StyleZ.BLOG @ Republic Polytechnic

October 29, 2006

Protection for your Computer!

Filed under: Daily stuff,Every Little Thing — Jasper Mah @ 1:18 pm

Hey all, StyleZ here. This week has indeed been quite tiring for me, been sorting out quite alot of stuff, and with work related to events for Gaming.RP. Now today, I have the idea on venturing to a guide of using different programs that can be used for protecting your computer, or self-maintenance against threats like

– viruses

– adwares

– spywares

– malwares

– trojans

Recently, I’ve been fixing people’s computers, and I noticed students do install some of the programs I am going to recommend later, but still, I have friends and accquaintances asking me for recommended softwares to counter such problems. So in today’s guide, I shall recommend some softwares, and if possible to take some screenshots to display how to use the softwares.

Note : Softwares, whether it’s a freeware, or a paid software, do not have protections that are forever, your current product’s protection power will not last throughout to defend against all threats for centuries. Threats are created almost everyday, and softwares constantly update itself to fight against such threats. Take in mind, Protection Softwares need to be constantly updated, whether is it the definitions, the software versions itself, updates are important to protection softwares!

Without further ado, I shall start my guide now!

Adwares are harmful programs that causes different effects, especially targeting your Internet Explorer. The function of adwares are to create popups constantly, that may contain tracking cookies, randomly at any time interval as and when they wished, while a person is surfing the Internet. Tracking cookies may be dangerous, and can reveal confidential information if a person’s cookies are being hijacked by other users. Now, cookies here don’t refer to those you eat, it’s a method used to keep your information while visiting different websites, such as your login information, your password, and credentials. Adwares may also attract trojan downloaders to appear on your computer, and cause more problems such as spywares, viruses to appear on your computer.

Well-Known Adwares:

– Gator

– NewDotNet

– CoolWebSearch

– Alexa Toolbar

Now spywares are extremely close brothers to adwares, and also can be quite damaging. So what are spywares? Spywares are harmful programs that may install loopholes within your operating system, allowing the program user to reveal information easily to the spyware creator, by having spying programs silently installed in the background, to monitor things such as keystrokes, websites visited, login information used. Spywares differs from worms and viruses because of it’s inability to replicate itself but still, contains its damages. Spywares can also force-download viruses and trojans to your computer at any point of time interval, so it can be one of the reasons why computers get easily infected, when even a small spyware is installed on the computer.

Well-known Spywares:

-180 Solutions


-Internet Optimizer(DyFuCa)




Now malwares are what we normally refered to as the “promotion package”, reason being that it contains both adwares and spywares, and is the most damaging out of the 3, in terms of affecting the Internet Explorer, and the Winsock, which is controlling your connection to the Internet. Malwares normally have difficult methods of removal, compared to spywares/adwares, which may have programs that can easily detect and remove the signatures of those adwares and spywares. Malwares’s alternative mostly require manual removal, and the editing of the registry. Malwares also have lack of alternatives to fixing the problem, as it can self-replicate without stopping, running on an infinite loop, so you may take forever to remove it, if you are self-dependent on programs.

Well Known malwares :

– CnsMin.dll


– Henbang Shanghai Technology

– Yahoo!Assistant China


Viruses are self-replicating computer program written to alter the way a computer operates, without the permission or knowledge of the user. Though the term is commonly used to refer to a range of malware, a true virus must replicate itself, and must execute itself. The latter criteria is often met by a virus which replaces existing executable files with a virus-infected copy. While viruses can be intentionally destructive—destroying data, some are known to be annoying malwares and irritates the users.

Well-known viruses:



– Hare

– Melissa worm

– RavMonE.exe

Trojan Horses

In the context of computer software, a Trojan horse is a malicious program that is disguised as or embedded within legitimate software. RavmonE.exe is an example of a trojan, which we classified as a trojan.downloader, where it downloads malware and viruses onto your computer.
There are two common types of Trojan horses. One, is otherwise useful software that has been corrupted by a cracker inserting malicious code that executes while the program is used. Examples include various implementations of weather alerting programs, computer clock setting software, and peer to peer file sharing utilities. The other type is a standalone program that masquerades as something else, like a game or image file, in order to trick the user into some misdirected complicity that is needed to carry out the program’s objectives.

Trojan horse programs cannot operate autonomously, in contrast to some other types of malware, like viruses or worms. Just as the Greeks needed the Trojans to bring the horse inside for their plan to work, Trojan horse programs depend on actions by the intended victims. As such, if trojans replicate and even distribute themselves, each new victim must run the program/trojan. Therefore their virulence is of a different nature, depending on successful implementation of social engineering concepts rather than flaws in a computer system’s security design or configuration.

