Saturday, December 6, 2008

Detecting Computer Error Beep Of Sound

Detect errors from the sound BeepBeep computer (motherboard speaker's voice) is often used as a standard way to detect the damage on the motherboard. Indeed, every motherboard (more precisely each BIOS) sometimes use a different sound when the computer booting.

The difference is what you should know to prepare for your computer errors. Even so, listening to beeps are not the only solution, but at least with the sound of it you will know the next step in the process of improvement.

Beep Code following standardization my coffee from one of a collection of hacking articles. However, once ayang, the source of the following articles I do not find on the internet. But, thanks a lot for the creators.

Standard Original IBM POST Error Codes
Code Explanation

1 short beep System is OK
2 short beeps POST Error - error code shown on screen No beep Power supply or system board problem Continuous beep Power supply, system board, or keyboard problem Repeating short beeps Power supply or system board problem
1 long, 1 short beep System board problem
1 long, 2 short beeps Display adapter problem (MDA, CGA)
1 long, 3 short beeps Display adapter problem (EGA)
3 long beeps 3270 keyboard card

IBM POST Diagnostic Code Descriptions
Code Explanation

100-199 System Board
200-299 Memory
300-399 Keyboard
400-499 Monochrome Display
500-599 Color / Graphics Display
600-699 Floppy-disk drive and / or Adapter
700-799 Math Coprocessor
900-999 Parallel Printer Port
1000 - 1099 Alternate Printer Adapter
1100 - 1299 Asynchronous Communication Device, Adapter, or Port
1300 - 1399 Game Port
1400 - 1499 Color / Graphics Printer
1500 - 1599 Synchronous Communication Device, Adapter, or Port
1700 - 1799 Hard Drive and / or Adapter
1800 - 1899 Expansion Unit (XT)
2000 - 2199 Bisynchronous Communication Adapter
2400 - 2599 EGA system-board Video (MCA)
3000 - 3199 LAN Adapter
4800 - 4999 Internal Modem
7000 - 7099 Phoenix BIOS Chips
7300 - 7399 3.5 "Disk Drive
8900 - 8999 MIDI Adapter
11,200 to 11,299 SCSI Adapter
21,000 to 21,099 SCSI Fixed Disk and Controller
21,500 to 21,599 SCSI CD-ROM System

AMI BIOS Beep Codes
Code Explanation

1 Short Beep System OK
2 Short Beeps Parity error in the first 64 KB of memory
3 Short Beeps Memory failure in the first 64 KB
4 Short Beeps Memory failure in the first 64 KB Operational of memory
or Timer 1 on the motherboard is not Functioning
5 Short Beeps The CPU on the motherboard generated an error
6 Short Beeps The keyboard controller may be bad. The BIOS can not switch to protected mode
7 Short Beeps The CPU generated an exception interrupt
8 Short Beeps The system video adapter is either missing, or its memory is faulty
9 Short Beeps The ROM checksum value does not match the value encoded in the BIOS
10 Short Beeps The shutdown register for CMOS RAM failed
11 Short Beeps The external cache is faulty
1 Long, 3 Short Beeps Memory Problems
1 Long, 8 Short Beeps Video Card Problems

Phoenix BIOS Beep Codes
Note - Phoenix BIOS emits three sets of beeps, separated by a brief pause.

Code Explanation

1-1-3 CMOS read / write failure
1-1-4 ROM BIOS checksum error
1-2-1 Programmable interval timer failure
1-2-2 DMA initialisation failure
1-2-3 DMA page register read / write failure
1-3-1 RAM refresh verification failure
1-3-3 First 64k RAM chip or data line failure
1-3-4 First 64k RAM odd / even logic failure
1-4-1 Address line failure first 64k RAM
1-4-2 Parity failure first 64k RAM
2-_-_ faulty Memory
3-1-_ faulty Motherboard
3-2-4 Keyboard controller Test failure
3-3-4 Screen initialisation failure
3-4-1 Screen retrace test failure
3-4-2 Search for video ROM in progress
4-2-1 Timer tick interrupt in progress or failure
4-2-2 Shutdown test in progress or failure
4-2-3 Gate A20 failure
4-2-4 Unexpected interrupt in protected mode
ffffh" onmouseover="'#ebeff9'" onmouseout="'#fff'">4-3-1 RAM test in progress or failure> ffffh
Motherboard faulty 4-3-2
4-3-3 Interval timer channel 2 test or failure
4-3-4 Time of Day clock test failure
4-4-1 Serial port test or failure
4-4-2 Parallel port test or failure
4-4-3 Math Coprocessor test or failure
Low 1-1-2 System Board select failure
Low 1-1-3 Extended CMOS RAM failure

Trojan Bag 1

Trojan 1Trojan Bag is a result of the evolution of a troy or the Trojan said that a nation legends about the delivery troy horse as an offering of friendship to the nation troy. For more details, please watch the movie Troy.

