How The Company Can Help You Best Computer Repair

Now is an indispensable gadget that is used in everyday life. Most times when a computer crash, you need to have it repaired as soon as possible so they do not experience job loss. Find a better business computer repair at this time is difficult.

The computer has become a very necessary gadget, which is used in everyday life. Most of the time when a computer crashes, it must be replaced as soon as possible so as not to see any loss of jobs. To find the best computer repair company becomes difficult.

When you need to call a computer repair in Los Angeles, you must be sure that they are reliable and can help you get the problem resolved as quickly as possible. There are two options for you at this time. Or you can go directly to your home to lead his team or simply make a call and a repair shop offering computer services to your doorstep. There are few things more than you need to consider when faced with the best computer repair company.

First, if you are calling from a home service, you must ensure that the company is called is trusted and recommended for home delivery. Since we can not allow anyone to enter your home or office, sometimes it's risky to choose a repair company cheap and unknown. Secondly, you should get quotes and compare several companies before choosing the best. You must then ensure that the quality of service you get is worth the money spent.

There are several varieties of services you can find when you find a real computer repair Los Angeles. Whether you want up-grading your PC, or if you want to create a home network, you can find services that are reliable and honest. Most computer repair companies in Los Angeles offers comprehensive services in its own right that you are looking for. Not only repair (like malware, spyware, viruses), but data backup, PC maintenance and other IT-related services performed by the best repair company.

Getting the best possible service computer repair in Los Angeles, you can save time and money, and do not have to worry about any loss of productivity, which may be experienced differently. Solving computer problems, errors, system errors or other issues which are now called on. You can call and get an immediate high-quality services as soon as possible. Not only will it help you get a high quality service, but you get the most convenient service that you deserve to get.

Helpful Hints For The Prevention And Removal Of Malware

I bought a new computer for home or office? Then you must take care of it. But what protects you from viruses and malware?

Malware are small programs designed to steal confidential information from other computers. These programs can also destroy important files when they are present in the user's computer. Therefore, it is very important to get rid of them. Then read this write more about the different ways to remove malware from your computer. For virus troubleshooting, you can also get help from a company computer repair online.

Usually, people install antivirus software on their computer to protect against viruses and spyware. Many people often use trial versions of antivirus software to save their computers against malware attacks yet. But the features of this software remains active for 30-60 days. After he returned to the reduced functionality mode, leaving your computer vulnerable to viruses, malware and spyware is still there to cause potential damage your valuable files and data.

Users often complain that, although the use of such a trial version of antivirus software installed on your computer, malware and viruses to infect your system. This is due to the fact that these programs are hidden inside the computer and have a slightly different virus, which make a common anti-virus software will detect them. Sometimes, running a thorough scan of an effective anti-virus software can detect and remove these malware.

Original purchase the full version antivirus solutions. This software is equipped with state-of malware detection and removal. Just install and leave the rest in that. Automatically detects the malware as soon as active on your system and delete or quarantine, preventing their spread within your system more.

However, it is often considered that even genuine anti-virus solutions are unable to avoid potentially dangerous malware from a PC. Despite the repeated detection and suppression, maintain these malware from entering your system via the Internet, USB keys, CDs, etc.

In such cases, the use of online tools to remove malware. Various sites let you use their tools to detect malicious software online for free. These sites are powerful tools that scan your computer online and detects malware if found inside your computer or not. If malware is found, you can then use their anti-malware tools to clean your PC. Well yes, if you choose to use their tools to remove malware, you must pay a small fee for this service.

You can also buy software malware removal and install on your PC in addition to installing antivirus software. Remove malicious applications generally take up less space in your PC, not your computer slower. Regularly scan your PC with it to ensure an experience free of malicious software on your computer.

To prevent malware from entering your PC through Internet, using the latest versions of web browsers. Today, all the latest Internet browsers such as Mozilla Firefox, Google Chrome, Safari, Opera, etc come with malware detection technology. If a Web site reported a possible threat of malware, the browser notify you in advance before attempting to enter this site.

Panduan membuat Blog di Blogspot

1. Apa itu Blog ?

Blog merupakan sigkatan dari “Web log” adalah salah satu aplikasi web berupa tulisan-tulisan yang umum disebut sebagai posting pada halaman web. Tulisan-tulisan tersebut seringkali diurut dari yang terbaru dan diikuti oleh yang lama.
Awalnya, blog dibuat adalah sebagai catatan pribadi yang disimpan secara online, namun kini isi dari sebuah blog sangat bervariatif ada yang berisi tutorial ( contoh blog ini ), curhat, bisnis dan lain sebagainya. Secara umum, blog tidak ada bedanya dengan situs yang ada di internet.
Flatform blog atau seringkali disebut juga dengan mesin blog dibuat sedemikian rupa oleh para designer blog agar mudah untuk digunakan. Dulu, untuk membuat aplikasi web diperlukan pengetahuan tentang pemrograman HTML, PHP, CSS dan lain sebagainya, dengan blog semuanya menjadi mudah semudah menyebut angka 1 2 3.

2. Cara membuat blog di blogspot

Salah satu penyedia blog gratis yang cukup populer saat ini adalah  blogspot atau blogger, dimana ketika mendaptar adalah melalui situs blogger.com namun nama domain yang akan anda dapatkan adalah sub domain dari blogspot, contoh : contohsaja.blogspot.com
Kenapa harus membuat blog di blogger.com bukan pada situs penyedia blog lainnya? Sebenarnya tidak ada keharusan untuk membuat blog di blogger, namun ada banyak kelebihan yang dimiliki blogger di banding dengan penyedia blog lain. Beberapa contoh kelebihan blogspot di banding yang lain yaitu mudah dalam pengoperasian sehingga cocok untuk pemula, lebih leluasa dalam mengganti serta mengedit template sehingga tampilan blog anda akan lebih fresh karena hasil kreasi sendiri, custom domain atau anda dapat mengubah nama blog anda dengan nama domain sendiri misalkan contohsaja.blogspot.com di ubah menjadi contohsaja.com,sedangkan hosting tetap menggunakan blogspot dan masih tetap gratis.
Perlu ditekankan dari awal bahwa internet itu sifatnya sangat dinamis, sehingga mungkin saja dalam beberapa waktu kedepan panduan membuat blog di blogspot ini akan sedikit berbeda dengan apa yang anda lihat di blogger.com
Untuk mengurangi hal yang tidak perlu di tulis, berikut cara membuat blogger di blogger.com

Membuat Email

Salah satu syarat yang harus dipenuhi dalam membuat blog adalah anda memiliki alamat email yang masih aktif atau di gunakan. Jika anda belum mempunyai alamat email, silahkan daftar terlebih dahulu di gmail karena blogger adalah salah satu layanan dari Google maka ketika mendaftar ke blogger sebaiknya gunakan email gmail. Jika anda belum paham bagaimana cara membuat email, silahkan gunakan mesin pencari google untuk mencari panduannya.

