Tuesday, March 31, 2009

About Me




Name: Geoffrey Rosete [a.k.a. ikogsakanding]

Location: Maasin City,Southern Leyte, Philippines
E-mail Address: ikogsakanding@gmail.com

I’m just a simple weird guy just like anybody else. I love to design using Adobe Photoshop ( I have Adobe PhotoShop CS4 :] ).I also love on phone freaking specially my phone... :)..I know how to tweak my phone and pc.... :p



Geoffrey Yhopix Rosete's Profile | Create Your Badge
Geoffrey Yhopix Rosete's Facebook profile

FOLLOW ALSO MY BLOG ON FACEBOOK













MY TWITTER UPDATES




    follow me on Twitter





    IF YOU WANT TO BECOME MY TWITTER FRIEND JUST FOLLOW ME AT http://twitter.com/ikogsakanding





    About the BLOG [noob.niteshkothari.com]
    I am new in bloggin, I started my blog last January 16,2009, it was just for fun for spending my leisure time,my first blog contains Adult contents[http://maasincityscandal.blogspot.com]then I decided to make a non adult content blog because most of my affeliates reject my blog. Then I started this Blog For Noob Last March 9, 2009 with the help of an Indian blogger named Nitesh Kothari [http://www.niteshkothari.com] I am very greatful that a person like him was willing to help me about blogging.Im still a newbie blogger, if you want to help me to become a Pro blogger, you can contact me via email at ikogsakanding@gmail.com... till here... heheh


    About My Blog Theme
    This blog is using “Bmagazine Template” from NiteshKothari. But I want my theme to be myself. I customized it redesigned. I am tweaking the codes and I doing some customize grpahics. So the customization of the theme made me feel dizzy because of lots and lots of codes. But then, I ended up with this. For me, its cool.I love dark colors.....


    You can also connect me via:

    Twitter-ikogsakanding
    Yahoo Messenger

    GoogleTalk-ikogsakanding@gmail.com
    Friendster-friendster.com/yhop2x
    Plurk-ikogsakanding
    Mobile-+639184527235


    If you want to donate or you want to help me, You can donate via paypal or by using the paypal donation widget below.. thank you...













    Blogroll



    Noob Blogger





    IF YOU WANT TO JOIN ON MY BLOGROLL JUST COMMENT IN THIS POST THE NAME YOUR YOUR SITE AND URL.. THANK YOU.... [YOU CAN ALSO PUT A BUTTON ON YOUR BLOG/SITE, JUST COPY THE CODE ABOVE (OPTIONAL)]



    1. Maasin City Scandal
    2. Music Phone Tricks
    3. Maasin City Online
    4. NiteshKothari-A Tech Blog
    5. Nyi Nyi Myanmar
    6. DuniaCindi in The Virtual World
    7. Topel Jungle
    8. Make Life Easy
    9. My Web Hosting
    10. Forex Trading
    11. PlanetOdith
    12. Download Metal Mediafire
    13. Clark And Aie
    14. Azer Workz
    15. Candy Candy Sexy Blog
    16. O Papa Xicolates
    17. WRITINGS OF RYU
    18. Coretan Hidupku
    19. Sang Waktu
    20. Blogging With Style
    21. Berkata Bebas
    22. Tracy Chopz Mah Style
    23. Heading Home
    24. Tourism in Nepal
    25. <MUD FLUX>
    26. Your Daily Dose of Anything
    27. Kelvinonian
    28. Jong's Trivialities and Stuff
    29. Kodigo ni Kylito
    30. ymailidandemailid
    31. Untold Treasure Stories
    32. Hot Stuff AvenueBlogger Templates
    33. Obama's funny cartoons collections
    34. Celebrity Gossip
    35. BlogO Bla Bla's blog
    36. Short Funny Jokes
    37. Young and talented Guitarist Sungha Jung
    38. TECHPALS-Recommended
    39. Make Money Online for FREE
    40. Life's Pen At WOrk

    Nba Section


    PLAYOFFS BRACKET




    STANDINGS




    HIGHLIGHTS





    Friendster Layouts

    Here are some usefull site of customizing your Friendster Layout...

    1. Friendster-Layouts.com. Thousands of Free Friendster Layouts for Your Friendster Profile.
    2. Friendster Layouts. The best collection of Friendster Layouts around. Over 1000 layouts.
    3. Friendster Layouts, Layouts For Friendster, Premade Friendster Layouts. Offering up to 3000 unique Friendster layouts at FreeCodeSource.com you can find any layout … Get your free Friendster layouts here at FreeCodeSource.com!
    4. Friendster Layouts - Collections of Over 1000+ Unique Friendster. Unique Friendster Layouts with Best Collection of High Quality Friendster Layouts, Codes, Graphics, MP3 Music and more!
    5. Friendster Style - Friendster Layouts, Backgrounds and Graphics. Get cool graphics and layouts for your Friendster page. We offer free graphics and tools to improve your profile.
    6. Friendster Layouts | New Friendster Layouts. Welcome to Spider-Layouts.com. We provide free premium quality friendster layouts for friendster profiles. The friendster layouts here are updated daily
    7. Friendster Layout, Layouts for Friendster, Friendster Layouts. Friendster Layout, Layouts for Friendster, Friendster Layouts, Premade Friendster Layouts, Free Friendster Layouts.
    8. Friendster Layouts, Friendster Comments, Friendster Graphics. Get free flash friendster comments, layouts, backgrounds, countdowns, surveys, graphics, greetings and more for your friendster profile & blogs.
    9. Friendster-Tweakers | Friendster Layout Customization Tools. Friendster editor, tools, resources, tutorials, and many more Friendster related stuff to tweak your Friendster profile!
    10. MYFLYPROFILE.NET Custom Layouts for Myspace, HI5, and Friendster. OT MYSPACE LAYOUTS … Member Requested Layouts … Chris Brown Friendster




    Follow me on Facebook








    Conficker virus hits on April fools day

    Last night when I watch the news, it said that parliament has been hit by the Conficker worm, which attacks Microsoft's Windows operating systems and is designed to take control of all infected computers on 1 April.

    The worm is well known to security firms who have updated their anti-virus products accordingly, casting doubt on how up-to-date parliament's malware protection systems are.

    The Houses of Parliament refused to say when the anti-virus systems were last updated.

    Computing was unable to reach the Parliamentary Information and Communications Technology Department for further comment.


    Nobody knows what’s going to happen April Fools, but security professional have a plan.
    By all accounts Conficker has the potential capacity to steal data or launch a massive denial of service attack which encompasses massive amounts of data, flooding the Net, bogging down mainframe servers that distribute data to our inboxes.

    Symptoms of infection

    If your computer is infected with this worm, you may not experience any symptoms, or you may experience any of the following symptoms:

    * Account lockout policies are being tripped.
    * Automatic Updates, Background Intelligent Transfer Service (BITS), Windows Defender, and Error Reporting Services are disabled.
    * Domain controllers respond slowly to client requests.
    * The network is congested.
    * Various security-related Web sites cannot be accessed.

