Saturday, February 19, 2011

JUSTIN BIEBER AND SELENA GOMEZ MARRIED!

ST. LUCIA –  Justin Bieber and Selena Gomez were married in the Caribbean over the holiday.
After Justin Bieber and Selena Gomez were caught smooching in the Caribbean, rumors began to circulate that the two were dating. As it turns out, the couple didn’t go on vacation to catch some rays– they went to get married!
Gomez and Bieber have been rumored to be dating for months. Though they have been caught kissing and hugging in public, both parties deny that they are involved in a romantic relationship.
“The Biebs and I are just friends,” said Gomez in an interview last month. “Besides, he’s only 16 and I’m 18. It would be illegal for us to hook up.”
Obviously, Selena was only talking about marriage laws in the United States, because in the St. Lucia, it is legal for an 18 year-old to marry a 16-year old with written consent.
The couple departed for the Caribbean island on New Years Eve, telling reporters that they were going out for a “fun weekend” and “to take a break from the stress of life.”
But we at Weekly World News had a hunch that something more was going on, so we sent some photographers out to crash the wedding. Here’s an exclusive shot from the ceremony:
According to inside sources, the wedding was a small, family-only affair that took place on Bieber’s private yacht. Usher, Ludacris, Ashton Kutcher, and Kim Kardashian were rumored to have attended.
“Justin Bieber and Selena Gomez could not be happier right now,” said Bieber’s publicist, “and I know they want the rest of the world to share in their happiness. It won’t be long before they announce their marriage to the world.”
The couple is rumored to be honeymooning in Thailand at the moment. They could not be reached for comment.

Microorganisms

Are you used to have seen one of these creatures? Yes, if you are a lover of Microbiology, and “swallow” everything that has to do with this topic. Otherwise, they are all around us, but you can not see them because they are too small. Hidden, tucked, this small but very complex beings live their lives. Their external structure reminiscent of the animals much larger than them. The diversity of microorganisms is really amazing and interesting, and these photographs enable us to learn more about the world around us, which is incredible.
microorganisms under a microscope01
microorganisms under a microscope02
microorganisms under a microscope03
microorganisms under a microscope04
microorganisms under a microscope05
microorganisms under a microscope06
microorganisms under a microscope07
microorganisms under a microscope08
microorganisms under a microscope09
microorganisms under a microscope10
microorganisms under a microscope11
microorganisms under a microscope12

Batu Pelik

Most Expensive Laptop - Top 10

10. Acer Ferrari 1100: This laptop is worth $3,000, it is built with ultra light design that wears resistant carbon fiber chassis, designed just like a Ferrari car. The laptop carries 4 GB of RAM and a AMD Turion X2 Dual Core processor.
Acer Ferrari 1100

9. Dell M6400: This laptop also has a price tag of $3,000, though it does not look as good as Acer’s Ferrari 1100 but comes with ultra powered specifications. The laptop has a Quad Core Extreme processor and packs up 16 GB of RAM along with additional 1 GB graphics memory. The top class specifications this laptop is the only reason which makes it a must buy laptop.
Dell M6400
8. Toshiba Qosmio G-35-AV660: This amazing laptop by Toshiba costs $3,500 but still it is worth it. The laptop is powered by a core 2 duo processor, 250 GB of hard disk drive and Nvidia Geforce 7600. The laptop also has a 17 inch screen with a max resolution of 1920×1200.
Toshiba Qosmio G-35-AV660
7. Lenovo Thinkpad W700DS: This laptop offers numerous features which makes it worth $4,500. The best feature is that this laptop has an additional pull-out display other than a 17 inch display, which makes it very useful for running different engineering software such as CAD. The laptop is powered by a Core 2 Quad processor, 4 GB of RAM and 250 GB hard disk drive.
Lenovo Think pad W700DS
6. Alienware Area 51: Being an Alienware product, this product is definitely going to satisfy all videogame lovers. This laptop has core 2 duo processor and 1TB hard disk drive. The laptop also features some sleek and stylish looks, and also comes with an Nvidia GeForce 9800 GT in dual SLI configuration and 1 GB of graphics memory. This laptop is worth $5,000.
Alienware Area 51
5. Rock Xtreme SL8: This is considered to be the best laptop for portable gaming. This monstrous laptop packs 8 GB of RAM and a Core 2 Quad Extreme processor. Nvidia 9800 GT with 1 GB of memory fulfills its graphics requirements. This laptop has a price tag of $5,000.
Rock Xtreme SL8
4. Voodoo Envy H-171: This laptop comes with the optimized settings. The laptop is powered by Intel Core 2 Duo Extreme X6800 processor, 4 GB of RAM and comes with a dual 250 GB hard disk drive. Voodoo Envy has 17 inch screen display with the max resolution setting of 1920×1200. This laptop is worth $8,500.
Voodoo Envy H-171
3. Ego for Bentley: This laptop is meant for those rich women who are willing to spend $20,000 just for fashion purpose, as this laptop has no good specifications and only supports 64 bit windows Vista and packs up 160 GB of Hard Disk. The logo of Bentley on this laptop makes it look very stylish and the color also matches the color of the car.
Ego for Bentley
2. Tulip E-go Diamond: This laptop is worth $355,000 and is considered to be the world’s most luxurious laptop. It has only 2 GB of RAM and 160 GB of Hard Disk. This laptop is also basically meant for fashion purposes only.
Tulip E-go Diamond
1. Luvaglio: Very few people are going to believe it, but it is a bitter fact that this laptop has a price tag of a million dollars. These laptops are built on orders only, and in this case, the buyer is given an option to choose the specifications and the design of the laptop and also which material to be used for making the body of the laptop. This laptop consists of a 128 Solid State Drive, built-in USB support, an mp3 player and is also equipped with an integrated screen cleaning feature.
Luvaglio

