Sunday, December 23, 2007

Profile Suns Warrior IV


Cok that's what we called him. A young and hard working lad who is still in highschool. Although he is still in highschool he is willing to learn about internet cafe and networking. Likes to play Winning Eleven on PS2 and quite good at it too. He is the latest addition to our Suns Warrior team. This is his complete profile.

Name : Cok Ngurah
Nick : Cok
Birthday : 1990
Occupation : Highschool student
School : SMU Negeri 2 Denpasar
Status : In a relationship
Friendster : _cOk rAch_

Monday, December 17, 2007

RF Online - Update Red Army



Surely you would have enjoyed playing RF Online by now. The latest news is that there is a new update for RF Online - Red Army. According to the official website, due to the release of the new update there will be server maintenance between 1 AM - 12 AM Indonesian Western Time (WIB). For you who already have the Red Army DVD don't install it before 18th December, and remember that you can only play the Red Army only after the server maintenance is finished. If you don't have the dvd then you can download the Red Army update here. Now, for all Acretia Empire, Bellato Union and Holly Alliance Cora followers gear up and prepare for battle of Red Army!

Saturday, December 08, 2007

Peekaboo Post

Sometimes if you are blogwalking, have you noticed that some blogs have a "Read more" link? When you click on the "Read more" link you will be able to read the whole post. Now isn't it greate to have it in your blog, because you can skip reading a blog post if you find the header of the post is not interesting. Thanks to Ramani for making this beautiful hack. If you want to try it, go to the link above. You will see there is a section called "Posts labelled New Template Hacks". Click the "Blogger hack: Expandable posts with Peekaboo view". Follow the instructions and you're blog is as good as others. You can find my implementation in my other blog.

Saturday, December 01, 2007

Online Games

As of this month, Suns.NET also has online games opened for you gamers out there. Currently there are 6 clients you can use. Each of these clients is powered with:

  1. Intel Dual Core 1.8 GHz processor.
  2. 1 GB DDR2 667 memory.
  3. HIS X1050 256 MB (HM 1 GB) graphics card.
  4. 80 GB of harddisk.
  5. LCD 17" monitor.
which is more than enough to play the online games you want. Here are some of the online games you can play at our place:
  1. AyoDance
  2. RF online
  3. Seal online
  4. DOMO
  5. Tantra
  6. Deco
  7. Ragnarok Online
  8. O2Jam
  9. RYL (Risk Your Life) I & II
  10. Ghost Online
  11. Gunbound
  12. Pangya
  13. Xian

Friday, November 30, 2007

Hiding Your Navigation Bar

Really annoyed by the navigation bar on top of your blog? Want to get rid of it? Read on... After sometime surfing in the internet, I finally managed to find this good article of how to show or hide your navigation bar. Thanks to Derya my blog now looks great. You can see how to do it here. For your note, I didn't use the second part of the code because I want to get rid of the bar permanently.

Friday, November 23, 2007

Reinstalling Windows (Genuine)

Tired, that's what I'm feeling these last few days. People who use our computer at the internet cafe sometime are irresponsible. They don't care about the lifetime of the computer they use. They came to the cafe, rented a computer. Once they logged on, they installed many softwares such as Internet Download Manager (you know what this program is used to), MegaUpload toolbar (for downloading from MegaUpload), YouTube Grabber (to download files from YouTube). While these programs are useful for the customer, we (the administrator) have a lot of troubles to keep the internet connection stable once they installed the software. Using a bandwith manager also doesn't guarantee a stable connection. Anyone who installed and used this software could get all the bandwith while others will be left with a very slow internet connection.

To correct this problem, we usually uninstall these programs right after the customer left. Here is the tricky part, because we installed DeepFreeze and Billing Explorer we got another problem. Through Billing Explorer we can hide the Control Panel and DeepFreeze ensure that the Windows setting would never be changed. The two programs accidentally canceling each other leaving us with no choice than reinstalling the windows.

Another problem arise. We are using genuine Windows XP Home Edition at the internet cafe. As you know if you have a genuine copy of Windows you have to activate it 30 days after you install it. Now, it has been more than 30 days so I have activated all Windows. If you reinstall it you can't activate it anymore. You have to manually activate it by calling the Microsoft and ask for another activation key. Really why should we go with all these troubles because we are using a genuine product?

Fortunately, after searching on Google, I have came up with these two links, here and here. Both of these two links tell you the same thing, how to preserve your windows activation files before reinstalling. Note these tips would only be successful if you are reinstalling the Windows on the same machine with the same configuration as the time you first activate it. So if you're thinking on buying a genuine copy, install it, activate it and then install it on another computer you can forget that. If you have any major hardware changes such as adding another Graphic Card, you should take it off first, reinstall, reactivate the WPA and then put the Graphic Card back in.

Basically what you need to do is copy the WPA.dbl and WPA.bak files from Windows system folder (usually for Windows XP is C:\Windows\System32). Put it in a safe directory for use later. Reinstall your computer. After finished reinstalling, if you are asked to activate, just say no. Boot from safe mode (press F8 while booting). Go to system folder. You should see that there is a new WPA.dbl file there. Rename this file to whatever name you like, e.g: WPANew.dbl. Then copy your original WPA files and put it in the same folder. Restart your computer. You might be asked again to activate your Windows. Now click Yes, then choose only activate but don't register. After waiting for a few seconds your copy of Windows is activated and you should be able to use your Windows.

Monday, November 12, 2007

Label Clouds

Want to have a different look for your labels? When I was surfing the internet, I saw a lot of blogs who have a different look for their labels. The labels were randomly made bigger or smaller. So I started wandering if there is a code for this. After sometime I found the answer here. I have tried the code written there, and it worked fine. Hence, I have added a special thanks for Phydeaux3 who made this code at the bottom page of my blog. This is a really nice hacks!

Tuesday, November 06, 2007

How To Download Youtube

Have you ever heard about Youtube? If you haven't got any clues about Youtube, then probably you are in a town where you don't have internet access. Quoting from Wikipedia: "Youtube is a video sharing website where users can upload, view and share video clips". As stated before, you can watch almost anything in Youtube from movie, tv clips, music videos and even a video of your own production.
Youtube was founded by three former employees of Paypal, namely Chad Hurley, Steve Chen, and Jawed Karim. See below Youtube's earlier office in San Mateo.


