I Komang yang kesepian, menggoda I Made yang sedang serius membaca koran.."Bli Made, babi bahasa balinya apa?" tanya I Komang jahil."Celeng" jawab I Made sambil tetap membaca koran."Kalau babi betina?" tanya I Komang lagi."Bangkung" jawab I Made mulai jengkel."Kalau anak babi?" I Komang tetap menggoda."Kucit" I Made mulai semakin jengkel."Kalau sepupunya babi?" tanya I Komang dengan senyum mulai
Dina menelpon Andi untuk mengingatkan agar segera menyelesaikan tugas dari dosen mereka yang harus disetor besok."Halo andi! Bagaimana dengan tugas yang diberikan pak doni?""Tugas yang mana ya?" Andi malah balik bertanya."Tugas membuat draft perjanjian" jawab Dina."Oh, yang itu!" sahut Andi."Bagaimana?" tanya Dina lagi."Sudah hampir.." jawab Andi."Sudah hampir selesai?" desak Dina."Sudah hampir
Tole dibelikan seekor anak anjing oleh ibunya sebagai hadiah ulang tahunnya. Tole berjanji akan merawatnya dengan baik dan memberinya nama becky.Namun sebulan kemudian, becky mati. Tole pun menangis sejadi-jadinya..“Bu, kenapa becky mati?” tanya tole sambil terisak-isak menahan tangisnya.“Mungkin kemarin kamu lupa memberinya makan” jawab ibunya.“Aku nggak pernah lupa memberinya makan” bantah
Budi dan Dudung berada di sebuah tempat yang asing. Mereka mencari rumah Pak Doni, dosen mereka. Budi pun bertanya kepada seorang warga.."Pak, numpang tanya" sapa Budi dengan sopan. "Bapak tau rumah Pak Doni?" tanyanya kemudian."Oh iya. Adik ikuti aja jalan ini. Ketemu pertigaan belok kiri. Ketemu pertigaan lagi, belok kanan. Nah, rumah pak doni di sekitar sana, yang ada pohon palemnya" jawab si
Seekor anjing mengajak anaknya berjalan-jalan sore. Di pinggir sebuah jalan, mereka berhenti sejenak..Anak : Pak, kita mau kemana lagi?Bapak : Kita harus menyeberangi jalan ini..Anak : Di sebelah sana ada tempat penyeberangan pak..Bapak : Nggak usah. Kita menyeberang di sini aja.Anak : Kenapa pak?Bapak : Tempat itu untuk zebra. Bukan untuk anjing..
Seorang dosen UGM memarahi mahasiswanya karena berprestasi buruk..Dosen : Mas, masa 1 semester nilaimu D semua?Mahasiswa : Maaf pak..Dosen : Kalau cuma dapet D, mending jangan kuliah di Jogja..Mahasiswa : Kok gitu, pak?Dosen : Mas, kalo di Jogja.., motor aja AB! Bukan C apalagi D!AB : Tanda nomor kendaraan daerah Jogja
Seorang petugas satpol pp menegur seorang pedagang kaki lima keliling yang memasuki area kantor gubernur. Padahal di depan pintu gerbang kantor terpasang papan peringatan ; Pedagang Kaki Lima Dilarang Masuk."Pak, anda nggak boleh masuk ke sini, apalagi berjualan di sini!" hardik si petugas."Maaf pak, saya nggak tau" jawab si pedagang dengan polosnya."Bapak nggak baca papan peringatan di depan
Seekor anak tokek bertanya pada ayahnya..Anak : Yah, kenapa kita nggak seperti manusia?Ayah : Emang kenapa, nak?Anak : Kulit mereka mulus, nggak seperti kulit kita..Ayah : Sudahlah nak..Anak : Tapi bisakah kita memiliki kulit seperti manusia?Ayah : Nggak bisa nak..Anak : Kenapa yah?Ayah : Kita nggak punya duit untuk periksa ke dokter kulit..
A proxy server is a kind of buffer between your computer and the Internet resources you are accessing. They accumulate and save files that are most often requested by thousands of Internet users in a special database, called “cache”. Therefore, proxy servers are able to increase the speed of your connection to the Internet. The cache of a proxy server may already contain information you need by the time of your request, making it possible for the proxy to deliver it immediately. The overall increase in performance may be very high. Also, proxy servers can help in cases when some owners of the Internet resources impose some restrictions on users from certain countries or geographical regions. In addition to that, among proxy servers there are so called anonymous proxy servers that hide your IP address thereby saving you from vulnerabilities concerned with it.