Strange facts that we do not know:



     

1 - Paper money is not the doing of paper instead of cotton
     

2 - Baby's stomach can only accommodate 60 ml of milk at a time. Stomach while adults have the maximum capacity of 1.5 liters. However, cattle can carry 300 liters of food in her stomach.
      

3 - A total of 110.000 million tonnes of carbon dioxide each year meet the atmospheric effects of burning petrol. To absorb all the gas, it memerlukukan jungle covering the continent of Australia.
    

4 - A total of 4.082 kilograms of roses will be able to produce only 0.972kg extracts to be used in a mixture of perfume.
      

5 - Palm largest in the world can be found only in the Seychelles Islands in the Indian Ocean. The weight of ripe fruit up to 22 pounds.

Rahsia Nombor 11

apakah yang tersirat disebalik nombor 11 pada kejadian 11 september yang menjadi tanda tanya bagi sesetengah pakar?
Fakta Nombor 11:
-tarikh kejadian 11 september
-tarikh kejadian ditulis dalam bentuk nombor 11/9 —> 1+1+9=11
-bangunan WTC berbentuk nombor 11
-perkataan THE NEW YORK CITY terdiri dari 11 huruf
-penerbangan yang melanggar WTC adalah ‘Flight 11′
-11 september adalah hari ke 254 dalam kiraan setiap tahun 2+5+4=11
-jumlah kru dalam flight 11 adalah 11 orang
- AFGHANISTAN terdiri dari 11 huruf
-pembinaan WTC memakan masa selama 11 tahun (1966 – 1977)

23 perkara tidak boleh dilakukan semasa memandu...

1. Tidur dengan nyenyak.
2. Membebel tak sudah-sudah.
3. Menyumpah-nyumpah trafik light dan polis trafik.
4. Menghidupkan lampu isyarat tak tentu hala.
5. Membunyikan hon sesuka hati.
6. Menelefon kekasih masing-masing sampai terlentuk-lentuk.
7. Buka cermin tingkap dan meludah sesuka hati.
8. Menunjukkan penumbuk kepada pemandu lain.
9. Melanggar tiang lampu isyarat.
10. Masuk ke lorong bertentangan.
11. Menjerit-jerit tak tentu hala.
12. Menukar seluar.
13. Mandi sambil berkemban.
14. Menggosok gigi dengan air enjin.
15. Meminjam telefon bimbit pemandu lain.
16. Mengurat pemandu lain dan pejalan kaki.
17. Makan sirih.
18. Memesan teh tarik di gerai tepi jalan.
19. Duduk di tempat duduk penumpang.
20. Menari-nari terutama bila dengar lagu Hindustan.
21. Mengorek-ngorek lubang hidung dengan tombol gear.
22. Membaiki komputer yang rosak hardisknya.
23. Menelefon boss anda dan menyatakan anda menyampah dengannya

Thursday, February 17, 2011

"Jack The Ripper"

"Jack the Ripper" is the best-known name given to an unidentified serial killer who was active in the largely impoverished areas in and around the Whitechapel district of London in 1888. The name originated in a letter, written by someone claiming to be the murderer, that was disseminated in the media. The letter is widely believed to have been a hoax, and may have been written by a journalist in a deliberate attempt to heighten interest in the story. Other nicknames used for the killer at the time were "The Whitechapel Murderer" and "Leather Apron".