It currently has 67 staffs and it is now acquired by Google Inc, in a deal worth US$1,65 billion. The deal was closed on 13 November 2006. TIME magazine awarded Youtube as "Invention of the Year" for 2006. Here is the look of the new office for Youtube in San Bruno.


Enough about history lesson, now to the important part. As you probably know that you can watch any videos in Youtube's website but the site itself doesn't provide you the tool or link to download the video you want. I don't know if this legal or not but you can download the video if you want. After doing some Googling (using the keyword "downloading youtube video", here are some sites that will provide you the download link of Youtube's video that you want.
Using those sites to download the file is easy, but it requires you to open the site first, enter the Youtube's video path until it finally gives you the actual download link. For me it is easier to use Mozilla add-ons that you can find here. Just download the add-ons, install and restart Firefox. After restarting Firefox, right-click on the toolbar (area to the left of your navigation bar), choose Customize. It will then open a window where you can choose a lot of items. Locate the VideoDownloader, and click to drag and drop it after the Home button. There you go, you can now download the video from Youtube just by clicking the VideoDownloader button. Easy right?

Tuesday, October 30, 2007

Changing Recent Comments

First, I would like to thanks Hans for this beautiful blogger hacks. This posting will not tell you how to add the recent comments to your blog, you can find it here and the Indonesian version here. Those two versions are working great, but if you want to have a different look for your recent comments please read on. If you follow the first link, you will find something like this:


Remember to choose Custom CSS. Click Customize and then Add Widget To My Blog. You can then follow the rest of the instructions to add the widget. But, before you view your blog you have to edit your template and declare three classes called ".bbrecpost", ".bbrecpostsum" and ".bbwidgetfooter". You can put those three classes anywhere in the skin declaration of your blog. Or just find this code: "]]>" and put the classes above that. Your recent comments will surely work.
Now, if you would like to take it a little bit further you can customize the look of your recent comments. The script that is responsible for this recent comments looks like this:

You can find the actual script here. The script called a function named "showrecentcomments" and uses json feeds as the input. If you have a little knowledge of C++ or Java, this wouldn't be a problem because the code is really similar. What this function do actually is looping through all the comments and then write it one by one in your blog. In the actual script, each comment will be divided into there groups (bbrecpost for the header, bbrecpostsum for summary of the comment and bbwidgetfoot), hence you must provide those three classes mentioned above to give it a different style than the common recent comments. In my script I didn'use the ".bbwidgetfooter" and introduce a new class called ".bbrecdate". You can see the implementation right here in this blog. These are my classes:

.bbrecheader {
font-size: 80%;
font-family: verdana, Trebuchet;
padding-left: 2px;
line-height: 1em;
}

.bbrecheader a:hover {
font-size: 100%;
text-decoration: none;
}

.bbrecdate {
text-align: right;
border-bottom: 1px dashed $bordercolor;
border-left: 1px dashed $bordercolor;
border-right: 1px dashed $bordercolor;
line-height: 1.2em;
font-size: 80%;
width: 70px;
float: right;
}

.bbrecpostsum {
background: #F5F5F5;
font-size: 80%;
font-family: verdana, Trebuchet;
padding-left: 2px;
line-height: 1em;
border-top: 1px solid $bordercolor;
border-bottom: 1px solid $bordercolor;
}

.bbrecpostsum a:hover {
font-size: 100%;
text-decoration: none;
}

Everything is quite clear I guess, but you must have a variable called "bordercolor" declared in your variable declaration. You can also download my script here. Use it at your own risk or better download it and put it somewhere where you usually put your online files. A little note: the script is originally Hans's, you can use the script or modify it but please remember to put credit for the original author in your blog. If you have any question, just leave it in your comments. I would love to help you and get back to you soon.

Sunday, October 28, 2007

Blogging

Having an internet cafe is opening up many doors for me. For an example, I can now start (again) my hobby of blogging. This hobby was stopped before because I was having trouble finding internet connection (which was free) after I resigned from my job as a programmer in a timeshare company. But now as I have internet connection 24 hours a day and 7 days a week, there are plenty of time for me to create new posts.

I started blogging when the blogging feature was introduced by Friendster. At that time, I have heard a little about blogging but didn't really know what it was. So to satisfy my curiosity I started blogging with Friendster. But after a while I found it that there was many limitations with Friendster's blogging feature, such as the need to change the look of your blog. At that time (I don't know if Friendster already improved their blogging feature now) Friendster didn't provide online tools to modify your background color, font color, or changing your header background with image that kind of stuffs. Then I found out about Blogger. It was like founding heaven for me, because you can use the predefined themes and then edit its html coding. Changing the color of your background and font was really simple as there is an online tools that you can use and even preview the changes before saving them. The introduction of sidebar also amazed me. Inserting new widgets to the sidebar is really simple, all you need to is a simple click. I have been using Blogger as my blogging place until now. I've heard about many other site which provides blogging such as Wordpress. It also has many big fans. I will try to use it later, but for now I am satisfied with Blogger.

Thursday, October 18, 2007

Profile Suns Warrior III

This is the youngest of all Suns Warrior: Gustu or known as Bonbon by his friends. A bit eccentric, the guy who claims to be a vocalist of an unknown band, is the latest administrator to join with Suns.NET. At first, it seems that he is irresponsible but after a long hard fought you can be sure that he is a true administrator now. Here is the complete profile of Bonbon.

Name : Ida Bagus Putu Ekawadi
Nickname : Gustu or Bonbon
Birthday : 1986
Occupation : University Student
University : Udayana University
Status : Still Looking for a Partner (anybody interested?)
Friendster : Bony Eka


Sunday, October 07, 2007

How To Increase Your Page Rank?

Many bloggers would have asked the same question as myself, how do you increase your Google PageRank? Well, let's not get too hasty right now. I mean do you already know what a PageRank is? Maybe you have some clue about this thing, but I'll try to expain here for you.