The essence of the legend that is, a statue of a horse which is used as a gift is actually a powerful weapon to stifle troy kingdom. On the statue there is a bunch of soldiers who were waiting for the right time to attack the kingdom of troy. And when the night comes, when people were already asleep, penyeranganpun happen very powerful and destroyed the kingdom leburkan troy.

Well, the core concept Trojan something like that. You will pretend to send a file to the victim by giving attractive names, such as inul_bugil or krisdayanti_bugil or kucing_bugil or anything that actually is a fake file. Certainly the potential victims (as happened to the guy gatel) will be motivated to get clicking. And when the file is clicked, then you (the sender) are eligible for the gift as a devil haunts. Because when you also have 100% control of a victim computer with no censorship at all. You can remove the CDROM it from a distance, can also peek favorite videos ever seen the victim or you can record everything typed by him. Interesting is not it?

To be able to use a Trojan, you do not need to be a programmer. You simply use aplikas-applications that are intentionally designed for such activities can be found on the internet a lot. Some of them are as follows:

1. Optix Pro
2. SubSeven
3. Commander
4. Assassin
5. Etc. will be discussed in detail on the connection of this title.

All you need to understand as the basic ingredient is the following chart:

Trojan Bag 1

From the chart, hackers plays as a client and the victim as a server. Why is that? because in this case the hacker planted a file (called the file server) on the victim's computer to then be used as a remote material.

In the local network, anonymous is not so necessary, though actually quite important, too. Anonymous Proxy is also proper to use as a fort to disguise the identity.

Overcoming Session Error Warning

Finding error when doing develop, not something you should fear. Because every error that occurs is a special opportunity to become better application again.

This article will discuss two types of errors that occur in session procedure in PHP and is a continuation of the article about the PHP Session.

Okay, so save your reading time, following detail the case:

Warning: Unknown: Your script possibly relies on a session side-effect which existed until PHP 4.2.3. Please be Advised that the session extension does not consider global variables as a source of data, unless register_globals is enabled. You can disable this functionality and this warning by setting session.bug_compat_42 or session.bug_compat_warn to off, respectively. in Unknown on line 0

The message was conveyed by the PHP session variables associated with that you create. Differentiate the two examples following script:

example 1:
session_start ();
session_register ( "usermember");
session_register ( "passmember");
$ usermember = $ datauser [userid];
$ passmember = $ datauser [password];

example 2:
session_start ();
session_register ( "usermember");
session_register ( "passmember");
$ _SESSION [ 'Usermember'] = $ datauser [userid];
$ _SESSION [ 'Passmember'] = $ datauser [password];

Warning error above will occur when you use a command script as an example 1. The solution, of course, you should use the script as an example 2. So as a small conclusion, the session you need assertiveness to say whether a variable is a session or not. If planned as a session, then from the beginning had to be confirmed with the command $ _SESSION [ 'namavariabel'].

Warning: session_start () [function.session-start]: Can not send session cache limiter - headers already sent (output started at D: \ xampplite \ htdocs \ donation \ koneksi.php: 4) in D: \ xampplite \ htdocs \ donors \ login.php on line 16

2 error messages on your face will be if you put the command session_start (); not in the right place. It commands this one quite selfish. He must be placed before anything else. Consider two examples of the following script:

example 1:
if ($ usermember == $ datauser [userid])
session_start ();
session_register ( "usermember");
session_register ( "passmember");
$ _SESSION [ 'Usermember'] = $ datauser [userid];
$ _SESSION [ 'Passmember'] = $ datauser [password];

example 2:
session_start ();
if ($ usermember == $ datauser [userid])
session_register ( "usermember");
session_register ( "passmember");
$ _SESSION [ 'Usermember'] = $ datauser [userid];
$ _SESSION [ 'Passmember'] = $ datauser [password];

In example 1, session_start (); placed after the branching order if (). That means the command was run after other procedures. Well, to avoid messages like ERROR 2, we recommend you use a command like the example 2.
Contribute a better translation

Turn off Computer With SUICIDE"

Turn off the computer with SUICIDE Usually, when the computer off, we'll do it manually. This article will discuss about how to turn off the computer with a suicide death dewek alias.