Adware Removal/Recommended Programs

Ad-Aware Personal/Professional Edition v1.06

To download Ad-Aware Personal Edition, for RP students, you can download it @,%20Spyware,%20Adware%20and%20Malware/aawsepersonal.exe

Spyware Removal/Recommended Programs

SpyBot Search & Destroy 1.4

Spyware Doctor (Approach IT-helpdesk for a licensed version or choose product registration to use full features)
Malwares Removal/Recommended Programs


Note : Autoruns requires some experience in identifying the programs, just in case you may delete the wrong file, I will release a small guide to using Autoruns soon!


StartupList (Works in a similar way as Autoruns)

Viruses Removal/Recommended Programs

AVG Free Edition

AntiVir Personal Edition

Trojans Removal / Recommended Programs

The Cleaner Professional

These are all the softwares I would recommend for your PC protection, maintenance and removal of harmful issues. Please remember to constantly update the softwares and do constant scanning weekly for recommended results!

Like PBL, you have to learn how to use Google to search for information on a certain program if you think that it’s a spyware. Find conclusive information before performing any actions on it!

Like usual, if you know me personally, or would like to get into contact with me for any maintenance issues or advices in removal :

Contact me @

or leave your email address here with the problem you encountered, in the comments section, so I can get back to you ASAP.

Thank You.

– StyleZ

“Play with Originality, Play with StyleZ”


October 27, 2006

Ronan Keating – If Tomorrow Never Comes

Filed under: Daily stuff,Every Little Thing — Jasper Mah @ 10:05 pm

Sometimes late at night
I lie awake and watch her sleeping
She’s lost in peaceful dreams
So I turn out the lights and lay there in the dark
And the thought crosses my mind
If I never wake up in the morning
Would she ever doubt the way I feel
About her in my heart

If tomorrow never comes
Will she know how much I loved her
Did I try in every way to show her every day
That she’s my only one
And if my time on earth were through
And she must face the world without me
Is the love I gave her in the past
Gonna be enough to last
If tomorrow never comes

‘Cause I’ve lost loved ones in my life
Who never knew how much I loved them
Now I live with the regret
That my true feelings for them never were revealed
So I made a promise to myself
To say each day how much she means to me
And avoid that circumstance
Where there’s no second chance to tell her how I feel

If tomorrow never comes
Will she know how much I loved her
Did I try in every way to show her every day
That she’s my only one
And if my time on earth were through
And she must face the world without me
Is the love I gave her in the past
Gonna be enough to last
If tomorrow never comes

So tell that someone that you love
Just what you’re thinking of
If tomorrow never comes

Craig David – Don’t love you no more

Filed under: Daily stuff,Every Little Thing — Jasper Mah @ 10:03 pm

For all the years that I’ve known you baby
I can’t figure out the reason why lately you’ve been acting so cold
(didn’t you say)
If there’s a problem we should work it out
So why you giving me the cold shoulder now
Like you don’t even wanna talk to me girl
(tell me)
Ok I know I was late again
I made you mad and dinners thrown in (the bin)
But why are you making this thing drag on so long
(I wanna know)
I’m sick and tired of this silly game
(silly games)
Don’t think that I’m the only one here to blame
It’s not me here who’s been going round slamming doors
That’s when you turned and said to me
I don’t care babe who’s right or wrong
I just don’t love you no more.

Rain outside my window pouring down
What now, your gone, my fault, I’m sorry
Feeling like a fool cause I let you down
Now it’s, too late, to turn it around
I’m sorry for the tears I made you cry
I guess this time it really is goodbye
You made it clear when you said
I just don’t love you no more

I know that I made a few mistakes
But never thought that things would turn out this way
Cause I’m missing something now that your gone
(I see it all so clearly)
Me at the door with you in a state
(in a state)
Giving my reasons but as you look away
I can see a tear roll down your face
That’s when you turned and said to me
I don’t care babe who’s right or wrong
I just don’t love you no more.

Rain outside my window pouring down
What now, your gone, my fault, I’m sorry
Feeling like a fool cause I let you down
Now it’s, too late, to turn it around
I’m sorry for the tears I made you cry
I guess this time it really is goodbye
You made it clear when you said
I just don’t love you no more

Don’t say those words it’s so hard
They turn my whole world upside down
Girl you caught me completely off guard
On the night you said to me
I just don’t love you more.

