All Stories
Law of attraction

Hey all. Today in the self developpement we will talk about the Law of attraction . -The key-
I advise you to watch the following video is the one who will change your life, he secret that 
key to open happiness and all that you want from the money and Sons and More :) 


Law Of attraction

Law of attraction

Hey all. Today in the self developpement we will talk about the Law of attraction . -The key-
I advise you to watch the following video is the one who will change your life, he secret that 
key to open happiness and all that you want from the money and Sons and More :) 


Posted at 8:01 AM |  by test
-->
If you have never heard of download do virtualbox, it is the free and open source equivalent to VMware. If you are still lost, what virtualbox software ?
basically does is let you run any operating system inside your current operating system virtually!. For example, you can run Mac-OS X inside Windows, or Run Windows inside Ubuntu Linux, just like having a Windows emulator for Ubuntu, etc. The possibilities are endless. windows virtualbox download is a blessing for those of us who are in need of running another operating system. Let’s say that your main computer is Windows based, however, you are in need of running a program that only exists in Linux, or you want to test certain programs you downloaded from the web but are afraid of catching a virus.With virtualbox windows 32 bit or 64 bit you will be able to accomplish all of that reliably and without the licensing constraints of Vmware authorization service.

Installation

What we are going to be doing in this project is basically install Ubuntu 10.10, with ubuntu aircrack and tools on a machine running virtual box windows7, however, you can do any combination you like, OS X on Windows 7, Windows XP on OS X, virtualbox for xp on Linux, the combinations are endless and the tutorial will be exactly the same for all of them.
download de virtual box,  you can find it for a variety of operating systems, including Windows, OS x virtualbox linux  Once installed, open it and click on “New” to create a new virtual machine.


Next, give it a name on the field provided, and choose the OS you are going to be installing. Since we are going to be installing Ubuntu, this is what we are going to choose. Click “next” to continue.

Next we are presented with the memory allocation setting. This basically pertains to the amount of memory you want to allocate to your new virtual machine. Slide the bar until you reach the desired amount. and click “Next” to continue.
Bear in mind that the more memory you choose for your virtual operating system, the less you will have available for your host operating system, this memory, however, will only be allocated while the virtual machine is running. If you plan to run both operating systems at the same time, while both of them are running intensive operations, then choose the amount of allocated memory wisely, otherwise choose something a little below half of your total amount of memory. Of course this all depends on the total amount of memory you have, you can’t expect tolerable performance out of a single core machine with 1GB or less of total memory. In this case it is time to upgrade.
 Next, choose “Create a new hard disk” and click on “Next” to continue. You will then be presented with the “Create New Virtual Disk Wizard“. Click “Next” here as well.
 On the first window of the virtual disk wizard, choose “Dynamically expanding storage“. Choosing this option will make the virtual hard drive grow automatically as it needs space. This will allow you to conserve space on the host machine. Click “Next” to continue.


 Next, choose the starting size for your virtual drive. Since the space will expand dynamically, just leave the default space allocated by virtualbox software,  usually 8 or 10 gigabytes. Click “Next” to continue and click “Finish” on the next window to create the virtual drive.



Once finished, you are going to see your newly created virtual machine. This virtual machine however, does not contain any operating system yet, you need to install one. To install an operating system, just load your installation CD in your host machine, click on “Start” and go through the installation just as you would on any computer.
Optional Step: If you downloaded an operating system like Ubuntu from the web and it came in ISO format, virtualbox software will run the ISO for you, it is not necessary for you to waste a CD for this installation.
 When you are done with the installation process, the virtual machine will restart and voila! you have your operating system running. If you want to adjust the screen size, do it inside the virtual operating system just as you normally would, just be careful not to make the resoltion bigger than the host’s resolution or the virtual machine’s desktop will fall outside the host’s screen limits.

Final Thoughts

If you have no experience with virtual machines, with this tutorial you can see that the process of installing and running one on your computer is probably easier than you thought. Good luck with your project and if you have any questions, feel free to ask!

installation virtualbox ubuntu – Tutorial

-->
If you have never heard of download do virtualbox, it is the free and open source equivalent to VMware. If you are still lost, what virtualbox software ?
basically does is let you run any operating system inside your current operating system virtually!. For example, you can run Mac-OS X inside Windows, or Run Windows inside Ubuntu Linux, just like having a Windows emulator for Ubuntu, etc. The possibilities are endless. windows virtualbox download is a blessing for those of us who are in need of running another operating system. Let’s say that your main computer is Windows based, however, you are in need of running a program that only exists in Linux, or you want to test certain programs you downloaded from the web but are afraid of catching a virus.With virtualbox windows 32 bit or 64 bit you will be able to accomplish all of that reliably and without the licensing constraints of Vmware authorization service.

Installation

What we are going to be doing in this project is basically install Ubuntu 10.10, with ubuntu aircrack and tools on a machine running virtual box windows7, however, you can do any combination you like, OS X on Windows 7, Windows XP on OS X, virtualbox for xp on Linux, the combinations are endless and the tutorial will be exactly the same for all of them.
download de virtual box,  you can find it for a variety of operating systems, including Windows, OS x virtualbox linux  Once installed, open it and click on “New” to create a new virtual machine.


Next, give it a name on the field provided, and choose the OS you are going to be installing. Since we are going to be installing Ubuntu, this is what we are going to choose. Click “next” to continue.

Next we are presented with the memory allocation setting. This basically pertains to the amount of memory you want to allocate to your new virtual machine. Slide the bar until you reach the desired amount. and click “Next” to continue.
Bear in mind that the more memory you choose for your virtual operating system, the less you will have available for your host operating system, this memory, however, will only be allocated while the virtual machine is running. If you plan to run both operating systems at the same time, while both of them are running intensive operations, then choose the amount of allocated memory wisely, otherwise choose something a little below half of your total amount of memory. Of course this all depends on the total amount of memory you have, you can’t expect tolerable performance out of a single core machine with 1GB or less of total memory. In this case it is time to upgrade.
 Next, choose “Create a new hard disk” and click on “Next” to continue. You will then be presented with the “Create New Virtual Disk Wizard“. Click “Next” here as well.
 On the first window of the virtual disk wizard, choose “Dynamically expanding storage“. Choosing this option will make the virtual hard drive grow automatically as it needs space. This will allow you to conserve space on the host machine. Click “Next” to continue.


 Next, choose the starting size for your virtual drive. Since the space will expand dynamically, just leave the default space allocated by virtualbox software,  usually 8 or 10 gigabytes. Click “Next” to continue and click “Finish” on the next window to create the virtual drive.



Once finished, you are going to see your newly created virtual machine. This virtual machine however, does not contain any operating system yet, you need to install one. To install an operating system, just load your installation CD in your host machine, click on “Start” and go through the installation just as you would on any computer.
Optional Step: If you downloaded an operating system like Ubuntu from the web and it came in ISO format, virtualbox software will run the ISO for you, it is not necessary for you to waste a CD for this installation.
 When you are done with the installation process, the virtual machine will restart and voila! you have your operating system running. If you want to adjust the screen size, do it inside the virtual operating system just as you normally would, just be careful not to make the resoltion bigger than the host’s resolution or the virtual machine’s desktop will fall outside the host’s screen limits.

Final Thoughts

If you have no experience with virtual machines, with this tutorial you can see that the process of installing and running one on your computer is probably easier than you thought. Good luck with your project and if you have any questions, feel free to ask!

