of data to the data that is really important.
3. Teach to the new computer user what steps can and should not be taken in operating the computer.
4. Install Anti Virus up to date, look for the antivirus which can automatically work in the background and can monitor all types of viruses including viruses of documents.
In general, the four steps above are good enough to prevent errors due to inadvertence. You can add their own steps deemed necessary.
Making a good password
A good password is very important to secure your computer so you have to know how to create a good password. Although the program you are using very sophisticated, your data could be dismantled if someone knows your password. Some of the techniques taught here apply also to non-computer passwords you have (ATM, TeCC, etc.) Perhaps you have heard how to make a good password, but normally never given an explanation why I never will now explain.
1. Do not use common words in the dictionary, let alone English dictionary. Why?, Hackers often use a dictionary to guess your password with the program, this way is known as password cracking dictionary / dictionary attack password.

:: Computer maintenance
2. Use a combination of numbers and letters. Some programs use a brute-force cracking / brute-force attack means the program will try all the combinations aa, ab, ac and so on until the password to see, well to do this required a very long time, therefore, usually some programs set only to find the password in the form of letters only. For comparison try to compare how the combination to look for if you use only letters and combinations are to be found when using a combination of letters and numbers. The formula: the number of combinations = a lot of letters long promoted the password. For passwords use letters only assume there are 52 types of letters (AZ and az) and for the use of letters and numbers there are 62 types of letters (AZ, az, and 0 .. 9).
3. Password at least 5 characters, less than it would be easy to predict.
4. Change your password periodically.
5. Do not use the same password for different things. If you are a system administrator do not use your password as the password SUPERVISOR Screen Saver. Maybe people would be hard to guess password supervisor, but the screen saver password easily decrypted.
6. Do not use your birth date or your family, do not use your phone number or your car license plate number as the password (also applies to ATM password). Remember that your enemy is someone near you who might know it all.
7. Do not bertahukan your password to anyone, including your beloved.
8. If someone calls you and says that he needs your ATM password or any password, DO NOT give any reason (usually the reason a computer error or no checks that your ATM card has been misused). Although the call claiming to be from the Bank or the Police. Contact Customer Service and ask the Bank kebijakkan banks on this issue, because the bank will never ask for things like that. If you are calling the police ask your name, postal where she worked and number on the card. Please verify this to the relevant police station if you are in doubt.
9. Password should be easy to remember, because of your negligence can cause problems. For this you can use a combination of names and phone numbers of people you like are NOT known to anyone. Or use a combination of your own that only knows.
10. For a free email password on the internet you will usually be asked to enter a hint question when you register. To master this question if you forget your password, they will ask questions at the hint of a very simple question and they will tell you your password. If you believe you will always remember your password, do not question the contents of hint option. If you're afraid to forget to choose the difficult questions like what is your mother's maiden name? and not questions like where you were born or the other simple. Many people who caught only because the password is trivial.
Deleting Files
If you intend to delete files to remove the traces do not use the command del. / erase usual, use special programs that actually command del / erase does not erase your data. The data can still be returned with the Unerase program.

Senin, 07 September 2009

Step By Step Computers Assembling

Step By Step Computers Assembling ...



The following will be discussed on how to assemble a computer, especially for those just learning .. from some references that I learned .. then the following will be explained step by step how to install the computer, hopefully useful .. Red. deden

Components of computer assemblers are available on the market with a variety of quality and price options. By assembling their own computers, we can determine the types of components, capabilities and facilities of the computer according kebutuhan.Tahapan in computer assembly consists of:

A. Preparation
B. Assembly
C. Testing
D. Handling Problems




Preparation

Good preparation will facilitate the assembly of computers and avoid possible problems related timbul.Hal in preparation include:

1. Computer Configuration Determination
2. Kompunen preparation and equipment
3. Security

Computer Configuration Determination

Computer configuration relates to the determination of the components and features of the computer and how all components can work as a computer system component kita.Penentuan suit starts from processor type, motherboard and other components. Factors suitability or compatibility of the components of the motherboard should be noted, because each type of motherboard supports the processor type, memory modules, ports and I / O bus different.