Daftar Blog di blogger


  1. Silahkan kunjungi situs http://www.blogger.com
  2. Setelah halaman pendaftaran terbuka, alihkan perhatian ke sebelah kanan atas, ubah bahasa ke Indonesia agar lebih mudah difahami. Silahkan langsung login dengan menggunakan username serta password gmail anda ( akun email anda bisa untuk login ke blogger). login blogger
  3. Klik tombol bertuliskan CIPTAKAN BLOG ANDA. ciptakan blog anda
  4. Isilah nama judul blog serta alamat blog yang di inginkan. Ingat! dalam membuat alamat blog harus benar-benar serius karena itu permanen tidak dapat digantikan lagi (kecuali nanti ganti dengan custom domain). Jika alamat yang diinginkan ternyata tidak bisa digunakan, masukkan kembali alamat lain yang masih tersedia. Jika alamat blog yang diinginkan masih tersedia, silahkan klik anak panah bertuliskan LANJUTKAN. nama-blog
  5. Silahkan pilih template yang anda sukai ( template ini nanti bisa diubah lagi kapan saja anda mau), kemudian klik LANJUTKAN. pilih template di blogger
  6. Akan ada tulisan “Blog Anda Sudah Jadi!”. Silahkan lanjutkan dengan klik tombol MULAI BLOGGING. mulai blogging
  7. Setelah masuk post editor, silahkan isi apa saja ( disarankan untuk langsung mengisi posting, biasanya jika tidak langsung posting akan terjaring robot anti spam milik blogger, dan blog anda akan di lock). Contoh : hello world. Klik Tombol PRATINJAU untuk melihat tampilan yang nanti akan muncul di blog, klik tombol TERBITKAN ENTRI jika posting anda mau dipublikasikan ke publik. terbitkan entri
  8. Klik “Lihat Entri” untuk melihat blog anda. Berikut contoh tampilan blog yang tadi di buat. tampilan-blog
  9. Selesai.
Untuk tahap awal, blog anda sudah jadi dan bisa diakses dimana saja. Untuk pembahasan lebih dalam tentang bagaimana blogging dengan blogger, akan di bahas pada posting berikutnya.

sumber : http://kolom-tutorial.blogspot.com/2007/04/bikin-blog.html

Cara Install Windows XP dengan Flashdisk

Cara menginstall windows xp menggunakan media flasdisk untuk netbook.
usb Cara 
Install Windows XP dengan Flashdisk
Akhir-akhir ini banyak sekali orang memilih jenis Komputer Netbook untuk dipakai sehari-hari karena harganya yang murah dan juga bentuknya yang kecil praktis dibawa kemana-mana. kelemahannya Netbook ini tidak dilengkapi dengan Cd room tau pun DVD room sehingga ketika kita ingin menginstall ulang windows karena rusak akibat virus sangat sulit kecuali mempunyai CD/DVD room externall. Tapi hal ini bisa diatasi dengan adanya teknologi Flasdisk yang semakin hari semakin besar kapasitasnya sehingga kita bisa menggunakan media Flasdisk ini sebagai pengganti CD room . DVD room.
Teknik yang yang saya gunakan ini tidak hanya berguna untuk netbook saja tapi berguna untuk semua komputer yang tidak memiliki cdroom dan sudah support booting dengan Usb Flasdisk.
Alat-alat yang harus di persiapkan :

  1. Usb Flash disk apa aja ( Min 1GB lebih besar lebih bagus).
  2. komputer master , lengkap dengan cd-rom ( untuk membuat master flash disk )
  3. CD installer windows xp.
Software yang diperlukan :
  • USB_PREP8 dan PEtoUSB  ( Sudah saya gabungkan jadi satu)
  • Silakhan di download terlebih dahulu file nya
    winzip Cara Install Windows XP dengan Flashdisk download: USB_PREP8 dan PEtoUSB ()
    added: 12/07/2010
    clicks: 4867
    description: USB_PREP8 dan PEtoUSB
Setelah alat yang diperlukan siap dan software telah didownload langkah berikutnya adalah :
  1. Colokan USB flash disk ke komputer.
  2. Masukan Cd Installer Windows Xp ke dalam CD room.
  3. Extrak file yang sudah di download ke Drive C:/flasdisk
  4. Selanjutnya masuk ke folder C:\flasdisk tadi yang sudah dibuat dan berisi file2 yang di extra diatas.
  5. Selanjutnya jalankan file bernama “usb_prep8.bat” Kemudian akan muncul sebuah windows command prompt berisi bermacam2 perintah tekan sembarang tombol saja untuk melanjutkan.
  6. Kemudian akan muncul program PEtoUSB untuk memformat Flasdisk , Pilih flasdisk yang akan di format kemudian Klik Start sampai selesai.
  7. Jika proses format sudah selesai, tutup program PEtoUSB Kembali lagi ke windows command prompt usb_prep8.bat di layar akan muncul opsi-opsi dari 0 hingga 5.
  8. Selanjutnya pilih Pilihan No 1 untuk memilih sumber file installasi windows pilih Cdroom tempat kita menyimpan CD Installasi Windows xp.
  9. Setelah itu lanjutkan dengan Memilih Pilihan No 3 , untuk mentukan dimana kita mencolokan Usb flash disk , kalau di drive E maka ketik e dan tekan enter.
  10. Setelah tahap ini pilihlah Pilihan No 4 untuk memulai proses pembuatan modul instalasi yang nantinya akan disalin ke dalam USB flash disk secara otomatis. Ketika muncul Popup windows Pilih aja pilihan YES, apa pun konfirmasi yang muncul pilih YESn. Proses ini kira-kira akan memakan waktu sekitar 15 Menit.
  11. Setelah selesai semua langkah diatas dan Usb Flasdisk siap digunakan untuk Installasi Windows XP,
  12. Jangan Lupa ketika mau menginstall dengan Usb Flasdisk ini kita harus masuk dulu ke dalam BIOS komputer dan memilih boot First nya ke Removable drive.
sumber :
http://www.ndroe.web.id/cara-install-windows-xp-dengan-flashdisk.html