    For more information about Win32/Conficker.b, visit the following Microsoft Malware Protection Center Web page:
    http://www.microsoft.com/security/portal/Entry.aspx?Name=Win32/Conficker

    Propagation methods

    Win32/Conficker.B has multiple propagation methods. These include the following:

    * Exploitation of the vulnerability that is patched by security update 958644 (MS08-067)
    * The use of network shares
    * The use of AutoPlay functionality

    Therefore, you must be careful when you clean a network so that the threat is not reintroduced to systems that have previously been cleaned.
    Prevention
    Stop Conficker from spreading by using Group Policy NotesThis procedure does not...
    Stop Conficker from spreading by using Group Policy
    Notes

    * This procedure does not remove the Conficker malware from the system. This procedure only stops the spread of the malware. You should use an antivirus product to remove the Conficker malware from the system. Or, follow the steps in the "Manual steps to remove the Conficker.b variant" section of this Knowledge Base article to manually remove the malware from the system.
    * Please carefully read and understand the note in step 4 of this procedure.

    Create a new policy that applies to all computers in a specific organizational unit (OU), site, or domain, as required in your environment.

    To do this, follow these steps:

    1. Set the policy to remove write permissions to the following registry subkey:
    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Svchost
    This prevents the random named malware service from being created in the netsvcs registry value.

    To do this, follow these steps:
    1. Open the Group Policy Management Console (GPMC).
    2. Create a new Group Policy object (GPO). Give it any name that you want.
    3. Open the new GPO, and then move to the following folder:
    Computer Configuration\Windows Settings\Security Settings\Registry
    4. Right-click Registry, and then click Add Key.
    5. In the Select Registry Key dialog box, expand Machine, and then move to the following folder:
    Software\Microsoft\Windows NT\CurrentVersion\Svchost
    6. Click OK.
    7. In the dialog box that opens, click to clear the Full Control check box for both Administrators and System.
    8. Click OK.
    9. In the Add Object dialog box, click Replace existing permissions on all subkeys with inheritable permissions.
    10. Click OK.
    2. Set the policy to remove write permissions to the %windir%\tasks folder. This prevents the Conficker malware from creating the Scheduled Tasks that can re-infect the system.

    To do this, follow these steps:
    1. In the same GPO that you created earlier, move to the following folder:
    Computer Configuration\Windows Settings\Security Settings\File System
    2. Right-click File System, and then click Add File.
    3. In the Add a file or folder dialog box, browse to the %windir%\Tasks folder. Make sure that Tasks is highlighted and listed in the Folder: dialog box.
    4. Click OK.
    5. In the dialog box that opens, click to clear the check boxes for Full Control, Modify and Write for both Administrators and System.
    6. Click OK.
    7. In the Add Object dialog box, click Replace existing permissions on all subkeys with inheritable permissions.
    8. Click OK.
    3. Set AutoPlay (Autorun) features to disabled. This keeps the Conficker malware from spreading by using the AutoPlay features that are built into Windows.

    To do this, follow these steps:
    1. In the same GPO that you created earlier, move to one of the following folders:
    * For a Windows Server 2003 domain, move to the following folder:
    Computer Configuration\Administrative Templates\System
    * For a Windows 2008 domain, move to the following folder:
    Computer Configuration\Administrative Templates\Windows Components\Autoplay Policies
    2. Open the Turn off Autoplay policy.
    3. In the Turn off Autoplay dialog box, click Enabled.
    4. In the drop-down menu, click All drives.
    5. Click OK.
    4. Disable the local administrator account. This blocks the Conficker malware from using the brute force password attack against the administrator account on the system.

    Note Do not follow this step if you link the GPO to the domain controller's OU because you could disable the domain administrator account. If you have to do this on the domain controllers, create a separate GPO that does not link the GPO to the domain controller's OU, and then link the new separate GPO to the domain controller's OU.

    To do this, follow these steps:
    1. In the same GPO that you created earlier, move to the following folder:
    Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options
    2. Open Accounts: Administrator account status.
    3. In the Accounts: Administrator account status dialog box, click to select the Define this policy check box.
    4. Click Disabled.
    5. Click OK.
    5. Close the Group Policy Management Console.
    6. Link the newly created GPO to the location that you want it to apply to.
    7. Allow for enough time for Group Policy to update to all computers. Generally, Group Policy replication takes five minutes to replicate to each domain controller, and then 90 minutes to replicate to the rest of the systems. A couple hours should be enough. However, more time may be required, depending on the environment.
    8. After the Group Policy has propagated, clean the systems of malware.

    To do this, follow these steps:
    1. Run full antivirus scans on all computers.
    2. If your antivirus software does not detect Conficker, you can use the Malicious Software Removal Tool (MSRT) to clean the malware. For more information, visit the following Microsoft Web page:
    http://www.microsoft.com/security/malwareremove/default.mspx (http://www.microsoft.com/security/malwareremove/default.mspx)
    Note You may still have to take some manual steps to clean all the effects of the malware. To clean all the effects that are left behind by the malware, follow the steps that are listed in the "Manual steps to remove the Conficker.b variant" section of this Knowledge Base article.

    Back to the top
    Recovery
    Run the Malicious Software Removal tool The Microsoft Malware Protection Center...
    Run the Malicious Software Removal tool
    The Microsoft Malware Protection Center has updated the Malicious Software Removal tool (MSRT). This is a stand-alone binary that is useful in the removal of prevalent malicious software, and it can help remove the Win32/Conficker malware family.

    You can download the MSRT from either of the following Microsoft Web sites:
    http://www.update.microsoft.com (http://www.update.microsoft.com)
    http://support.microsoft.com/kb/890830 (http://support.microsoft.com/kb/890830)

    For more information about specific deployment details for the MSRT, click the following article number to view the article in the Microsoft Knowledge Base:
    891716 (http://support.microsoft.com/kb/891716/ ) Deployment of the Microsoft Windows Malicious Software Removal Tool in an enterprise environment
    Note The Stand-Alone System Sweeper tool will also remove this infection. This tool is available as a component of the Microsoft Desktop Optimization Pack 6.0 or through Customer Service and Support. To obtain the Microsoft Desktop Optimization Pack, visit the following Microsoft Web site:
    http://www.microsoft.com/windows/enterprise/technologies/mdop.aspx (http://www.microsoft.com/windows/enterprise/technologies/mdop.aspx)
    If Windows Live OneCare or Microsoft Forefront Client Security is running on the system, these programs also block the threat before it is installed.
    Back to the top
    Manual steps to remove the Conficker.b variant
    The following detailed steps can help you manually remove Conficker.b from a system:

    1. Log on to the system by using a local account.

    Important Do not log on to the system by using a Domain account, if it is possible. Especially, do not log on by using a Domain Admin account. The malware impersonates the logged on user and accesses network resources by using the logged on user credentials. This behavior allows the malware to spread.
    2. Stop the Server service. This removes the Admin shares from the system so that the malware cannot spread by using this method.

    Note The Server service should only be disabled temporarily while you clean up the malware in your environment. This is especially true on production servers because this step will affect network resource availability. As soon as the environment is cleaned up, the Server service can be re-enabled.