PageRank is a system for ranking web pages developed by Google's founders Larry Page and Sergey Brin at Stanford University. So Google uses PageRank to determine which site will they viewed on the first page of a search conducted by a person. What really tricky is how does Google give a PageRank for a site. To determine its PageRank, Google analyze the link structure of the site. In essence, Google interprets a link from page A to page B as a vote, by page A, for page B. But, Google looks at considerably more than the sheer volume of votes, or links a page receives; for example, it also analyzes the page that casts the vote. Votes cast by pages that are themselves "important" weigh more heavily and help to make other pages "important." Using these and other factors, Google provides its views on pages' relative importance. Get the meaning? So to improve your PageRank you have to get other sites link to your site. It would be really excellence if you have links from sites who have higher PageRank than yours. By using this methodology some sites on the internet act as a provider to exchange link within their members. LinkALizer is an example of such sites. You have to register as a member to use their service. To register you only need to fill in the url of your site and your email address. They will then send an invitation to exchange links with other sites. You can accept or reject the invitation. Should you accept, you must put the other site's link in your site. That way, the other site's PageRank will go higher and so as yours.

Well, that is really the simplest way to make your PageRank higher. Optimizing the keywords of your site is also another way. But it requires a skill in SEO. Maybe we'll talk about SEO some other time when I'm finally understand what it is about.

Tuesday, September 18, 2007

Suns General I

The general, of course it is a higher rank than the warrior if you are in the army. But in this context it is not so different as this specific general has the same abilities as the other warriors. The only different is this general is the brother of the Suns's owner, hehehehe. The general name is General Bino. He has a good sense of humor, Here is his complete profile.

Name : AA Ngurah Dharma Putra
Nickname : Bino
Occupation : Highschool student
School : SMU Negeri 2 Denpasar
Status : In a relationship
Friendster : Bino

Tuesday, September 11, 2007

10 Simple Ways To Speed Up Your Windows XP

1. Defrag Disk to Speed Up Access to Data

One of the factors that slow the performance of the computer is disk fragmentation. When files are fragmented, the computer must search the hard disk when the file is opened to piece it back together. To speed up the response time, you should monthly run Disk Defragmenter, a Windows utility that defrags and consolidates fragmented files for quicker computer response.

* Follow Start > All Programs > Accessories > System Tools > Disk Defragmenter
* Click the drives you want to defrag and click Analyze
* Click Defragment

2. Detect and Repair Disk Errors

Over time, your hard disk develops bad sectors. Bad sectors slow down hard disk performance and sometimes make data writing difficult or even impossible. To detect and repair disk errors, Windows has a built-in tool called the Error Checking utility. It’ll search the hard disk for bad sectors and system errors and repair them for faster performance.

* Follow Start > My Computer
* In My Computer right-click the hard disk you want to scan and click Properties
* Click the Tools tab
* Click Check Now
* Select the Scan for and attempt recovery of bad sectors check box
* Click Start

3. Disable Indexing Services

Indexing Services is a little application that uses a lot of CPU. By indexing and updating lists of all the files on the computer, it helps you to do a search for something faster as it scans the index list. But if you know where your files are, you can disable this system service. It won’t do any harm to you machine, whether you search often or not very often.

* Go to Start
* Click Settings
* Click Control Panel
* Double-click Add/Remove Programs
* Click the Add/Remove Window Components
* Uncheck the Indexing services
* Click Next
4. Optimize Display Settings

Windows XP is a looker. But it costs you system resources that are used to display all the visual items and effects. Windows looks fine if you disable most of the settings and leave the following:

* Show shadows under menus
* Show shadows under mouse pointer
* Show translucent selection rectangle
* Use drop shadows for icons labels on the desktop
* Use visual styles on windows and buttons

5. Speedup Folder Browsing

You may have noticed that everytime you open My Computer to browse folders that there is a little delay. This is because Windows XP automatically searches for network files and printers everytime you open Windows Explorer. To fix this and to increase browsing speed, you can disable the “Automatically search for network folders and printers” option.

6. Disable Performance Counters

Windows XP has a performance monitor utility which monitors several areas of your PC’s performance. These utilities take up system resources so disabling is a good idea.

* Download and install the Extensible Performance Counter List (http://www.microsoft.com/windows2000/techinfo/reskit/tools/existing/exctrlst-o.asp)
* Then select each counter in turn in the ‘Extensible performance counters’ window and clear the ‘performance counters enabled’ checkbox at the bottom button below

7. Optimize Your Pagefile

You can optimize your pagefile. Setting a fixed size to your pagefile saves the operating system from the need to resize the pagefile.

* Right click on My Computer and select Properties
* Select the Advanced tab
* Under Performance choose the Settings button
* Select the Advanced tab again and under Virtual Memory select Change
* Highlight the drive containing your page file and make the initial Size of the file the same as the Maximum Size of the file.

Windows XP sizes the page file to about 1.5X the amount of actual physical memory by default. While this is good for systems with smaller amounts of memory (under 512MB) it is unlikely that a typical XP desktop system will ever need 1.5 X 512MB or more of virtual memory. If you have less than 512MB of memory, leave the page file at its default size. If you have 512MB or more, change the ratio to 1:1 page file size to physical memory size.

8. Remove Fonts for Speed

Fonts, especially TrueType fonts, use quite a bit of system resources. For optimal performance, trim your fonts down to just those that you need to use on a daily basis and fonts that applications may require.

* Open Control Panel
* Open Fonts folder
* Move fonts you don’t need to a temporary directory (e.g. C:\FONTBKUP?) just in case you need or want to bring a few of them back. The more fonts you uninstall, the more system resources you will gain.

9. Use a Flash Memory to Boost Performance

To improve performance, you need to install additional RAM memory. It’ll let you boot your OS much quicker and run many applications and access data quicker. There is no easiest and more technically elegant way to do it than use eBoostr (http://www.eboostr.com).

eBoostr is a little program that lets you improve a performance of any computer, powered by Windows XP in much the same way as Vista’s ReadyBoost. With eBoostr, if you have a flash drive, such as a USB flash thumb drive or an SD card, you can use it to make your computer run better. Simply plug in a flash drive through a USB socket and Windows XP will use eBoostr to utilize the flash memory to improve performance.

The product shows the best results for frequently used applications and data, which becomes a great feature for people who are using office programs, graphics applications or developer tools. It’ll surely attract a special attention of laptop owners as laptop upgrade is usually more complicated and laptop hard drives are by definition slower than those of desktops.

10. Perform a Boot Defragment

There's a simple way to speed up XP startup: make your system do a boot defragment, which will put all the boot files next to one another on your hard disk. When boot files are in close proximity to one another, your system will start faster.