30 Software antivirus terbaik 2011 di dunia (best antivirus in the world)

Antivirus terbaik 2011 agak berbeda dibandingkan dengan antivirus terbaik 2010. Jika pada tahun 2010 berdasarkan hasil survey dan pengujian yang dilakukan oleh berbagai perusahaan yang bergerak di bidang review dan pengujian produk teknologi menobatkan Bitdefender sebagai antivirus terbaik 2010. Maka saat ini kedudukan antivirus Bitdefender bergeser ke posisi kedua, digantikan oleh pesaingnya. Antivirus terbaik 2011 adalah Ad-Aware Pro Internet Security 9.0 berdasarkan hasil pengujian dari team teknisi PC Magazine


Penilaian antivirus terbaik 2011 tersebut berdasarkan pada kemudahan penggunaan, kinerja antivirus dalam memproteksi komputer, kecepatan dalam membersihkan virus yang menginfeksi komputer,recovery data yang terinfeksi virus, update antivirus, serta kemampuan melindungi komputer dari serangan virus dan script-script berbahaya lainnya. Berikut ini adalah daftar antivirus terbaik 2011 versi PC Magazine



1. Ad-Aware Pro Internet Security 9.0
2. BitDefender Antivirus Pro 2011
3. BullGuard Antivirus 10
4. Double Anti-Spy Professional v2
5. eScan Anti-Virus 11
6. F-Secure Anti-Virus 2011
7. G Data AntiVirus 2011
8. Kaspersky Anti-Virus 2011
9. McAfee AntiVirus Plus 2011
10. Norton AntiVirus 2011
11. Outpost Antivirus Pro 7.0
12. Panda Antivirus Pro 2011
13. PC Tools Spyware Doctor with AntiVirus 2011
14. StopSign Internet Security 1.0
15. TrustPort Antivirus 2011
16. Trend Micro Titanium Antivirus + 2011
17. Webroot AntiVirus with Spy Sweeper 2011
18. Ad-Aware Free Internet Security 9.0
19. AVG Anti-Virus Free 2011
20. Comodo Antivirus 5.0
21. digital defender free 2.0
22. Immunet Protect Free 2.0
23. Malwarebytes' Anti-Malware 1.46
24. Panda Cloud Antivirus 1.1
25. avast! Free Antivirus 5.0
26. Avira AntiVir Personal 10
27. Microsoft Security Essentials 1.0
28. Prevx 3.0
29. VIPRE Antivirus 4.0
30. ZoneAlarm Antivirus 2010

Silahkan di cek software antivirus di atas mungkin bisa menjadi bahan pertimbangan untuk memilih antivirus yang akan diinstal di komputer, jika ingin membandingkan dengan antivirus terbaik tahun lalu bisa dilihat disini antivirus terbaik 2010

more : http://artikelkomputerku.blogspot.com/2011/02/30-software-antivirus-terbaik-2011-di.html

Computer is...

A computer is a device that accepts information (in the form of digitalized data) and manipulates it for some result based on a program or sequence of instructions on how the data is to be processed. Complex computers also include the means for storing data (including the program, which is also a form of data) for some necessary duration. A program may be invariable and built into the computer (and called logic circuitry as it is on microprocessors) or different programs may be provided to the computer (loaded into its storage and then started by an administrator or user). Today's computers have both kinds

Learn More

of programming. Most histories of the modern computer begin with the Analytical Engine envisioned by Charles Babbage following the mathematical ideas of George Boole, the mathematician who first stated the principles of logic inherent in today's digital computer. Babbage's assistant and collaborator, Ada Lovelace, is said to have introduced the ideas of program loops and subroutines and is sometimes considered the first programmer. Apart from mechanical calculators, the first really useable computers began with the vacuum tube, accelerated with the invention of the transistor, which then became embedded in large numbers in integrated circuits, ultimately making possible the relatively low-cost personal computer.
Modern computers inherently follow the ideas of the stored program laid out by John von Neumann in 1945. Essentially, the program is read by the computer one instruction at a time, an operation is performed, and the computer then reads in the next instruction, and so on. Recently, computers and programs have been devised that allow multiple programs (and computers) to work on the same problem at the same time in parallel. With the advent of the Internet and higher bandwidth data transmission, programs and data that are part of the same overall project can be distributed over a network and embody the Sun Microsystems slogan: "The network is the computer."

read more :  http://searchwinit.techtarget.com/definition/computer

How To Install Windows XP From A USB Flash Drive

Install Windows XP

Installing Windows XP on the Asus EEE pc using a single USB flash drive.

Please note this tutorial works on all computers not just the Asus EEE PC.
To complete this tutorial you need a 32bit version of Windows XP or Windows Vista installed on your home PC.

What you'll need:
USB_PREP8 (alternative download)
PeToUSB (alternative download)

Bootsect.exe (alternative download)
Special Note: If you use the program Nlite be sure to keep the manual installation files as the USB_prep8 script relies on these files.

Extract the files in Bootsect.zip
The next step is to extract USB_prep8 and PeToUSB.
Next copy the PeToUSB executable into the USB_prep8 folder.
Inside of the USB_prep8 folder double click the executable named usb_prep8.cmd.

The window that opens will look like this:



Press any key to continue

You next window will look like this:
These settings are preconfigured for you all you need to do now is click start.
Once the format is complete DO NOT close the window just leave everything as it is and open a command prompt from your start menu (type cmd in the search bar or run box depending on your version of windows.).

Inside of the command windows go to the directory you have bootsect.exe saved.
(use the cd directoryname command to switch folders)

Now type "bootsect.exe /nt52 R:" NOTE R: is the drive letter for my USB stick if yours is different you need to change it accordingly. What this part does is write the correct boot sector to your USB stick, this allows your PC to boot from the USB stick without it nothing works.
Please note: When running the bootsect.exe command you cannot have any windows open displaying the content of your USB stick, if you have a window open bootsect.exe will be unable to lock the drive and write the bootsector correctly.