Attacks ascribed to the Ripper typically involved female prostitutes from the slums whose throats were cut prior to abdominal mutilations. The removal of internal organs from at least three of the victims led to proposals that their killer possessed anatomical or surgical knowledge. Rumours that the murders were connected intensified in September and October 1888, and letters from a writer or writers purporting to be the murderer were received by media outlets and Scotland Yard. The "From Hell" letter, received by George Lusk of the Whitechapel Vigilance Committee, included half of a preserved human kidney, supposedly from one of the victims. Mainly because of the extraordinarily brutal character of the murders, and because of media treatment of the events, the public came increasingly to believe in a single serial killer known as "Jack the Ripper".

Extensive newspaper coverage bestowed widespread and enduring international notoriety on the Ripper. An investigation into a series of brutal killings in Whitechapel up to 1891 was unable to connect all the killings conclusively to the murders of 1888, but the legend of Jack the Ripper solidified. As the murders were never solved, the legends surrounding them became a combination of genuine historical research, folklore, and pseudohistory. The term "ripperology" was coined to describe the study and analysis of the Ripper cases. There are now over one hundred theories about the Ripper's identity, and the murders have inspired multiple works of fiction.

Fuck!

Fuck is an English word that is generally considered profane which, in its most literal meaning, refers to the act of sexual intercourse. However, by extension it may be used to negatively characterize anything that can be dismissed, disdained, defiled, or destroyed.

"Fuck" can be used as a verb, adverb, adjective, command, interjection, noun, and can logically be used as virtually any word in a sentence (e.g., "Fuck the fucking fuckers"). Moreover, it is one of the few words in the English language which could be applied as an infix (e.g., "Am I sexy? Absofuckinglutely!"; "Bullfuckingshit!"). It has various metaphorical meanings. The verb "to be fucked" can mean "to be cheated" (e.g., "I got fucked by a scam artist"), or alternatively, to be sexually penetrated. As a noun "a fuck" or "a fucker" may describe a contemptible person. "A fuck" may mean an act of copulation. The word can be used as an interjection, and its participle is sometimes used as a strong emphatic. The verb to fuck may be used transitively or intransitively, and it appears in compounds, including fuck off, fuck up, "fuck you", and fuck with. In less explicit usages (but still regarded as vulgar), fuck or fuck with can mean to mess around, or to deal with unfairly or harshly. In a phrase such as "don't give a fuck", the word is the equivalent of "damn", in the sense of something having little value. In "what the fuck!", it serves merely as an intensive. If something is very abnormal or annoying "this is fucked up!" may be said.

Monday, February 7, 2011

Fakta LAwak

1.Tahukah anda apabila 350ml air yang diambil dari sinki dan kemudiannya dituangkan ke dalam cerek yang mengandungi 150ml air suling dan dibiarkan terdedah kepada nyalaan api bersuhu 100 darjah celcius akan menghasilkan satu cecair yang dinamakan air masak.
2. Percayakah anda yang air sirap merupakan salah satu bahan asas dalam pembinaan sebuah helikopter. Ini kerana kajian telah dibuat, seorang pembina helikopter memerlukan air sirap untuk menghilangkan keletihan semasa membuat helikopter, tanpa air sirap mungkin helikopter tersebut tidak dapat disiapkan.
3. Sebuah kereta yang dipandu selaju 220 km/j tidak akan dapat memotong kereta yang dipandu selaju 40 km/j sekiranya kereta-kereta tersebut dipandu dari arah yang bertentangan
4. Tahukah Anda dalam bahasa Inggeris dan ….Italy…., jurugambar dikenali sebagai paparazzi. Perkataan itu dipercayai diambil dari watak paparazzo dalam filem La Dolce Vita yang diterbitkan oleh Federico Fellini pada tahun 1960. Dalam bahasa
melayu pula, ayah kepada seorang budak yang bernama Razzi juga boleh dikenali dengan nama papa Razzi.