    To stop the Server service, use the Services Microsoft Management Console (MMC). To do this, follow these steps:
    1. Depending on your system, do the following:
    * In Windows Vista and Windows Server 2008, click Start, type services.msc in the Start Search box, and then click services.msc in the Programs list.
    * In Windows 2000, Windows XP, and Windows Server 2003, click Start, click Run, type services.msc, and then click OK.
    2. Double-click Server.
    3. Click Stop.
    4. Select Disabled in the Startup type box.
    5. Click Apply.
    3. Remove all AT-created scheduled tasks. To do this, type AT /Delete /Yes at a command prompt.
    4. Stop the Task Scheduler service.
    * To stop the Task Scheduler service in Windows 2000, Windows XP, and Windows Server 2003, use the Services Microsoft Management Console (MMC) or the SC.exe utility.
    * To stop the Task Scheduler service in Windows Vista or in Windows Server 2008, follow these steps.

    Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:
    322756 (http://support.microsoft.com/kb/322756/ ) How to back up and restore the registry in Windows
    1. Click Start, type regedit in the Start Search box, and then click regedit.exe in the Programs list.
    2. Locate and then click the following registry subkey:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Schedule
    3. In the details pane, right-click the Start DWORD entry, and then click Modify.
    4. In the Value data box, type 4, and then click OK.
    5. Exit Registry Editor, and then restart the computer.
    5. Download and manually install security update 958644 (MS08-067). For more information, visit the following Microsoft Web site:
    http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx (http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx)
    Note This site may be blocked because of the malware infection. In this scenario, you must download the update from an uninfected computer, and then transfer the update file to the infected system. We recommend that you burn the update to a CD because the burned CD is not writable. Therefore, it cannot be infected. If a recordable CD drive is not available, a removable USB memory drive may be the only way to copy the update to the infected system. If you use a removable drive, be aware that the malware can infect the drive with an Autorun.inf file. After you copy the update to the removable drive, make sure that you change the drive to read-only mode, if the option is available for your device. If read-only mode is available, it is typically enabled by using a physical switch on the device. Then, after you copy the update file to the infected computer, check the removable drive to see whether an Autorun.inf file was written to the drive. If it was, rename the Autorun.inf file to something like Autorun.bad so that it cannot run when the removable drive is connected to a computer.
    6. Reset any Local Admin and Domain Admin passwords to use a new strong password. For more information, visit the following Microsoft Web site:
    http://technet.microsoft.com/en-us/library/cc875814.aspx (http://technet.microsoft.com/en-us/library/cc875814.aspx)
    7. In Registry Editor, locate and then click the following registry subkey:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost
    8. In the details pane, right-click the netsvcs entry, and then click Modify.
    9. Scroll down to the bottom of the list. If the computer is infected with Conficker.b, a random service name will be listed. For example, in this procedure, we will assume the name of the malware service is "gzqmiijz". Note the name of the malware service. You will need this information later in this procedure.
    10. Delete the line that contains the reference to the malware service. Make sure that you leave a blank line feed under the last legitimate entry that is listed, and then click OK.

    Note All the entries in the following list are valid. Do not delete any of these entries. The entry that must be deleted will be a randomly generated name that is the last entry in the list.

    AppMgmt
    AudioSrv
    Browser
    CryptSvc
    DMServer
    EventSystem
    HidServ
    Ias
    Iprip
    Irmon
    LanmanServer
    LanmanWorkstation
    Messenger
    Netman
    Nla
    Ntmssvc
    NWCWorkstation
    Nwsapagent
    Rasauto
    Rasman
    Remoteaccess
    Sacsvr
    Schedule
    Seclogon
    SENS
    Sharedaccess
    Themes
    TrkWks
    TrkSvr
    W32Time
    WZCSVC
    Wmi
    WmdmPmSp
    winmgmt
    wuauserv
    BITS
    ShellHWDetection
    uploadmgr
    WmdmPmSN
    xmlprov
    AeLookupSvc
    helpsvc
    axyczbfsetg

    11. Restrict permissions on the SVCHOST registry key so that it cannot be written to again. To do this, follow these steps.

    Notes
    * You must restore the default permissions after the environment has been fully cleaned.
    * In Windows 2000, you must use Regedt32 to set registry permissions.
    1. In Registry Editor, locate and then click the following registry subkey:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost
    2. Right-click the Svchost subkey, and then click Permissions.
    3. In the Permissions Entry for SvcHost dialog box, click Advanced.
    4. In the Advanced dialog box, click Add.
    5. In the Select User, Computer or Group dialog box, type everyone, and then click Check Names.
    6. Click OK.
    7. In the Permissions Entry for SvcHost dialog box, select This key only in the Apply onto list, and then click to select the Deny check box for the Set Value permission entry.
    8. Click OK two times.
    9. Click Yes when you receive the Security warning prompt.
    10. Click OK.
    12. In a previous procedure, you noted the name of the malware service. In our example, the name of the malware entry was "gzqmiijz". Using this information, follow these steps:
    1. In Registry Editor, locate and then click the following registry subkey, where BadServiceName is the name of the malware service:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\BadServiceName
    For example, locate and then click the following registry subkey:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\gzqmiijz
    2. Right-click the subkey in the navigation pane for the malware service name, and then click Permissions.
    3. In the Permissions Entry for SvcHost dialog box, click Advanced.
    4. In the Advanced Security Settings dialog box, click to select both of the following check boxes:
    Inherit from parent the permission entries that apply to child objects. Include these with entries explicitly defined here.

    Replace permission entries on all child objects with entries shown here that apply to child objects
    13. Press F5 to update Registry Editor. In the details pane, you can now see and edit the malware DLL that loads as "ServiceDll" To do this, follow these steps:
    1. Double-click the ServiceDll entry.
    2. Note the path of the referenced DLL. You will need this information later in this procedure. For example, the path of the referenced DLL may resemble the following:

    %SystemRoot%\System32\emzlqqd.dll

    Rename the reference to resemble the following:

    %SystemRoot%\System32\emzlqqd.old

    3. Click OK.
    14. Remove the malware service entry from the Run subkey in the registry.
    1. In Registry Editor, locate and then click the following registry subkeys:
    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
    2. In both subkeys, locate any entry that begins with "rundll32.exe" and also references the malware DLL that loads as "ServiceDll" that you identified in step 13b. Delete the entry.
    3. Exit Registry Editor, and then restart the computer.
    15. Check for Autorun.inf files on any drives on the system. Use Notepad to open each file, and then verify that is a valid Autorun.inf file. The following is an example of a typical valid Autorun.inf file.

