Putra Jaya Komputer ( PJK )

PJK berdiri sejak tahun 1998 di Kota Pekalongan dan pada tahun 2002 berpindah di Kab. Batang. Berkecimpung pada masalah IT PJK telah berpengalaman pada bidang ini. Sampai sekarang kami masih aktif dalam bidang IT khususnya Networking.

Paket Antena Siap Pakai

Pengen punya usaha RT RWnet sendiri? PJK menyediakan paket hemat untuk anda yang ingin membangun usaha RT RWnet sendiri, cukup dengan 5juta (internet sendiri) Usaha anda siap berdiri.

Unlimited Internet Cepat Satu tahun hanya 360 Ribu Rupiah

PJK-WISP membuka pendaftaran kembali unlimited internet cepat dan handal hanya Rp 360.000,- (tiga ratus enam puluh ribu rupiah) untuk 1 tahun. Segera hubungi PJK-WISP di Jalan Akasia Raya No.5 Perumahan Kalisalak.

Penambahan Antena Grid PointToPoint Di Kadilangu

Kami menargetkan agar pelanggan yang berada di wilayah Kadilangu Batang mendapat koneksi internet nirkabel yang stabil dan handal dari PJK, Untuk itu PJK memperluas jangkauan dengan menambahkan Antena point to point ke wilayah kadilangu.

Jasa Setting Video Cache Proxy

Khusus calon pengguna jasa instalasi dan konfigurasi Video Cache Proxy yang bertempat tinggal di dalam Wilayah Pekalongan Kota dan Batang Kota, kami berikan harga khusus, cuma Rp 400.000,-

Thursday, 31 July 2008

This week i have a lot of to do and task. As civil servant on Pekalongan Municipal i got commanded to install VOIP phone and have prearing for connection to the office village.
As owner of PJK company i have to servicing all customer so they are will satisfied. PJK have been a lot of ordered some computers set and secondhand notebook. There for we busy.
And on this week we open Computers Technician Course for the biginner or anybody who instristed about computers maters.

Thanks to GOD who give us a live to do something for anybody. I hope someday PJK getting large and global company.

Sunday, 27 July 2008

My full name Falentino Eka Laksana Putra. Birth on Pekalongan City, Central Java Province is approximate 340 km from Jakarta the capital of Indonesia. Date of birth: 11 July 1978. Education: under graduted on communication science and bachelor on computer science.Occupation :Civil Servant on Pekalongan Municipal at Informatic Techology. Business: Informatic Technology Solution as Service/Repair CPU, Laptop and Monitor/Display. Making Softwares Application for any fields.

I am easygoing, extrovert, sociable, little sensitive, glad to making friendship. My hobby : reading a book, computers, listening music, swimming, and travelling.

Monday, 21 July 2008

Posted by Picasa

Posted by Picasa

Posted by Picasa

Saturday, 19 July 2008

Reports are rife at the moment that the makers of Facebook are set to announce some sort of payment system on the site.
While this could mean that users may be able to start paying a monthly charge for premium content, it looks more than likely that the payment system will be used to pay developers who create successful applications.
Payment system
Eagle-eyed users of the site first spotted the signs that the site was gearing up for money exchanges when the US address for Facebook changed from http:// prefix to a https:// prefix – with the 's' standing for secure.
If the rumours are true, then Facebook looks set to have its own type of App store that has proven to be incredibly successful so far for Apple.
The announcement of what Facebook will actually use the payment system for is likely to be announced at the upcoming f8 developer's conference, alongside the official unveiling of Facebook Connect.
Marc Chacksfield, Techradar