Apabila Obama Dibandingkan

jadi lah begini.

Saturday, February 5, 2011

359 km/h (224 mph) G-Power Hurricane RS BMW M5 Touring GPS-verified on P...

Online casinos are one of the most played pass-times for quite a number of people.

Online casinos are among the most played recreational activities for many individuals. From the 22 year old secretary, to the 60 year old CEO, all the way up to the 80 year old Miami pensioner... people from all walks of life enjoy playing in online casinos.

Obviously, it's much more immediate to play in an online casino, rather than going out to Las Vegas, paying for a hotel room, and eat in the restaurant. While it's certainly something that must be tried sooner or later, the online casinos boast loads of advantages over their brick and mortar counterparts.

Aside from not being as expensive, they are also far more convenient. Simply download casino software onto your computer, and voilĂ ...! Virtual Vegas is right there on your PC. All online casinos tend to present just about every one of your favourite casino games, and this gives you practically have an endless supply of online gambling fun... without the expensive $20 cocktails.

Here are a few considerations you should be aware of, however, if you are keen to play in online casinos. The two most important ones are the casino welcome bonus, and the cash-out conditions.

Online casinos are study many strategies in order to find new players to download their desktop client - that's how they make their living! Thus, they pile on the welcome bonuses, to get you started gambling in their casino. Usually, you'll find casino welcome bonuses in the hundreds of dollars, if not even as high as $20,000. But a word of caution here: not all that glitters in Vegas (virtual, or otherwise) is gold, mind you.

The bigger the welcome bonus amount, the much higher and stringent the requirements will be to cash out your winnings. When you play with a welcome bonus of $20,000, you're not going to be able to cash out the 20k with just a $10 deposit. Any casino would go bust (if you'll pardon the pun), and The Good Samaritan Foundation would be up against its toughest competition, in terms of freebie help!

It goes without saying, not only will you need to win at least the $20,000 in prize money to even be eligible to cash out, but generally you will also have to make quite a few deposits to be awarded such a welcome bonus. Theres a casino we know of that offers its players $12,500 as a welcome bonus. When you read between the lines, you find out you're required make 15 deposits of $100 first, to receive the bonus. Only then will you be eligible for the welcome bonus.

Also, be aware that most casinos won't let you withdraw more than a certain amount of money per week. If you've won a $60,000 grand prize in online poker, for example, and you've met or exceeded your deposit requirements, you may be eligible to withdraw no more than $3,000 per week. Naturally, you aren't going to forfeit your money, but it takes away the joy of paying for that new Mercedes in cash. In this aspect, real Vegas has an Ace up its sleeve over virtual Vegas.

Playing in online casinos can be a fun, different way to try something different ... and why not, even make some money. But familiarise yourself with the deposit "fine print" of the casinos you are playing with, so you won't have any surprises!

Friday, February 4, 2011

How to decide if you can trust a Web site

Web sites can bring you a wealth of information and convenience. However, some Web sites can request personal information that you would rather keep private, display advertisements you do not want to see, or expose your computer to software that contains viruses or other security threats. How do you know which Web sites you can trust? It’s difficult to be completely certain, but there are a few key things to look for.

    Is the Web site certified by an Internet trust organization such as BBBonline, TRUSTe, or WebTrust? Sites that display these logos have agreed to follow certain practices like providing a comprehensive privacy statement. If you read these statements, you should be able to determine what data the site collects and what the site does with that data (for example, you can find out whether they share your data with a third party or use it to display personalized advertisements). This logo does not mean that the site collects no data. It means that the privacy statement will tell you what data the site collects so you can decide if you want to use that Web site.


    Is the site from an organization you know and already trust (for example, a vendor you have a positive ongoing relationship with) or from a widely recognized brand or institution? The site should provide a privacy statement or a Terms of Use statement. Reading these statements should make it clear what will happen when you use the site. If you are not comfortable with the terms or behaviors (for example, if you would prefer not to be tracked or have advertisements presented and the organization indicates that it does either of those things), do not use the site.


    If you do not recognize the Web site and it does not have a trust logo, you should be cautious and thoroughly research the site before using its services. Research can include reading the site’s disclosures, asking friends and colleagues you trust, and searching the Web for positive or negative articles about the site.