On most systems, boot defragment should be enabled by default, but it might not be on yours, or it might have been changed inadvertently. To make sure that boot defragment is enabled:

* Run the Registry Editor
* Go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfrg\BootOptimizeFunction
* Set the Enable string value to Y if it is not already set to Y.
* Exit the Registry
* Reboot

Hope you find these 10 tips useful. Have a nice day!

Friday, September 07, 2007

Get Yourself Started In Blogging - The Right Way

As of September 2007, more than 106 million blogs have been tracked which makes one wonder just what blogging is.Blogging is that wonderful world where you can write your personal thoughts about what you think on any subject imaginable, whether good or bad, with or without anonymity, although in reality anonymity really doesn’t exist when it come to the Internet. Your website, your email has an ISP address which is easily traceable to any given computer.

In general, blogs are articles you write and post on the web for the entire world to see. Your blog puts you, your thoughts in the forefront, which lets others see your brilliance or idiocy. You can have your own website dedicated to your thoughts, or you can respond to a particular article that has been written which allows you to voice your opinion about the subject or article, although use tact when responding. Most news media allowing you respond to a written article requires you to provide a valid email address in order for you to make a comment.

Most subscribers to the Internet post there blogs on personal web pages or websites their ISP provides. Other bloggers post their comments on the multitude of websites available for posting their thoughts, usually indexed by subject. To find a blog site, simply type “blog/s” in any search engine and behold you will find thousands of blog sites you can read or post.

Methods for blogging vary which you should consider before doing any posting. Blogging in response to a particular article, as well as posting on dedicated blog sites are permanent blogs, in that they can not be changed once posted. With that in mind, you really need to think about what you want to say before posting your thoughts. It’s somewhat like making a comment, once spoken it can’t be undone.

The other side of posting on an open blog site is the libel issue. At present, blog sites are not libel for what you say, so use caution when blogging.

The other method of blogging is to have your own website or page where you write your own blog. Using this method, you can edit your blog, write about another subject or simply delete the blog entirely. This method in my opinion is perhaps the safest method of blogging, but there is a caveat to this method. When you write something on your computer using a word processor and save the document, even if you delete the article, or document, it still resides on your computer and unless you completely reformat or destroy the hard drive, it remains on you computer forever. If someone wants to prove you wrote the article, with the proper software they can retrieve it.

You may wonder if blogging is without peril. That depends. If you are blogging about your Aunt Tilly’s super fruit cake recipe, you’re safe, but if you’re blogging about a politician, an organization, the government, religious leaders, a company, an individual, you need to be careful about what you have to say, as you just might be libel. Presently, in the US, the courts are undecided about blogging, weighing in on the free speech side of the argument, however; individuals have been imprisoned and/or fined for their blogs.

To be safe when blogging, it’s important to use the correct adjectives, or follow the method the news media use when writing an article. Words like; alleged, subject to, suspected of, and the like may keep you out of trouble. Although, innuendos you make can been seen as an attack, an accusation, by some very sensitive people and they just might decide to take action against you.

Even when using safe words, that doesn’t mean you’re not going to suffer the consequences for your big mouth. Many states have what is known as; “The Right To Work Law,” which simply means employers can fire an employee for any reason, or for no reason. Individuals have been fired from their jobs for posting blogs about their company.

Many blogs are instructional in nature from how to grow a tree, wash a cat to building an explosive device. Here again you need to be careful. Those blogs about explosive devices just might cause a visit from a federal agency. Unfortunate as it is, when it comes to blogging, “Big Brother Is Watching!”

Monday, September 03, 2007

K4L0N6

Probably you will be wondering what is the meaning of the title above. K4l0n6 is local virus developed by an Indonesian (in his blog he also put the antivirus) which will disabled:
1. Task Manager - you won't be able to invoke the task manager using Ctrl-Alt-Del. It will say that the task manager has been disabled by your administrator. Although you've logged in as a user who has the administrator rights it will also display that message.
2. Regedit - if you run regedit.exe/regedit32.exe, it will be debugged with notepad.
3. It will disabled the cmd.exe, msconfig.exe, folder options and many more.

Symptoms:
1. If you do a double click on C drive or any drive, it won't show the contains of the folder (unfortunately you have just activated the virus).
2. You can't run regedit, cmd, msconfig, instead it will show notepad.
3. You can't see the folder options.

How to remove:
1. Kill the process of WScript.exe (you won't be able to use the task manager, so you need another program to do it. ProcessXP is one of the softwares you can use. Download it here.)

2. Run Autoruns (if you don't have it already, download it here). Go to Image Hijacks sections. Delete all entries there except the last (it is related to file ntsd.exe, don't delete it as it is needed by windows).

3. Copy this code below and save it as "antivirus.vbs":
[Version]
Signature=”$Chicago$”
Provider=Fariskhi

[DefaultInstall]
AddReg=UnhookRegKey
DelReg=del

[UnhookRegKey]
HKCU,Software\Microsoft\Internet Explorer\Main, Window Title,0, “INTERNET EXPLORER”

[del]
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, NoFind
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, NoFolderOptions
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, NoRun
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableRegistryTools
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\System, DisableTaskMgr
HKCU, Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, NoViewContextMenu
HKLM, Software\Microsoft\Windows\CurrentVersion\Winlogon, LegalNoticeCaption
HKLM, Software\Microsoft\Windows\CurrentVersion\Winlogon, LegalNoticeText
HKLM, Software\Microsoft\Windows\CurrentVersion\Run, Systemdir
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe, Debugger
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\install.exe, Debugger
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe, Debugger
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe, Debugger
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe, Debugger
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RegistryEditor.exe, Debugger
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\setup.exe, Debugger
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV.exe, Debugger
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-CLN.exe, Debugger
HKLM, SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-RTP.exe, Debugger

4. Search and delete these two files: autorun.inf and k4l0n6-x.dll.vbs.

After you have done all the steps above, you should be able to see the folder options again and run cmd or msconfig. Note: if you have opened an explorer before doing the cleanup just close and reopen. All options are now back where it belongs.

For the full information about this virus please refer to the author's blog. It is really amazing what he can do, but although he has put a disclaimer to his post, I am still convince that this is wrong. Sharing knowledge is one thing but if the use of knowledge for wrong purposes that is really destructive. My advise to the author is please be careful with what you are posting because your blog can be read by many people of which we can't control all of them.