Posted at 3:37 PM |  by Narut0
-->
Why is my computer slowness ? Being a computer professional I cannot remember how many times I’ve been asked this question. It is probably the #1 question in the computer world, and just as other common questions this one does not have only one answer. A wide variety of conditions can cause a computer to lose speed over time. Most of these conditions can be resolved by any user with little computer knowledge. In this article I will list most causes and solutions to this common problem, making you aware of things you probably never realized and guiding you by the hand to help you get the most out of your computer.

Causes
Don’t worry if you do not understand some of these, I will explain them thoroughly in the next section.
Common Causes:
#1 Too many programs running at start up
#2 Hard Drive is too fragmented
#3 Hard Drive is too full
#4 Registry has grown over time
#5 Spyware
Less Common Causes:
#1 Bad Sectors on Hard drive
#2 Overheating
#3 Data Corruption
#4 Computer is trying to connect to a network resource.

Solutions
Next I will give you some solutions. Follow the steps in the order presented as they are listed in order from most to least common. Start with these only if the cause is not obvious to you (like spy-ware advertisement pop-ups, etc).
Free-up Memory, Hard Drive Space and Optimize:
(Includes solutions to causes #1, #2, #3)
Computers use memory to “think” however is most of the time just memory is not enough. At this time is when the computer needs to use hard drive space as memory. If the computer has little space left on the hard drive or too many programs are loading in memory, when the computer starts up it will not have enough resources to run fast and efficient.

STEP 1: Delete unneeded personal files:
Over time we tend to store files on our computer that can take up a lot of space which we no longer need. Such as downloaded videos, installation programs, etc. While these programs do not directly affect your computer’s speed is it good to eliminate them to make more space available on the hard drive, and to prepare the hard drive for defragmentation (I will go into this later). Most of these programs are usually found in two locations, the windows desktop and the “my documents” folder. Look in these two sections and start deleting.

STEP 2: Delete unneeded Windows files by running Windows Cleaner:

1) Click on "Start"
2) Click on "Run"
3) Type "cleanmgr" and hit enter
 Everything there is self explanatory, so check all items you wish to clean. One of the selections includes the “download” directory, if you have anything there that you wish to save transfer it to another directory before continuing. Don’t worry, none of this will delete your personal files or will affect your already installed programs.





STEP 3: Uninstall unneeded programs
This step will not only help free up additional space on the hard drive but will also help free up memory. As the computer boots-up many programs load and remain in memory. They do this to optimize the way they run. This is beneficial for them but detrimental for the computer’s overall performance, especially when too many are loading up and occupying space in your limited and precious memory.
1) Click on Start
2) Click on Settings
3) Click on Control Panel
3) Click on Add/Remove programs

Start deleting any programs that you are certain you do not need, like America Online Free trials, Internet Explorer toolbars, Online Games, etc.

STEP 4: Defragment your Hard Drive
Hard Drives have an arm with a magnetic head that writes data as the disk spins. To save time the arm writes this data wherever it is located at that particular moment. This saves recording time but in the long run it makes the computer slow as the data becomes scattered throughout the disk in fragments. This causes the arm of the hard drive to travel longer distances to read a file. Defragging (or drefragmenting) gathers all pieces belonging to a particular file and puts them all together. Therefore, next time a program is executed it is done as efficiently as possible.

1) Click on "My Computer"
2) Right click on Drive C:
3) Click on "Properties"
4) Click on "Tools"
3) Click on "Defragment Now"
4) Click on "Defragment"
 
Defragmenting might take from minutes to hours, depending on the amount of data you have and how fragmented it is. While a defrag is being performed it is best not to work on the computer. Hence a good time to perform a defrag will be any time you foresee your computer being idle, like at night while you sleep.

Registry has grown over time

For those of you that do not know what the registry is, the best explanation I can give you is that the registry acts as a “windows brain”. It is one big configuration file that tells windows what to load at start up, what program to execute when needed, how to control hardware, etc.
Whenever a program is installed it adds entries to the registry. The problem is that even when these programs are uninstalled they leave some of these entries in the registry. As time passes the registry grows making the computer slower, especially when booting up. There are only two solutions for this problem, one is to clean the registry, and the other to reinstall windows.


If you do decide to clean the registry I would have to warn you that this rarely works for speeding up you computer. Registry Cleaners just do not do an effective job most of the time. However since reinstalling Windows takes so long, trying a registry cleaner would not hurt.
If you do decide to take this route try EasyCleaner which is free, do not waste your money buying another product no matter what it claims.
The best ideal solution here will be to backup your files and reinstall windows. However this is a very time consuming task that could take you days but it will guarantee that all work performed will be 100% effective as well as one very important aspect… you will know for certain that you are not wasting your time.

Spyware
Spyware is basically software that gets loaded on your computer without your permission when you are surfing on the web. This software usually studies your surfing habits and then sends you pop-up adds based on what its know about you. Another type of Spyware are those that infect your computer and then try to sell you a product to solve your problem.
Spyware infections can make your computer slow and ever render it useless depending on its severity. They load into memory every time you boot up, making their removal a very hard undertaking. Some even kill your Internet connection just so you can buy their “fix”
There are several ways you can clean a spyware infection. It all depends on its severity and on how reliable the cleaning information you find is. No software will provide a solution for all the spyware out there, specially if this ainti-spyware software is executed on the same Windows operating system affected by the spyware.
One solution that has worked for me in the past has been to run Trend Micro’s antivirus from their free web based application, however I must say this has not been reliable lately. Nowadays I am using BartPE. BartPE is basically a utility capable if creating a Windows version that can be customized and run live from a bootable CD. This guarantees that you are running a clean spyware-free Windows version from your CD on the same computer where the infection has occured. Spy-ware cleaning software companies have plug-ins for BartPE, this gives your the capability of having all Spyware removal utilities at your disposal when boot from the CD. And since you are using a new clean Windows version running on a different drive, you do not have to worry about spyware loading into memory. All spyware will be inactive in drive C: ready to be cleaned.
One drawback bartPE has it that it does require a lerning curve to create a Windows image that you can boot from the CD. Going into the use of BArt PE is beyond the scope of this article, however there are plenty of articles on the web that will help you with this.
If your computer is infected with spyware, you are not familiar with BartPE and you are really pressed for time, best this to do is to reinstall Windows. Sometimes even using BArtPE is not enough to remove spyware, and if you are pressed for time this would just make matters worse.