Preparation Components and Equipment

Computer components and assembly equipment to be prepared for the assembly prepared in advance to facilitate assembly. Equipment is prepared consisting of:

* Components of computer
* Completeness components such as cables, screws, jumpers, bolts and so on
* Books and reference manuals from component
* Aids in the form of a flat screwdriver and philips

Operating system software, device drivers and application programs.



The book takes as a reference manual for the position of the diagram mengatahui connection elements (connectors, ports and slots) and element configuration (jumpers and switches) and how to set jumpers and switches are suitable for computer or CD Software dirakit.Diskette required to install operating system, device drivers from the device, and application programs on a computer that is assembled.

Security

Necessary precautions to avoid problems such as damage to components by static electrical charges, falls, excessive heat or damage due to spillage cairan.Pencegahan static electricity by:

* Use anti-static wrist or touch the metal surface on the chassis before handling components to remove static charge.
* No direct touching electronic components, connectors or circuit path but holding on metal or plastic bodies found in the component.


Assembly

Stage of the process on a computer assembly consists of:

1. Preparation motherboard
2. Installing processor
3. Installing heatsink
4. Installing Memory Modules
5. install the motherboard on the chassis
6. Install Power Supply
7. Install the motherboard and chassis cable
8. Install Drive
9. Install the adapter card
10. Final Settlement

1. Preparation motherboard

Check your motherboard manual to find out the position of jumpers for CPU speed setting, speed multiplier and input voltage to the motherboard. Set the jumper setting according to the instructions, set the jumpers wrong voltage can damage the processor.


2. Installing processor

Easier processor motherboards occupy placed before casing. How to install the processor socket and the slot type socket berbeda.Jenis

1. Determine the position of pin 1 on the processor and the processor socket on the motherboard, usually located on the corner marked with a dot, triangle or curve.
2. Straighten locking lever position to open the socket.
3. Insert the processor into the socket by aligning the position of first legs with holes processor socket. Squeeze until there is no gap between the processor with the socket.
4. Lower the locking lever back.

Slot Type

1. Install buffer (bracket) at the two ends of a slot on the motherboard so that the peg hole position met with a hole in the motherboard
2. Enter the pegs and locking pin in the hole peg

Processor card tucked in between the brace and press to the right into the hole slot.

3. Install Heatsink

Heatsinks function is to remove the heat generated by the processor through the conduction of heat from the processor to optimize the transfer of heat heatsink.Untuk the heatsink must be fitted tightly on the top of the processor with a clip as a drag while the contacts on the heatsink surface coated conductor panas.Bila gene equipped with a fan heatsink then the fan power connector is connected to the fan connector on the motherboard.


4. Installing Memory Modules

Memory modules are installed sequentially from the smallest socket number. The order of installation can be seen from the diagram motherboard.Setiap types of memory modules SIMMs, DIMM and RIMM can be distinguished by the position of grooves on the sides and bottom of the modul.Cara install for each type of memory module as follows.

Type SIMMs

1. Adjust the position of grooves on the module with the bumps in the slot.
2. Insert the module with a sloping 45-degree angle to the slot
3. Push the module straight up in the slot, the locking lever on the slot will automatically lock the module.

Type DIMM and RIMM

How to install the DIMM and RIMM modules together and there is only one way that will not be reversed because there are two grooves as a guide. DIMM and RIMM difference in the position of the curve

1. Lay locking catches on the end slot
2. adjust the position of the curve on the connector module with bumps in the slot. and enter the module into the slot.
3. Hook lock automatically locks the module in the slot when the module is just installed.


5. Install the motherboard to the chassis

Motherboard mounted to the chassis with screws and seat (standoff). How to install as follows:

1. Determine the position of the hole for each holder of plastic and metal. Mounting holes for the metal (metal spacer) are marked with a ring on the edge of the hole.
2. Install metal or plastic holder on the tray casing in accordance with the position of each corresponding mounting hole on the motherboard.
3. Place the motherboard on the tray so that the head holder casing out of the hole on the motherboard. Place the lock screw on each metal holder.
4. Place the frame port I / O (I / O sheild) on the motherboard if any.
5. Place the tray casing which is mounted on the chassis and motherboard with a screw lock.