    [autorun]

    shellexecute=Servers\splash.hta *DVD*

    icon=Servers\autorun.ico

    A valid Autorun.inf is typically 1 to 2 kilobytes (KB).
    16. Delete any Autorun.inf files that do not seem to be valid.
    17. Restart the computer.
    18. Make hidden files visible. To do this, type the following command at a command prompt:
    reg.exe add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL /v CheckedValue /t REG_DWORD /d 0x1 /f
    19. Set Show hidden files and folders so you can see the file. To do this, follow these steps:
    1. In step 13b, you noted the path of the referenced DLL file for the malware. For example, you noted a path that resembles the following:
    %systemroot%\System32\emzlqqd.dll
    In Windows Explorer, open the %systemroot%\System32 directory, or the directory that contains the malware.
    2. Click Tools, and then click Folder Options.
    3. Click the View tab.
    4. Select the Show hidden files and folders check box.
    5. Click OK.
    20. Select the DLL file.
    21. Edit the permissions on the file to add Full Control for Everyone. To do this, follow these steps:
    1. Right-click the DLL file, and then click Properties.
    2. Click the Security tab.
    3. Click Everyone, and then click to select the Full Control check box in the Allow column.
    4. Click OK.
    22. Delete the referenced DLL file for the malware. For example, delete the %systemroot%\System32\emzlqqd.dll file.
    23. Enable the BITS, Automatic Updates, Error Reporting, and Windows Defender services by using the Services Microsoft Management Console (MMC).
    24. Turn off Autorun to help reduce the effect of any reinfection. To do this, follow these steps:
    1. Depending on your system, install one of the following updates:
    * If you are running Windows 2000, Windows XP, or Windows Server 2003, install update 967715. For more information, click the following article number to view the article in the Microsoft Knowledge Base:
    967715 (http://support.microsoft.com/kb/967715/ ) How to correct "disable Autorun registry key" enforcement in Windows
    * If you are running Windows Vista or Windows Server 2008, install security update 950582. For more information, click the following article number to view the article in the Microsoft Knowledge Base:
    950582 (http://support.microsoft.com/kb/950582/ ) MS08-038: Vulnerability in Windows Explorer could allow remote code execution
    Note Update 953252 and security update 950582 are not related to this malware issue. These updates must be installed to enable the registry function in step 24b.
    2. Type the following command at a command prompt:
    reg.exe add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoDriveTypeAutoRun /t REG_DWORD /d 0xff /f
    25. If the system is running Windows Defender, re-enable the Windows Defender autostart location. To do this, type the following command at the command prompt:
    reg.exe add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Defender" /t REG_EXPAND_SZ /d "%ProgramFiles%\Windows Defender\MSASCui.exe –hide" /f
    26. For Windows Vista and later operating systems, the malware changes the global setting for TCP Receive Window Auto-tuning to disabled. To change this setting back, type the following command at a command prompt:
    netsh interface tcp set global autotuning=normal

    If, after you complete this procedure, the computer seems to be reinfected, either of the following conditions may be true:

    * One of the autostart locations was not removed. For example, either the AT job was not removed, or an Autorun.inf file was not removed.
    * The security update for MS08-067 was installed incorrectly

    This malware may change other settings that are not addressed in this Knowledge Base article. Please visit the following Microsoft Malware Protection Center Web page for the latest details about Win32/Conficker.b:
    http://www.microsoft.com/security/portal/Entry.aspx?Name=Win32/Conficker (http://www.microsoft.com/security/portal/Entry.aspx?Name=Win32/Conficker)
    Back to the top
    Verify that the system is clean
    Verify that the following services are started:

    * Automatic Updates (wuauserv)
    * Background Intelligent Transfer Service (BITS)
    * Windows Defender (windefend) (if applicable)
    * Windows Error Reporting Service

    To do this, type the following commands at the command prompt. Press ENTER after each command:

    Sc.exe query wuauserv
    Sc.exe query bits
    Sc.exe query windefend
    Sc.exe query ersvc

    After each command runs, you will receive a message that resembles the following:
    SERVICE_NAME: wuauserv
    TYPE : 20 WIN32_SHARE_PROCESS
    STATE : 4 RUNNING
    (STOPPABLE,NOT_PAUSABLE,ACCEPTS_SHUTDOWN)
    WIN32_EXIT_CODE : 0 (0x0)
    SERVICE_EXIT_CODE : 0 (0x0)
    CHECKPOINT : 0x0
    WAIT_HINT : 0x0
    In this example, "STATE : 4 RUNNING" indicates that the service is running.

    To verify the status of the SvcHost registry subkey, follow these steps:

    1. In Registry Editor, locate and then click the following registry subkey:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost
    2. In the details pane, double-click netsvcs, and then review the service names that are listed. Scroll down to the bottom of the list. If the computer is reinfected with Conficker.b, a random service name will be listed. For example, in this procedure, the name of the malware service is "gzqmiijz".

    If these steps do not resolve the issue, contact your antivirus software vendor. For more information about this issue, click the following article number to view the article in the Microsoft Knowledge Base:
    49500 (http://support.microsoft.com/kb/49500/ ) List of antivirus software vendors
    If you do not have an antivirus software vendor, or your antivirus software vendor cannot help, contact Microsoft Consumer Support Services for more help.
    Back to the top
    After the environment is fully cleaned
    After the environment is fully cleaned, do the following:

    * Re-enable the Server service.
    * Restore the default permissions on the SVCHOST registry key.
    * Update the computer by installing any missing security updates. To do this, use Windows Update, Microsoft Windows Server Update Services (WSUS) server, Systems Management Server (SMS), System Center Configuration Manager (SCCM), or your third-party update management product. If you use SMS or SCCM, you must first re-enable the Server service. Otherwise, SMS or SCCM may be unable to update the system.

    Back to the top
    APPLIES TO

    * Windows Server 2008 Datacenter without Hyper-V
    * Windows Server 2008 Enterprise without Hyper-V
    * Windows Server 2008 for Itanium-Based Systems
    * Windows Server 2008 Standard without Hyper-V
    * Windows Server 2008 Datacenter
    * Windows Server 2008 Enterprise
    * Windows Server 2008 Standard
    * Windows Web Server 2008
    * Windows Vista Service Pack 1, when used with:
    o Windows Vista Business
    o Windows Vista Enterprise
    o Windows Vista Home Basic
    o Windows Vista Home Premium
    o Windows Vista Starter
    o Windows Vista Ultimate
    o Windows Vista Enterprise 64-bit Edition
    o Windows Vista Home Basic 64-bit Edition
    o Windows Vista Home Premium 64-bit Edition
    o Windows Vista Ultimate 64-bit Edition
    o Windows Vista Business 64-bit Edition
    * Microsoft Windows Server 2003 Service Pack 1, when used with:
    o Microsoft Windows Server 2003, Standard Edition (32-bit x86)
    o Microsoft Windows Server 2003, Enterprise Edition (32-bit x86)
    o Microsoft Windows Server 2003, Datacenter Edition (32-bit x86)
    o Microsoft Windows Server 2003, Web Edition
    o Microsoft Windows Server 2003, Datacenter Edition for Itanium-Based Systems
    o Microsoft Windows Server 2003, Enterprise Edition for Itanium-based Systems
    * Microsoft Windows Server 2003, Datacenter x64 Edition
    * Microsoft Windows Server 2003, Enterprise x64 Edition
    * Microsoft Windows Server 2003, Standard x64 Edition
    * Microsoft Windows XP Professional x64 Edition
    * Microsoft Windows Server 2003 Service Pack 2, when used with:
    o Microsoft Windows Server 2003, Standard Edition (32-bit x86)
    o Microsoft Windows Server 2003, Enterprise Edition (32-bit x86)
    o Microsoft Windows Server 2003, Datacenter Edition (32-bit x86)
    o Microsoft Windows Server 2003, Web Edition
    o Microsoft Windows Server 2003, Datacenter x64 Edition
    o Microsoft Windows Server 2003, Enterprise x64 Edition
    o Microsoft Windows Server 2003, Standard x64 Edition
    o Microsoft Windows XP Professional x64 Edition
    o Microsoft Windows Server 2003, Datacenter Edition for Itanium-Based Systems
    o Microsoft Windows Server 2003, Enterprise Edition for Itanium-based Systems
    * Microsoft Windows XP Service Pack 2, when used with:
    o Microsoft Windows XP Home Edition
    o Microsoft Windows XP Professional
    * Microsoft Windows XP Service Pack 3, when used with:
    o Microsoft Windows XP Home Edition
    o Microsoft Windows XP Professional
    * Microsoft Windows 2000 Service Pack 4, when used with:
    o Microsoft Windows 2000 Advanced Server
    o Microsoft Windows 2000 Datacenter Server
    o Microsoft Windows 2000 Professional Edition
    o Microsoft Windows 2000 Server