    If you are asked to provide sensitive personal data (such as your password, social security number, credit card number, or bank information), only do so if there is a valid reason and if the site uses a secure method to collect this data. Look for a statement indicating this information will be encrypted or look for the golden padlock symbol in your browser status area to indicate that the information will be transferred using secure methods.


    When making a purchase on a Web site, verify that the site has a posted return policy and that the terms are acceptable to you.

Be cautious of a Web site if…


You were referred to the site by e-mail from someone you don’t know.

The site contains objectionable material such as pornography.

The site makes offers that seem too good to be true. Are they just trying to lure you to their site?

You are asked to provide a credit card number but there is no indication that the Web site ensures the transaction is secure.

The site offers free membership but asks you to provide extensive personal information that does not seem necessary or that you do not want to provide.

How to decide if you can trust an e-mail message

E-mail is one way that viruses spread across the Internet. When you open an infected e-mail message, the virus can be transmitted to your computer, and then you, in turn, can infect people to whom you send e-mail. If you use e-mail, you can get dozens of messages every day that come from people you’ve never heard of. With so much e-mail coming in, how do you know which messages you can trust?

Think about these four things:

    Do you know the person who sent you this e-mail message? Is this a person, organization, or business you know and trust? If you get mail from someone you’ve never heard of before or a source you never subscribed to, you should be cautious.


    Have you received legitimate e-mail from this source before? Do you receive e-mail from this person regularly or occasionally? If you get e-mail from someone you know, but you’ve never received e-mail from them before, ask yourself if there is any reason you’re getting this message now. If the answer is no, think twice before opening it.


    Do you have any reason to expect e-mail from this person? Are you surprised to see this e-mail? Does it seem unusual or strange to be getting e-mail from this person? If the answer is yes, be cautious about opening the message.


    Does the message on the subject line make sense coming from the sender? Does the subject line refer to something this person would want to send you a message about? If the subject line is just gibberish or doesn’t make sense, the message might be junk mail that uses nonsense titles to get past spam filters that look for certain words.


    If you are not sure that the e-mail you received is trustworthy, don’t open it or even bother to reply. It’s much easier to check before you open the message than it is to clean some viruses off of your computer.

One essential action to take:

    Before you open any e-mail that has an attachment, make sure that your antivirus program is up to date and that it is turned on. This allows the antivirus program to scan attachments with the highest chance of protection.

Beware to Read Mail.

Sending and reading e-mail over the Internet is one of today's most popular activities. The widespread use of this technology makes it a primary way for computer viruses to spread. You can help protect your computer against viruses that spread by e-mail, and when you do so, you also help protect people who receive e-mail from you.

Specific actions you can take:

Help protect your computer with safer e-mail practices

    Use virus scanning software and keep it up to date with regular updates from the provider. Updates are very important because new viruses are created regularly.


    Don't open attachments from senders you don't know. Even if you know and trust the source of the e-mail you should still be cautious. Carefully read the e-mail's subject line. Does the message on the subject line make sense coming from the sender? Does the subject line refer to something this person would want to send you a message about? If the subject line is just gibberish or does not make sense, you should not open the attachment.


    Read your messages in plain text. Much of the e-mail you receive is created using a simple computer language called HTML. HTML makes it possible to use pictures, fancy backgrounds, icons, and different kinds of text in e-mail. But HTML can also allow hackers to hide viruses in e-mail. When you read your e-mail in plain text, you prevent the viruses from being transmitted to your computer.


    Use your e-mail program’s security features. See your e-mail program's Help topics for information about the options available to you. Many programs now include options for filtering images, handling attachments, and blocking unwanted messages. Features like these work together to help protect your computer and anyone you correspond with.


    Be very cautious about opening links that you receive in e-mail. You never really know what a link is connected to. Internet Explorer 6 contains features that will help protect you in this situation.

Tuesday, February 1, 2011

Tip Menjaga Laptop

1 -- Downlaod software atau lagu percuma!
Software atau lagu percuma biasanya digunakan oleh hacker untuk meletakkan virus atau spyware! Sebaiknya beli software atau lagu yang original supaya terjamin keselamatan dan kualiti.

2 -- Meletak laptop di lantai !
Mudah dipijak, digunakan sebagai mainan oleh binatang peliharaan dan kanak-kanak ketika bermain!