Rain outside my window pouring down
What now, your gone, my fault, I’m sorry
Feeling like a fool cause I let you down
Now it’s, too late, to turn it around
I’m sorry for the tears I made you cry
I guess this time it really is goodbye
You made it clear when you said
I just don’t love you no more

October 25, 2006

Long day @ skool

Filed under: Daily stuff,Every Little Thing — Jasper Mah @ 9:48 pm

Hey guys, long time no see again. I’ve been busy working for an event, so I have requests from some of my old friends about being in the Internet World, while downloading stuff, some of the terms to be understood easily, like ddl/bt and stuff. I wouldn’t be doing much of a guide today, but to give some definitions to different terms used while surfing online.

Direct Download/DDL: Your basic downloading from a website, though different websites will provide different speeds of downloading depending on the bandwidth given to the site. If you are a 256/384/512/768kbps user, it’s best advised to get a download accelerator. A recommended brand that is useful if you are using Mozilla FireFox would be the Flashgot Extension, which will also provide the Free Download Manager. For Internet Explorer users, it’s best to get either a retail Download Accelerator or FlashGet. Do take note not to use download accelerators with software bundles.(It’s easy to identify them..they are always the ones saying to install Gator,WeatherBar,NavExcel ToolBar,Ebaymoemoneymaker which are actually adwares that slow down your computer.)

File-Transfer-Protocol/FTP:Another way of downloading from a website, basically some websites have FTP servers which they upload files to their server to users for them to download. Some FTP servers are supported by download accelerators, which helps the user to get files easily, but do take note, you will drain up the bandwidth of the server heavily when you use download accelerators. FTP servers are usually supply their users with a username and password, as having a FTP server will have many leechers taking files from it. Most FTP servers have anonymous access for visitors though, though visitors will take the chance to leech as many files as possible.

mIRC XDCC/CTCP:Known as Xabi Direct Client to Client Protocol or Client to Client Protocol, this is the method many mIRC users transfer files to each other using their mIRC client such as the basic mIRC client now or Sysreset.(Sysreset is usually used by users who wants to host their file on a Fileserver, or otherwise known as Fserve, as some channels in mIRC require you to share as many as you download from different users.) mIRC has been a common tool for online piracy since the P2P network laws have been upheld strictly by governments in many countries. mIRC stands for Mass Internet Relay Chat, though it’s original name was IRC, known as Internet Relay Chat.

Bittorrent:The uploading/downloading method replacing P2P networks for users to share files, it is a very popular method around the world for users to download files of a large size reaching more than 5 GB at times. Bittorrent’s idea is a user will become a seeder and leecher when they download the files, being a seeder means you are a file uploader, or you distribute the files to everyone who’s downloading in laymen’s term. Being a leecher means you are downloading without uploading any of the contents of the files which is disliked by many seeders as it does not help in providing files to those who are new to the Bittorrent. Most of the Bittorrent Clients that are available will give the option of downloading and uploading the files, though it’s always best to have a higher download speed than your upload speed, as having a higher upload speed will slow your download speed. Your download speed is always proportional to your upload speed to get the best out of your connection.
(Warning:Using Bittorrent has a high risk usage in some countries for they are very strict with the copyright laws, and it has been using as a source of distributing illegal files.)

P2P Networks: This is the most dangerous method of downloading files, and many users who has been in the Online world for quite a while would know of this famous names such as Kazaa, Morpheus,Bearshare,Ares,Shareaza and many other more. This method of downloading has minimal control over the files you download and upload..and the risk of getting viruses, worms, adwares/spywares or trojans is extremely high. Governments in many countries are extremely strict with P2P Networks and will hunt down any uploaders of files and since there is minimal control over file you upload..the risk of getting caught is high.Those names that I had mentioned are P2P Clients, otherwise known as Peer-to-Peer Clients which allow one user to download files of their preferences from another user who has the file on his computer.
So, with today’s topic coming to an end,and now time to leave school,  I shall sign off for now.

– StyleZ

– “Play with Originality, Play with StyleZ”

October 20, 2006

I’m back! Mini-Wireless Network Guide released!

Filed under: Daily stuff,Every Little Thing — Jasper Mah @ 12:32 am

Hi all! StyleZ’s back from the paperwork and documents handling that I do for Gaming.RP! Finally, after finishing most of the details of the paperwork, I get some time to post at my blog today. As requested by a few friends of mine, and classmates, I shall release the small guide to making your own wireless network for playing games, for laptop users today!

Without Further ado, here it is!

– want to play LAN games of DOTA & CS with friends?

– want to set up a wireless network to share files?

– don’t know how to setup a wireless network?

– want basic security for your wireless network? 