proxy server
A proxy server is a kind of buffer between your computer and the Internet resources you are accessing. They accumulate and save files that are most often requested by thousands of Internet users in a special database, called “cache”. Therefore, proxy servers are able to increase the speed of your connection to the Internet. The cache of a proxy server may already contain information you need by the time of your request, making it possible for the proxy to deliver it immediately. The overall increase in performance may be very high. Also, proxy servers can help in cases when some owners of the Internet resources impose some restrictions on users from certain countries or geographical regions. In addition to that, among proxy servers there are so called anonymous proxy servers that hide your IP address thereby saving you from vulnerabilities concerned with it.
proxy server
JavaScript may not be the best way to password-protect a webpage, but for those who do not have access to a CGI-BIN, it may very well be the only way. To provide these people with a decent JavaScript password protector that will keep out at least the average surfer, I've created this encrypted password generator.
password Generator
PHP seems very much in vogue now - with an increasingly greater number of web hosts providing support for it. For those who have only vaguely heard of it and are not too sure what it is, this article discusses PHP and informally compares it with writing CGI scripts in Perl.
PHP is a free server side scripting language. It can be built into web servers like Apache and you can use it to generate your pages dynamically. You would probably use it in situations you would have otherwise used a CGI script for. For example, thefreecountry.com's Feedback form (among other things) uses a PHP script to generate the form and send the message to me.
the last article vs
In this tutorial I'll show you how to create an image slideshow with an interesting fade-in effect for IE users (IE5.5+ to be exact). It relies on IE's multimedia filters, a quick and easy way to add interesting visual effects to content on your page. Here's what we'll see how to do:
You need IE5.5+ to see the transitional effect, though the slideshow itself works in all browsers. Lets begin shall we?
The Fade filter
Multimedia filters are a IE exclusive feature that instantly adds transitional effects to objects on your page that simply aren't possible using scripting alone. Here we are specifically interested in one of the filters called "Fade." Now, you may be familiar with a filter called "BlendTrans", which was first introduced in IE4; that one is now deprecated in favour of "Fade" (IE5.5+) instead, which is more efficient and contains subtle rendering differences. Like any filter "Fade" is defined using CSS syntax, either inline or within an external CSS:
Inline Definition:
External CSS Definition:
Both of the above are identical. It's probably a good time now to mention that Microsoft states that a filter can only be applied to objects on the page with a layout; in other words, objects with a defined width and height. This is important to know when you're applying filters to textual containers such as a P or DIV. In these cases, you'll need to also define (using CSS) a width for the element, and in many cases, a height as well, before the filter will work.
Defining a filter on an object by itself produces no visible effect- the image above when viewed in your browser remains unchanged. Filters remain dormant until they are invoked and manipulated using scripting, and that's what we'll learn next!
The conventional way to loading external JavaScript (ie: .js) and CSS (ie: .css) files on a page is to stick a reference to them in the HEAD section of your page.
for example
Create an ASP SQL Stored Procedure
Stored Procedures are very powerful database tools. They are essentially mini-programs and using SQL you can achieve many of the programmatic tricks you might use in an ASP page, including loops, if else statements and so on.
The useful thing about stored procedures is that they separate out the database activity from the displaying. This keeps your ASP pages very simple and makes maintenance a lot easier.
Here I'll introduce you to the basics of using a stored procedure and passing a parameter to it.
download article procedure
Anytime your hard drive crashes or you lose your data, you’ll need to turn to data recovery to properly restore your information. Data recovery is something most computer users are familiar with, as a majority of us have had to turn to data recovery at some point in time. Even though hard drives are becoming better and better, they are still mechanical and will always encounter problems.
The first thing to do, before any problems happen, is to always back up your data. If you create backups of your information, you’ll be well prepared in the event of a disaster. The registry keeps growing when you use Windows. As it does, it attracts obsolete information and becomes cluttered. Get Free Registry Cleaner Scan here!
This way, even if your hard drive cannot be repaired and the data is lost forever, you’ll have the back ups to continue going as normal. If you didn’t make back ups, you’ll find the situation very traumatic when you discover that your data cannot be recovered.
Most hard drives will last for years before they start to encounter any type of malfunction or hardware problems. You can help prevent data loss by turning off your computer when it isn’t in use, or shutting it down when you hear the hard drive making an odd noise.
If the hard drive starts to malfunction, letting it continue to run will only do more damage. If you shut it off immediately and take it to a specialist, you’ll have a much better chance of getting it repaired.
With natural disasters, hackers, viruses, or other problems, you won’t have the time to react. Before you know it, your hard drive will be damaged and your data will be gone. Although this can be very frustrating, data recovery can normally bring your information back. All you need to do is take the hard drive to a local specialist, then let them work their magic and show you the power of data recovery.