If all went well you should see "Bootcode was successfully updated on all targeted volumes."

Now you can close this command prompt (don't close the usbprep8 one by mistake) and the petousb window.

You window you see now should look like this:

If it doesn't try pressing enter.

Now you need to enter the correct information for numbers 1-3.
Press 1 and then enter. A folder browse window will open for you to browse to the location of you XP setup files (aka your cdrom drive with xp cd in)
Press 2 and enter a letter not currently assigned to a drive on your PC
Press 3 and enter the drive letter of your USB stick
Press 4 to start the process.

The script will ask you if its ok to format drive T:. This is just a temp drive the program creates to cache the windows installation files. Press Y then enter.

Once it's done formating press enter to continue again, you can now see the program copying files to the temp drive it created. Once this is done press enter to continue again.

Next you will see a box pop up asking you to copy the files to USB drive yes/no you want to click yes.

Once the script has completed copy files a popup window asking if you would like to USB drive to be preferred boot drive U: select YES on this window.

Now select yes to unmount the virtual drive.

Ok we are done the hard part, close the usbprep8 window.

Now make sure your EEE pc is configured with USB as the primary boot device.
Insert your USB drive and boot up the EEE.

On the startup menu you have two options, select option number 2 for text mode setup.

From this point on it is just like any other windows XP installation delete/recreate the primary partition on your EEE pc and format it using NTFS. Make sure you delete ALL partitions and recreate a single partition or you will get the hal.dll error message.

Once the text mode portion of setup is complete it will boot into the GUI mode (you can press enter after the reboot if your too excited to wait the 30 seconds)

Once the GUI portion of setup is complete you will again have to boot into GUI mode this will complete the XP installation and you will end up at you XP desktop. It is very important that you DO NOT REMOVE THE USB STICK before this point. Once you can see your start menu it is safe to remove the usb stick and reboot your pc to make sure everything worked.

This method has advantages over all current no cdrom methods of installing XP to the EEE. You do not have to copy setup files in DOS to the SSD and install from there. It gives you access to the recovery console by booting into text mode setup, and it gives you the ability to run repair installations of XP if you have problems later on.

I hope this worked out for you and please post feedback to the comments section.
Please note due to the amount of comments this article has received you must now click on "Post a Comment" below the existing comments to view the most recent feedback in a popup window.


more fully in : http://www.eeeguides.com/2007/11/installing-windows-xp-from-usb-thumb.html

Online game???

Definition

"Online gaming is a technology rather than a genre; a mechanism for connecting players together rather than a particular pattern of gameplay."[1] Online games are played over some form of computer network, now typically on the Internet. One advantage of online games is the ability to connect to multiplayer games, although single-player online games are quite common as well.

First-person shooter games

During the 1990s, online games started to move from a wide variety of LAN protocols (such as IPX) and onto the Internet using the TCP/IP protocol. Doom popularized the concept of deathmatch, where multiple players battle each other head-to-head, as a new form of online game. Since Doom, many first-person shooter games contain online components to allow deathmatch or arena style play.

Real-time strategy games

Early real-time strategy games often allowed multiplayer play over a modem or local network. As the Internet started to grow during the 1990s, software was developed that would allow players to tunnel the LAN protocols used by the games over the Internet. By the late 1990s, most RTS games had native Internet support, allowing players from all over the globe to play with each other. Services were created to allow players to be automatically matched against another player wishing to play or lobbies were formed where people could meet in so called game rooms. An example was the MSN Gaming Zone where online game communities were formed by active players for games, such as Age of Empires and Microsoft Ants.

Cross-platform online play

As consoles are becoming more like computers, online gameplay is expanding. Once online games started crowding the market, open source networks, such as the Dreamcast, PlayStation 2, Nintendo GameCube and Xbox took advantage of online functionality with its PC game counterpart. Games such as Phantasy Star Online have private servers that function on multiple consoles. Dreamcast, PC, Macintosh and GameCube players are able to share one server. Earlier games, like 4x4 Evolution, Quake III and Need for Speed: Underground also have a similar function with consoles able to interact with PC users using the same server. Usually, a company like Electronic Arts or Sega runs the servers until it becomes inactive, in which private servers with their own DNS number can function. This form of open source networking has a small advantage over the new generation of Sony and Microsoft consoles which customize their servers to the consumer.

Browser games

As the World Wide Web developed and browsers became more sophisticated, people started creating browser games that used a web browser as a client. Simple single player games were made that could be played using a web browser via HTML and HTML scripting technologies (most commonly JavaScript, ASP, PHP and MySQL). More complicated games such as Legend of Empires or AQWorlds would contact a web server to allow a multiplayer gaming environment.
The development of web-based graphics technologies such as Flash and Java allowed browser games to become more complex. These games, also known by their related technology as "Flash games" or "Java games", became increasingly popular. Many games originally released in the 1980s, such as Pac-Man and Frogger, were recreated as games played using the Flash plugin on a webpage. Most browser games had limited multiplayer play, often being single player games with a high score list shared amongst all players. This has changed considerably in recent years as examples like Castle of Heroes or Canaan Online show.
Browser-based pet games are popular amongst the younger generation of online gamers. These games range from gigantic games with millions of users, such as Neopets, to smaller and more community-based pet games.
More recent browser-based games use web technologies like Ajax to make more complicated multiplayer interactions possible and WebGL to generate hardware-accelerated 3D graphics without the need for plugins.

MUDs

MUDs are a class of multi-user real-time virtual worlds, usually but not exclusively text-based, with a history extending back to the creation of MUD1 by Richard Bartle in 1978. MUDs were the direct predecessors of MMORPGs.[2]

Massively multiplayer online games (MMOG)

Massively multiplayer online games were made possible with the growth of broadband Internet access in many developed countries, using the Internet to allow hundreds of thousands of players to play the same game together. Many different styles of massively multiplayer games are available, such as:
  • MMORPG (Massively multiplayer online role-playing game)
  • MMORTS (Massively multiplayer online real-time strategy)
  • MMOFPS (Massively multiplayer online first-person shooter)
  • MMOSG (Massively multiplayer online social game)

Online game governance

Popular online games are commonly bound by an End User License Agreement (EULA). The consequences of breaking the agreement vary according to the contract; ranging from warnings to termination, such as in the 3D immersive world Second Life where a breach of contract will append the player warnings, suspension and termination depending on the offense.[3] Enforcing the EULA is difficult, due to high economic costs of human intervention and low returns back to the firm. Only in large scale games is it profitable for the firm to enforce its EULA.
Edward Castronova writes that "there are issues of ownership and governance that wrinkle the affairs of state significantly".[4] He has divided the online governance into "good governance" and "strange governance". Castronova also mentions that synthetic worlds are good ways to test for government and management.