A guide released by StyleZ, a.k.a Jasper, on how to create a wireless network, with screenshots and small detailed notes!

1st : Coming to your basic Wireless Network Connection Screen

network example 1

– You see two networks, one being rpnet, one being Meow Network.

Note: rpnet is what we referred to a wireless network, where users can access it easily from anywhere, depending on the signal strength. Meow Network is a AdHoc network, where users need to be near each other in order to get the best signal strength for any LAN/Internet sharing. What we are doing today, is to make a “Meow Network”.

2nd : So how should I start?

– click on the “Change orders of Preferred Networks” button.

– You will be brought to this screen, as shown below.

network example 2

– This is the place which you add your own Adhoc Network by pressing the “Add…” button.

– Click on the “Add…” Button, as the next step is being illustrated in the next screenshot.

3rd: Adding your own AdHoc Network 

– after pressing the “Add…” button, you should have arrived at this screen.

network example 3

– Network Name (SSID) here refers to the name of the Network you would like to use. For this guide, I will be using StyleZ.Network as the Network Name.

– For your network, at the Network Authentication part, choose Open. 

– Data Encryption here refers to a security choice for your network, whether you would like to password-protect it, or let it be a unsecured AdHoc Network. I will illustrate how to make 2 type of networks with each examples of having no security, and a password-protected network.

NOTE : Networks that are password-protected, can be easily cracked, especially those using WEP Encryption. This is just a basic defense if you don’t want users to tap your network.

1st Example : making a password-protected AdHoc Network

network example 4 with pw

– See that I have choose WEP for my data encryption?

– After choosing WEP, you will need to untick the “The key is provided for me automatically”, to input your own password or what is referred to as Network key in the screenshot. MAKE SURE YOU UNTICK!
For a network key, I would suggest using 10 key combinations, 5 numbers and 5 letters. An example is 00000FFFFF for your network key. 5 zeroes and 5 F. Take note that this is just an example to illustrate how it actually works with data encryption using your own password.

– After doing it once, reconfirm the network key in the second row, and make sure you tick the checkbox “This is a computer-to-computer (ad hoc) network ; wireless points are not used”.

– Click Ok and you’re done!

– Your network is created, go back to your Wireless Network Connection Screen, and connect to your own network!

Note: Make sure you remember your network key, because during the process of connecting, the network will ask you for your encryption key. It works in the same manner for your friends, so also tell them the encryption key you are using to allow them to connect to your network successfully.

2nd Example : Making a unsecured AdHoc Network

A unsecured AdHoc network has been a more popular choice for RP students, as it can be easily created, without going through the hassle of using a encryption key to get access to the network. Yet, students must understand, a unsecured AdHoc Network can be easily tapped by other students to use it for their own purposes. Without further ado, this is the unsecured version!

network example 4 without pw

– It’s actually easier this time, for your data encryption option, make sure it’s “Disabled”.

– Tick the checkbox “This is a computer-to-computer (ad hoc) network ; wireless points are not used”.

– Press Ok.

– You’re done!

– Your unsecured AdHoc Network is setup to be used!

4th: Checking your Wireless AdHoc Network
– After doing the steps above, check that you have reached this screen as shown below.

network example 5

– After reaching this screen, press “Advanced”.
– You should be at this part of the screen after pressing “Advanced” as shown below.

network example 6

– Choose “Computer-to-Computer (Ad hoc) networks only” as the option. This would make sure you will not connect back to rpnet while playing halfway through your CS match or your DOTA match.

– Press on the “Close” button.

– Press Ok.

– You’re done!

– Now, go back to your Wireless Network Connection screen as shown below.

network example 7

– You should see your own network now!

– If you don’t see your network, press the refresh button a few times. It will normally appear after a few refreshes.

– Connect and have fun!

Note: Students, please be reminded that you need to change back to “Any Network Available” in your advanced settings shown above, when you wish to connect back to rpnet, or else you will receive an error that rpnet is a access point network.

This guide is not fully power-packed yet, but I have done my best in presenting it in the simplest manner possible with screenshots and words. I hope you will find it useful, and have fun playing your networked games!

This method currently work for users using Wireless Network Connections to connect to different networks. I will do my best to release a guide for users who are using the Intel/PRO Wireless Software as soon as possible.

Users using WNC : Acer Laptops, Sony Vaio Laptops, HP laptops (not fully confirmed)

Users using Intel/PRO: Fujitsu laptops, Toshiba Laptops, Dell Laptops (not fully confirmed)

Thank you all for reading!

– StyleZ

“Play with Originality, Play with StyleZ”

Next Page »

Blog at