Wednesday, 16 July 2008

Situs internet jejaring sosial yang populer ini memungkinkan para pengguna menambahkan beragam program aplikasi ke profil mereka.
Namun, program jahat, yang disamarkan sebagai aplikasi tak berbahaya, mungkin bisa menghimpun data pribadi.
Facebook mengatakan, pengguna sebaiknya berhati-hati ketika menambahkan aplikasi. Program yang melanggar ketentuan akan ditarik, kata pengelola jejaring sosial tersebut.
Facebook digemari banyak orang saat ini. Jejaring ini memungkinkan orang saling berhubungan, menerbitkan foto, dan berbagai game dan kuiz sederhana.
Dan, situs yang sama juga memungkinkan anda menyimpan rincian dari para pengguna lain. Atau setidaknya itulah implikasi yang dikehendaki.
Mencuri rincian
Tim program BBC Click telah menemukan cara untuk mencuri rincian pribadi orang dan temannya di Facebook tanpa sepengetahuan mereka.
Ada banyak aplikasi tersedia bagi pengguna Facebook
Tim BBC membuat profil fiktif Bob Smith. Dia menyimpan dan merahasiakan sebagian besar rincian pribadi mengenai profilnya dari orang-orang yang bukan temannya di Facebook.
Meski tim tidak bisa mendapatkan seluruh rincian, ditil yang benar-benar diperoleh, termasuk namanya, kota asal, sekolah, minat dan foto, tentu membantu kami untuk mencuri identitas seseroang.
Dengan memanfaatkan sepasang laptop dan bantu penyusun kode aplikasi, tim BBC menciptakan aplikasi khusus untuk para pengguna Facebook atau Facebookers.
Salah satu alasan Facebook menjadi begitu cepat populer adalah koleksi aplikasi yang bisa ditambahkan oleh pengguna ke profil mereka.
Ada ribuan game, kuiz, dan tes IQ sederhana tersedia bagi mereka. Dan, begitu pengguna menambahkan suatu aplikasi, teman-temannya akan terdorong untuk ikut menambahkan.
Siapa pun yang memiliki pemahaman dasar pemrograman web bisa menulis aplikasi.
Menambang data
Tim BBC merancang aplikasi penghimpun data (datang mining) yang jahat dengan nama Miner, yang jika dikehendaki, bisa menyamar sebagai game, uji kecerdasan, kelakar dan semacamnya.
Facebook menjadi medan komunikasi bagi banyak kalangan
Program itu bisa dibuat dalam waktu kurang dari tiga jam.
Namun, seperti apa pun tampaknya program, di latar belakang, aplikasi itu bisa menghimpun rincian pribadi, dan para pengguna lain yang termasuk teman-teman dan mengirimkan ditil-ditil tadi melalui e-mail keluar dari Facebook kepada tim.
Ketika anda menambahkan aplikasi, kecuali anda memilih membatasinya, program itu diberi akses ke sebagian besar informasi dalam profil anda. Dan, itu termasuk informasi yang anda punya mengenai teman-teman anda sekalipun mereka menyangka mereka telah memilih security setting yang ketat.
Saat ini, banyak aplikasi memang memerlukan akses ke ditil anda agar bisa berfungsi sebagaimana mestinya.
Namu, tim BBC menyatakan tidak tahu aplikasi tertentu yang menyalahgunakan ditil informasi pengguna Facebook, selain program yang diciptakan tim tersebut.
Namun, fakta bahwa tim bisa menciptakan aplikasinya dengan mudah merisaukan banyak orang. Orang tidak perlu memiliki program seperti itu untuk menjadi korban. Orang bisa menjadi korban jika dia mempunyai teman yang memiliki program semacam itu.
Mengingat aplikasi tersebut dijalankan di server pihak ketiga, bukannya oleh Facebook, sulit bagi perusahaan itu untuk mengecek apa yang terjadi, apakah program itu telah berubah, dan berapa lama aplikasi itu menyimpan data dan data itu dipergunakan untuk apa.
Meski ketentuan dan syarat yang diberlakukan Facebook memuat peringatan bahwa keadaan itu secara teoretis mungkin terjadi, dan menawarkan pilihan untuk menghalangi aplikasi untuk mengakses ditil anda, banyak game dan kuiz tidak akan berfungsi jika pilihan ini digunakan.
'Bertindak naif'
Pertanyaannya kini apakah Facebook telah bertindak cukup untuk melindungi para penggunanya dari pencurian identitas.
Ada kekhawatiran soal informasi pribadi pengguna Facebook
Paul Docherty adalah direktur teknis pada Portcullis Security, perusahaan yang menjadi penasihat pemerintah beberapa negara soal computer security, termasuk pemerintah Inggris.
Dia mengatakan kepada BBC, dia yakin ketentuan dan syarat Facebook yang tercantum di situs itu menandakan Facebook telah melindungi diri secara hukum dari tanggungjawab.
Namun, dia menambahkan: "Secara moral, Facebook telah bertindak naif."
Secara moral, Facebook telah bertindak naif

Paul Docherty Portcullis Security
Menurut Docherty: "Facebook perlu mengubah default setting-nya dan memperketat security."
Dia yakin sulit untuk mengamankan sistem yang ada saat ini, sebab ada begitu banyak aplikasi pihak ketiga yang beredar saat ini.
Saat menanggapi pertanyaan tim investigasi BBC, Facebook mengatakan, situs itu memiliki tim penyelidik yang mengawasi situs tersebut, dan menarik aplikasi yang melenggar ketentuan, dan itu termasuk aplikasi seperti Miner.
Facebooks juga menasihati pengguna agar menempuh langkah kehati-hatian seperti saat men-download software dari aplikasi Facebook yang mereka men-download software di komputer mereka.
Berbeda
Ini semua terjadi pada bulan saingan Facebook, MySpace membuka application platform-nya.
MySpace menawarkan jasa jejaring sosial lain di internet
Namun, MySpace menangani aplikasi dengan cara berbeda. Di sini, semua aplikasi dioperasikan di server MySpace sendiri, sehingga pengelola situs itu bisa melihat gerak-gerik aplikasi.
MySpace juga secara manual memeriksa aplikasi yang di-upload dan memeriksa ulang aplikasi tersebut jika penciptanya berniat mengubah kodenya. Tim BBC tidak bisa menimbulkan ancaman yang sama terhadap security pengguna yang memakai sistem MySpace.
Tampak jelas bahwa securitu setting Facebook tidak memadai untuk melindungi rincian informasi pribadi pengguna, dan teman-teman si pengguna.