Read More :  http://en.wikipedia.org/wiki/Online_game

stop: 0x00000050 BSOD (Blue Screen Of Dead)

stop: 0x00000050
BSOD (Blue Screen Of Dead)
Computer restarts itself and appears a blue screen after restart.
BSOD This code means that the damage to the hardware that is commonly referred to MEMORY or RAM, so the solution instead of RAM or check your ram first on another computer is good. The cause of this may be due because the computer working too hard or not good quality ram.
so that this problem was getting ready to replace your ram .....

Computer virus

A computer virus is a computer program that can copy itself[1] and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.[2]
Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.[3][4]
As stated above, the term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves.

read more :  http://en.wikipedia.org/wiki/Computer_virus

what is BSOD(Blue Screen Of Dead)?

What is the Blue Screen of Death?
The Blue Screen of Death, or simply BSOD, represents an error notoriously associated with Microsoft Windows operating systems. This error is more common on older versions of Windows such as 3.0 and 3.1, but also shows up on later versions such as Windows 95, 98, NT, 2000, XP, and even Vista. Although the Windows platform has come a long way in terms of stability and performance, the infamous Blue Screen of Death is still known to make an entrance from time to time. When this nuisance shows up, it often indicates that the system has a critical error.

Identifying the Blue Screen of Death
As the name implies, the Blue Screen of Death is characterized by a blue screen along with text and hexadecimal values that help to determine what caused the problem. When a BSOD occurs, the system is essentially shutting down to protect itself from a particular error. Unfortunately, it often leads to the loss of any data that was not saved before the computer crash occurred.
After encountering the Blue Screen of Death, your computer might automatically shut down or you may be forced to shut it down manually. Once this process is complete, the machine is rebooted and the system typically runs a diagnostics to retrieve data and determine what led to the error.
If you are bombarded with a BSOD error repeatedly, it could be a sign that your computer system is enduring serious problems. When this is the case, you may need to perform a re installation of the operating system or take various troubleshooting steps in order to pinpoint and resolve the issue. Some of these steps may need to be performed in Safe Mode, which provides a stripped down version of the Windows operating system and features an environment that lets you safely troubleshoot various issues.
Analyzing BSOD Codes
Unless you are a computer programmer, the data that is displayed on the blue screen will probably look like unfamiliar gibberish. However, this information is incredibly useful in solving your problems. These codes generally identify the error and its parameters among other details that could help you pinpoint the problem and keep it from occurring again. A knowledgeable computer user can access the information accompanying the Blue Screen of Death and quickly determine the root of the problem. Most of the time, they come to find that it has something to do with the kernel of the operating system, or a hardware device installed on the computer.
Inherent Problems with Computer Systems
Unless you started your computing with newer versions of XP or Vista, you have probably encountered the dreaded Blue Screen of Death with more frequency then you prefer. This is especially true for someone running a more unstable version of the system or one who has made significant modifications to the Windows environment. Although the Windows system has been known for the infamous blue screen and other deficiencies, it isn’t the only platform that endures critical errors. Both Mac OS X and Linux computers encounter similar problems known as Kernel Attacks.

RAM

Memori akses acak (bahasa Inggris: Random access memory, RAM) adalah sebuah tipe penyimpanan komputer yang isinya dapat diakses dalam waktu yang tetap tidak memperdulikan letak data tersebut dalam memori. Ini berlawanan dengan alat memori urut, seperti tape magnetik, disk dan drum, di mana gerakan mekanikal dari media penyimpanan memaksa komputer untuk mengakses data secara berurutan.
Pertama kali dikenal pada tahun 60'an. Hanya saja saat itu memori semikonduktor belumlah populer karena harganya yang sangat mahal. Saat itu lebih lazim untuk menggunakan memori utama magnetic.
Perusahaan semikonduktor seperti Intel memulai debutnya dengan memproduksi RAM , lebih tepatnya jenis DRAM.
Biasanya RAM dapat ditulis dan dibaca, berlawanan dengan memori-baca-saja (read-only-memory, ROM), RAM biasanya digunakan untuk penyimpanan primer (memori utama) dalam komputer untuk digunakan dan mengubah informasi secara aktif, meskipun beberapa alat menggunakan beberapa jenis RAM untuk menyediakan penyimpanan sekunder jangka-panjang.
Tetapi ada juga yang berpendapat bahwa ROM merupakan jenis lain dari RAM, karena sifatnya yang sebenarnya juga Random Access seperti halnya SRAM ataupun DRAM. Hanya saja memang proses penulisan pada ROM membutuhkan proses khusus yang tidak semudah dan fleksibel seperti halnya pada SRAM atau DRAM. Selain itu beberapa bagian dari space addres RAM ( memori utama ) dari sebuah sistem yang dipetakan kedalam satu atau dua chip ROM.

sumber : http://id.wikipedia.org/wiki/RAM

ALU (Arithmetic ligic Unit)

Tasks of an ALU

ALU units typically need to be able to perform the basic logical operations (AND, OR), including the addition operation. The inclusion of inverters on the inputs enables the same ALU hardware to perform the subtraction operation (adding an inverted operand), and the operations NAND and NOR.
A basic ALU design involves a collection of "ALU Slices", which each can perform the specified operation on a single bit. There is one ALU slice for every bit in the operand.

[edit] ALU Slice

[edit] Example: 2-Bit ALU

This is an example of a basic 2-bit ALU. The boxes on the right hand side of the image are multiplexers and are used to select between various operations: OR, AND, XOR, and addition.
2-bit ALU.png
Notice that all the operations are performed in parallel, and the select signal ("OP") is used to determine which result to pass on to the rest of the datapath. Notice that the carry signal, which is only used for addition, is generated and passed out of the ALU for every operation, so it is important that if we aren't performing addition that we ignore the carry flag.