There are software programs out there that claim to recover lost data, although you should avoid them at all costs. Most of time, these software programs will do your hard drive more bad than good. Even though software may cost a lot less than professional data recovery services, the professional services will guarantee their work.
Anytime your hard drive fails and you seem to have lost your data, you should turn to professional data recovery services immediately. They may cost you a lot of money, although they do the job right the first time. When it comes to your data, you really don’t want to take any chances - especially if you had important documents and files stored on your hard drive.
The Red Hat Enterprise Linux 5 Desktop is the secure and extensible alternative for client systems like desktops and laptops in a business IT environment. Plus, the full set of standard productivity applications for a general IT workplace.
Desktop options
Multi-OS option
Virtualization
Run multiple desktop operating systems, including Microsoft® Windows®, at the same time.
* Provides the ability to deploy up to four guest operating instances on a client system like a Desktop or Laptop. (Please refer to the general configuration limits for minimum requirements.)
Workstation option
High end client support
Ideal for power users and demanding client applications.
* Provides support for client systems with up to two processor sockets, with no main memory size limit.
Server applications and development tools
Provides the software stack for more demanding classical workstation use cases and can be used in environments where a system, primarily used as personal client for an individual user, also needs to share data.
* Adds the full Red Hat Enterprise Linux software development stack as well as the complete set of server applications for use in primarily client use-cases. Extends the Red Hat Enterprise Linux Desktop to Engineering and Development environments.
* Ideal migration path for most WS users
Workstation with Multi-OS option
High end client support
High end client support and server application development capabilities of the workstation upgrade option combined with the virtualization capabilities of the Multi-OS upgrade option.
* Compare Desktop options
Features and capabilities
The following list provides an overview of the capabilities and new features of Red Hat Enterprise Linux 5.
Intel and AMD processor support
Runs on a huge range of laptop and desktop systems. Select the system that meets your needs.
* All x86 (32-bit) and x86-64 (64 bit) processors from Intel and AMD are supported. Red Hat Enterprise Linux Desktop provides support for systems with one processor socket and up to 4GB of main memory.
Comprehensive office suite
Excellent interoperability with Microsoft Office® environments. Feel at home immediately, with no training needed. OpenOffice provides:
* sophisticated document, spreadsheet, presentation, database, and drawing applications
* HTML and XML support
* the ability to create and access Microsoft Office format files.
Web browser
Enjoyable web browsing with performance and security. Firefox web browser offers:
* excellent performance and security,
* a large range of optional plugins
* easy tab browsing
* font sizing
* history, bookmark, and popup management
Mail
Choose from two fully featured email applications. Easy migration from Microsoft Outlook®. With full POP and IMAP protocol support. Evolution provides:
* Microsoft Outlook look and feel
* calendar and contact management
* support for accessing Microsoft Exchange Server®
Thunderbird provides:
* modern, high performance
* easy-to-use design
Messaging
Communicate with your friends anywhere in the world instantly. Choice of:
* IRC
* messaging applications
* VOIP
Graphics
Manage your photos and images, and edit them without having to purchase expensive third party applications. gThumb and Gimp provide:
* Image management
* sophisticated editing
Wireless and networking
Stay on line: at home, in the corner cafe, and out of town.
* support for many wireless network cards
* easy configuration and network selection with NetworkManager.
Cameras and printers
If you haven't lost the cable, simply plug in and play.
* automatic detection of USB devices such as cameras
* easy configuration of printers and scanners
Configuration and management
Manage all your desktop systems easily and consistently. Maintain security and control.
* Red Hat Network Update, Management, and Provisioning, provided with every subscription, enables fast deployment and easy management, from one system to thousands of systems. Sabayon enables the desktop user environment to be standardized-ideal for corporate IT deployments
Smart card login
Simplify client authentication, interactive login, secure e-mail and web browsing with a simple USB token.
* Use a USB smart card to log in to a desktop system and seamlessly access network services, such as websites and mail servers, using either PKI or Kerberos authentication.
* Additionally, Firefox and Thunderbird have been enhanced so that they can now use Kerberos to authenticate to web and mail servers.
Workspace management
Individualize your desktop with eye-catching features. Liven up your work experience. 3D graphics features provide:
* transparent windows
* fading and zooming
* multiple workspaces with rotating cube displays
Based on Compiz and AIGLX.
Security and VPNs
Start secure, stay secure. Access corporate data using VPN. Encrypt disk data so that you can leave your laptop in the car. Sleep easy.
* Built in firewall provides control of all incoming and outgoing network connections. Enabled by default.
* optional disk encryption
* kernel based IPsec.