3 -- Menyimpan kertas kerja di tengah antara skrin dan keyboard!
Kertas dapat merosakkan skrin yang mempunyai harga yang mahal untuk mengantinya

4 -- Menyimpan laptop pada kawasan yang sejuk!
Ketika anda membawa laptop ke tempat yang panas akan membentuk dan menyebabkan pergerakkan elektrik seluruh laptop anda. Demikian juga jika anda mengembalikannya ke tempat yang dingin akan mendorong terjadinya overloading

5 -- Menempatkan laptop di permukaan yang lembut!
Permukaan yang lembut, seperti karpet, bantal, tilam dapat menutup jalan lubang angin dan laptop anda menjadi terlalu panas. Sebaiknya Alaskan buku yang tebal supaya udara boleh keluar dengan mudah.

6 -- Menjatuhkannya!
Pembungkus kulit yang baik dengan bahagian pemisah adalah cara yang paling baik untuk menjaga laptop anda. Pastikan bahawa pembungkus ini memiliki bahagian pemisah untuk dikeluar pasang dan boleh menghindari hentakan pada laptop anda

7 -- Minum air di sekitar laptop anda!
Dalam keadaan tidak sedar, anda boleh menyenggol gelas minuman yang boleh tumpah ke keyboard. Hal ini boleh menyebabkan laptop anda rosak.

8 -- Memperbaiki laptop anda sendiri!
Laptop memiliki banyak kompenen kecil yang mudah patah, salah meletakkannya. Berikan kepada yang lebih professional, atau kedai baiki laptop!

Thursday, January 27, 2011

Teka teki Albert Einstein

Ada 5 buah rumah yang masing-masing memiliki warna berbeza. Setiap rumah dihuni satu orang lelaki dengan kebangsaan yang berbeza-beza. Setiap penghuni menyukai satu jenis minuman tertentu, merokok satu merk rokok tertentu dan memelihara satu jenis hewan tertentu. Tidak ada satupun dari kelima orang tersebut yang minum minuman yang sama, merokok merk rokok yang sama dan memelihara hewan yang sama seperti penghuni yang lain.


Petunjuk:
Orang Inggris tinggal di dalam rumah berwarna merah.
Orang Swedia memelihara anjing.
Orang Denmark senang minum teh.
Rumah berwarna hijau terletak tepat di sebelah kiri rumah berwarna putih.
Penghuni rumah berwarna hijau senang minum kopi.
Orang yang merokok PallMall memelihara burung.
Penghuni rumah yang terletak di tengah-tengah senang minum susu.
Penghuni rumah berwarna kuning merokok Dunhill.
Orang Norwegia tinggal di rumah paling pertama.
Orang yang merokok Marlboro tinggal di sebelah orang yang memelihara kucing.
Orang yang memelihara kuda tinggal disebelah orang yang merokok Dunhill.
Orang yang merokok Winfield senang minum bir.
Di sebelah rumah berwarna biru tinggal orang Norwegia.
Orang Jerman merokok Rothmans.
Orang yang merokok Marlboro bertetangga dengan orang yang minum air.


Pertanyaannya : Siapakah yang memelihara IKAN?

Albert Einstein menyusun teka teki ini pada abad yang lalu. Dia menyatakan, 98% penduduk di dunia tidak mampu memecahkan teka teki ini. Apakah anda termasuk yang 2%?

Wednesday, January 26, 2011

Cara untuk melindungi komputer dari virus

Cara ini adalah untuk mencegah virus merusak file system kita yang biasanya berakhiran EXE, dan Sebelum anda melakukan hal ini, anda harus terlebih dahulu membackup system windows anda (baca keterangan no 1 di atas), karena penulis takut anda melakukan kesalahan yang dapat berakibat fatal terhadap system anda. Anda juga harus mempunyai dasar Windows untuk melakukan ini, kalau tidak, anda akan bingung dan kesulitan untuk memahaminya.