    Source:http://microsoft.com




    Monday, March 30, 2009

    An issue about Chip Tsao "the war at home"

    Last Night as I watch the news on Tv, it was about a writer that is discriminating the lives of a Filipino.... his name is Chip Tsao, He is a book author, broadcast journalist, columnist and former BBC reporter and reputedly famous for his “wry sense of humor and sarcasm.” His writings have been the subject of controversy before — see this and this. he also wrote about to the Philipine Policy about the Spratly Island..Before making any reactions,You can critisize Chip Tsao and disagree about his articles or writings but calling him names and hurling personal insults at him reflect badly on Filipinos, not on him. I have a picture attached about his article.





    Sunday, March 29, 2009

    Ten Common Affiliate Marketing Mistakes

    This article will investigate some of the majority often mistakes affiliates make. This is a Giant problem that many newbies make, and I hope that by caring these to your attention that you start seeing some positive results speedily. Since I was collecting his list of inaccuracies.
    -NOT Offering Yourself to One Before Beginning Another
    In affiliate marketing you can repeatedly be drawn in by the ability of operating as an affiliate for a couple of different sites while making money from each one of them. This is a troublesome thing for anyone to do prosperously when they are first starting. Not just is it difficult to study the fundamentals of Affiliate Marketing, but you also require to have time to cultivate your business. Therefore, if you don't dedicate yourself to one schedule before starting another, you will not be able to fully skill the potential that Affilite Marketing can offer you.

    -NOT Focusing on the Pre-Sell
    Affiliates that attempt to trade the product to the consumer and analyse all the product's positive and negative qualities does not truly deduce the notion of an affiliate marketer. When you use your time trying to characterize every latest detail of the product or responding to all the inquiries of the client, then you are wasting your time, your job is to pre-sell the client. You should not be present obscure information that is difficult to understand to the customer, your job is simply to get the client attentive in the product. Your customer will have all the details of the product protected so it is not you job to repeat those details. Preferably concentrate on pre-selling the product to your clients.Making them want to purchase site they are ready to continue.
    -NOT Using the Product
    How many times have you spoke to a salesperson and asked questions about a product and felt like they sincerely had no concept what they were speaking about? When you are buying something from salesperson you have more trust in the person if they have tried the product or are at present using the product.
    -NOT Comprehension Pay Per Click
    Knowledge the advertising model as PPC is fundamental to becoming a successful marketer online. Trough pay per click, advertisers use search engines and other web pages to place their ads. However, the advertiser only pays off when a customer actually finds their ad persuasive and clicks on the ad to visit the advertiser's web page.
    -NOT Having Clutter-Free Web Pages
    Fill one site with a multiplicity of affiliate product ads may look like a great method to save money. However, it could truthfully cost you thousands of dollars in sales. Possible customers automatically get went off when they view a web page cluttered full of various sales products. It is too difficult to understand for them, and they move on to another website justly quickly. If you are working through more than one affiliate program it is important to assign one page at least to your program. Better would be to dedicate a domain name and site to each affiliate program.
    -NOT Writing Your Own Copy
    Most programs offer pre-made web pages or email ads that you can simply copy and paste to make your own promotional campaign. These ready to post web pages will be of little help to you when you are trying to get your website seen and clicked on, or your emails opened by potential customers. Preferably, you should take the time to write your own copy.
    -NOT Selecting the Right Products for You
    Every affiliate product may not be correct for you. Even if it is nice to find the highest paying program or the program that gives a product you have used for years. Those things may not actually make the program right for you. When preferring your product you should keep three things in memory: Time, Payout and Usability.
    -NOT Catching Incoming Email Addresses
    Don't loss the opportunity to get your clients email addresses. These will be useful to you in the perspective since you start working with another affiliate product. By collection their email addresses up front, you set it up so you continually will be adding to your own selling list, which will help you in all your marketing efforts in the future.
    -NOT Believing in Yourself!
    If you don't imagine you are going to be successful as an affiliate marketer, then you probably will not be. It is normal to sense a bit of apprehension, but is principal that you believe in yourself and your ability to make a success at this business.
    -NOT Perfoming Yourself to Your Affiliate Marketing Program
    At one time you have possessed the time to research the various affiliate programs, and you have to establish the ones that are right for you, make sure and give time to work. The majority programs will not make you an instant millionaire. They need time to build up a customer base. Be patient and be obligated to growing your affiliate program.




    See What Search Engines See

    If you want to know about what see searh engines and to check your or another sites page rank you just have to install free Toolbarbrowser from Trellian Private Ltd.. The FREE ToolbarBrowser is a complete Toolbar Authoring and Management tool. You can use it to manage dozens of toolbars in a simple tabbed control to save valuable browser space. At the same time covers all benefits of a search toolbar including: search, navigation, popup blocking and much more so you will never need another toolbar. Download the Free Toolbar Browser Now!

    Features and benefits include:
    Popup Blocking
    Auto Form Filler
    Highlight search text
    Zoom in and Zoom Out
    Search major search engines, including Google, Yahoo, MSN, Ask etc..
    Popularity Index (PI Rank), Google PR ™ and Alexa Rank ™
    Wayback Machine - See how a website looked in the past
    Clipboard Manager
    Tabbed control to save toolbar space
    Fully programmable with XML support
    RSS feeds
    Create your own toolbars
    Add Toolbars to your web site
    Standard IE buttons and links replacement to save browser space
    Available in Dutch, English, French, German, Polish and Swedish
    Search Bar- Meta search most major search engines
    Pay Per Click engine meta search toolbar
    Links toollbar replacement to save browser toolbar space
    Favorites toolbar for easy access to your favorite links
    Search Engine Optimitization toolbar loaded with SEO tools & features
    Lots of other handy free custom toolbars
    plus many more features...



    SEO Workers Analysis Tool Firefox

    SEO Workers Analysis Tool extension allows you to perform a basic SEO analysis of the page in your browser with a single click.

    Want to check if you web site is search engine friendly?

    If you use the browser Firefox , you are only two steps away! If you do not have Firefox yet, download it and change the way you use the Web!

    The results from the SEO Workers Analysis Tool are structured into the following useful groups:

    * General status;

    * Meta tags listing;

    * Meta tags analysis;

    * The page displayed within search engine results;

    * Keywords found in the anchor tags;

    * Keywords found in the image "alt" attribute text;

    * Keywords found on the page;

    * URLs found in the page;

    • Headers returned from the server.

