Get cash from your website. Sign up as affiliate.
4000 TV channels
Download TV Software. It's safe to install.
Safe to install software
Download TV Software. It's safe to install.
Number one rated software

Jan 28, 2010

convert FAT to NTFS

convert FAT ke NTFS
step 1
into comandline type cd\












step2
into commandline type help convert


 








step3
suppose we want to change the D drive partition is a FAT file extension to NTFS.
into commandline type convert D: /FS:NTFS Read more "convert FAT to NTFS..."

solar powered lamp

This is a pretty good light is available in different colors, this beda.lampu was using solar power.

This light color options there are 3 kinds;
1.pink
2.yellow
3.blue

This form and color options available



how to charge the lamp is quite simple, do not need to be placed directly under the hot sun, just placed near the glass window in the sun.



The following is a specification of the lamp





for friends who are interested and want to buy it, these lights are sold around £ 20.00. please kalu wants to buy can buy here Read more "solar powered lamp..."

Jan 27, 2010

strongest mobile





Land Rover car company to introduce Mobile with a Land Rover S1, Mobile was created as an alias Mobile strongest in the world is not damaged.

This new mobile phone made by Land Rover, known as the most powerful phone in the world.
This phone can still be used even though trampled by the elephant, heated with an oven, drowned dilumpur, and resistant to water with a depth of 1 meter.

This phone brings the 1500-hour battery life, 2.0 megapixel camera and extra loud ringtone to be heard in noisy environments because of the engine.
this phone marketed by Tesco with the price of £ 249.99 Pounds Sterling. Tesco believes that this phone will not be damaged, Tesco 3-year warranty. Read more "strongest mobile..."

Jan 23, 2010

k-ninja


ini ada aplikasi yang menurutku sangat bagus dan wajib digunakan bagi temen2x yang mengutamakan kecepatan dalam browser.nama aplikasi web browser ini adalah K-NINJA.

K. Ninja adalah salah satu tool browser. Setelah melihat - melihat features dari browser ini saya jadi tertarik dan yakin kalo browser ini handal dan bisa membuat kita browsing internet lebih cepat dan mampu menambah kecepatan koneksi internet kita ketika sedang browsing.



dibawah ini adlah tampilan utama dari K-NINJA.



jika dilihat memeang tampilan aplikasi ini tidak seperti web browser,tapi jangan salah meskipun terlihat sederhana,kemampuan aplikasi ini melebihi web browser lainnya.hal ini terbukti dari fitur-fitur yang ada.

Dengan interface yang benar2 friendly dan tidak bnyak menggunakan RAM / memory pc kita menjadikan Tool Browser ini benar-benar ringan dan cepat untuk digunakan, berikut ini adalah beberapa fitur K. Ninja
K-Ninja Samurai Features:
  • Rendering Engine - K-Ninja  utilizes the latest SeaMonkey/Gecko Rendering Engine release: v1.8.1.2. It is a fast, secure rendering engine which supports most current Web Standards (HTML 4.0, CSS, XHTML etc.).
  • Tabs - K-Ninja has tabbed browsing, which we call “Layers”. New layers can be opened and closed with the Open & Close Layers buttons.
  • Compact Menu - to increase viewing space, the menu which is normally located at the top of the screen is available in K-Ninja via the Preferences button, by right-clicking on it.
  • Pop-up Blocker - Enabled by default, K-Ninja will block most if not all pop-ups. The pop-up blocker can be enabled/disabled via the Preferences button.
  • Integrated Search - just type a search term/word into the address bar, and click on the Search button. Results are then delivered via Google.
  • RSS Support - the Aggreg8 RSS Reader is included with K-Ninja. It can be accessed via the Compact Menu (right-click on the Preferences button).
  • Mouse Gestures - the mouse gestures plugin is included. To use simply right-click, hold the mouse button and then drag the cursor either right (to go back a page) or left (to go forward).
  • Translate a Page - simply right-clicking on a webpage will provide you with a menu to translate a page from one language to another.
  • Safe Recovery - Requires manually selecting the Open Last Session Feature.
  • Unique Speed Settings - K-Ninja is by default optimized for fast connections, and these speed settings can now be toggled in case you are on dial-up.
  • Mozilla ActiveX Control support included for Media Player functionality on streaming and embedded multimedia content.
  • Flashblock extension - this can be enabled/disabled via the Compact Menu. Once enabled Flash animations will be deactivated on the webpages you are viewing.
  • Quicknote extension - this is a handy little note-taking utility included in K-Ninja for those who like to take/transcribe notes or copy & paste text whilst browsing.
  • Extremely lightweight STP MP3 Player included (200kb). When run an icon for STP will appear in your System Tray. Right click on the icon for options or to play an MP3 or CD whilst browsing.
  • Includes additional Web Search engines including MultiSearch: enter a search term and the results will be delivered via 6 popular search engines including Google (100 results per page), MSN, All The Web, Google Images, Ask.com & Gigablast.
  • URL Shortcut Hotkeys now implemented.
  • Built in macro language.
  • Unique themes & skins.
  • Even more privacy options available via the Compact Menu. It will provide you with an array of options to enable/disable any “features” that you don´t want running on a webpage before you view it (like Java, Javascript etc).


