Monday, March 16, 2009

Privacy Policy

Privacy Policy for www.thysoft.blogspot.com

If you require any more information or have any questions about our privacy policy, please feel free to contact us by email at pohonet@yahoo.com.

At www.thysoft.blogspot.com, the privacy of our visitors is of extreme importance to us. This privacy policy document outlines the types of personal information is received and collected by www.thysoft.blogspot.com and how it is used.

Log Files
Like many other Web sites, www.thysoft.blogspot.com makes use of log files. The information inside the log files includes internet protocol ( IP ) addresses, type of browser, Internet Service Provider ( ISP ), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user’s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.

Cookies and Web Beacons
www.thysoft.blogspot.com does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.

DoubleClick DART Cookie
.:: Google, as a third party vendor, uses cookies to serve ads on www.thysoft.blogspot.com.
.:: Google's use of the DART cookie enables it to serve ads to users based on their visit to www.thysoft.blogspot.com and other sites on the Internet.
.:: Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - http://www.google.com/privacy_ads.html

Some of our advertising partners may use cookies and web beacons on our site. Our advertising partners include ....
Google Adsense


These third-party ad servers or ad networks use technology to the advertisements and links that appear on www.thysoft.blogspot.com send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.

www.thysoft.blogspot.com has no access to or control over these cookies that are used by third-party advertisers.

You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. www.thysoft.blogspot.com's privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.

If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browsers' respective websites.

Tuesday, January 6, 2009

Free Parallels Workstation for Windows and Linux

Like Virtualbox or Microsoft Virtual PC, Parallels Workstation is a software that can be used to make hardware virtualization, making it possible to install and run other operating systems at the same time. For instance, on a Windows computer that has been installed and used Parallels Workstation, the installation can be done with more Windows, Linux, FreeBSD, OS / 2, eComStation, Solaris, or MS-DOS, and later this can be run simultaneously. Unlike the Virtualbox or Microsoft Virtual PC that can be used free of charge, Parallels Workstation is a commercial program for $ 49.99. However, at this time is how to get activation key for Parallels Workstation is free of charge directly from Parallels.


To get the activation key, go to the address Lunarpages Registration. Then, on the page fill in your name, email address, company, phone number and proceed with the click Submit button. On the next page, the download link will be provided both Parallels Workstation for Windows and Linux. Package for Linux itself can be selected if the RPM, DEB, or TGZ.


Next is a check on the email address previously registered. If you have received and includes activation key that can be used, then the next is to install Parallels Workstation. To note, on the steps after the User Registration License Agreement is to select the Skip Registration button, so that the next steps could include the activation obtained.


Make the installation process to complete, and you'll be able to try to add other operating systems will be installed.


Download Logo Design at Logo Instant

The existence of a logo for a product would be important because it can characterize the product when people see it. For example, the logo used on a website, using the logo, the people will be expected to remember the website behind him. To make the logo itself is of course necessary expertise mendesign that is able to translate the essence of the product diusungnya. For those who do not or less experts in the design, the service may be provided by Instant Logo will be able to produce useful to the end of the appropriate logo.

Through the website, LogoInstan provide design-design the logo can be downloaded and then edited for both text and images that have already adjusted to the desired. Indeed, when I write this, there are 25 new logo designs are available, but based on information LogoInstan, later adding that there will be a new logo design every day. Logo design is free to be used either for personal maupuun commercial.

Some of the logo design that I tried downloading, design in PSD format, which can later be processed or edited with Adobe applications Photoshop. Tag line of Instant Logo, logo-logo provided logo design is a web 2.0. How do you interested to create their own logo? Try to start the course of the initial design Logo Instant.

Go to http://Logoinstant.com

Monday, January 5, 2009

Tips to Prevent Virus Attack / Entry Computer

As good as any antivirus + we use the latest update is no guarantee the computer free of viruses, because viruses are always evolving and update anti-virus [most] only the development of the virus itself (so when the virus has spread, the possibility of anti-virus can detect the new few days later). But anti-virus Computer without much more vulnerable to the virus infected .

For most users, this article may have been common and are not new anymore, but for ordinary users / general public may be useful to prevent the virus entry / PC spread to us. Given the development of the virus in the country so rapidly. This may be due to [the] source code that explains how creating a virus that is published in general, which may mean simply the exchange of information, but beyond that it is likely that many developing its own to create a virus and fishing-programmer to try to try.

Some of the things that need to prepare in order to prevent virus entry / spread to our computer is:

1.Use anti-virus that constantly updated, at least once a week, then switch online if the auto update on the antivirus

2.Non enable autorun facility on our computer, so that the CD-ROM or flash that we do not enter directly to the computer files that have run in it.

3.Show all file extensions windows, including the windows file system. How: In Windows Explorer open the Tools menu> Folder Options ... and then select the tab view and select (enable) the option "show hidden files and folders", removed the check on the "Hide extensions for known file types" also remove the check in "Hide protected operating system files (Recommended)"

4.Check each flash entered autorun.inf file is there, try to see if there is content, if it refers to a file. Exe,. Dll or. Scr the odd hidden, immediately delete the file, or scan it with antivirus

5.This may be a very important: If the computer is used by many people, ask users to be careful before running a file, not only to see its icon, but see the extension. For example, the file icon with ms word, excel, pictures, mp3 etc. but I berekstensi. Exe,. Scr,. Vbs,. Batatau not in accordance with the iconnya, please alert

6.Use the tools / programs such as autoruns to see the files / programs are running when Windows is started. If there is a marvelous program soon ask people who know more.

Hopefully this article useful, if there are additional / tips please input, is expected to increase security in the use of computer.


Free Blogger Templates by Isnaini Dot Com. Supported by Exotic Car Pictures. Powered by Blogger