Tuesday, 15 July 2008

With the capacity of USB flash disks getting larger and larger and portable USB hard disks offering hundreds of gigabytes of storage, who would need a portable printer?
If your organizing committee wants a hard copy of your presentation, just copy the PowerPoint file to a USB disk and hand it to them. Give them the name of the file and they will take care of the rest. The good thing is you do not have to worry about your ink expenses.
But there are times that you have to do the printing on your own. If you are in your hotel room late at night, the business center is closed, and you remember that you have to prepare an invoice to be submitted to your client first thing in the morning, you may find yourself wishing you had a printer in your suitcase.
And if you happen to be in an unfamiliar city, would it not be better to have a printout of the map depicting the route to the convention center where you are supposed to give your presentation? Just go to the Web, select the right map, zoom in the right area, print it out and keep the printed map in your pocket.
A portable printer has long been a notebook companion for a lot of road warriors. The early models did not use ink. Yes, you guessed it right, they used thermal transfer fax paper. Of course, the biggest drawback with this kind of printout is that it fades quickly.
A much noisier type of portable printer uses the old dot matrix technology, but this type generally is for special purposes. For example, they are used to print labels, receipts, tickets, etc. They are no good for printing a press release.
For many years, top printer makers such as Canon, Citizen and HP have sold quiet but reliable portable printers. Courtesy of Datascrip, I had the chance to play around with the latest portable printer from Canon, the PIXMA iP100. It is the successor to the Canon PIXMA iP90, which I did not get to test drive.
PIXMA iP100 is a portable photo printer. It can print full page photos without borders. (JP/Zatni Arbi)
Packed in a plastic box with a silver-finish, the CNet Editor's Choice PIXMA iP100 has two ink tanks -- one for the black and the other for the colors.
A unique feature is Canon's Use Composite mode. If you run out of black ink, you still can print black text as the printer has the intelligence to mix the color inks to produce black. To cut down the use of black ink, there is a Save Black Ink mode. The printer prints various sizes of paper, with A4 the maximum.
Like most high-end printers nowadays, Canon uses a technology that it calls ChromaLite 100, which promises that the printouts will last for 100 years. I do not think I will live long enough to verify that the promise is kept. The photo quality is enhanced by the use of Canon's FINE technology, which now has 1,856 nozzles to spurt the ink on the paper. Additionally, one droplet of ink has the volume of a picoliter.
Different technologies have made photo printouts look more detailed and colors more vibrant, but if you still insist on knowing the resolution, the iP100 has a printing resolution of 9600 x 2400 dot-per-inch (DPI).
More interesting is perhaps the ability of this printer to print photos without borders. But, perhaps, the most relevant feature is the speed that Canon claims this printer is capable of.
The company's press release says that it can churn out up to 20 black-and-white text pages per minute and 14 color pages per minutes. A full color, 4-by-6-inch photo takes around 50 seconds. I did not have a stopwatch to check this.
There are three different ways to connect the portable printer to a notebook computer. You can use a USB cable, which I did in my test. There is also infrared connection, which is commonly called IrDA. You can also invest in a Bluetooth adaptor (BU-30), which will enable you to print directly from Bluetooth-capable PDA or notebook. You can print directly from your digital camera or a camera phone without the help of a PC. The printer also works with Macs.
Unfortunately, there is no media card reader and there is no way to add Wi-Fi, either. On the other hand, the Solution Menu application really makes it easy to select the photos you want to print. You can also check the status of the ink in the cartridges, although it only tells you that the ink level is "Adequate".
"Customers are still interested in portable photo printers," Nisyarani, a member of the Datascrip media relations staff, told me.
"During the computer exhibition at the Jakarta Convention Center last month, we ran out of stock. People were even willing to buy this demo unit," she added, referring to the printer unit that I was trying out.
It was rather surprising news, as the price tends to be on the higher end. Without the rechargeable battery, the price is US$248. With the battery, it is $292.
"The battery will enable you to continue working even while stuck in traffic," said Merry Harun, Datascrip's director for Canon division.
A fully charged battery can last for around 450 printouts. There is also an optional car kit, so that you can recharge the battery using the cigarette lighter jack in your car.
The unit weighs around two kilograms. You will need a wheeled bag if you have to carry both this printer and a notebook. The plastic feels a bit flimsy, and I have no idea how resilient the PIXMA iP100 when facing the abuse of regular travel. However, if you are habitually careful with your electronic gadgets, this is a good solution for your occasional -- probably desperate -- printing needs.
Each time you decide to carry your portable printer, just remember to throw in a pair of spare ink cartridges just in case. You do not want to add two kilograms of dead weight in your suitcase -- especially now that airlines are more unforgiving when it comes to excess baggage in light of rising fuel prices