Solutions to less common causes
Bad Sectors on Hard Drive
Bad Sectors as their name state are physically damaged spots on the hard drive were data can no longer be stored. Hard Drives develop bad sectors over time, this can make the computer slow due to the time it takes to try and retry reading these sectors.
When hard drives start developing bad sectors it is just a matter of time until they die, hopefully you become aware of the situation before this happens, because if it does and you do not have backups of your data you will have a big problem in your hands. All it takes is one bad sector on the wrong spot and all your files might not be accessible anymore.
Unfortunately new Windows versions do a mediocre job informing users when bad sectors start developing on the Hard Drive. One way to find out if you have bad sectors is to run Scandisk. ScanDisk is a utility that scans your hard drive for bad sectors and filesystem errors. The problem with ScanDisk is that inexplicably the report that it gives at the end appears in the screen for fractions of a second, making it almost impossible for users to see whether they have bad sectors or not. A better solution is to use a free utility called MHDD.
MHDD is software you download and burn to CD. This CD is then used to boot the computer and analyze the hard drive. To analyze your hard drive for bad sector with MHDD do the following:
Boot from MHDD CD – » Enter “scan” at the promp -» hit enter -» press F4 to begin

Overheating
When a computer is running hot CPU’s tend to lower processing speed to reduce heat, this is however not a common occurrence. Possible solutions include moving the computer to a cooler environment, adding more fans (to desktop computers), etc. Adding too many fans however can be detrimental to the computer in the long run, since more air and therefore more dust is circulating inside the case. Dust gathers around electronic components and acts as an insulating material preventing heat from escaping.
If you suspect your computer is overheating open it up and remove as much dust as as possible form all components, specially from the CPU heat-sink and fan. Try not to touch electronic components with a duster or your hands, I usually use a vacuum cleaner for this; being careful not get it near jumpers, or other components that might be sucked by the air. It works really well, just be extra careful when using it.

Final Thoughts
There is no better way to speed up your computer than to reinstall windows. Unless the problem is hardware related, 99% of the time this will fix the problem, and will leave the computer running at the same speed it ran when you first took it out of the box. Reinstalling windows however can be a painful process specially when you have to backup all your data, you do not have a restoration CD and you have to search the web for drivers. However if reinstalling Windows is above your skill level try the methods listed in this article, they will sure help improving your computer speed.

The Absolute Best Method to Make your Computer Faster

-->
Why is my computer slowness ? Being a computer professional I cannot remember how many times I’ve been asked this question. It is probably the #1 question in the computer world, and just as other common questions this one does not have only one answer. A wide variety of conditions can cause a computer to lose speed over time. Most of these conditions can be resolved by any user with little computer knowledge. In this article I will list most causes and solutions to this common problem, making you aware of things you probably never realized and guiding you by the hand to help you get the most out of your computer.

Causes
Don’t worry if you do not understand some of these, I will explain them thoroughly in the next section.
Common Causes:
#1 Too many programs running at start up
#2 Hard Drive is too fragmented
#3 Hard Drive is too full
#4 Registry has grown over time
#5 Spyware
Less Common Causes:
#1 Bad Sectors on Hard drive
#2 Overheating
#3 Data Corruption
#4 Computer is trying to connect to a network resource.

Solutions
Next I will give you some solutions. Follow the steps in the order presented as they are listed in order from most to least common. Start with these only if the cause is not obvious to you (like spy-ware advertisement pop-ups, etc).
Free-up Memory, Hard Drive Space and Optimize:
(Includes solutions to causes #1, #2, #3)
Computers use memory to “think” however is most of the time just memory is not enough. At this time is when the computer needs to use hard drive space as memory. If the computer has little space left on the hard drive or too many programs are loading in memory, when the computer starts up it will not have enough resources to run fast and efficient.

STEP 1: Delete unneeded personal files:
Over time we tend to store files on our computer that can take up a lot of space which we no longer need. Such as downloaded videos, installation programs, etc. While these programs do not directly affect your computer’s speed is it good to eliminate them to make more space available on the hard drive, and to prepare the hard drive for defragmentation (I will go into this later). Most of these programs are usually found in two locations, the windows desktop and the “my documents” folder. Look in these two sections and start deleting.

STEP 2: Delete unneeded Windows files by running Windows Cleaner:

1) Click on "Start"
2) Click on "Run"
3) Type "cleanmgr" and hit enter
 Everything there is self explanatory, so check all items you wish to clean. One of the selections includes the “download” directory, if you have anything there that you wish to save transfer it to another directory before continuing. Don’t worry, none of this will delete your personal files or will affect your already installed programs.





STEP 3: Uninstall unneeded programs
This step will not only help free up additional space on the hard drive but will also help free up memory. As the computer boots-up many programs load and remain in memory. They do this to optimize the way they run. This is beneficial for them but detrimental for the computer’s overall performance, especially when too many are loading up and occupying space in your limited and precious memory.
1) Click on Start
2) Click on Settings
3) Click on Control Panel
3) Click on Add/Remove programs

Start deleting any programs that you are certain you do not need, like America Online Free trials, Internet Explorer toolbars, Online Games, etc.

STEP 4: Defragment your Hard Drive
Hard Drives have an arm with a magnetic head that writes data as the disk spins. To save time the arm writes this data wherever it is located at that particular moment. This saves recording time but in the long run it makes the computer slow as the data becomes scattered throughout the disk in fragments. This causes the arm of the hard drive to travel longer distances to read a file. Defragging (or drefragmenting) gathers all pieces belonging to a particular file and puts them all together. Therefore, next time a program is executed it is done as efficiently as possible.

1) Click on "My Computer"
2) Right click on Drive C:
3) Click on "Properties"
4) Click on "Tools"
3) Click on "Defragment Now"
4) Click on "Defragment"
 
Defragmenting might take from minutes to hours, depending on the amount of data you have and how fragmented it is. While a defrag is being performed it is best not to work on the computer. Hence a good time to perform a defrag will be any time you foresee your computer being idle, like at night while you sleep.

Registry has grown over time

For those of you that do not know what the registry is, the best explanation I can give you is that the registry acts as a “windows brain”. It is one big configuration file that tells windows what to load at start up, what program to execute when needed, how to control hardware, etc.
Whenever a program is installed it adds entries to the registry. The problem is that even when these programs are uninstalled they leave some of these entries in the registry. As time passes the registry grows making the computer slower, especially when booting up. There are only two solutions for this problem, one is to clean the registry, and the other to reinstall windows.


If you do decide to clean the registry I would have to warn you that this rarely works for speeding up you computer. Registry Cleaners just do not do an effective job most of the time. However since reinstalling Windows takes so long, trying a registry cleaner would not hurt.
If you do decide to take this route try EasyCleaner which is free, do not waste your money buying another product no matter what it claims.
The best ideal solution here will be to backup your files and reinstall windows. However this is a very time consuming task that could take you days but it will guarantee that all work performed will be 100% effective as well as one very important aspect… you will know for certain that you are not wasting your time.

Spyware
Spyware is basically software that gets loaded on your computer without your permission when you are surfing on the web. This software usually studies your surfing habits and then sends you pop-up adds based on what its know about you. Another type of Spyware are those that infect your computer and then try to sell you a product to solve your problem.
Spyware infections can make your computer slow and ever render it useless depending on its severity. They load into memory every time you boot up, making their removal a very hard undertaking. Some even kill your Internet connection just so you can buy their “fix”
There are several ways you can clean a spyware infection. It all depends on its severity and on how reliable the cleaning information you find is. No software will provide a solution for all the spyware out there, specially if this ainti-spyware software is executed on the same Windows operating system affected by the spyware.
One solution that has worked for me in the past has been to run Trend Micro’s antivirus from their free web based application, however I must say this has not been reliable lately. Nowadays I am using BartPE. BartPE is basically a utility capable if creating a Windows version that can be customized and run live from a bootable CD. This guarantees that you are running a clean spyware-free Windows version from your CD on the same computer where the infection has occured. Spy-ware cleaning software companies have plug-ins for BartPE, this gives your the capability of having all Spyware removal utilities at your disposal when boot from the CD. And since you are using a new clean Windows version running on a different drive, you do not have to worry about spyware loading into memory. All spyware will be inactive in drive C: ready to be cleaned.
One drawback bartPE has it that it does require a lerning curve to create a Windows image that you can boot from the CD. Going into the use of BArt PE is beyond the scope of this article, however there are plenty of articles on the web that will help you with this.
If your computer is infected with spyware, you are not familiar with BartPE and you are really pressed for time, best this to do is to reinstall Windows. Sometimes even using BArtPE is not enough to remove spyware, and if you are pressed for time this would just make matters worse.