Friday, August 31, 2007

Broadband: Understanding the Jargon and How to Get the Best Plan

If you find yourself reading this article online, then odds are you are no stranger to the vast wilderness that is the internet. Uploads, downloads, blogs, videos, podcasts, pictures, forums, games, news, email, animation, flash, webmail, webcams and music can all make for a vast and limitless real-time environment that is constantly changing. It is often the seemingly inexhaustible amount of resources that has many net users tearing out their hair due to strolling performance and extended loading time for content. However, in many cases, the real culprit is not the content or the website itself, but rather the combination of an ill-equipped connection speed and an internet plan that does not adequately address specific user needs.

Before roaming free in the World Wide Web, every internet user must first choose a connection plan and connection speed that will be able to accommodate both their budget and their user needs. The following article seeks to outline some of the basic areas that novice users should address when deciding to connect to the internet. For some, it may seem like commonsense, but for those suffering easily avoidable headaches and long load times it may just make a world of difference.

Connection Speeds

Before beginning it would first be wise to explain the two types of connection speeds and how they fundamentally differ. All methods of internet usage around the globe only use either one or the other of these types of connections.

Kbps: Is the common acronym for ‘Kilobits per second’. A Kilobit is one thousand bits of data – a ‘bit’ being the most fundamental form of binary code that makes up all information available both online and on your home PC. Essentially, a ‘bit’ is the building block of all computer technology and communication. In layman’s terms it is simply the combination of 1s and 0s that form the language of computers.

Mbps: A much larger unit of data, Mbps refers to the term ‘Megabits per second’. A Megabit is one million ‘bits’. This form of data transference is used by every internet connection above Dial-Up speed.

Types of Connection

Dial-Up: The most basic connection available, a Dial-Up connection uses the existing phone line in a business or household to transfer data at around 56Kbps. This is the slowest connection currently available in Australia and is in the process of steadily being outdated due to faster connections being more widely and readily accessible for a lower cost.

ISDN: Is anIntegrated Services Digital Network and is twice the speed (at 128Kbps) of Dial-up. It can be difficult to obtain due to its reliance on what is fast becoming outdated technology. ISDN was essentially the technological stepping stone between Dial-Up and ADSL.

ADSL: Stands forAsymmetric Digital Subscriber Line, also most commonly referred to when the term ‘broadband’ is used, and is a one-way connection where the download speed is much faster than the upload speed. This is a common trap for the average consumer because the speed of the connection is always referenced in terms of the maximum download speed (i.e how fast a page loads up / time it takes to save a file), rather than the much slower upload speed (i.e how long it takes to send an email / send a file to another computer)

Cable: The fastest connection available for both business and residential use (Fibre Optic connections, which are the next level up, are currently exclusive to business due to the high cost of installing and maintaining). Cable internet uses a similar system of connections to most pay television providers. It is completely separate to the household phone line and connection speed is substantially faster for both uploads and downloads. However, speed can be compromised by the number of separate households located in close proximity that use the same cable as only one cable is generally provided for a whole neighborhood. Generally cable runs at around 1.5 – 6 Megabits of bandwidth which is substantially faster than ADSL.

Connection Plans and Common Traps

To maintain a steady and consistently fast connection you need to take care in the selection of your plan. Having selected the telecommunications company with which you wish to subscribe for the service you then need to select a plan based on the cost of installing and maintaining your connection, the type of connection you wish to have installed, the speed of the connection, the download limit, if any, and the consequences if that download limit is exceeded.

The download limit or ‘shaping’ of your plan dictates how much information you can access from the internet within a month before being subjected to either additional costs (which can be significant) or slower connections (usually Dial-up).

According to Miles Humphrys, IT Manager for Corporate Executive Offices, one of the largest international chains of serviced offices throughout the Asia Pacific Region, a common pitfall when deciding on your internet plan is, “not knowing what it is that you, or your business, wish to use the connection for”. According to Mr Humphrys, “Before connecting the business or user must first decide what their primary methods of usage will be. Will they be sending a substantial amount of emails? Downloading live videos or music? Or simply surfing for information? All these factors must be weighed up before signing up to a limited connection or one with a capped amount of usage. Nothing is more frustrating for a business, or home office, than being crippled by an incredibly slow connection because they have gone over their download limit during the day-to-day requirements of the business or user.”

If you are unsure of the amount of data which you are likely to download in a month make sure you select a plan that gives you sufficient download capacity to enable you to then monitor your usage without fear of exceeding your limit. Make sure that your plan is flexible enough to then change if your download requirements are either substantially less or more than you expected.

“The one piece of advice that I would give for anyone looking to connect to the internet either now or in the future, above all, is to - read the fine print! The things to look out for are capped plans, download limits, shaping and especially ‘extra charges’. If you see anything that looks a little odd, always ask questions or consult an IT Professional”, concluded Mr Humphrys.

Monday, August 27, 2007

How To Wipe Disk Drives, And Why

Data security has become a bigger concern as the information age goes into full swing. Computers are becoming more and more commonplace as versatile tools for a wide variety of tasks and uses. This has made digital storage increasingly the data storage format of choice, since digital information is easily accessed and processed by computers.

This has led to a rise in interest in digital information and data storage systems. Apart from developments in hardware technology that allow bigger capacity devices with faster access times, security has also become a prime consideration. Most software and programs nowadays come equipped with varying levels of security options. For instance, it is now possible to protect almost any file with a password such that only those who can provide the correct password would be able to access the information within the file.

However, these software security measures would not stand up to dedicated data extraction efforts, in particular those involving the actual physical hardware. Physically securing the hard drive (or other data storage device) under consideration may not always be possible or practical. Another way of ensuring that important data is not placed at risk is to wipe the disk.

Simply deleting the contents of a hard disk is not enough to ensure that they are not recovered. In fact, there are software utilities that allow the recovery of deleted data. This possibility is because when a file is deleted, it is not actually overwritten or removed from the hard disk. Instead, a marker is just associated with the file to say that it has been deleted, and the space it occupies on the disk is marked available for use. This means that the data in the file remains on the disk for the knowledgeable hacker to extract and view.

Wiping a disk, on the other hand, is a much more thorough process. In a disk wipe, all data to be wiped off is actually overwritten with random data. This eliminates almost entirely the traces that a normal deletion leaves behind, and makes recovery of data practically impossible. (In theory, it would still be possible to reconstruct the data lost after a hard disk wipe, but this would require high-powered microscopes and would proceed much too slowly to be useful!)