Caranya cukup mudah, anda tinggal merubah attribut dari file EXE anda menjadi READ ONLY alias cuma bisa dibaca, tidak bisa ditulis. caranya bisa anda menggunakan SEARCH dari windows anda, kemudian cari semua program yang ber-ektenstion EXE (search key-nya *.exe) di folder windows. Setelah itu blok semua program yang tampil (atau tekan ctrl+a) terus klik kanan pilih properties. Setelah itu pilih READ-ONLY di bagian bawah kotak pilihan atributes. Bagi yang tahu DOS (command prompt) bisa menggunakan perintah ATTRIB, fungsinya sama saja dengan cara di atas. contoh: c:\windows>attrib +r *.exe

Hal ini akan mencegah virus untuk merubah atau merusak file-file tersebut, karena pilihan tadi mematikan fitur untuk merubah file-file tersebut. Kalau anda ingin lebih yakin virus bisa mendeteksi hal tersebut, anda bisa tambahkan pilihan HIDDEN (menyembunyikan file tersebut) di sebelah kanan dari READ ONLY. Dengan kedua pilihan tersebut virus-virus pada umumnya tidak akan dapat menginfeksi file tersebut. Kalau anda ingin menampakan file HIDDEN ketika membuka folder di komputer anda, anda bisa pilih “show all hidden files” di “folder option”.

Anda juga bisa melakukan hal di atas ke semua folder komputer anda, kalau anda merasa hal ini perlu dilakukan, atau mungkin dilakukan juga ke file lain yang bukan ber-ekstensi EXE atau COM. Cara ini adalah cara yang paling efektif dan telah diuji coba oleh penulis. Satu hal yang penting diketahui, kalau anda ingin melakukan penghapusan atau perubahaan ataupun anda sering meng-update file yang ber-ekstensi EXE tersebut, anda harus ingat untuk membuka proteksi read-only atau hidden tersebut. Kalau tidak file tersebut tidak akan bisa dihapus atau diupdate, dan akan muncul pesan error.

Ini adalah salah satu cara untuk memproteksi file, cara lainnya dan cara Untuk mengetahui cara virus merusak/merubah file, membasmi atau menghapus virus secara manual.

Cerita Sedih

Adatiga orang sahabat Ali, Abu dan Mamat, yang tinggal serumah di sebuah apartment setinggi 60 tingkat. Pada suatu petang setelah tamat bertugas, mereka pulang ke rumah. Dilihatnya ramai orang sedang berkerumun di depan lif. Rupanya elektrik padam dan lif tidak berfungsi.


Ali: Macam mana ni... rumah kita atas sekali pulak tu?


Abu: Aduhhhh... bikin bingung kepala, nak panjat tangga larat ke?


Mamat: Aku rasa, baik kita panjat tangga aje... kita pun tak tahu bila agaknya elektrik ada balik.


Ali: Aku ada satu idea, kita panjat tangga sambil bercerita, tapi kita kena bercerita yang sedih saja, sebab kalau kita buat cerita lawak,kita akan terasa sesak nafas sebab kita ketawa. Biar kita serius dengar cerita.


Mereka pun bersetuju, jadi mereka mulalah melangkah kaki memanjat tangga untuk ke tingkat 60. Ali mula bercerita.


Ali: Aku masa kecil punyalah sedih dalam sejarah hidupku. Aku membesar tanpa bapa, bapaku meninggal semasa aku dalam kandungan, dari kecil aku... bla bla bla bla bla...


Punyalahsedih mereka mendengar cerita si Ali hingga meleleh-leleh air mata, sedar tak sedar mereka dah sampai kat tingkat 20. Mereka berhenti sekejapbukannya kerana penat tapi berhenti untuk lap air mata, kemudian merekakembali memanjat sambil Abu pula bercerita.


Abu: Sejarah hidup aku lagi sedih, semasa umur aku 5 tahun kedua ibubapaku meninggal dalam kemalangan jalan raya. Aku dibesarkan oleh abangsulung ku saja yang pada masa tu berumur 15 tahun. Abang sulung ku takbersekolah dan dia bekerja untuk menyara aku adik beradik seramai 4orang... bla bla bla bla...


Sekalilagi mereka bertiga meleleh sedih... punyalah lama si Abu bercerita,sedar tak sedar mereka dah sampai ke tingkat 55. Hanya 5 tingkat sajalagi. Sambil melangkah memanjat tangga ke tingkat 56, Mamat mula menyampuk.


Mamat: Alaaaaaa... korang punya cerita tak sedih lagi. Cerita aku lagi sedihhhh punya.


Ali: Kau ada sejarah hidup sedih juga ke?


Mamat: Emmmm... mungkin hari ini dalam sejarah...


Abu: Cerita aje le... kita dah tinggal 4 tingkat je lagi.


Mamat: Aku sedih kerana... KUNCI RUMAH KITA, AKU TERTINGGAL DALAM KERETA.... UWAAAAAA....