[edit] Example: 4-Bit ALU

Here is a circuit diagram of a 4 bit ALU.
74181aluschematic.png

[edit] Additional Operations

Logic and addition are some of the easiest, but also the most common operations. For this reason, typical ALUs are designed to handle these operations specially, and other operations, such as multiplication and division, are handled in a separate module.
Notice also that the ALU units that we are discussing here are only for integer datatypes, not floating-point data. Luckily, once integer ALU and multiplier units have been designed, those units can be used to create floating-point units (FPU).

[edit] ALU Configurations

Once an ALU is designed, we need to define how it interacts with the rest of the processor. We can choose any one of a number of different configurations, all with advantages and disadvantages. Each category of instruction set architecture (ISA) -- stack, accumulator, register-memory, or register-register-load-store -- requires a different way of connecting the ALU. [1] In all images below, the orange represents memory structures internal to the CPU (registers), and the purple represents external memory (RAM).


[edit] Accumulator

Isaccumulator.png
An accumulator machine has one special register, called the accumulator. The accumulator stores the result of every ALU operation, and is also one of the operands to every instruction. This means that our ISA can be less complicated, because instructions only need to specify one operand, instead of two operands and a destination. Accumulator architectures have simple ISAs and are typically very fast, but additional software needs to be written to load the accumulator with proper values. Unfortunately, accumulator machines are difficult to pipeline.
One example of a type of computer system that is likely to use an accumulator is a common desk calculator.

[edit] Register-to-Register

Isreg2reg.png
One of the more common architectures is a Register-to-register architecture, also called a 3 register operand machine. In this configuration, the programmer can specify both source operands, and a destination register. Unfortunately, the ISA needs to be expanded to include fields for both source operands and the destination operands. This requires longer instruction word lengths, and it also requires additional effort (compared to the accumulator) to write results back to the register file after execution. This write-back step can cause synchronization issues in pipelined processors (we will discuss pipelining later).

[edit] Register Stack

Is0addr.png
A register stack is like a combination of the Register-to-Register and the accumulator structures. In a register stack, the ALU reads the operands from the top of the stack, and the result is pushed onto the top of the stack. Complicated mathematical operations require decomposition into Reverse-Polish form, which can be difficult for programmers to use. However, many computer language compilers can produce reverse-polish notation easily because of the use of binary trees to represent instructions internally. Also, hardware needs to be created to implement the register stack, including PUSH and POP operations, in addition to hardware to detect and handle stack errors (pushing on a full stack, or popping an empty stack).
The benefit comes from a highly simplified ISA. These machines are called "0-operand" or "zero address machines" because operands don't need to be specified, because all operations act on specified stack locations.
In the diagram at right, "SP" is the pointer to the top of the stack. This is just one way to implement a stack structure, although it might be one of the easiest.

[edit] Register-and-Memory

Isregmem.png
One complicated structure is a Register-and-Memory structure, like that shown at right. In this structure, one operand comes from a register file, and the other comes from external memory. In this structure, the ISA is complicated because each instruction word needs to be able to store a complete memory address, which can be very long. In practice, this scheme is not used directly, but is typically integrated into another scheme, such as a Register-to-Register scheme, for flexibility.
Some CISC architectures have the option of specifying one of the operands to an instruction as a memory address, although they are typically specified as a register address.

[edit] Complicated Structures

There are a number of other structures available, some of which are novel, and others are combinations of the types listed above. It is up to the designer to decide exactly how to structure the microprocessor, and feed data into the ALU.

[edit] Example: IA-32

The Intel IA-32 ISA (x86 processors) use a register stack architecture for the floating point unit, but it uses a modified Register-to-Register structure for integer operations. All integer operations can specify a register as the first operand, and a register or memory location as the second operand. The first operand acts as an accumulator, so that the result is stored in the first operand register. The downside to this is that the instruction words are not uniform in length, which means that the instruction fetch and decode modules of the processor need to be very complex.
A typical IA-32 instruction is written as:
ADD AX, BX
Where AX and BX are the names of the registers. The resulting equation produces AX = AX + BX, so the result is stored back into AX.

[edit] Example: MIPS

MIPS uses a Register-to-Register structure. Each operation can specify two register operands, and a third destination register. The downside is that memory reads need to be made in separate operations, and the small format of the instruction words means that space is at a premium, and some tasks are difficult to perform.
An example of a MIPS instruction is:
ADD R1, R2, R3
Where R1, R2 and R3 are the names of registers. The resulting equation looks like: R1 = R2 + R3.

source of : http://en.wikibooks.org/wiki/Microprocessor_Design/ALU

Apa ya Wi-Fi dan Wi-Max???

   Wi-Fi (atau Wi-fi, WiFi, Wifi, wifi) merupakan kependekan dari Wireless Fidelity, memiliki pengertian yaitu sekumpulan standar yang digunakan untuk Jaringan Lokal Nirkabel (Wireless Local Area Networks - WLAN) yang didasari pada spesifikasi IEEE 802.11. Standar terbaru dari spesifikasi 802.11a atau b, seperti 802.16 g, saat ini sedang dalam penyusunan, spesifikasi terbaru tersebut menawarkan banyak peningkatan mulai dari luas cakupan yang lebih jauh hingga kecepatan transfernya.

    Awalnya Wi-Fi ditujukan untuk pengunaan perangkat nirkabel dan Jaringan Area Lokal (LAN), namun saat ini lebih banyak digunakan untuk mengakses internet. Hal ini memungkinan seseorang dengan komputer dengan kartu nirkabel (wireless card) atau personal digital assistant (PDA) untuk terhubung dengan internet dengan menggunakan titik akses (atau dikenal dengan hotspot) terdekat.

    WiMAX (Worldwide Interoperability for Microwave Access) adalah sebuah tanda sertifikasi untuk produk-produk yang lulus tes cocok dan sesuai dengan standar IEEE 802.16. WiMAX merupakan teknologi nirkabel yang menyediakan hubungan jalur lebar dalam jarak jauh.