Wait a bang! What benefits do I turn off the computer like that?.

Let's say you want after a virus scan with anti virus, the computer automatically die by itself.
Can not like that's it! Bisalah yes, time can dong.

Ok do not have to wait for long before I introduce a software AllOff automatically shut down your computer. Which can dowload here.
This software is free but you must register first to get a userid and verification code. The later code will be sent to the "you've got mail".

Ok think you've successfully installed:

Turn off the computer with SUICIDE

This software will disable your windows automatically aktiftas if there is no CPU, no typing, and no shift in the mouse.
Some things that may be very possible you need. First press the Configure button and there you will find:

1. No Activity Delay: enter a few seconds if there is no computer activity die die alone
2. CPU Thresolt: what percentage of CPU activity that you think can turn off the computer. Minimum 5%
3. Shut Down time: How time-out for computer menshutdown
4. Shut down Type: besides Power of (computer off), you can also mensettingnya supa windows berhibernate, reboot or just standby.

Windows XP Can not Connect Wireless"

Windows XP can not connect my WirelessTeman insisted (until almost spurted uratnya) says that the wireless device on the laptop no problem. Itchy butt, gemes, still glaring at her friend who had a verdict if wirelessnya hardware error.

But anyway, that's not what we will discuss. This time, we will discuss about Windows XP that can not connect to wireless. In fact, you are sure that there is no problem at all with the hardware. And the driver was already installed properly. However, when clicking the Connect button on the wireless network one captured, which appears precisely is the message as follows:

"Windows is Unable to connect to the selected network. The network may no longer be in range. Please refresh the list of available networks and try to connect again."

Free translation roughly like this: "The fact that windows can not connect to the network due to (probably) no longer be in range. Please refresh and try connecting again. "

The message still appears every time you click the Connect button, when the signal obtained in the status of Strength (full).

This problem often occurs by the unavailability of security features in accordance with the provisions of the Wireless Router. Windows XP, by default only provide two types of wireless security type, the WPA and WPA-PSK.
Thus, if you specify security at the router is WPA2, then of course windows xp considered not reach the network (although the full visible signal) or the language of windows usually say "may no longer be in range".

So, whether you are wrong windows xp?, Whether your windows bad? .. instead, it would be stupid if you think so.

You should know that WPA2 was created after Windows XP in circulation. Hence, it is normal that Windows XP has not included it on the wireless feature is available. The solution, you should download the update files directly from its official website. To speed up the search, should go to google and type in "WPA2 update site:". The file you should download the KB893357.exe.
After that, you live install and restart the computer.

Family game night to foster healthy and harmonious family

When did you as a father and mother never think how many hours you actually set aside time for family, children, wife and your husband? last time you took the time to be with family? these questions may be currently difficult in charge because you are all busy.

In the morning you've got to go to the office, your wife is also getting ready to work, your kids busy with school so rarely seen even just for the exchange of greetings. This situation is certainly not healthy, therefore it is currently the trend term family game night or dinner with the family by doing the game.

Spend time with the family game night is one solution for your family to do activities with your family.

By doing family game night, you can re-start the atmosphere is less rigid and harmony between the families because of lack of communication during this.

To the family doing night game with your family by doing some activities that are useful and fun, like playing guess the picture, monopoly, cards and even you can do by going out together to the game or to the food area.

Condition is that all family members should spend a special time for family game night and forget all the daily activities and your activities, if necessary, turn off your mobile phone so that no interference.

POM RI Laboratory launched to Nowhere

As a body the duty to protect the public from drugs and food products at risk to health, POM supervise medicinal products, traditional medicines, cosmetics, food and food supplements. To improve surveillance coverage, RI POM develop Kelilin g. Laboratory Program

Circuit Laboratory launched by BPOM labolatorium RI is a multifunctional testing laboratory equipped with counterfeit drugs faster, faster testing laboratories Hazardous Materials contamination in food and public information materials in the form of books, leaflets, brochures, comic books and multimedia materials.

Circuit Laboratory is working to:

* Supervision of food containing hazardous materials.
* Supervision of cosmetics containing hazardous materials.
* Supervision counterfeit drugs.
* Supervision TIE products (Without distribution license)
* Monitoring product daluarsa
* The information for the community.

For now launched mobile lab now consists of 8 units, 7 units will be operational in 5 areas of DKI Jakarta and 1 unit will be operational in the area of Serang, Circuit Laboratory is expected to be realized also in Indonesia.