Monday, 14 July 2008

court in Germany has ruled that a man is not to blame for illegal downloading as he has an open Wi-Fi connection.
The whole case came to light when an unnamed musician sued a man for downloading one of their songs on a P2P site.
Even though the musician had the person's IP address, the defence suggested that, as he had an open Wi-Fi connection, it could have been anyone who downloaded the song.
The prosecution argued that, as it was his connection, he should be the one policing it. And the court agreed.
Decision overruled
Not wanting to be sued, the man appealed the decision and a judge in Frankfurt overruled the original verdict, stating that if other users use your open Wi-Fi network without your consent and download copyrighted material, you cannot be automatically held responsible for their actions.
This new ruling could have many implications for copyright infringement laws over the internet. Now that one person has blamed an open Wi-Fi connection, many are sure to follow.
Marc Chacksfield, Techradar

Friday, 11 July 2008

Pada tanggal 11 Juli 2008, Sdr.Falentino Eka Laksana Putra genap berusia 30 tahun. Pendiri dan pemilik Putra Jaya Komputer (PJK) lahir di Kelurahan Dukuh Kota Pekalongan, tepatnya di Rumah Bersalin KARANA (sekarang BII)Jalan Pangeran Diponegoro. Semoga TUHAN selalu menyertai kita semua.

Bukan Lamanya kita hidup di dunia ini, namun yang terpenting seberapa banyak sesuatu bermanfaat yang telah kita berikan pada dunia ini.

Pada tanggal 28 Juni 2008, Putra Jaya Komputer (PJK) telah memasuki usia yang ke 10 tahun. Dalam usia yang 10 tahun ini, PJK telah mengubah core bisnisnya yang semula lebih fokus pada penjualan dan software aplikasi, sekarang fokus pada service dan repair CPU,MONITOR dan LAPTOP. PJK juga merupakan mitra resmi dari INTEL dan dealer resmi LAPTOP baru dan bekas dari JAKARTA dan SURABAYA. Beli laptop bekas di PJK harga lebih rendah dan disertai jaminan selama 1 bulan.

Monday, 7 July 2008

Mulai bulan Juli 2008, Kantor Kecamatan Pekalongan Utara sudah terpasang layanan akses internet melalui WIFI. Layanan internet tersebut tidak dibatasi/non stop 24 jam. Sehingga karyawan/karyawati dapat mendapatkan informasi terkini atau yang dibutuhkan.