Laptop and power Management
Be more productive: keep working while on the move.
* Enhanced support for ACPI (Advanced Configuration and Power Interface) power management and laptop features.
Multilingual support
Easy to use, consistent, desktop environment for around the world.
* more supported languages
* improved input method (SCIM)
* Japanese font support
Management
With Red Hat Network, even the largest deployments of Red Hat Enterprise Linux Desktop are easy to deploy, update, keep secure, and manage.
* Every Red Hat Enterprise Linux Desktop subscription includes the Red Hat Network Update, Management, and Provisioning modules.
See details at: RedHat
Free and open-source software is good for you and for the world. This is the best Windows software that we know of. No adware, no spyware, just good software. Free to download. Many kind free software here.
Mozilla Firefox, web browser, if you find most powerful browser, just download here.
Open Office, word processing, this software is just simple like another word processing, MS-Word, free to download.
Many software in here, for many kinds of works.
Just download here.
Some have speculated that prolonged exposure to wireless network devices could cause memory loss or other brain damage. However, potential health hazards from the microwave signals of WLANs have not been validated scientifically. In fact, using a WLAN is most likely much safer than using a cell phone.
Why? A typical home wireless network transmits radio signals in the same general frequency range as microwave ovens. Yet compared to ovens and even cell phones, wireless network cards and access points transmit at very low power, anywhere from 100 to 1000 times less. In addition, WLANs send radio signals only intermittently, during data transmisssion, whereas cell phones transmit continously while powered on.
Overall, the cumulative exposure to microwave radiation from a WLAN remains much, much less than exposure from other radio frequency devices.
Source: about.com
Undelete Plus is a quick and effective way to retrieve accidentally deleted files, files removed from the Recycle Bin, in a DOS window, from a network drive, from Windows Explorer with the SHIFT key held down.
Undelete Plus works under Win 95/98/Me/NT/2000/XP/2003/Vista operating systems. The program supports all Windows file systems for hard and floppy drives including FAT12/16/32,NTFS/NTFS5 and image recovery from CompactFlash, SmartMedia, MultiMedia and Secure Digital cards.
Undelete Plus is a completly FREE Software. It contains absolutely NO ADWARE, NO SPYWARE, NO REGISTRATION, NO POPUPS, NO MALWARE or other unwanted software.
Undelete Plus allows the following tasks to be performed:
- Recovery of deleted files from NTFS/NTFS5, FAT12/FAT16/FAT32 volumes.
- Restoring deleted files on Windows 2000, Windows XP, Windows 98, Windows ME, Windows NT, Windows 2003, Windows Vista.
Important Information: The following three things are important for a successful restoration: (1) The more recent your last defrag was the better your chance of recovering the deleted file so defrag often (at least once a week). DO NOT defrag the disk after you decide to try and retrieve an erased file. 2) Every time that your computer writes to disk the chances increase that your deleted file will be overwritten. The sooner you make a restoration attempt the more likely you will be successful. (3) the smaller the size of the file - the better your chance of success to restore it.
When Undelete Plus saves a restored file it reads its content and then writes it to a new file with the same name. It is recommended that you save the files that you are recovering to another disk because of the risk of overwriting other files that you may be trying to recover with the newly recovered one that you are saving. It would be best not to save the retrieved files back to the same hard drive until after completing all attempts to retrieve any lost files. This will minimize the chance of corrupting any remaining lost files.
Download Undelete Plus here.
LinkScanner technology will protect 60+ million users of AVG security products against malicious web sites and drive-by downloads
Brno, Czech Republic – December 5, 2007 – AVG today announced the acquisition of Exploit Prevention Labs, a pioneering developer of safe surfing technology that protects Internet users against malicious web sites and drive-by downloaded exploits. Terms of the acquisition were not disclosed. The deal is expected to be finalized by December 31st 2007.
“Unsafe hyperlinks and the poisoning of legitimate websites represent one of the biggest threats facing computer users since the advent of viruses,” said J.R. Smith, CEO of AVG. “The research and technology behind Exploit Prevention Labs’ LinkScanner product family will enable us to provide our 60-plus million users with access to the most complete protection against internet security threats. Our combined operations will give us the dual advantages of fast reaction and deep research capabilities over other vendors attempting to address this space.”
The acquisition will allow AVG to leapfrog the safe surfing initiatives of other anti-virus vendors, who have focused on database-driven approaches that are incompatible with the dynamic, elusive nature of these threats. Exploit Prevention Labs' experience has shown that real-time analysis is the most reliable method of protecting users against fast-moving Web 2.0-style attacks by cybercriminals.
See details at grisoft-website.