    Download now

    Instal now from here

    After install go to Tools and use it.
    Enjoy!



    Friday, March 27, 2009

    Getting Started With Adsense

    A very important element in the rapid adoption of AdSense is that it has been very easy for publishers to get the ads on their site as quickly as possible.

    Integrating AdSense in your website takes only a few minutes, and you can be on your way with one or more nicely integrated AdSense ads.

    The first thing you need to do is navigate to http://www.google.com/adsense and either apply or log in with your existing account and password. What follows is a page presenting the Google AdSense Terms and Conditions which you must agree to in order to proceed.

    You are presented with a report page which you can use to get a detailed status on how your AdSense advertising is doing. This allows you to improve your site's contents and layout to maximize your AdSense earnings.

    On the top of your page you also have link to the setup section where you can generate the code that will need to be pasted on your website in order to have AdSense banners on your page.
    You can use AdSense for text (the said ads), using a search box or with referrals. Your choice among these options depends on how users will navigate your site.

    Finally, there is a "My Account" tab which allows you to set up details concerning your account, payment and tax information.

    To add a text ad on your site, go back to the "AdSense Setup" tab and click the "AdSense for content" link. Make sure you have cookies enabled in your browser.

    You can make a choice between ad units and link units. The former contain text and or images concerning a certain site for each unit, most with a detailed description, the latter only contain links to certain types.

    Of course, it's a bit hard to know which type you should use so you should probably experiment with both for a while before you decide.

    You can also view an example of how the unit will look to the right of your page. However, you may only use three ad units and one link unit on any given page. This is believed to be a step which Google takes for quality control.

    The next step is to choose your add format and colors. You can basically select any color palette you choose with Google offering some of its own if you don't have the time or skill to create one. You can constantly view how the palette will look through the aid of an example. The one that works best in terms of appearance and revenues will vary with the look, feel and content of a website.

    However, your ad formats are limited to a choice of eleven formats. There's an "Ad Formats" link which takes you to a page that lets you see all even of these in action so you can decide best which one suits your site. Sometimes the most intrusive, doesn’t work best however again, this can vary from website to website.

    After you finish with customization, you can click "Continue" from the bottom of the page.
    You are now presented with a section entitled "AdSense for Content". You can click anywhere in the text and that shows the JavaScript required to get AdSense running. This will automatically select the text in the box.

    You can then copy it and paste it into your pages directly. If you use dynamic pages, you should paste this code within your template so as to ensure that it gets displayed on any page of your website. Some advertisers choose not to display Adsense on every page, and this is understandable. An example of this is a company that has adsense, may also have terms and condition which would inevitably provide legal resources which would probably be deemed inappropriate.

    What is then left for you to do is get content on your page (provided you didn't have any already). Google AdSense crawlers will soon visit your site, making sure that the ads displayed are relevant to your site's content.

    And you're all done. For a simple page this should indeed be a matter of a few minutes, which is precisely what makes AdSense the choice for so many. Although it is quick, its mass appeal also makes it the best. Through being the most popular, advertisers and publishers alike see Adsense and Adwords as their natural first choice.




    10 Money Making Tips - Everything You Needed to Know to Make Money in Todays Market

    1. Maintain a good credit score! It will save you thousands of dollars in the short and long term when you need to borrow money to buy a car or a home. Creditors will give you an interest rate and the loan amount based on your income and credit score.

    2. Large sums of money should NEVER be left in a checking account or even a low-interest bank savings account. Rather, put the money into a high interest savings account (like an ING savings), money market fund, or other forms of short term high interest investments with a fixed return.

    3. If you have an employer matching 401K plan, maximize your contributions, so that you double your money!

    4. Set aside 10% of your paycheck towards some form of long term savings account, like a money market account, mutual fund, retirement plan, or 401K. As you pay amount increases, your contribution will also increase automatically. 10% will also ensure that you stay ahead of inflation.

    5. One of the best investments you can make is to first pay off all your high credit card debts. Credit cards typically carry a high interest rate and by paying off these debts, you get one of the best returns available which also is tax-free.

    6. If you are losing sleep over an investment, whether its a stock, mutual fund, or retirement plan, its not worth it! Your lack of sleep is probably a good indication that it may be too risky, too good to be true, or just not the right invesment for you.

    7. If an investment is projecting returns that are just too good to be true, they probably are. Unless you are intimately involved in the investment or are an insider, an investment that sounds too good to be true is probably too ambitious, too risky or just a scam.

    8. Before you invest in something, always do your own research. Consulting with others and getting a second opinion is good, but you need to investigate for yourself. The internet is typically the best source for lots of information but make sure you read enough or get relevant data.

    9. Always negotiate for commissions or fees paid for financial or real estate advice. Don’t be misled by standard commissions and “non-negotiable fees”. It is your money and the experts work for you.

    10. Can’t get out of debt? If you are having problems meeting your debt payments each month and feel like you are digging a deeper hole, go talk to your creditors and banks to find a solution to get out of the mess. Beware of debt consolidators as they could charge higher interests in the long term and get you even deeper into debt.



    10 Things to Look For in an Affiliate Management System

    There are many different affiliate management systems available. You have to select the best one so that you can get good profit and your affiliates are also happy. This article explains 10 most important things that should be present in a great affiliate management system, so you would be able to run your affiliate marketing business easily:

    1) Complete control over recruitment of Affiliates:

    This is the basic requirement of any affiliate management system because if you don't have control over the number of affiliates joining and promoting your affiliate program you might be soon end up in loss or some spammers or your competitor may try to break down your affiliate system and create loss in your business. So, wisely choose the affiliate management system which provides complete control over the affiliates so you would be able to contact them, offer them help, request information and keep in-touch.

    2) Offer multiple payment options for your customers and affiliates:

    Your affiliates are distributed geographically all over the world. In one region particular payment option will be available and the same will not be available in some other region. PayPal is a good option because they are almost present in all countries but you can't withdraw the money in some countries like Egypt where you can use MoneyBookers to withdraw the money. So, your affiliate management system should enable your affiliates to receive the payment via lot of payment processors else they will not work for you. Offer as much affiliate payment options as possible and then you will have no problem getting your product promoted!

    3) Affiliate visitor and sales tracking is a must - track as much details as possible:

    The affiliate management system should be able to provide you the ratio between the number of visitors and the sales made by them. This can help you to find out your best affiliate and reward your best affiliate every month it will create a healthy competition among your affiliates and you will enjoy the benefits of it. You must be able to track all details of your affiliates activities: views and visitors that your affiliates bring, the number of sales, conversion rates of your promotional partners, refund rates. Some systems even allow you to track the websites referring sales to your website and even keywords used on search engines to find and buy your products.

    4) Affiliate reward system based on their performance:

    The affiliate management system should not give the same amount of commission to all your affiliates i.e., it should provide more commission to those who bring quality traffic and make good sales and should give somewhat less commission to poor performers. So, that your good affiliates will try to work even harder to get more commission per sale. Make sure to select the system that allows you to set custom affiliate commission percentages for each certain affiliate. Then you will be able to reward your best performing ones!