6. Install Power Supply

Several types of chassis is equipped with power supply. When the power supply has not included the way the installation as follows:

1. Enter the power supply on the shelf at the back of the casing. Connect the four locking screws.
2. Connect the power connector from the power supply to the motherboard. ATX power connector types have only one way of installation so as not to be reversed. For non-ATX type connectors with two separate cables then black ground must be placed side by side and mounted in the middle of the motherboard power connector. Connect the power cord for the fan, if you use the fan for cooling the CPU.

7. Install the motherboard and chassis cable

After the motherboard installed in the chassis next step is to install the cable I / O on the motherboard and the casing panels.

1. Connect the data cable for the floppy drive controller on a floppy connector on the motherboard
2. Connect the IDE cable connector to the primary and secondary IDE on the motherboard.
3. For non-ATX motherboard. Connect the serial cable and parallel port on the connector on the motherboard. Note the position of pin 1 to install.
4. On the back of the casing there is a hole to install an additional port types of non-slot. Open the lock plate screw holes covered lalumasukkan port to port connectors installed and put screws back.
5. When the mouse port not available at the back of the card casing mouse connectors must be installed and connected to the mouse connector on the motherboard.
6. Relations switch cable connector from the chassis front panel, LED, internal speakers and ports that were installed in front of the casing when the motherboard. Check your motherboard diagram to locate the right connectors.



8. Install Drive

The procedure to install the hard disk drive, floppy, CD ROM, CD-RW or DVD is the same as follows:

1. Pellet dislodged drive bay cover (space to drive on the casing)
2. Enter from the front drive bays with the first set the jumper settings (as master or slave) on the drive.
3. Adjust the position of screw holes in the drive and chassis and then install the drive retaining screws.
4. Connect the IDE cable connector to the drive and the connector on the motherboard (the connector is used first primary)
5. 1 samapai Repeat step 4 for each installation drive.
6. If the IDE cable connected to the du drive jumper settings make sure that the difference of the two first drive set as master and the other as slave.
7. Secondary IDE connector on the motherboard can be used to connect two additional drives.
8. Floppy drive is connected to a special connector on the motherboard floppy

Connect the power cable from the power supply to each drive



9. Install Card Adapter

A common adapter card is installed video card, sound, network, modem and SCSI adapters. Video card should generally be installed and installed before any other adapter card. How to install the adapter:

1. Hold the edge of the adapter card, avoid touching the electronic components or circuits. Press the card to plug right into the expansion slot on the motherboard
2. Place the retaining screw to the chassis card
3. Reconnect the internal cable to the card, if any.



10. Finishing

1. Replace the chassis cover by sliding
2. connect the cable from the power supply into the wall socket.
3. Connect the monitor to the video card port.
4. Connect the phone cable into the modem port if any.
5. Connect the keyboard cable connector and plug the mouse into the mouse port or serial poert (depending on the type of mouse).
6. Connect other external devices such as speakers, joystick, and microphone if there is to the appropriate port. Check the manual of the adapter cards to ensure the port location.



Testing

The new computer is assembled can be tested by running the BIOS setup program. How to do a test with the BIOS program as follows:

1. Turn on the monitor and system unit. Note the display monitor and the sound from the speakers.
2. Fost of the BIOS program will automatically detect the installed computer hardware. If there are errors then display a blank screen and the speaker sounds a beep on a regular basis as an indication of error codes. Check reference BIOS code to find an error indication is meant by the beep code.
3. If no error occurs then the monitor displays the execution of the POST program. BIOS interrupt key ekan according to the instructions on the screen to enter the BIOS setup program.
4. Check all the hardware detection by the BIOS setup program. Some settings may have changed in value, especially the capacity of hard drives and boot sequence.
5. Save changes to the settings and exit the BIOS setup.

After exit from the BIOS setup, the computer will load the Operating System with appropriate search order settings in the BIOS boot sequence. Insert Bootable Diskette or CD containing the operating system to drive the search.

Handling Problems

A common problem in computer assembly and handling, among others:

1. Computer or monitor is not lit, probably due to the switch or power cord not connected.
2. Card adapter is not detected due to the installation of not fitting into the card slot /

LED of the hard disk, floppy or CD burning continue due to wiring error or a pin connector that fits yet connected. Congratulations and Good Trying Helpful.