Solutions to less common causes
Bad Sectors on Hard Drive
Bad Sectors as their name state are physically damaged spots on the hard drive were data can no longer be stored. Hard Drives develop bad sectors over time, this can make the computer slow due to the time it takes to try and retry reading these sectors.
When hard drives start developing bad sectors it is just a matter of time until they die, hopefully you become aware of the situation before this happens, because if it does and you do not have backups of your data you will have a big problem in your hands. All it takes is one bad sector on the wrong spot and all your files might not be accessible anymore.
Unfortunately new Windows versions do a mediocre job informing users when bad sectors start developing on the Hard Drive. One way to find out if you have bad sectors is to run Scandisk. ScanDisk is a utility that scans your hard drive for bad sectors and filesystem errors. The problem with ScanDisk is that inexplicably the report that it gives at the end appears in the screen for fractions of a second, making it almost impossible for users to see whether they have bad sectors or not. A better solution is to use a free utility called MHDD.
MHDD is software you download and burn to CD. This CD is then used to boot the computer and analyze the hard drive. To analyze your hard drive for bad sector with MHDD do the following:
Boot from MHDD CD – » Enter “scan” at the promp -» hit enter -» press F4 to begin

Overheating
When a computer is running hot CPU’s tend to lower processing speed to reduce heat, this is however not a common occurrence. Possible solutions include moving the computer to a cooler environment, adding more fans (to desktop computers), etc. Adding too many fans however can be detrimental to the computer in the long run, since more air and therefore more dust is circulating inside the case. Dust gathers around electronic components and acts as an insulating material preventing heat from escaping.
If you suspect your computer is overheating open it up and remove as much dust as as possible form all components, specially from the CPU heat-sink and fan. Try not to touch electronic components with a duster or your hands, I usually use a vacuum cleaner for this; being careful not get it near jumpers, or other components that might be sucked by the air. It works really well, just be extra careful when using it.

Final Thoughts
There is no better way to speed up your computer than to reinstall windows. Unless the problem is hardware related, 99% of the time this will fix the problem, and will leave the computer running at the same speed it ran when you first took it out of the box. Reinstalling windows however can be a painful process specially when you have to backup all your data, you do not have a restoration CD and you have to search the web for drivers. However if reinstalling Windows is above your skill level try the methods listed in this article, they will sure help improving your computer speed.

Posted at 3:37 PM |  by Narut0
I wrote an article that described how to connect from a Ubuntu computer to a Windows Computer using the “real” remote Desktop. Now I will describe how to do the inverse: How to connect from Windows to Ubuntu using Windows remote desktop (the real one as well). As I described in the previous article, Ubuntu’s Remote Desktop is nothing more than VNC, which is very slow and cumbersome compared to the real Microsoft Windows remote desktop.  It can be made to work in a Windows machine if you install VNC, however, that is not the ideal solution specially if you have to work with it often. If you are used to Windows Remote desktop speeds, VNC will just drive you crazy. Fortunately there is a solution. To connect from Ubuntu to Windows we use “rdesktop“, and to connect from Windows to Ubuntu we are going to use “xrdp” which is basically the remote desktop protocol for the xwindows environment.

Instructions
To install “xrdp” click on “Applications” and “Ubuntu Software Center“.
 On the Ubuntu Software Center window, enter “xrdp” in the search field and press the  “enter” key; once it finds it, click on the “install” button.
 When installation finishes on Ubuntu, go to your Windows computer and open the “Remote Desktop Connection“, enter the IP address of the Ubuntu computer and click the “Connect” button.
 Immediately you will see the screen of the remote computer. Enter the username and password for the remote Ubuntu computer and click “OK” to continue.
 And that is all, now you should be able to see and control your remote Ubuntu machine from your Windows computer.


Final Thoughts
Many people in the Linux world do not seem to be aware of the fact that Windows and Ubuntu can communicate using the “real” Windows remote desktop. Not only this is not apparent but, for some reason, Ubuntu decided to rename VNC as “remote desktop viewer”, implying that this is the only way to establish a remote desktop connection.

How to Connect from Windows to Ubuntu using Remote Desktop

I wrote an article that described how to connect from a Ubuntu computer to a Windows Computer using the “real” remote Desktop. Now I will describe how to do the inverse: How to connect from Windows to Ubuntu using Windows remote desktop (the real one as well). As I described in the previous article, Ubuntu’s Remote Desktop is nothing more than VNC, which is very slow and cumbersome compared to the real Microsoft Windows remote desktop.  It can be made to work in a Windows machine if you install VNC, however, that is not the ideal solution specially if you have to work with it often. If you are used to Windows Remote desktop speeds, VNC will just drive you crazy. Fortunately there is a solution. To connect from Ubuntu to Windows we use “rdesktop“, and to connect from Windows to Ubuntu we are going to use “xrdp” which is basically the remote desktop protocol for the xwindows environment.

Instructions
To install “xrdp” click on “Applications” and “Ubuntu Software Center“.
 On the Ubuntu Software Center window, enter “xrdp” in the search field and press the  “enter” key; once it finds it, click on the “install” button.
 When installation finishes on Ubuntu, go to your Windows computer and open the “Remote Desktop Connection“, enter the IP address of the Ubuntu computer and click the “Connect” button.
 Immediately you will see the screen of the remote computer. Enter the username and password for the remote Ubuntu computer and click “OK” to continue.
 And that is all, now you should be able to see and control your remote Ubuntu machine from your Windows computer.


Final Thoughts
Many people in the Linux world do not seem to be aware of the fact that Windows and Ubuntu can communicate using the “real” Windows remote desktop. Not only this is not apparent but, for some reason, Ubuntu decided to rename VNC as “remote desktop viewer”, implying that this is the only way to establish a remote desktop connection.

Posted at 3:37 PM |  by Narut0
To many IT professionals it is imperative to be able to connect remotely to their work via VPN and if you connect by VPN, the next likely step is to connect using Remote Desktop. Many of us however, prefer to use Ubuntu at home and in most workplaces almost all machines are Windows based; that is where the problem comes in. One big obstacle in finding the solution is the apparent lack of a true compatible Windows Remote Desktop alternative in Ubuntu, and the scarcity of information on the web about this topic. This myth becomes even more believable when users find that Ubuntu has labeled VNC as “Remote Desktop Viewer”; a total nonsense. VNC is not compatible with Windows Remote Desktop, but “rdesktop” is and it comes already pre-installed in Ubuntu. I have also written another article that explains how to do the inverse:  Connecting from Windows to Ubuntu using remote desktop .

How to Use Rdesktop
Rdesktop is a command line application. To use it easily and effectively we have to create a custom command line and save it as an executable shortcut on Ubuntu’s desktop.
Right click on the Desktop and click on “Create Document” and “Empty File“.


Right click on your empty test file and rename it whatever you wish.