Friday, 4 July 2008

Every time you’ve bought a new PC, the chances are that you’ll have spent hours, days or even weeks transferring all of your old files and software by hand. If so, you’ll appreciate that the task is an effective way to waste time that could be spent more productively. There are several options that are faster and more convenient than doing everything yourself. Some of these are more adventurous and DIY-oriented than others. We’ve listed all of them here, so that you can pick the technique that’s most likely to work for you.
At this point, we’ll assume you have two PCs: one holding all your old software and data, and the other one clean and empty. For some of the techniques that follow, you don’t even need to have Windows installed. In fact, you may not even need a system disk installed in the new PC.
Before you startAlthough this step is optional, it’s recommended because it can speed up the transfer process and improve the chances of success. Before trying to set up your new machine, delete unwanted files from the old machine using Windows Cleanup. It’s also a good idea to clean up the registry – for example with Registry Mechanic. Use this step as an excuse to remove anything from your old PC that you don’t need or want, including old software.
The disk swapOf the four techniques you can use, this is the simplest. You physically swap the hard disk out of one machine and install it into the other. You might think this is a recipe for disaster, but in fact the chances of a terminal error aren’t all that great. Windows XP does a reasonable job of working out which drivers to install in a new hardware environment.
As a rough rule of thumb, the chances of a non-booting error are around one in 20 – less if your hardware configuration is fairly standard, but more if your PC is unusually esoteric. You can improve the odds significantly by stripping down your new PC to its core, removing any hardware that isn’t essential for the boot process, then re-installing these extras later once Windows XP is running again. The drivers won’t usually need a re-install because they’ll already be on the disk.
In practice, there’s not much more you need to do – pull the system disk out of the old machine, and install it in the new one. Power up, and boot. Wait for Windows to reorient itself. And you’re done.
So what about downsides? The first is if you’ve just bought a new machine, you’ll be voiding your warranty if you do this, simply by opening the case. If you’ve built a homebrew machine from scratch, this isn’t an issue. The other problem is that if you do get a showstopper boot error, there’s not much you can do. Sometimes you can rescue your installation if you move the disk back to your old machine and boot again. But this doesn’t always work. Overall, this is an adventurous DIY option, to be used at your own risk.
There’s also a more subtle drawback. Windows never cleans out the registry, so once hardware has been installed, it always stays there. This means that when you move a disk to a new machine, all the hardware settings from the old machine are copied too. But you won’t see them unless you boot in Safe Mode and select the Device Manager. If you do this after a transfer, you’ll be surprised how many unnecessary entries there are.
Using Device Manager in Safe Mode gives you a chance to delete these spare entries by hand. If your disk swap results in a non-booting PC, it’s always worth going through this step to see if something in the device list could be causing a problem.
Partition cloningThis is similar to the first technique, but instead of physically swapping your disk, you copy the system partition to a different disk first, then install that in your new machine. The advantage of this approach is that you’re not risking your original system folder, and you’ll be able to continue using your old PC. It also means that if for any reason you end up with a non-booting new PC, you haven’t lost anything except some time.
You may be wondering why you don’t just copy all the files across to the new disk, instead of cloning the partition? The problem with this approach is that it won’t copy across certain system files, and it certainly won’t copy the boot sector. So you’ll end up with a disk that looks a lot like a Windows system partition, with all of the software in place, but won’t boot properly. Partition cloning avoids this by copying everything. The only downside is that it suffers from the same registry issues as a straight disk swap. For maximum efficiency, you’ll need to go into Device Manager and clean out unnecessary entries by hand.
A new disk is less likely to die than an old one, so this technique will improve the likely longevity of your new PC more than a straight disk swap would. You can also use your partition manager to increase the size of your system partition – even up to the 127GB that’s the maximum possible in Windows XP.
Copy a partition
If you want to copy a partition, you’ll need a suitable spare hard drive that’s at least as big as the system partition you’ll be copying. You’ll need to install this drive in the source PC. You can copy a partition to a FireWire or USB2 drive, but of course you’ll then need to work out a way to copy it again to your destination PC. It’s easier to do the copying in situ and swap the disk physically.
Next, you’ll need a partition copying utility. This feature isn’t built into Windows XP, so you’ll need to buy a third-party tool. We’ve chosen Paragon’s Partition Manager here (included on your SuperDisc), although there are plenty of alternatives that all work more or less the same way. In many cases their interfaces look very similar too, so you should be able to follow these steps.
Install your new hard drive, boot Windows and start your partition management tool. You’ll see a list of partitions similar to that shown in the Windows disk manager. Select the system partition you want to copy, then right-click and select the Copy option or select the Copy option from the menu. You’ll see a dialog that asks you to specify a destination disk. Select your newly installed empty disk. Click on a confirmation, and wait… Once the copy has finished, you’ll have an exact clone of the original partition, complete with all hidden files, the Windows swap file, and a working boot sector.