Performing a disk wipe is facilitated by the many disk wipe programs available. There are many free options, as well as commercial software options, which may differ in terms of functionality and documentation. The majority of these are available online, which makes it quite easy to browse through and find the most appropriate program for the specific task. Some programs are designed for use on a single personal computer, while others may be designed for use on batches of computers.

Confidential data that needs to be kept from being exposed may best be hidden by using a disk wipe. This simple additional security measure makes the recovery of deleted data nearly impossible. With the many disk wipe programs available, it is easier than ever to perform a disk wipe, even for casual users, making this a real data security option.

Friday, August 24, 2007

Free Spyware Removal Software - Why Use It?

I guess most of us have been bothered with spyware infections once or more. Nobody likes that their computer become slow because of them, and nobody likes to pay a huge pile of cash just to get rid of them either. In this article I write about a great spyware removal tool that is free. What you get for zero bucks could sometimes actually be a whole lot.

When people get infections into their home computer, many are not aware of the existence of such threats. They just keep on working with their slow running computers until they stop almost completely. Some ask friends or relatives with a little computer experience to take a look at their computer. Therefore I will try to explain the importance of having protection, and how to get something that works.

Through the two latest decades we have seen computers eventually come into our lives, and that we use them more and more, and integrate them to become more or less a necessity in our homes. But, when internet was made public in 1990 we also began to see more and more of all the problems that came along with it.

An experience that I've had often is, when a system was near a breakdown, the problems was very often caused by a massive infection of online threats. Today we know them as spyware, adware, worms, trojan horses or viruses. They crawl up your cables and into your system, and when they become many they start competing with eachother for the available resources.

This will cause the computer to slow down, and when it eventually comes to a complete stop, the number of nfections will be too high for the computer to handle. All the power you need to do your stuff will be unavailable. An overrun system is of no real value to the user, because there are virtually no resources left to run real programs. This computer system has also become a real danger to privacy.

A good security tool could get rid of these bugs. I recommend that you have three basic types of security software installed on your system. Number one is a firewall protection. This will help prevent hackers from breaking into your system. Number two is a good antivirus solution. This keeps viruses, worms, trojan horses and often other types of threats away. Number three is to have a good spyware removal tool, because these threats are the most common ones today. They spread between computers like wildfire. Some of them are even made to steal your private information.

A quality piece of security software would protect you from various types of threats. But no software will make your system total immune, and a combination of different pieces of quality software is always preferred.

No matter what, it is always better to atleast have somekind of protection software installed, rather than nothing at all. So you might need to look for some you too. A good place to do this is online. This is because you simply get the fastest delivery and the best prices. But you have to look carefully for it.

I need to alert you about a new type of threats that is spreading around the world these days. A bug slips into your system, and almost instantly pops up with a warning about a "system error" from something called "Security Center" or similar. You should pay attention to this kind.

They infect you in the first place, then they want you to purchase a remedy for their disease and other types of infections. But most of them don't get rid of anything but the warnings, and even slips more bugs into your computer. Sneaky don't you think?

There are alot of software and solutions to choose from. Some are expensive, some are cheap, some are good and some are worse. They vary as much quality as they vary in price, and the most expensive ones are not by far always the best ones.

Infact there are actually spyware removal software packages that will protect against several categories of threats, and it will even clean up your computer's registry. This feature alone is a good way to increase the computers speed. I know about a really great tool that will do all this for you, and even for free.

This package does unfornately not include a firewall protection, but if you are running Windows XP there is a good firewall included in this operating-system. Just go to the control panel, and then to the Windows security center to activate it. It works great, and you should definately turn it on if you have it in the first place. This firewall in combination with the totally free spyware removal tool we provide on our website, you'll suddenly have a nice protection.

If you see the point of being protected for free rather than not protected, I have met my goal. Take care, and secure your computer properly. More information about this great free tool is to be found at our website.

Tuesday, August 21, 2007

Acquaint Yourself With Computer Printers

A computer printer is a device used for printing text or images on hard copy stored in electronic form, generally on physical print media like paper. Printers are designed to support both local and network connected users simultaneously.

Nowadays, modern printers can directly interface to electronic devices like digital cameras. Some printers that come with non printing features are commonly known as Multi-Functional Printers (MFP) or Multi-Function Devices (MFD). It integrates various functions of multiple devices into one. Such types of printers are extremely useful for small businesses and home offices.

As opposed to a traditional printer, a multi-functional printer is a combination of devices like Printer, Scanner, Photocopier, and Fax Machine. Likewise, there are numerous other types of printers widely available in the market. Let’s take a look at them:

Laser Printer: A laser printer works in a similar fashion as a photocopier does. It has a roller which is charged with electricity. A laser beam is passed to remove the charge from portions of the roller. The parts hit by the laser are powdered by the toner which is then transferred from the roller to the paper. Finally, the ink is baked into the paper with the help of a heater incorporated in the printer. People generally prefer laser printer because of its ability to give high quality output and high speed.

Dot Matrix: It has a print head that moves across the page. A dot matrix printer produces characters using a cluster of pins which press an inked ribbon to the paper, thereby creating a dot. Each character is made in the same way. Dot Matrix printers are relatively cheaper and durable. These qualities still attract businesses which use them as invoice printers.

Ink Jet and Bubble Jet: It works in a manner similar to a Dot Matrix Printer. However, its print head sprays liquid ink onto the page instead of pressing a dry ink against the page. Ink jet and bubble jet printers are better known as predecessors of laser printers. They produce better image quality and run faster.

>From inkjets to monochrome and color lasers, different printers are designed to accomplish different tasks. Companies like DELL, CANON, LEXMARK, BROTHER, EPSON, and HP HEWLETT PACKARD are most preferred when it comes to buying a printer. Nowadays, computer printer support is widely available on the Internet which saves you from taking it to any expensive technician for troubleshooting.

Friday, August 17, 2007

Fighting Off Viruses: Advancements In Antivirus Software Suites

Protecting your computer from a virus is getting harder and harder each day. While it may border on the paranoid, it goes without saying that you can’t leave your guard down for one second. Even corporate giant Microsoft has found its own systems compromised on more than one occasion.