download Read more "k-ninja..."

facebook+YM

This is a pretty good application for mengabungkan various social networking and instant message sperti facebook, twitter, yahoo messenger, AIM, and several other instant messege. In other words, you can follow the status updates from your friends on facebook, twitter, etc. from Yono Desktop ini.tampilan this application is quite trendy and attractive.






To use this free software is very easy way. After you finish installing the account you just add whatever you want to enable the Yoono Desktop.

such an account you want to enable your facebook, you can click on an account that is facebook, it would appear the display;





Here you need to fill in your email and password. After you click the Login button will display a confirmation page for Facebook to connect with Yoono Desktop. Klik aja Allow button.

an account to add other similar way.

download yono desktop in here Read more "facebook+YM..."

yono desktop

ini ada aplikasi yang cukup bagus buat mengabungkan berbagai sosial networking dan instant message sperti facebook, twitter, yahoo messenger,AIM, dan beberapa instant messege lainnya. Dengan kata lain Anda dapat mengikuti update status dari teman-teman Anda di facebook, twitter, dll tersebut dari Yono Desktop ini.tampilan aplikasi ini cukup trendy dan juga menarik.

berikut screenshoot dari aplikasi yono desktop;




Untuk menggunakan software gratis ini caranya sangat mudah. Setelah Anda selesai menginstall maka Anda tinggal menambahkan akun apa saja yang ingin Anda aktifkan di Yoono Desktop ini.

misalnya anda ingin mengaktifkan acount facebook anda, anda tinggal klik acount facebook yang ada, maka akan muncul tampilan;



Di sini Anda harus mengisikan email dan password Anda. Setelah Anda mengklik tombol Login maka akan muncul halaman konfirmasi untuk menghubungkan Facebook dengan Yoono Desktop. Klik aja tombol Allow.

untuk menambahkan acount yang lainnya caranya sama.

untuk download yono desktop di sini Read more "yono desktop..."

merubah text menjadi kode ASCII

setelah beberapa lama gak update blog,sekarang saatnya aku post sedikit artikel.

bagi temen2x yang yang ingin membuat karya seni dengan mengunakan kode ASCII sekarang tidak perlu lagi binggung bangaimana membuatnya, cukup melakukan beberapa langkah saja karya seni temen2x sudah jadi.

caranya unduh program ASCII art generator (bisa di searching dari google) dan instal program tersebut pada komputer/laptop temen2x.jalan kan aplikasi tersebut.
berikut tampilan awal dari program tersebut:



program ini terdiri dari 3 menu utama,yaitu;
1.convert image
2.convert word
3.free draw

jika temen2x ingin membuat kata dengan karakter ASCII berikut caranya;

1.klik pada menu convert word




2.ketikkan kata yang ingin diubah kedalam karakter ASCII pada kolom
char config word(s)atur ukuran font dan type sesuai keinginan kamu.

3.setelah itu klik start convertion,maka kata tersebut akan di ubah kedalam karakter
ASCII.

4.setelah itu tinggal save as/copy ketempat yang temen2x kehendaki.

NB; cara untuk mengunakan menu lainnya hampir sama.



Read more "merubah text menjadi kode ASCII..."

Jan 2, 2010

overclock

Language Overclock composed of two words that is Over and that means Clock mainboard setup for the processor clock and a VGA, and can also maximize the performance of certain software does is run the computer at a higher clock speed than the specifications, Wikipedia says, Overclock it means to run a component above the computer clock rate than it should.