     Yang membedakan WiMAX dengan Wi-Fi adalah standar teknis yang bergabung di dalamnya. Jika WiFi menggabungkan standar IEEE 802.11 dengan ETSI (European Telecommunications Standards Intitute) HiperLAN sebagai standar teknis yang cocok untuk keperluan WLAN, sedangkan WiMAX merupakan penggabungan antara standar IEEE 802.16 dengan standar ETSI HiperMAN.

     Standar keluaran IEEE banyak digunakan secara luas di daerah asalnya, Amerika, sedangkan standar keluaran ETSI meluas penggunaannya di daerah Eropa dan sekitarnya. Untuk membuat teknologi ini dapat digunakan secara global, maka diciptakanlah WiMAX. Kedua standar yang disatukan ini merupakan standar teknis yang memiliki spesifikasi yang sangat cocok untuk menyediakan koneksi berjenis broadband lewat media wireless atau BWA.



Simpelnya, WiMax memiliki daya jangkau yg lebih luas dengan kecepatan yg lebih cepat dibandingkan Wifi....

sumber : http://id.answers.yahoo.com/question/index?qid=20071224012356AAq6eDG

Sejarah Perkembangan Teknologi Informasi dan Komunikasi

A.   Masa Perasejarah

a.      Masa (….s/d 3000 SM)
Pada awalnya teknologi informasi yang dikembangkan manusia pada masa ini berfungsi sebagai sistem untuk pengenalan bentuk-bentuk yang meraka kenal. Mereka menggambarkan informasi yang mereka dapatkan pada dinding-dinding gua, tentang berburu dan binatang buruannya. Pada masa ini mereka mulai melakukan pengidentifikasian benda-benda yang ada dilingkungan mereka tinggal dan mewakilinya dengan bentuk-bentuk yang kemudian mereka lukis pada dinding gua tempa.t mereka tinggal, karena kemampuan mereka dalam berbahasa hanya berkisar pada bentuk suara dengusan dan isyarat tangan sebagai bentuk awal komunikasi mereka pada masa ini.
Perkembangan selanjutnya adalah diciptakan dan digunakannya alat-alat yang menghasilkan bunyi dan isyarat, seperti kendang ,terompet yang terbuat dari tanduk binatang, atau isyarat asap sebagai alat pemberi peringatan terhadap bahaya.

b.      Masa Sejarah(3000 SM s/d 1400 –an M)
Pada masa tersebut teknologi informasi belum menjadi teknologi masal seperti yang kalian kenal sekarang ini, teknologi informasi masih digunakan oleh kalangan terbatas saja, digunakan pada saat-saat khusus dan biaya yang dikeluarkan banyak.

c.       Masa 3000 SM
Untuk pertama kali tulisan digunakan oleh bangsa Sumeria dengan symbol-simbol yang dibentuk dari pictograf sebagai huruf.
Simbol atau huruf-huruf ini juga mempunyai bentuk bunyi yang berbeda (penyebutan), sehingga mampu menjadi kata , kalimat dan bahasa.

d.      Masa Sejarah (3000 SM s/d 1400-an M)
1)      2900 SM
Pengunaan huruf hierogliph pada bangsa Mesir kuno. Hierogliph merupakan bahasa symbol dimana setiap ungkapan diwakili oleh symbol yang berbeda.Ketika digabungkan menjadi satu akan mempunyai cara pengucapan dan arti yang berbeda. Bentuk tulisan dan bahasa heirogliph ini lebih maju dibandingkan dengan tulisan bangsa Sumeria.
2)      500 SM
Serat papyrus digunakan sebagai kertas. Kertas terbuat dari serat pohon papyrus yang tumbuh disekitar Sungai Nil ini menjadi media menulis atau media informasi yang lebih kuat dan fleksibel dibandingkan dengan lempengan tanah liat yang sebelumnya digunakan sebagai menia informasi.
3)      105 M
Bangsa Cina menemukan kertas.Kertas yang ditemukan oleh bangsa Cina pada masa ini adalah kertas yang kalian kenal sekarang. Kertas ini dibuat dari serat bambu yang dihaluskan, disaring,dicuci, kemudian diratakan dan di keringkan. Penemuan ini juga memungkinkan sistem pencetakan yang dilakukan dengan menggunakan blok kayu yang ditoreh dan dilumuri oleh tinta atau yang kalian kenal sekarang dengan sistem cap.


2.      Masa Modern (1400-an M s/d sekarang)

  1. Tahun 1455
Mesin cetak yang menggunakan plat huruf terbuat dari besi yang dapat diganti-ganti dalam bingkai yang terbuat dari kayu dikembangkan untuk yang pertama kalinya oleh Johann Guntenberg

  1. Tahun 1830
Augusta Lady Byron menulis program komputer yang pertama di dunia bekerja sama dengan Charles Babbage menggunakan mesin Analytical-nya. Alat tersebut didesain mampu memasukkan data, mengola data, dan menghasilkan bentuk keluaran dalam sebuah kartu. Mesin ini dikenal sebagai bentuk komputer digital yang pertama walaupun cara kerjanya lebih bersifat mekanis daripada bersifat digital, 94 tahun sebelum komputer digital pertama ENIAC 1 dibentuk .

  1. Tahun 1837
Samuel Morse mengembangkan telegraf dan bahasa kode Morse bersama Sir Wiliam Cook dan Sir Charles Wheatstone yang dikirim secara elektronik antara dua tempat yang berjauhan melalui kabel yang menghubungkan kedua tempat tersebut. Pengiriman dan penerimaan informasi ini mampu dikirim dan diterima pada saat yang hampir bersamaan waktunya penemuan ini memungkinkan informasi dapat diterima dan digunakan secara luas oleh masyarakat tanpa dirintangi oleh jarak dan waktu.

  1. Tahun 1861
Gambar bergerak yang diproyeksikan ke dalam sebuah layar pertama kali digunakan sebagai cikal bakal film sekarang pada zaman dulu proyektor ini berkembang dengan sebutan layar tancap.

  1. Tahun 1876
 Pada masa ini ditandai dengan tokoh Melvyl Dewey yang mengembangkan sistem penulisan desimal.

  1. Tahun 1877
1)   Alexander Graham Bell menciptakan dan mengembangkan telepon yang digunakan pertama kali secara umum.
2)   Fotografi dengan kecepatan tinggi ditemukan oleh Edward Maybridge.