Remember the “good old days”, before the advent of the Internet and downloadable programs? Life was simple then in terms of computer viruses. With the primary way in which a virus could be transmitted being limited to floppy disks, the ability to catch and eradicate the virus was a lot easier. By today’s standards, it used to take quite a while before a virus was able to infect a computer and slow down the system. The antivirus software of that time was typically able to identify and eradicate viruses before they caused too much damage. Additionally, computer users were pretty savvy on how to protect themselves in terms of scanning all floppy disks before copying them to our desktop.

The Internet helped change all that. The Internet provided a conduit by which viruses could move from host to host with lightening speed. No longer could a computer user just worry about floppy disks as points of entry, but they now had to worry about email, email attachments, peer-to-peer file sharing, instant messaging, and software downloads. Today’s viruses can attack through multiple entry points, spread without human intervention, and take full advantage of vulnerabilities within a system or program. With technology advancing everyday, and the convergence of computers with other mobile devices, the potential of new types of threats also increase.

Protecting Your Computer

Luckily, the advancement of antivirus software has kept pace with current virus threats. Antivirus software is essential to a computer’s ability to fend off viruses and other malicious programs. These products are designed to protect against the ability of a virus to enter a computer through email, web browsers, file servers and desktops. Additionally, these programs offer a centralized control feature that handle deployment, configuration and updating.

A computer user should remain diligent and follow a few simple steps to protect against the threat of a virus:

1. Evaluate your current computer security system.

With the threat of a new generation of viruses able to attack in a multitude of ways, the approach of having just one antivirus software version has become outdated. You need to be confident that you have protected all aspects of your computer system from the desktop to the network, and from the gateway to the server. Consider a more comprehensive security system which includes several features including antivirus, firewall, content filtering, and intrusion detection. This type of system will make it more difficult for the virus to penetrate your system.

2. Only install antivirus software created by a well-known, reputable company.

Because new viruses erupt daily, it is important that you regularly update your antivirus software. Become familiar with the software’s real-time scan feature and configure it to start automatically each time you boot your computer. This will protect your system by automatically checking your computer each time it is powered up.

3. Make it a habit to always scan all new programs or files no matter from where they originate.

4. Exercise caution when opening binary, Word, or Excel documents of unknown sources especially if they were received during an online chat or as an attachment to an email.

5. Perform regular backups in case your system is corrupted. It may be the only way to recover your data if infected.

Recommended Antivirus Software

There are numerous applications available to consumers. With a little research, you can pick the program that is right for you. Many programs provide a trial version which allows you to download the program and test its abilities. However, be aware that some anti-virus programs can be difficult to uninstall. As a precaution make sure to set up a System Restore point before installing.

Here are a few programs which typically receive high marks in terms of cost, effectiveness, ease of use, and customer service.

The Shield Pro 2005™ provides virus protection and hacker security through ongoing support and updates. When a virus breaks out, The Shield Pro 2005™ promises to provide a patch within 2-3 hours and a fix for the virus within 5 hours. You can set your computer to update viruses weekly and run a complete virus scan.

BitDefender 9 Standard provides antivirus protection, as well as Peer-2-Peer Applications protection, full email protection, and heuristics in a virtual environment. This provides a new security layer that keeps the operating system safe from unknown viruses by detecting malicious pieces of code for which signatures have not been released yet.

Kaspersky Anti-Virus Personal 5.0 program is simple to install and use. The user only needs to choose from three levels of protection. It allows updates as frequently as every hour while promising not to disrupt your computer. The program also offers a two-tier email protection feature and round-the-clock technical support.

PC-cillin Internet Security combines antivirus security and a personal firewall—for comprehensive protection against viruses, worms, Trojans, and hackers. It also detects and removes spyware and blocks spam. It even guards against identity theft by blocking phishing and pharming attacks.

AVG Anti-Virus Free Edition is a free downloadable antivirus program that has received high marks for its reliability. In the past, free downloadable antivirus programs have been viewed skeptically because of issues relating to its reliability. However, AVG from Grisoft, remains one of the best-known free anti-virus programs available. While AVG can not be installed on a server operating system and there is no technical support, it still makes a good choice for many home computer users. The best part is that since it is free, you can try it with no further obligation necessary.

NOTE: You have full permission to reprint this article within your website or newsletter as long as you leave the article fully intact and include the "About The Author" resource box. Thanks! :-

Sunday, August 12, 2007

Safari

It seems that the "product war" between Apple and Microsoft will still continue. After launching their newest operating system: Mac OS X Leopard, Apple now claimed that their latest web browser: Safari is the fastest web browser today. On their official website, you will see there are three categories which are included as comparison tools.
Html performance:

The fastest web browser on any platform, Safari loads pages up to 2 times faster than Internet Explorer 7 and up to 1.6 times faster than Firefox 2.

Javascript performance:
And it executes JavaScript up to 2.8 times faster than Internet Explorer 7 and up to 1.6 times faster than Firefox 2.

Application launch:
You guessed it right, Safari still leads with time needed to load is only 1.74s, Opera comes in second, while Mozilla and Internet Explorer in third and fourth respectively.
What does all that mean for you? Less time loading pages and more time enjoying them.

Wow, it is indeed a really bold claim. But I am sure they won't go telling the whole world about it, if it is a lie. I have just used Safari for a few days now and from what I can tell it is really quicker than Mozilla. They will have to continue to develop it though as there are maybe only a few add-ons that can be installed with it. Unlike his rival Mozilla which has a lot of add-ons that you can install according to your needs and preferences. Aside from all of that, I think that Internet Explorer and Mozilla has a new rival that can really beat them as the "fastest web browser".

Click here to download Safari.

Thursday, August 09, 2007

Fun Games to Play With the Family

Many families today do not spend that much time together. Life seems to get in the way, and they end up going their separate ways and doing their own things. However, there are ways to bring the family closer, and one way is through the playing of games. With that in mind, however, it is important to find games that everyone can play, so that they can all have fun and enjoy what they are doing. Without the entire family being able to play, the people that are left out will be resentful and the goal of getting the entire family involved will be lost. Fortunately, there are many fun games available.

Some of the easiest ones to play are backyard games like horseshoes and beanbag toss. These are games that do not require a lot of set-up and preparation. In addition, they have simple rules and they are games that almost anyone of any age can play. Because of this, the entire family from very young children through to the elderly grandparents and even great-grandparents can play them. When games are available for such a large group of individuals, they can really help to keep families together. Sometimes, though, the weather is bad and games cannot be played outside. It may be too hot for everyone to enjoy it, or it may be raining or cold.