Then, open your new empty text file and paste the following line inside it:

rdesktop -g 1152x864 -r disk:home=/home/username -r clipboard:CLIPBOARD -r
 sound:off -x l -P 192.168.1.200 -u "administrator@domain.local" -p password


I have highlighted in red the parts of the line that need to be changed.

Command Line Explained by Parts
Changing the Size of the Remote Desktop Screen
To change the size you need to change the resolution; the first part of the line highlighted in red is this resolution, play with it until you get to the desired size. Some of the most common sizes are:
640X480
800X600
1024×768
1152×864

Enter IP of Remote Computer
Change the sample IP “192.168.1.200” to the IP of the remote computer or domain you wish to connect to.
Enter Username of Remote Computer and Domain Name
If you are trying to connect to a Windows Domain, you have to enter your username in that domain and make sure you specify the domain name as part of the username. Take a look at our example. If our username was “Administrator” and our domain name was “domain” then our username will be “administrator@domain.local“. Similarly, if our username was “jdoe” and our domain name was “mycompany” then our username was “jdoe@mycompany.local“. If your computer is not on a domain or it resides inside your same network,  just enter your username.
Enter Password
Just replace the last part of the command line with your password. You can leave this part out if you are concerned about having your network password on a text file that anybody can click. This however, makes it a lot easier, since you will be logged in automatically just by clicking the icon on your desktop, all in one step.
Make Shortcut Executable
To make the shortcut executable, right click on it and select “Properties“, then on the properties windows, click on the “Permissions” tab and check “Allow executing file as a program“.

And finally we will be able to connect to any Windows machine using its native Remote Desktop

How to Use the Real Windows Remote Destop in Ubuntu

To many IT professionals it is imperative to be able to connect remotely to their work via VPN and if you connect by VPN, the next likely step is to connect using Remote Desktop. Many of us however, prefer to use Ubuntu at home and in most workplaces almost all machines are Windows based; that is where the problem comes in. One big obstacle in finding the solution is the apparent lack of a true compatible Windows Remote Desktop alternative in Ubuntu, and the scarcity of information on the web about this topic. This myth becomes even more believable when users find that Ubuntu has labeled VNC as “Remote Desktop Viewer”; a total nonsense. VNC is not compatible with Windows Remote Desktop, but “rdesktop” is and it comes already pre-installed in Ubuntu. I have also written another article that explains how to do the inverse:  Connecting from Windows to Ubuntu using remote desktop .

How to Use Rdesktop
Rdesktop is a command line application. To use it easily and effectively we have to create a custom command line and save it as an executable shortcut on Ubuntu’s desktop.
Right click on the Desktop and click on “Create Document” and “Empty File“.


Right click on your empty test file and rename it whatever you wish.

Then, open your new empty text file and paste the following line inside it:

rdesktop -g 1152x864 -r disk:home=/home/username -r clipboard:CLIPBOARD -r
 sound:off -x l -P 192.168.1.200 -u "administrator@domain.local" -p password


I have highlighted in red the parts of the line that need to be changed.

Command Line Explained by Parts
Changing the Size of the Remote Desktop Screen
To change the size you need to change the resolution; the first part of the line highlighted in red is this resolution, play with it until you get to the desired size. Some of the most common sizes are:
640X480
800X600
1024×768
1152×864

Enter IP of Remote Computer
Change the sample IP “192.168.1.200” to the IP of the remote computer or domain you wish to connect to.
Enter Username of Remote Computer and Domain Name
If you are trying to connect to a Windows Domain, you have to enter your username in that domain and make sure you specify the domain name as part of the username. Take a look at our example. If our username was “Administrator” and our domain name was “domain” then our username will be “administrator@domain.local“. Similarly, if our username was “jdoe” and our domain name was “mycompany” then our username was “jdoe@mycompany.local“. If your computer is not on a domain or it resides inside your same network,  just enter your username.
Enter Password
Just replace the last part of the command line with your password. You can leave this part out if you are concerned about having your network password on a text file that anybody can click. This however, makes it a lot easier, since you will be logged in automatically just by clicking the icon on your desktop, all in one step.
Make Shortcut Executable
To make the shortcut executable, right click on it and select “Properties“, then on the properties windows, click on the “Permissions” tab and check “Allow executing file as a program“.

And finally we will be able to connect to any Windows machine using its native Remote Desktop

Posted at 3:37 PM |  by Narut0
By now you should all know that even the best spyware removal software protects, but seldom removes spyware once it has infected the computer. The main reason for this is that once your computer is infected, the spyware loads itself in memory every time the computer is started. In Windows no program that is actively running in memory can be erased from the hard drive; it has to be stopped first. This is where all antivirus tools fail. Another reason is that the spyware disables most antiviruses and system tools that pose a threat to it, like for example the Windows task manager.
Lately I’ve discovered a technique to remove almost all malware infections. A technique that has been working reliably for me in a surprisingly vast majority of cases and that can be followed step by step and can be replicated for almost all types of adware or spyware. A technique that will work better than any spyware removal tool you can find. This technique works for all versions of Windows XP, Vista and Windows 7. The pictures that you will see in this article are from Windows XP, however, the steps are similar for all other versions of Windows.
How to remove spyware - Method Summary:
- Open Task Manager as soon as you see the desktop.
- Write down the name of the spyware showing up in task manager and kill it.
- Look for spyware on c:\documents and setting\username\local settings\application data and delete it.
- Look for spyware in registry and delete every single entry as it appears.
- Create a new username, log in with new usermane, rename previous username account folder and reboot.
- Log in with your old usernane so that new profile folder can be created.
- Transfer your files from the old account folder to the current.
 
 Step 1: Identify Spyware in memory and kill it

Turn your computer on and as soon as you login and see your Desktop hit Ctrl-Alt-Del and click on Task Manager, you have to do this fast otherwise the virus will take control of the computer and task manager will no longer open. Once Task Manager is open the spyware will not be able to close it. Never close Task Manager or else the spyware you will not let you open it again unless you reboot. As

soon as you see the spyware appear, (usually a fake anti virus shield on the task bar near the clock) check the Task Manager for any suspicious programs. It also helps if you sort items in the Task Manager by memory usage, this way you will see all new applications as they start popping up. How can you tell the application is suspicious? Use common sense. The application popping up in this example has the name “guxprpnshdw.exe”. As you can see, the name is just a bunch of letters that do not make sense. Now that we have identified our suspicious program, the next step is to get paper and pencil, and write the whole name of the suspicious application making sure not to miss any letters. Then, right click on the application and click “end task” to remove spyware from memory. Once you do this, hover the cursor of the mouse over the fake anti virus shield without clicking on it. If the shield disappears, we know we have killed the fake anti virus in memory. If it does not, we need to continue our search. Repeat the operation with another suspicious-looking file in Task Manager until you find the right one. Make sure to always write down the name of the file before clicking “end task”.