  1. Tahun 1899
Dipergunakan system penyimpanan dalam tape (pita) magnetis yang pertama tetapi pada masa ini penyimpanan masih bersifat analog belum digital seperti masa sekarang.
  1. Tahun 1923
Pada masa ini ditandai dengan Zvorkyn menciptakan tabung TV yang pertama.

  1. Tahun 1940
Dimulainya pengembangan ilmu pengetahuan dalam bidang informasi pada masa Perang Dunia 2 yang digunakan untuk kepentingan pengiriman dan penerimaan dokumen-dokumen militer yang disimpan dalam bentuk magnetic tape. 
         
  1. Tahun 1945
Vannevar Bush mengembangkan sistem pengkodean menggunakan hypertext.Pada masa ini penggunaan hypertext sudah berkembang seiring dengan perkembangan desain web site yang saat ini berkembang.

  1. Tahun 1946
Pada masa kurun waktu ini teknologi komputer digital pertama di dunia ENIAC I dikembangkan walaupun belum begitu banyak pemakai tetapi teknologi computer sudah digunakan instansi-instansi tertentu.

  1. Tahun 1948
Para peneliti di Bell Telephone mengembangkan transistor.

  1. Tahun 1957
1)      Jean Hoerni mengembangkan transistor planar.Teknologi ini memungkinkan Pengembangan jutaan bahkan milyaran transistor dimasukan kedalam sebuah keping kecil kristal silicon.
2)      USSR (Rusia pada saat itu) meluncurkan Sputnik sebagai satelit bumi buatan pertama yang bertugas sebagai mata-mata.Sebagai balasannya Amerika membentuk Advance Research Projects Agency (ARPA) di bawah kewenangan Departemen Pertahanan Amerika untuk mengembangkan ilmu pengetahuan dan teknologi informasi dalam bidang militer.

  1. Tahun 1972
Pada masa ini Ray Tomlinson menciptakan program E-mail pertama yang digunakan untuk berkomunikasi jarak jauh menggunakan teks.E-mail dapat dikatakan sebagai surat elektronik.

  1. Tahun 1973-1990
Istilah internet diperkenalkan dalam sebuah paper mengenai TCP/IP kemudian dilakukan pengembangan sebuah protokol jaringan yang kemudian dikenal dengan nama TCP/IP yang dikembangkan oleh grup dari DARPA.Pada tahun 1981 National Science Fondation mengembangkan Backbone yang disebut CSNET dengan kapasitas 56 Kbps untuk setiap institusi dalam pemerintahan.Kemudian pada tahun 1986 IETF mengembangkan sebuah server yang berfungsi sebagai alat koordinasi diantaranya:DARPA, ARPANET, DDN, dan Internet Gateway.

  1. Tahun 1991-Sekarang
Sistem bisnis dalam bidang IT pertama kali terjadi ketika CERN dalam menanggulangi biaya operasionalnya memungut bayaran dari para anggotanya.Pada tahun 1992 pembentukan komunitas internet, kemudian diperkenalkan istilah World Wide Web (WWW) oleh CERN.Pada tahun 1993, NSF membentuk interNIC untuk menyediakan jasa pelayanan internet menyangkut direktori dan penyimpanan data serta database (oleh AT&T), jasa registrasi (oleh Network Solution Inc),dan jasa informasi (oleh General Atomics/CERFnet).Pada tahun 1994 pertumbuhan internet melaju dengan sangat cepat dan mulai merambah ke dalam segala segi kehidupan manusia dan menjadi bagian yang tidak dapat dipisahkan dari manusia.Tahun 1995, perusahaan umum mulai diperkenankan menjadi provider dengan membeli jaringan di Backbone.Langkah ini memulai pengembangan teknologi informasi khususnya internet dan penelitian-penelitian untuk mengembangkan sistem dan alat yang lebih canggih.

Downloan Video di YouTube

Sebenarnya da banyak cara. Secara umum bisa dibagi dalam tiga kategori: lewat situs layanan download, memakai add-ons, dan lewat software khusus. Gratis.
Ketiga metode pengunduhan file video tersebut memiliki kelebihan dan kekurangan masing-masing. 
Download file video YouTube ke komputer berarti kita bisa menonton video tersebut tanpa harus tersambung ke jaringan Internet. 

Layanan online download video YouTube

1. Keep Vid — Sangat mudah dipakai. Tinggal copy-pastekan alamat URL video YouTube ke kotak yang tersedia. Juga bisa dipakai untuk mengunduh file video dari MySpace Video dan Daily Motion.
2. KCool Online — Ini paling cocok untuk penggila situs video, karena bisa dipakai untuk mengambil video dari 200 lebih situs video, jadi bukan hanya dari YouTube.
3. Zamzar — Selain untuk download video YouTube, juga bisa dipakai untuk mengubah/konversi video ke dalam format yang lain.
4. Keep Tube — Gambar bergerak dari YouTube bisa dikonversi dalam format FLV, 3GP, atau MP4.
5. Kiss YouTube — Ini cara unik dan cepat mengunduh video-video dari situs YouTube. Tidak perlu harus mengakses situs Kiss Youtube. Tambahkan saja kata “kiss” [tanpa tanda petik] setelah “www.” pada alamat video YouTube yang hendak didownload.

Software khusus mengunduh video

1. FLV Converter [untuk komputer Windows] — Aplikasi ini bisa mengkonversi format video. Kelebihannya, bisa dipakai untuk mencari video-video tertentu dari situs YouTube untuk kemudian diunduh sekaligus secara bersamaan.
2. Orbit Downloader — juga untuk Windows.
3. YouTube DL — untuk komputer Linux dan Windows.
4. Abby and CCLive — khusus Linux.
5. Get Tube — software untuk mengunduh video YouTube khusus bagi komputer Mac.

Add-ons Firefox dan web browser

1. Video Download Helper — Fitur tambahan add-on yang bisa dipasang pada peramban Firefox. Bila kau belum memakai Firefox, silakan unduh dan install Firefox versi terbaru ke komputermu.
2. Net Video Hunter — Juga add-on pada Mozilla Firefox.
3. Viloader — Bisa dipasang pada browser Firefox, Internet Explorer, atau Opera.
4. IE7Pro — Untuk Internet Explorer.
5. Flash Video Downloader — Untuk mendownload video YouTube dari peramban Opera, Firefox, dan Internet Explorer.
Selamat Mencoba!