    5) Ban the affiliates if they use illegal methods - Affiliate BAN mechanism :

    Some of your affiliates may bring traffic to your site by spamming or by redirecting their browser in malicious manner and some may buy your product if they like it but more than 95% visitors will consider your site to be malicious site and trying to spam them. So, it will bring bad reputation to your business hence, your affiliate management system should identify these affiliates and ban them. Your affiliate management system should allow you to identify these scammers - by allowing you to track number of visitors, websites used by affiliate to refer visitors - and then ban if you feel that certain affiliate hurts your reputation.

    6) Be in contact with your affiliates - always stay in touch with them:

    Money is the main factor for which your affiliates are working for you, but it isn't the only factor which helps you to retain your affiliates. More or less all the affiliate programs offered by different product sellers are almost the same, so you can have an advantage if you do something different than what others do, you can do this by being in contact with your affiliates try to understand their problem and help them whenever they need your support and get their suggestions to improve your product. Always help your affiliates by contacting them personally, asking if they need some help. This way they will reward you with a lot of sales!

    7) Keep track the refund rates of each certain affiliate:

    When your customer is not happy with your product they request you to refund the money and you have to do this to maintain good reputation. There are basically two reasons for which your customers will ask you to refund: first is when the product is not really worth the other reason is they might be given some wrong information about the product by your affiliates and when they didn't find that feature in your product they will request you to refund. So, your system should be able to track down those affiliates and ban them if they bring too many sales that ends up as a refund request - in order to protect your product and online reputation.

    8) Track all websites that bring you visitors and sales via affiliate links:

    Tracing down the source from where visitors arrive. Your affiliate management system should be able to trace out from where your customers are coming from i.e., the source which directs them to find the sales page and buy your product. After pinpointing it you have to focus advertising there to boost your sales. Such tracking capabilities allow you to identify the most profitable 'traffic sources' and concentrate on them (if it's an affiliate - offer additional help, etc.). This way you can easily make your profits soar!

    9) Flexible affiliate training capabilities:

    You should provide training to your affiliates about your product so that they can understand what they are selling, its advantages and disadvantages. This will help them greatly to convince their visitors to make them buy your product. Provide all possible promotional materials - banners, pre-written articles, e-mail letters and other content for your affiliates. Your affiliate management system should allow you to place and manage all promotional tools and thus enable your affiliates to access them easily whenever they need to.

    10) Track all keywords that bring you visitors and sales and manage affiliates effectively:

    Your affiliate management system should be able to find out the keywords used by the visitors to find your product on search engines like Google, yahoo or other search engines. This report can be used to stress these words more in other search engines by using the Meta tags and using ad services of Google, yahoo or other ad service providers. You should be able to track all keywords that people use to find your product via pay per click campaigns such as Google Adwords or Y! Search marketing or regular search engines. Once you find keywords that bring sales, you can easily concentrate on them, bid higher to get even more traffic and sales!

    If your affiliate management system has these 10 things then you can be assured that you will make good profit, but always try to improve your system according to the latest technology so that you are always ahead of your competitors. We would recommend you to join Click2Sell.EU (http://www.click2sell.eu) affiliate management system. It allows you to sell your products online, run your affiliate marketing business and manage all your affiliates easily with a help of great statistical and analytics features. Choose a good affiliate manage system that will enable you succeed online!




    Monezine - Best Money Making Blogger adsense Theme






    Demo | Download


    "Revolution Church Template" for Blogger






    DEMO | DOWNLOAD

    Features of this Template:
    1. This Template is 3 column fixed with Sidebars at right.
    2. This Template is optimized for advertising.It has got more than 4 perfect areas for advertising.
    3. It has got inbuilt site-search Engine.
    4. This Template has got date widget at Top left that shows the current date.
    5. This Template has got two CSS Menus.
    6. This Template is a magazine style template and has got the professional look.



    Charcoal Blogger Template - 3 Columns









    Stone Way [Doxs]






    Design by: Doxs
    View: Demo
    Download: Direct
    Download: 4shared



    Fascinated [Doxs]






    Design by: Doxs
    View: Demo
    Download: Direct
    Download: 4shared




    Complex World [Doxs]





    Design by: Doxs
    View: Demo
    Download: Direct
    Download: 4shared



    Bubbles [Doxs]





    Design by: Doxs
    View: Demo
    Download: Direct
    Download: 4shared



    Inside The Factory [Doxs]





    Design by: Doxs
    View: Demo
    Download: Direct
    Download: 4shared



    Thursday, March 26, 2009

    How to change the Settings on your blog?

    1. Login to blogger.com with your ID.


    2. If your blog more than 1, click at the blog title want to setting.


    3. Click Setting and then click Basic. Several form that must in the contents to the menu basic:





    * Title : Content with your blog title. Example : Blog Tutorial.


    * Description : Content with your description blog. Example : All about blogging can find here.


    * Add your blog to our listing : chose Yes, so that every time posting always entered the Blogger.com list.


    * Show Quick Editing on your blog : Chose Yes.


    * Show Email post link : It is best to chose Yes, but if you chose No also it's allright.


    * Show compose Mode for all your blog : Chose Yes.


    * Show transliteration button for your post : chose Yes if the you wanted to be button to change normally alphabet to hindi (India) alphabet, Chose No if being the reverse.


    * Click Save Settings.


    * Finish.



    # Click Publishing to arrange the publishing menu.


    * Blog’Spot Address : Content with your blog address. Example : kolom-tutorial.


    * Send Pings : Chose Yes.


    * Click Save Settings.


    * Finish.



    # Click Formatting to arrange the formatting menu.


    * Show : Chose the number of post want you to display in your blog. Example : Show : 6 post, it's means your posting will display in your page Totally six posting. Chose Post (don't days) at pulldown menu


    * Date header Format : Chose the style of date/month what you wanted, this date/month will display above your post.


    * Archive Index Date Format : Chose the style for your archive


    * Timestamp Format : Chose the style of the time, what you wanted.


    * Time Zone : Chose the matching zone with your place. Example for WIB : [UTC+7.00] jakarta.


    * Language : Chose language what you wanted.


    * Convert line break : Chose Yes, but if you chose No it's allright.


    * Show Link Field : Chose No, but if you chose Yes it's allright.


    * Enable Float aligment : Chose Yes, but if you chose No it's allright.


    * Click Save Settings.

    * Finish.



    # Click Comment to arrange the Comment menu.


    * Comments : Chose Show.


    * Who Comment? Chose Anyone. It's means anyone can comment to your post.


    * Comments Default for Post : Chose New post Have Comments


    * Back links : Chose Show. It's means you will know if another people has linked to your post.


    * Backlinks default for Posts : Chose New post have Backlinks.


    * Show comments in a popup window? : Chose Yes. It's means when the people click Comment link your blog not lost.


    * Show word verification for comments? : It's better to chose Yes


    * Enable comment moderation? : Chose No, but if you wanted chose Yes it's allright.


    * Show profile images on comments? : Chose Yes. It's means the photo of commentator of blogger member can display.


    * Comment Notification Address : Content with your email address.


    * Click SAVE SETTINGS.


    * Finish.



    # Click ARCHIVING to arrange the archiving menu.


    * Archive Frequency : Chose monthly.


    * enable Post Pages? : Chose Yes.


    * Click SAVE SETTINGS.