Step 2: Remove spyware from hard drive and registry
 Once you have the name of the file, go to “My Computer” and click on Tools -> Folder Options -> select “View hidden Files and Folders. In Vista and Windows 7 go to Control Panel -> Folder Options and select “View hidden files and folders”. Go to “C:\Documents and Settings\” or “C:\Users” in Windows 7 or Vista and look for a folder with your username. If your computer logs in automatically or you are unsure of your username, you can find out in Windows XP by clicking Ctrl-Atl-Del and it will display who you are logged in as. In Windows 7 all you have to do is click on “start” and it will display your username on the top right corner of the menu; I am not sure about Vista. Once you have identified your username go to the following path “C:\Documents and Settings\username\local settings\application data\”, and in Vista and Windows 7

 it should be either on “C:\Users\username\” or “C:\ProgramData\”. Once there, look for a folder with a suspicious name. In this example our folder name is “xyfbofkle”. Again, notice that its name does not make any sense. Go into the folder and you should find a program with the name of our previously discovered spyware, in this case “guxprpnshdw.exe”. If you find the spyware, write down the name of the folder and delete it. Open the registry by clicking start -> run -> type “regedit” and click enter. Look for every instance of the spyware’s filename using the registry’s search utility and delete it. When you get to the end of the registry repeat the operation, this time using the spyware’s folder name. This should remove the spyware on your computer for good. However, there is one extra step we must take to lessen the possibility of future recurrence.

Step 3: Disable your old profile and create new one
 To be on the safe side and prevent malware from ever coming back, we are going to create a new user profile folder and delete your current one. To do this, create a username and make sure to give it administrator rights. Reboot your computer, (don’t just log off or switch users) and log into your newly

created account. Then, go to your “C:\Documents and Settings\” or “C:\Users\” (in Vista and Windows 7) and rename your previous username account folder. I usually rename it with a “.old” at the end. Example, if my original account folder is named “\administrator\”, I rename it to “\administrator.old\” so it is no longer recognized by Windows. Now reboot your computer again and log in with your old usermane. This will create a brand new account folder with your old usermane. Now, transfer everything you want to save from your “.old” account folder to your new one. Don’t transfer absolutely everything because you run into the risk of transferring whats left of the spyware to your new account. I usually transfer the “My Documents”, “Desktop”, “My Favorites” and nothing else. When finished you can delete the “.old” folder and the account folder you created at the beginning.

 And you are done! as easy as that. No more spyware. This will not work 100% of the time because not all spyware behave exactly same, some can’t even be terminated in the task manager; they just won’t close. However it will work in the big majority of cases. and as I said before it will work better than even the best spyware removal program available in the market today. I can say with certainty that 90% (or probably more) of the malware infections you encounter can be removed using this method.

How to Remove Spyware – Remove Almost All Infections

By now you should all know that even the best spyware removal software protects, but seldom removes spyware once it has infected the computer. The main reason for this is that once your computer is infected, the spyware loads itself in memory every time the computer is started. In Windows no program that is actively running in memory can be erased from the hard drive; it has to be stopped first. This is where all antivirus tools fail. Another reason is that the spyware disables most antiviruses and system tools that pose a threat to it, like for example the Windows task manager.
Lately I’ve discovered a technique to remove almost all malware infections. A technique that has been working reliably for me in a surprisingly vast majority of cases and that can be followed step by step and can be replicated for almost all types of adware or spyware. A technique that will work better than any spyware removal tool you can find. This technique works for all versions of Windows XP, Vista and Windows 7. The pictures that you will see in this article are from Windows XP, however, the steps are similar for all other versions of Windows.
How to remove spyware - Method Summary:
- Open Task Manager as soon as you see the desktop.
- Write down the name of the spyware showing up in task manager and kill it.
- Look for spyware on c:\documents and setting\username\local settings\application data and delete it.
- Look for spyware in registry and delete every single entry as it appears.
- Create a new username, log in with new usermane, rename previous username account folder and reboot.
- Log in with your old usernane so that new profile folder can be created.
- Transfer your files from the old account folder to the current.
 
 Step 1: Identify Spyware in memory and kill it

Turn your computer on and as soon as you login and see your Desktop hit Ctrl-Alt-Del and click on Task Manager, you have to do this fast otherwise the virus will take control of the computer and task manager will no longer open. Once Task Manager is open the spyware will not be able to close it. Never close Task Manager or else the spyware you will not let you open it again unless you reboot. As

soon as you see the spyware appear, (usually a fake anti virus shield on the task bar near the clock) check the Task Manager for any suspicious programs. It also helps if you sort items in the Task Manager by memory usage, this way you will see all new applications as they start popping up. How can you tell the application is suspicious? Use common sense. The application popping up in this example has the name “guxprpnshdw.exe”. As you can see, the name is just a bunch of letters that do not make sense. Now that we have identified our suspicious program, the next step is to get paper and pencil, and write the whole name of the suspicious application making sure not to miss any letters. Then, right click on the application and click “end task” to remove spyware from memory. Once you do this, hover the cursor of the mouse over the fake anti virus shield without clicking on it. If the shield disappears, we know we have killed the fake anti virus in memory. If it does not, we need to continue our search. Repeat the operation with another suspicious-looking file in Task Manager until you find the right one. Make sure to always write down the name of the file before clicking “end task”.

Step 2: Remove spyware from hard drive and registry
 Once you have the name of the file, go to “My Computer” and click on Tools -> Folder Options -> select “View hidden Files and Folders. In Vista and Windows 7 go to Control Panel -> Folder Options and select “View hidden files and folders”. Go to “C:\Documents and Settings\” or “C:\Users” in Windows 7 or Vista and look for a folder with your username. If your computer logs in automatically or you are unsure of your username, you can find out in Windows XP by clicking Ctrl-Atl-Del and it will display who you are logged in as. In Windows 7 all you have to do is click on “start” and it will display your username on the top right corner of the menu; I am not sure about Vista. Once you have identified your username go to the following path “C:\Documents and Settings\username\local settings\application data\”, and in Vista and Windows 7

 it should be either on “C:\Users\username\” or “C:\ProgramData\”. Once there, look for a folder with a suspicious name. In this example our folder name is “xyfbofkle”. Again, notice that its name does not make any sense. Go into the folder and you should find a program with the name of our previously discovered spyware, in this case “guxprpnshdw.exe”. If you find the spyware, write down the name of the folder and delete it. Open the registry by clicking start -> run -> type “regedit” and click enter. Look for every instance of the spyware’s filename using the registry’s search utility and delete it. When you get to the end of the registry repeat the operation, this time using the spyware’s folder name. This should remove the spyware on your computer for good. However, there is one extra step we must take to lessen the possibility of future recurrence.

Step 3: Disable your old profile and create new one
 To be on the safe side and prevent malware from ever coming back, we are going to create a new user profile folder and delete your current one. To do this, create a username and make sure to give it administrator rights. Reboot your computer, (don’t just log off or switch users) and log into your newly

created account. Then, go to your “C:\Documents and Settings\” or “C:\Users\” (in Vista and Windows 7) and rename your previous username account folder. I usually rename it with a “.old” at the end. Example, if my original account folder is named “\administrator\”, I rename it to “\administrator.old\” so it is no longer recognized by Windows. Now reboot your computer again and log in with your old usermane. This will create a brand new account folder with your old usermane. Now, transfer everything you want to save from your “.old” account folder to your new one. Don’t transfer absolutely everything because you run into the risk of transferring whats left of the spyware to your new account. I usually transfer the “My Documents”, “Desktop”, “My Favorites” and nothing else. When finished you can delete the “.old” folder and the account folder you created at the beginning.

 And you are done! as easy as that. No more spyware. This will not work 100% of the time because not all spyware behave exactly same, some can’t even be terminated in the task manager; they just won’t close. However it will work in the big majority of cases. and as I said before it will work better than even the best spyware removal program available in the market today. I can say with certainty that 90% (or probably more) of the malware infections you encounter can be removed using this method.