When outside games cannot be played, there are family games to play inside. Most people think of video and computer games, and those can be very enjoyable, but there are other games. Many people still like board games, and putting together a puzzle can be a fun family activity, as can doing an art project, making a scrapbook, or looking at family photos. For those that want a different kind of indoor game, though, there are many options that people used to play such as hide-and-seek or sardines. Searching the Internet for these kinds of games can provide parents with a list of many fun activities that the entire family can enjoy.

Sunday, August 05, 2007

Profile Suns Warrior II

The second longest serving administrator: Darma. First impression: calm, cool, silent, not talkative. But all of that will go away once you get to know him. He is a neat and tidy person and responsible with his work. Here is the complete profile of him.

Name : Made Darmayasa
Nickname : Darma
Birthday : 1985
Occupation : University Student
University : Electrical Engineering - Udayana University
Status : It's Complicated
Friendster : dharma


Saturday, August 04, 2007

Profile Suns Warrior I

Hey, this is a special post. Suns Warrior is what we called the administrator of Suns.NET internet cafe. For the first time here is the profile of our longest serving administrator: Swan (nothing related to duck).

Name : Made Swandana
Nickname : Swan
Birthday : 1985
Occupation : University Student
University : Electrical Engineering - Udayana University
Status : In A Relationship
Friendster : made


Monday, July 09, 2007

Software

To complete our review of the internet cafe, we have to look at the software installed in the server and clients.

The Server

  • Microsoft Windows XP Home Edition
  • Norton Internet Security 2007
  • Nero 7.0
  • Open Office (using free office, it turned out it is quite good)
  • LimeWire (P2P)
  • BitTorrent(downloading movie for free or rental or buy)
  • Bandwith Controller (to manage all bandwith used by clients)
  • Billing Explorer (of course we need to have this one)
  • FLV Player (playing flash video, usually for downloadable YouTube)
The Client
  • Microsoft Windows XP Home Edition
  • Norton Internet Security 2007
  • Open Office
  • LimeWire
  • BitTorrent
  • MSN Messenger, Yahoo, mIRC (each messenger has its own pros and cons, so installed all)
  • CamFrog (video chating)
  • Skype (low cost telephone)
  • DeepFreeze (it's a must for internet cafe, otherwise any user can change your computer settings and can cause problems for you)

Friday, July 06, 2007

Hardware

It is time for us to take a look at all the hardware that we use. This include server and clients. Okay, let's get into the server first:

The Server

  • Motherboard Intel
  • Processor Intel Core 2 Duo 1.8 Ghz
  • Memory DDR2 1 Gb PC 5300
  • Soundcard Creative Soundblaster Live 5.1
  • Harddisk Seagate 200 Gb
  • DVD-RW Sony
  • Monitor LCD Acer 17"
I think the main server is powerful enough to handle the clients. There are seven clients in total which has the specification listed below:

The Client
  • Motherboard PC-CHIPS
  • Processor Intel P4 3.0 Ghz
  • Memory DDR2 512 PC 4200
  • Harddisk Maxtor 40 Gb
  • Monitor LCD LG Flatron 17"
  • Webcam Logitech
  • Headphones

Thursday, July 05, 2007

The Exterior

Now that you have seen the interior, what about the exterior? Not much I can say about the exterior. This is the front door, if you look from outside.


And to make the place easier to see from the distance, we have put a neon box just beside the main street.



And if you can't see the neon box, there is also our banner which we put on top of our front door.

The Interior

This time we are going to know a little bit better about the place. I will be your tour guide to the place we call "Suns.Net". Shall we? Coming through the front door you will be in the main room. Here is the picture of the main room.


At the end of the room there is a stair which leads you to the second floor (I am going to use it as a room where people would bring their wifi laptop and use our hotspot).


On the left side of the room there are five internet booths. These booth are the same as other booths which you can find at any internet cafe.


On the other side, there are also five booths. But these booths have a different architecture. It is specially design to meet your comfort.


Inside the booth you will find a really cozy pillow and a very wide space so you wouldn't realize that you're in a booth.


Here is a view inside the booth.


As you can see, we do care about our customer's comfort. That is why we are using a flat 17" monitor. Guaranteed it won't make your eyes tired. Now coming to the front. Here is the counter desk.


Now, across the counter desk there is a red round table for people who would want to try our hotspot or even just want to hangout, drink or eat.


To make the room "alive" we put plants in the front door and on the back.



To make the room clean from smoke (generally people who go to internet cafe are smoker), we have put two exhaust fan (the red color will probably make you wonder if this is an internet cafe or a fire department).


So with all those comforts, wouldn't you be thinking about giving my internet cafe a visit? Just like this cat below (which is always waving his hand and hoping someone will come),


we are hoping to see you in the near future. Bring all your friends and feel the cozy feeling in our internet cafe, just like this customer for instance.


Anybody know who he is? Hehehehe....

Tuesday, July 03, 2007

The Logo

Hi, after a lot of hard works finally the Suns.Net internet cafe officially opened last Saturday. But that was the soft opening. We have been giving free internet access for the last two days now, and hoping that would attract many customers. Lets just cross our finger and see until the end of the week. Oh almost forgot, here are the logos for my internet cafe, it has a feminin look on it.




PS: Thanks to Mr. Asep for making these logos.

Saturday, June 30, 2007

Suns.NET Officially Opens!

Soft opening to be exact. Yes today is our soft opening day. We are giving 2 hours free for each person who walks to our door. So if you happens to be anywhere near Denpasar, please feel free to visit our internet cafe. You will also eligible to be a member with no membership charge, a.k.a it's free! Our internet cafe currenctly has seven clients with ADSL connection up to 384 kbps. I think 2 hours of free surfing on the internet with ADSL connection is really tempting, don't you? Anyway happy opening day for Suns.NET internet cafe, may you be blessed and prosperous.

Monday, June 25, 2007

Under Construction

Do apologize, this site is still under construction! This site is intended for Suns.NET internet cafe which is also under development. Hopefully the Suns.NET internet cafe will be opens soon then I can post everything about it. In this blog I would like also to share my blogging experiences, how to make money using your blog and some blogging (especially blogger related) hacks. Check this site anytime you like, comments and critics are welcomed.