Files and Settings Transfer WizardIf you’ve already upgraded from an earlier version of Windows, you may remember that Windows XP includes a Files and Settings Transfer Wizard. This is a slightly random but effective tool for copying information. It was originally designed to work with a direct serial link, which is far too slow to deal with the tens of gigabytes in a modern Windows XP installation. With a little lateral thinking, however, it can work over a network.
We’ll assume at this point that your source and destination PCs are connected to a network, and you’ve run the Network Setup wizard on the new PC so it’s visible over the network from the old one. If not, open Network Places on the new PC, select ‘Set up a home or small office network’, and follow the steps. The most important thing is to make sure that you use the same network name for both old and new PCs. MSHOME, the default, is fine for most uses. If you use different network names the PCs won’t find each other.
Start with the new machine. Create a folder called Transfer, or some other uniquely memorable name. Make sure that both the folder and the disk it lives on are enabled for Windows file sharing over the network. Now run the wizard on the old machine– it’s under Start Accessories System Tools. As you work your way through the steps, select the Other option and choose the Transfer folder on the new machine. The direct network copying option that’s offered doesn’t actually work, so we have to take this slightly roundabout route instead.
Tick ‘Let me select’ and Next. The key point here is that by default the Program Files folder won’t be included in the copy, so you need to add it by hand. Select Add Folder, work your way through the file system to Program Files, and select OK. Now check to make sure it’s in the list that appears. Once it’s added, Windows will transfer your installed software as well as all your other settings. Now move to the new machine, select the wizard, point it at your transfer partition, and it will integrate the old software and settings onto the new machine.
The wizard is the only way to copy an installation from an older version of Windows to Windows XP. However, it doesn’t seem to be absolutely reliable, and using a spare folder limits the maximum size of the files you can copy to 64GB. That’s enough for most installations, but occasionally this limit can cause you problems.
Laplink PCMoverLaplink’s PCMover is a handy transfer utility that’s very much like a sophisticated version of the Files and Settings Transfer Wizard. It has no problems working over a network, so it gets around the file size limit that the wizard enforces.
To use PCMover, you’ll have to install it on both old and new machines. On the old machine, follow the prompts up to the point where it asks you to stop and start PCMover on the new machine. Once you’ve switched, start PCMover on the new machine and follow the steps again. You’ll see your new PC’s name appear in the selector window. From there, it’s a simple matter of selecting some copying options and choosing to include or exclude certain files and disks. By default it copies everything, but it’s usually better just to copy the system disk.
PCMover is the easiest and most efficient way to copy everything to a new PC without having to open the case. It’s not fast – a complete system copy will take a few hours – and some of the selection options are a little quirky. But overall, it’s the simplest solution for anyone who doesn’t want to get their hands dirty by physically installing or moving hard drives.
Tidying upAs a final stage in the transfer process, you’ll want to make sure your working files are also copied. Email and web cache files will usually be transferred over with your system partition. If you work with sound or video, you’ll usually have working files on a separate disk, but copying these over is easy. You can again either swap the disks across physically or do a simple network copy using the Network Places browser. Make sure you create a similar file structure in the new PC with the same drive letters, otherwise your newly installed software may not find the working files it wants.
Software activation
Older software that’s been through a registration process is usually keyed to a specific file that’s created after activation. You’ll usually find this is copied across as part of the transfer process, so your old registration and activation should continue to work on your new machine.
When newer software is activated, it’s often keyed to specific hardware, so if you copy it to a different PC, it won’t work without reactivation. The details will be specific to each package, but a common rule is that you’re allowed two activations – nominally one on a desktop PC and one on a laptop – before online activation stops working.
What happens next depends on the software you’re using. Some packages do allow more than the nominal two activations – even though this isn’t admitted in public – so it’s worth trying to activate online first. Others offer assignable activations, where you need to find your registration details on the manufacturer’s website and delete an old activation before you can enter a new one.
Still others give you the choice of which hardware to key to. If you lock the software to a network card, you can move the card to your new machine: the activation comes across with it. The final option is a call to the software company’s customer services to arrange for a manual activation: you’ll need to persuade the representative that you’re not illegally trying to run more than two copies at once. Software activation isn't just restricted to programs, of course. Media files, such as audiobooks and music files, are generally more lenient, giving between three and five activations across your PCs and gizmos - on anything else, it's just bytes.