Posted at 3:37 PM |  by Narut0
Hasn’t this happened to all of us?. You discover you have a virus, you go to task manager and you are unable to identify it but you see a bunch of strange looking svchost processes.  SVCHOST.EXE is basically a Windows program that executes dll files. DLL files can’t run by themselves; they need a program to run them. This is where svchost comes in.  Some Windows pocesses come in DLL format rather than EXE. Some of these processes include “Windows Firewall”, “Automatic Updates”, “Plug and Play”, Windows Themes”, “Fax Service”, etc. Sometimes however, viruses use svchost to run; this way they cannot be identified on task manager and appear harmless, disguised as a Windows process.

How to tell if SVCHOST.EXE is harmless or not.
Fortunately for all of us there is a free utility designed just for identifying all svchost processes running on your computer. it is called svchost viewer and it works in XP, Vista and Windows 7. Svchost viewer not only tells you all processes running for each particular instance of svc host but also gives you a description of what these processes are. Take a look at the picture below:

What makes an svchost process suspicious?
Simple…
1) Any svchost process not identified by svchost viewer
2) Any svchost process consuming cpu capacity: If you see a svchost process hogging your cpu, making it run at 50%, 90%, 100% capacity, this might be the sign of a trojan horse trying to send spam or doing other malicious activities.

How to kill a suspicious svchost process
Svchost viewer itself can be a pretty effective svchost.exe killer. All you have to do is:
Select the Service to be killed >> Service Control >> Stop Selected Service.
A word of caution: Ending a particular service won’t probably cause permanent damage to your computer, however, before doing this make sure that no other programs are running, like an open document you have not finished or a defragmentation currently in progress. Some of these processes are critical, and ending one can cause the computer to frezee or to restart.

How to remove an svchost-related virus
If after killing the suspicious process, your virus or spyware goes away, you know you have identified it. Now it’s time to remove it. I have written an article on how to remove practically any virus on your computer, click here to read it.

What is svchost.exe? Is it a Trojan or Virus?

Hasn’t this happened to all of us?. You discover you have a virus, you go to task manager and you are unable to identify it but you see a bunch of strange looking svchost processes.  SVCHOST.EXE is basically a Windows program that executes dll files. DLL files can’t run by themselves; they need a program to run them. This is where svchost comes in.  Some Windows pocesses come in DLL format rather than EXE. Some of these processes include “Windows Firewall”, “Automatic Updates”, “Plug and Play”, Windows Themes”, “Fax Service”, etc. Sometimes however, viruses use svchost to run; this way they cannot be identified on task manager and appear harmless, disguised as a Windows process.

How to tell if SVCHOST.EXE is harmless or not.
Fortunately for all of us there is a free utility designed just for identifying all svchost processes running on your computer. it is called svchost viewer and it works in XP, Vista and Windows 7. Svchost viewer not only tells you all processes running for each particular instance of svc host but also gives you a description of what these processes are. Take a look at the picture below:

What makes an svchost process suspicious?
Simple…
1) Any svchost process not identified by svchost viewer
2) Any svchost process consuming cpu capacity: If you see a svchost process hogging your cpu, making it run at 50%, 90%, 100% capacity, this might be the sign of a trojan horse trying to send spam or doing other malicious activities.

How to kill a suspicious svchost process
Svchost viewer itself can be a pretty effective svchost.exe killer. All you have to do is:
Select the Service to be killed >> Service Control >> Stop Selected Service.
A word of caution: Ending a particular service won’t probably cause permanent damage to your computer, however, before doing this make sure that no other programs are running, like an open document you have not finished or a defragmentation currently in progress. Some of these processes are critical, and ending one can cause the computer to frezee or to restart.

How to remove an svchost-related virus
If after killing the suspicious process, your virus or spyware goes away, you know you have identified it. Now it’s time to remove it. I have written an article on how to remove practically any virus on your computer, click here to read it.

Posted at 3:36 PM |  by Narut0

battlefield wallpaper
Battlefield 2142, created by Digital Illusions CE as the fourth in the Battlefield series of first-person shooter games, and set in the 22nd Century-- during which the European Union (EU) and Pan Asian Coalition (PAC); two military superpowers-battle for survival.
-->
With the battlefield multiplayer ame play design, the game gives 64 players on a server, or 16 playing single mode battling bots in the Conquest mode. Like Battlefield 2, the user's stats can be used in a ranking system, but unlike 2, it starts up new categories of weapons and vehicles. The game additionally gives an unlock feature that lets the player pick a new unlock each time they get a new rank instead of having to purchase the item. Additionally, EA Games provides Northern Strike, a new booster pack with new vehicles, maps, and unlocks.
free battlefield games 2142 gives two modes of game play. One is Conquest, the other, Titan, which can be played online in download multiplayer games aps. Each mode supports up to 64 players in relation to which server a player uses to go online. Single player mode allows a up to 16, with 15 AI bots. There are 4 different player kits, each having separate weapons and equipment for that kit only, and each kit has a basic and secondary weapon, plus a knife unlike battle field 2 update's; the player's dog tags who is killer goes to that killer.
 By obtaining points in the game, each player can gain rank, options and equipment. Through customization, Battlefield 2142 becomes more effective by which players can gain more unlocks from the one kit. Within classes, each has two un-lockable weapons and a passive unlock that upgrades the soldier's helmet, with each helmet upgrade having different functions. One soldier's helmet upgrade will benefit by sharing with his/her squad mates.
Assault: Combined together, the Assault and Medic classes from Battlefield 2 become the Assault kit in Battlefield 2142. Assault rifles with un-lockable rocket or shotgun add-ons are the main weapons. Advanced first-aid kits (that can be used to restore health of those nearby), smoke grenades for screening, and a defibrillator for bringing back comrades who've fallen; are the other unlocks. The Assault kit's helmet upgrade lets soldiers find out what type of kit the enemy is using, and gives the proper icon above the marker "enemy spotted".
Recon: maps for battlefield 2 Special Forces and Sniper classes are combined to make up the Recon kit for Battlefield 2142. Sniper rifles are the main weapons, plus there's an un-lockable carbine for close-range battles.
Engineer: Again, combination of the Anti-Tank and Engineer classes from Battlefield 2 make up the Engineer kit in Battlefield 2142, and the maneuverable anti-vehicle rocket launcher is the default weapon. 

Support: The Support kit in Battlefield 2142 is basically the same from the Support class of Battlefield 2.