    * Finish.



    # Click Site Feed.


    * Publish Site Feed : Chose Yes.


    * Descriptions : Chose Full


    * Article Footer : If you have advertising code like Google Adsense, you can insert the code here.


    * Click SAVE SETTINGS.


    * Finish.





    How To Make a Blog at Blogspot

    Maybe, there're some of you who still don't understand about blog, and still wondering about blog. I’ll try to review a little about blog.
    . Blog, What it is?


    Blog (abbreviation from Web log) is sites which more dominant in private characteristic. This means, most of the content will be affected (realize or not) by the characteristic of the Blogger (Blog user) himself.

    Blog was made by the designers of the blog provider in order to work automatically and easily
    to be operated on, so for we that still was confused with the programming language to make one website still not the problem.If you could have made an email account in the internet, then in made blog then I was convinced you could.


    2. How to make a blog?



    As if when we start to make an ordinary e-mail, we’ll need an account first, to make a blog. Because of that reason, feel please to register yourself in free blog provider. We can find a lot of free blog provider in internet, and some blog provider which really famous nowadays, are http://www.blogger.com/, http://www.wordpress.com/ or http://www.blogsome.com.

    In this chance, I’m going to review about make a blog in http://www.blogger.com/ Click the picture below to register.

    After we arrive in Blogger.com, you will see picture like shown above. Now, follow my instruction.


    1. Click an arrow sign, inscribed with “CREATE YOUR BLOG NOW”
    2. Complete the ‘e-mail address’ form, with your own e-mail address (of course with the valid one).
    3. Rewrite your e-mail address in form ‘retype e-mail address’
    4. Type the password as you wanted to. Type it in form, ‘enter a password’
    5. Retype your password in form ‘type password again’
    6. Type the password as you wanted to. Type it in form, ‘enter a password’
    7. Retype your password in form ‘type password again’
    8. Type the word which has shown, in form ‘word verification’. Click the white little square beside the sentence, ‘I accept the Terms of Service’.
    9. Click an arrow sign inscribed with “CONTINUE”
    10. Write the title of your blog that you desire (you can change it later) in form ‘Blog Title’
    11. Type the name of your site in form ‘Blog Address (URL)’ .
    12. Type verification word which shown in form ‘word verification’. After that, click an arrow image inscribed with word, ‘CONTINUE’.
    13. Choose one template that you wanted to (You can change it later, if you want), then click again an arrow sign inscribed with word ‘CONTINUE’.
    14. Wait a moment. After you meet a sentence ‘Your blog has been created’. Click an arrow sign (again) which inscribed with “BEGIN POSTING’. Feel please to fill up your blog with everything you want to. After you finish with your first posting, just click the sentence, ‘PUBLISH YOUR POSTING’, Please write What you want, if being finished then click of the publish button.
    15. It's Done.



    Recent Posts and Recent Comments at Sidebar

    Many from bloggers wish insatlling the widget of Recent post and Recent post at sidebar, and for this matter is several blogger creating recent post and recent comment widget by javascript, However i think that is not good for your blog SEO (Search Engine Optimization). Besides not good to SEO, installation javascript risk to slow down your blog loading, so that matter it's can make your visitor don't feel balmy.
    To install recent post and recent comments, be in fact you can use your blog feed address. this is the address of Recent Post :

    http://YourBlogName.blogspot.com/feeds/posts/default

    And this is the address of Recent Comments :

    http://YourBlogName.blogspot.com/feeds/comments/default


    YourBlogName must be alter with your blog name. For example :

    this is my Recent Post address :

    http://noob.niteshkothari.com/feeds/posts/default

    And this is my Recent Comments address :

    http://noob.niteshkothari.com/feeds/comments/default


    Still compused to install this feed adress to your blog. Please follow the steps :

    1. Login to blogger with your ID

    2. After entering the dasboard page , click Layout.

    3. Click at Page Element tab.

    4. Click at Add a Page element.

    5. After emerging pop up window , click add to blog button for the things Feed

    6. After that, Insert your fedd URL (URL feed post for Recent posts or URL feed comment for recent comments).

    7. Click Continue button.

    8. Then alter the title with Recent Post for recent post widget or Recent Comments for recent comments widget.

    9. Click SAVE CHANGES button.

    10. Move that element where you want, and then click SAVE button.

    11. Finish. Please see the result.






    Add Google Talk to Blogger

    I'm sure you are surely knew what is the Google Talk, with google talk you can send instant messages, make voice calls, leave voicemail messages, transfer files and etc, however of course must with other google user. Do you know, now you can add google talk to your blog? not yet known its way? please follow the steps following :





    1. Login to blogger with your ID.

    2. After entering the dasboard page , click Layout.

    3. Click at Page Element tab.

    4.Click at Add a Page element.

    5.After emerging pop up window , click add to blog button for the things HTML/JavaScript. See the picture following :


    javascript


    6.Copy and paste the code below into available column :


    <iframe width="234" frameborder="0" src="http://talkgadget.google.com/talkgadget/client?fid=gtalk0&relay=http%3A%2F%2Fwww.google.com%2Fig%2Fifpc_relay" height="350">
    </iframe><p style="margin:-8px 0"><br /><center>
    <a style="text-decoration:none;font-size:70%;" href="http://noob.niteshkothari.com">Add to your blog</a></center></p>


    7. Click Save Changes

    8. Finish. Please see the result.


    Now you have a Google Talk at your blog.








    How To make the menu drop down?

    Do you ever seen the menu such as menu below? please click at the menu to see the effect of this menu :


    The name of this menu is drop down menu.

    To make the dropdown menu, you only make the code be like this :



    <form><select name="menu" onchange="window.open(this.options[this.selectedIndex].value,'_blank')"size=1 name=menu><option value=0 selected> Your text title here! </option>

    <option value=" your address link here "> the text here will be display </option> </select></form>


    For example, the code such as the following :

    <form><select onchange="window.open(this.options[this.selectedIndex].value,'_blank')" size="1" name="menu"><option>- Blog FOr Noob - </option><!-- change the links with your own --><option value="http://niteshkothari.com">Start to blogging</option> <option value="http://niteshkothari.com">Blog setting</option> <option value="http://niteshkothari.com">Backup template</option> <option value="http://niteshkothari.com">backup widget</option> </select></form>


    This is the result :


    You can make the drop down menu more than one, just make the code more than one, so very simple.


    Now, how to add this code to your blog. This is the step :

    1. Login to blogger with your ID

    2. After entering the dasboard page , click Layout.

    3. Click at Page Element tab.

    4. Click at Add a Page element.

    5. After emerging pop up window , Click add to blog button for the things HTML/JavaScript.

    6.Copy and paste the code below into available column :

    <form><select onchange="window.open(this.options[this.selectedIndex].value,'_blank')" size="1" name="menu"><option>- Blog FOr Noob - </option><!-- change the links with your own --><option value="http://niteshkothari.com">Start to blogging</option> <option value="http://niteshkothari.com">Blog setting</option> <option value="http://niteshkothari.com">Backup template</option> <option value="http://niteshkothari.com">backup widget</option> </select></form>


    7. Click Save

    8. Finish. Please see the result.


    Now you have a dropdown menu at your blog.




    Followers