There are many ways to get more from your PC: tweak application settings, play around with Windows, update your drivers – all these techniques have their place. But don’t forget the BIOS. The configuration here plays a key part in setting up your hardware, and no system will deliver its best possible performance without having a properly optimised BIOS.
Directing you to the right setting isn’t always easy. Every BIOS has its own menu structure and naming conventions, so while we can point you in the right direction for a particular option, ultimately you’ll have to browse for it yourself. And occasionally you might not find an equivalent setting at all, but don’t worry, just move on to the next: there are plenty of BIOS tweaks for everyone here.
Remember to be cautious when tweaking your system. Make a note of the original settings so that it’s easy to change back later. Try to modify only one or two values at a time, then test your PC to make sure everything’s still working well. If an issue does emerge, and you can’t get back into the BIOS setup program, then there’s an easy fix: just clear the CMOS RAM and start again with default settings. Your motherboard manual will tell you how to do this.
The typical BIOS set-up program is launched by pressing a particular key when your system first boots – often [Del] or [F2] – although a prompt should tell you what to use. The opening menu is commonly called Standard CMOS Features, and contains two entries for each of your IDE channels: IDE Channel 0 Master, IDE Channel 0 Slave, IDE Channel 1 Master, and so on. Each entry is normally set to Auto, allowing your PC to detect whether an IDE device is present, but if the channel isn’t being used then you may also set it to None. Your PC will then skip the detection step and boot a little faster.
The Advanced CMOS Features menu generally defines your PC’s boot order, which by default will be something like floppy; CD ROM; hard drive. Not only does checking floppy and optical drives slow the boot process, but it’s also a security risk, because you’re more likely to accidentally boot from virus-infected media. Change it now so your hard drive comes top of the list.
Ironically, this Advanced menu is also where you’ll usually find a particularly pointless legacy floppy setting, Boot up floppy seek. The system uses this to find out if you’re using a 40-track, 360KB floppy, and as we’d like to bet you’re not, is another delay in your PCs boot time. Turn the setting off immediately.
Integrated peripheralsModern motherboards are overloaded with ways for your PC to communicate with the outside world and other devices, far more than you actually need. Is your PC’s integrated network controller unused, because it’s a standalone machine? Maybe you never plug anything into the parallel or serial ports, and your Firewire (1394) controller is wasted because your devices are USB?
If any of this sounds familiar, then work your way down the list and turn off whatever features aren’t required for your PC. This is particularly important if you have integrated graphics or sound, and have also installed a separate graphics or sound card, because it’ll ensure you avoid conflicts between the two. But you’ll also benefit because BIOS initialisation will be faster. It’ll be easier for your system to allocate resources, and Windows may need to load one or two less drivers, saving a little RAM.
Anyone who is still using the parallel port, though, should check its mode here. By default it’s set to SPP (Standard Parallel Port), the slowest option available. Experiment with EPP (Extended Parallel Port) or ECP (Extended Capabilities Port) to see if either offers you improved speeds.
Power management The Power Management menu will contain a range of ‘Wake on’ functions, letting you turn on your PC by moving the mouse, touching the keyboard, an incoming ring on the modem – whatever your board supports. These functions might seem worth trying if they avoid the need to scramble under the desk for your power button, but they also increase the chance of turning on your system accidentally. It’s generally less hassle to leave them turned off.
There is a real hidden star in this menu, though, usually called something like ACPI Suspend Type or S3 Suspend Type. This governs how your PC handles being switched to Standby. Leave it in the default S1 setting, and it still uses a ludicrous amount of power: 182W when on for our test PC, only dropped to 86W in standby mode – a lot when it looks like the system is off.
Change your suspend type to S3, though, and more devices will be switched off, while their status will be saved internally. This should reduce standby power requirements by another 50 per cent, perhaps more, saving you a bundle on PC running costs. The only potential problem is that it may not work with older hardware, so you should experiment first. If any component doesn’t restore properly from standby, restore the previous S1 setting to get it working again.
CPU configurationAn AMI BIOS typically provides access to processor settings in the Advanced CPU Configuration menu, but other systems often place them in a general overclocking screen, like Gigabyte’s “MB Intelligent Tweaker”. So don’t be surprised if it takes a while to locate them.
The aim of these options is to help you overclock your CPU and run it at a faster rate than is intended, which can result in major performance gains. But at a price. Your PC may also become more unstable, lock up unexpectedly or deliver more blue-screen errors. Faster processors generate more heat, so you might need to install larger heatsinks. And even then your system might have a shorter life.
Still here? We don’t have the space to cover overclocking properly, but one very simple method involves looking for the FSB Frequency setting, and increasing it by a few MHz. The FSB speed governs both the speed of your CPU and memory, so you should see immediate results. Make your increases gradual, perhaps two per cent of the initial FSB value, then save the changes and test your PC thoroughly to ensure it’s stable.
When you do push too far and your PC starts to fail, switch the settings back to the last stable value, and look for CPU and memory voltage levels. Increase these by the smallest possible increment and you may be able to get better performance. But be careful: apply too much voltage and you really can trash your hardware immediately. And extra heat increases the change of failure later, too.
Memory settingsBrowse around the CPU Settings screen and you’ll find options for your memory, too. Most of these memory timing values relate to specific delays, defining a period of time the CPU will wait to perform an operation. Reduce these delays and you can achieve extra performance, perhaps five to ten per cent, but you face the same risk as overclocking your CPU: a more unstable system. Only continue if that’s a risk you’re willing to take.
It’s potentially dangerous, but the overall process of memory optimisation is at least a simple one: you pick a setting, reduce it, then test your PC for stability. If all is well, reduce the timing again. Keep repeating the process until your system becomes unstable: locks up, produces blue screen errors, whatever it might be. Then restore the last stable value, and move on to the next. That’s the general rule, but it doesn’t apply to everything. Here are the settings we recommend you optimise first.
Command Rate: Also known as Command Per Clock, this defines the delay between selecting a memory chip, and sending it commands. Set to one clock cycle or “Disabled” for the best performance.
CAS Latency Control (tCL): Typical settings here are Auto, then values from 1 to 4.5 (lower is faster). Change this value and you must also modify Min RAS Active Time (tRAS) (see below). RAS to CAS Delay (tRCD): These values are usually Auto or 0 to 7: the lower values offer the best performance here.
Row Precharge Time (tRP): This defines the delay between successive accesses to the same memory bank. Again, values are usually Auto or 0 to 7, and lower values are faster.
Min RAS Active Time (tRAS): This value is generally calculated from two others. As a rule: tRAS = tCL + tRCD + 2. If you change this, you must also change the Row Cycle Time (tRC) (see below).
Row Cycle Time (tRC): This is the number of clock cycles it takes to activate and precharge a particular row in memory. It should usually be calculated from other settings: tRC = tRAS + tRP.
Row Refresh Cycle Time (tRFC): This is a key memory refresh figure. Possible values are usually Auto, or 9 to 24: lower values are best, usually two to four more than the Row Precharge Time setting.
Write CAS Latency (tWCL): The normal settings are Auto, or 1 to 8. Keep the values low (1 if you have DDR memory, 2 if it’s DDR2) to improve write performance.
Bank interleaving: This setting allows one bank of memory to be refreshed while another is being accessed, improving efficiency. Turn this setting on, or at minimum set it to Auto for the best results.
Rounding up the restThese settings aren’t always found on the same menu, but if you discover any of them in your BIOS then this is what we’d recommend you do. Remember though, if you’re unsure or worried about making a change to your BIOS settings, note down how the option was initially configured so you can return to it if your machine becomes unstable. Finally, only make one change at a time, save it and then test your PC. This way, if you do run into a problem you’ll be able cure it quickly and with certainty.
Fast Boot: Also known as Quick Power On Self Test, this option skips the basic memory test performed when your PC starts. Enable it for a faster start time.
AGP Aperture Size: This defines the address space available for AGP memory addresses and is also known as Graphics Aperture. 64MB or 128MB are generally best, but as long as your system is running at its rated AGP speed we’d leave this alone.
System BIOS Cacheable: Options that refer to caching or “shadowing” ROMs may sound useful, but most perform no function under Windows systems and should be disabled. The one possible exception is “Video RAM Cacheable”. Enabling this feature on some boards may turn on write combining, which is good for performance. Try that setting both ways.
USB 2.0 Controller Mode: Don’t be confused by the terminology. The correct setting for this is HiSpeed (480 MB/s), not FullSpeed (12 MB/s).
Spread Spectrum Modulation: This is a technique that is sometimes used to reduce electromagnetic interference from the AGP, PCI or PCI Express buses. It’s more likely to cause problems than fix them though, so we’d suggest turning this off.
PCI Express Maximum Payload Size: This defines the maximum amount of data that can be included in a PCI Express packet. This should automatically be discovered by the system, but increase it to the maximum anyway, just to be sure.