-->
Maps: battlefield update 2142's ten maps include three new maps included in the Northern Strike booster pack. 
Cherish Lytle is Owner of Research2You.
Need Articles, Internet Research or Admin Support?
Stop by [http://www.research2you.com] and shoot us an email for a free quote.


keywords :

list of battlefield games
all battlefield games
battlefield bad company 2 save game
battlefield game hack
battlefield games list
battlefıeld play4free
bf3 game
battlefield game 4 free
battlefield 2142 game download
battlefield mobile game
battlefield 1942 games
online battlefield oyna
battlefield la game
all battlefield games
 battlefield 1917
 battlefield 1942 games,
battlefield 1942 widescreen,
battlefield mod
 normandy battlefield tour

battlefield la game


battlefield wallpaper
Battlefield 2142, created by Digital Illusions CE as the fourth in the Battlefield series of first-person shooter games, and set in the 22nd Century-- during which the European Union (EU) and Pan Asian Coalition (PAC); two military superpowers-battle for survival.
-->
With the battlefield multiplayer ame play design, the game gives 64 players on a server, or 16 playing single mode battling bots in the Conquest mode. Like Battlefield 2, the user's stats can be used in a ranking system, but unlike 2, it starts up new categories of weapons and vehicles. The game additionally gives an unlock feature that lets the player pick a new unlock each time they get a new rank instead of having to purchase the item. Additionally, EA Games provides Northern Strike, a new booster pack with new vehicles, maps, and unlocks.
free battlefield games 2142 gives two modes of game play. One is Conquest, the other, Titan, which can be played online in download multiplayer games aps. Each mode supports up to 64 players in relation to which server a player uses to go online. Single player mode allows a up to 16, with 15 AI bots. There are 4 different player kits, each having separate weapons and equipment for that kit only, and each kit has a basic and secondary weapon, plus a knife unlike battle field 2 update's; the player's dog tags who is killer goes to that killer.
 By obtaining points in the game, each player can gain rank, options and equipment. Through customization, Battlefield 2142 becomes more effective by which players can gain more unlocks from the one kit. Within classes, each has two un-lockable weapons and a passive unlock that upgrades the soldier's helmet, with each helmet upgrade having different functions. One soldier's helmet upgrade will benefit by sharing with his/her squad mates.
Assault: Combined together, the Assault and Medic classes from Battlefield 2 become the Assault kit in Battlefield 2142. Assault rifles with un-lockable rocket or shotgun add-ons are the main weapons. Advanced first-aid kits (that can be used to restore health of those nearby), smoke grenades for screening, and a defibrillator for bringing back comrades who've fallen; are the other unlocks. The Assault kit's helmet upgrade lets soldiers find out what type of kit the enemy is using, and gives the proper icon above the marker "enemy spotted".
Recon: maps for battlefield 2 Special Forces and Sniper classes are combined to make up the Recon kit for Battlefield 2142. Sniper rifles are the main weapons, plus there's an un-lockable carbine for close-range battles.
Engineer: Again, combination of the Anti-Tank and Engineer classes from Battlefield 2 make up the Engineer kit in Battlefield 2142, and the maneuverable anti-vehicle rocket launcher is the default weapon. 

Support: The Support kit in Battlefield 2142 is basically the same from the Support class of Battlefield 2.

-->
Maps: battlefield update 2142's ten maps include three new maps included in the Northern Strike booster pack. 
Cherish Lytle is Owner of Research2You.
Need Articles, Internet Research or Admin Support?
Stop by [http://www.research2you.com] and shoot us an email for a free quote.


keywords :

list of battlefield games
all battlefield games
battlefield bad company 2 save game
battlefield game hack
battlefield games list
battlefıeld play4free
bf3 game
battlefield game 4 free
battlefield 2142 game download
battlefield mobile game
battlefield 1942 games
online battlefield oyna
battlefield la game
all battlefield games
 battlefield 1917
 battlefield 1942 games,
battlefield 1942 widescreen,
battlefield mod
 normandy battlefield tour

Posted at 6:13 PM |  by Unknown
-->

Right after Part 3 intervention battlefield game come to the Battlefield  part 4




















EA confirmed today that Battlefield 4 will launch this fall. No platforms were named in the game's official announcement.

Battlefield ™ 4 is the kind of movies, identify actions are made ​​of moments that blur the actual line between game and beauty. Fueled by the power of the next generation of frostbite along with fidelity ™ 3, 4 battlefield ™ supplies visceral, exciting experience like simply no other.
Only on the battlefield people demolish buildings shielding your adversary.

 And only on the battlefield that lead the attack from the back of the arms vessel. Battle gives you the freedom to do more and be more while playing to your strengths and carve your own road to victory.

In addition to numerous hallmark, battlefield ™ includes 5 exciting intense character-driven campaign of which begins evacuation of U. Utes. dignitaries from Shanghai and following your band battle to find its way home.
There is absolutely no comparison. Found immerse yourself from the glorious chaos of war, but within the battlefield mod.

Company history
battlefield since battlefield 1.5 from battlefield 1917. Stepped up its shares in the video games market, After that ideas derived from battlefield 1917 in the world ware 2 with the latest and after this Now we saw Iraq and libya's Ware.

Privileges
Now with The Battlefield  4 you Do not be afraid Of battlefield 1942 widescreen, speed,
the best Graphics ever seen.

Confirmed for :
Xbox 360, 
PlayStation 3, battlefield ps3
and PC

Will be the most effective part to compete with the actual enemy Call of duty morden warfare.
-->
Keywords to found :
battlefield ps3
all battlefield games
battlefield 2 bots
battlefield 1942 games
battlefield vietnam servers
battlefield 2142 servers
vietnam battlefield tours
olustee battlefield
battlefield 1.5
battlefield stats verse
battlefield archaeology
battlefield 3 requirements
malvern hill battlefield
saratoga battlefield
server battlefield
battlefield servers
battlefield 1917
chalmette battlefield
normandy battlefield tour
battlefield 1.5 patch
battlefield mod

battlefield 4 coming soon

-->

Right after Part 3 intervention battlefield game come to the Battlefield  part 4




















EA confirmed today that Battlefield 4 will launch this fall. No platforms were named in the game's official announcement.

Battlefield ™ 4 is the kind of movies, identify actions are made ​​of moments that blur the actual line between game and beauty. Fueled by the power of the next generation of frostbite along with fidelity ™ 3, 4 battlefield ™ supplies visceral, exciting experience like simply no other.
Only on the battlefield people demolish buildings shielding your adversary.

 And only on the battlefield that lead the attack from the back of the arms vessel. Battle gives you the freedom to do more and be more while playing to your strengths and carve your own road to victory.

In addition to numerous hallmark, battlefield ™ includes 5 exciting intense character-driven campaign of which begins evacuation of U. Utes. dignitaries from Shanghai and following your band battle to find its way home.
There is absolutely no comparison. Found immerse yourself from the glorious chaos of war, but within the battlefield mod.

Company history
battlefield since battlefield 1.5 from battlefield 1917. Stepped up its shares in the video games market, After that ideas derived from battlefield 1917 in the world ware 2 with the latest and after this Now we saw Iraq and libya's Ware.

Privileges
Now with The Battlefield  4 you Do not be afraid Of battlefield 1942 widescreen, speed,
the best Graphics ever seen.

Confirmed for :
Xbox 360, 
PlayStation 3, battlefield ps3
and PC

Will be the most effective part to compete with the actual enemy Call of duty morden warfare.
-->
Keywords to found :
battlefield ps3
all battlefield games
battlefield 2 bots
battlefield 1942 games
battlefield vietnam servers
battlefield 2142 servers
vietnam battlefield tours
olustee battlefield
battlefield 1.5
battlefield stats verse
battlefield archaeology
battlefield 3 requirements
malvern hill battlefield
saratoga battlefield
server battlefield
battlefield servers
battlefield 1917
chalmette battlefield
normandy battlefield tour
battlefield 1.5 patch
battlefield mod

Posted at 4:25 PM |  by Unknown
© 2013 FreshGeek. WP Theme-junkie converted by BloggerTheme9
Blogger templates. Proudly Powered by Blogger.
back to top