Google has created an algorithm that makes searching for Flash files possible, according to Googleblog.
The new piece of indexing code allows users of Google's search engine to trawl the web for Flash content, something that was not possible before.
It now means that files such as menus, buttons and banners, and Flash-made websites can now be indexed.
This is a boon to web designers who rely on the technology for the creation of their websites, as it will vastly improve visibility of Flash-adorned web pages.
Not just a Flash in the pan
In other Google news, the Search Engine Journal has said to have found information relating to Google working on new tech to update its image searching.
Currently, Google indexes photos by text and metadata. The new search will see images indexed by pixels used and scene analysis – visual indexing rather than textual. This will allow better access to the some 3 trillion images that are currently on the net.
The information was found in a video interview with RJ Pittman, Google's director of Product Management for Consumer Search Properties.
Marc Chacksfield, Techradar

Thursday, 3 July 2008

Kota Pekalongan, kota yang pertumbuhan ekonominya cukup baik serta jumlah penduduk yang mayoritas sebagai wiraswastawan dibutuhkan akses internet guna mendukung promosi, pemasaran dan mengenalkan ke seluruh dunia tentang keberadaan Kota Pekalongan.Maka perlu dibangun areal hot spot/area nirkabel internet di tempat publik seperti di alun-alun, lapangan mataram dan lapangan monomen. Dengan adanya hot spot maka akan menjadi salah satu daya tarik wisata baru.Dan bagi para pelajar dapat memanfaatkan untuk mencari informasi yang berguna bagi mereka.

Hubungi Kami

PJK / BATANGBOLIC
Hardware,Networking, & Internet
Jl. Akasia Raya No.5 Perumahan
Kalisalak - Kauman Batang
Jawa Tengah - Indonesia

Email : putra.jaya.komputer@gmail.com
Hp. 085868788968 / 082227594993
Pin BB :52595EA2
YM

IKLAN

Pelatihan
&
Jasa Setting Proxy High Perfomance

Di Jamin Youtube tercache & Game online terupdate cepat
  • Pelatihan & Setting On the site
Mobile Phone:085868788968
Pin BB:52595EA2
BUTUH MOBIL BARU/BEKAS?

DP minimal 30 % dari harga mobil baru atau bekas. Syarat untuk karyawan/pns: Fotokopi KTP pemohon, Kartu Keluarga, Rincian Gaji, Rekening Listrik, Surat/Akta nikah, Telepon, PDAM, PBB, Rekening Tabungan & NPWP
Syarat untuk wiraswata:Plus SIUP/TDP, Laporan keuangan terakhir
Contact Person : Eka (082227594993)
Pin BB : 52595EA2

Jasa Pembuatan RT RW Net dan Warnet

Modal Hanya 5 JT-an..!!!

Meliputi:

=>Radio Access Point TP-LINK

=>Antena OMNI

=>Pigtail

=>Kabel UTP 25 meter

=>CPU P3 Mikrotik 2nd, CPU Dual COre Proxy Server 2nd dan Tower 3 Pipa Galvanis

Keuntungan

=>Lebih Murah dalam 1 paket komplit

=>RT/RW-Net Siap Pakai

=>PJK akan membantu promosi

Call/SMS = 085868788968
Pin BB :52595EA2


SEWA MOBIL PEKALONGAN DAN BATANG
Sewa/Carter Mobil Dalam Kota / Luar Kota (Se-Jawa) + Sopir.
Hubungi: Eka HP: 085868788968 / 082227594993
Pin BB : 52595EA2
Alamat:
Jl. Akasia Raya No.5 Perumahan Kalisalak Batang
Jl. Trapesium 3 No.15 Perumahan Limas Indah Pekalongan

SPACE INI DI SEWAKAN UNTUK IKLAN

Hubungi :

Mobile Phone:085868788968
Pin BB:52595EA2




Blog Archive

Popular Posts

Followers