WHAT PURPOSE OF overclock BY YOU?

CPU Bus Clock and Clock on this overclock, it is important to know the concept of the CPU clock and bus clock. CPU clock is a clock signal in the CPU, including the processor. CPU clock is what is often called the processor specification. Example Pentium 4 2.4 GHz. This means that these processors have allocated 2.4 GHz CPU clock. Clock does not watch or clock. Here is a signal that is used by the processor to trigger the occurrence of a process.



Read more "overclock..."

artificial intelligence

1. Processing (pefokusan) filed / ditunjkkan on issues that do not respond to a problem.
2. More effort is intended to capture and manipulate nature - an important qualitative properties of a situation
3. Work done adalahuntuk handling and simantik and syntactic forms
4. Answer yangdiberikan not optimal but rather
5. The use of special besarpengetahuan issues dalammemecahkakn
6. The use of meta-level pengeraitahuan to influence the control strategy
a problem




Read more "artificial intelligence..."

hacker history

erminology hackers emerged in the early 1960s among the members of student organizations Tech Model Railroad Club in Artifisial Intelligence Laboratory Massachusetts Institute of Technology (MIT). Student group is one of the pioneers of computer technology and they struggled with a number of mainframe computers. Said the first time hackers came up with a positive sense to refer to a member who has expertise in the field of computers and able to make computer programs better than what has been designed together.

Then in 1983, the term hacker became negative. The problem, in that year for the first time the FBI arrested a criminal group of computers The 414s are based in Milwaukee USA. 414 is their local area code. The group that came to be called a hacker was convicted of burglary 60 computers, from computers owned by Cancer Center Memorial Sloan-Kettering's computer to Los Alamos National Laboratory. One of the perpetrators are getting immunity for TESTIMONIALS, while the other 5 players get probation sentence.




Then, further up other groups to mention themselves hackers, but it's not. They are (especially the men) who have the satisfaction of breaking through computer and phone-jockey (phreaking). True hackers call these people 'crackers' and do not like to hang out with them. True hackers crackers as people look lazy, irresponsible, and not too bright. Real hackers do not agree to say that with a person through the security has become a hacker.

The hackers meeting each year which is held once every mid-July in Las Vegas. A meeting of the world's largest hacker is called Def Con. Def Con event to event is more exchange of information and technology related to hacking activities.

Hacker has a negative connotation for the public misunderstanding of the difference terms of the hackers and crackers. Many people understand that the resulting losses hackerlah certain parties such as changing the look of a web site (Defacing), insert the virus code and so on. In fact, they are a cracker. Crackerlah using vulnerabilities that have not been repaired by the software maker (bug) to infiltrate and damage a system. For this reason, hackers often understood is divided into 2 groups White Hat Hackers, the true hackers and crackers are often referred to as Black Hat Hackers.

White hat is a term of information technology in the English language that refers to the ethical hackers showed a weakness in a computer system. White hat generally focuses its action on how to protect a system, which contradicts with the black hat is more focus on how the action through the system.

Black hat hacker is a term of information technology in English which refer to those hackers who break computer security without permission, usually in order to access computers that are connected to the network. The term cracker proposed by Richard Stallman to refer in this sense. Read more "hacker history..."

manifesto hacker

It happened again today. Another one sold out, sacrificing their dreams to the corporate security machine.

Damn whitehats, noone believes in a cause anymore.
Another bug was released today to the security mailing lists.

Damn Whitehats, they know not what they do.
Another potential computer genius was relegated to an existence of nothing more than a 9-5 cubicle-dwelling promotional tool.

Damn whitehats, putting money before discovery.
Another family was ravaged by cooperations and governments bent on instituting control over individuality, monitoring every action..

Another kid was sentenced today for searching for a way to understand the world. Convicted and imprisoned, not because of what he did, but because of what others thought he could do.

Damn Whitehats - Fear keeps them in business.

The public, believing anything it hears from "reputed experts". Screaming for blood. Looking for something to blame for their lost hope. Their lost ability to seek out new knowledge. Fear consumes them. They cannot let go of their uncertainty and doubt because there is no meaning. They seek to destroy explorers, outlaws, curiosity seekers because they are told too. They are told these people that seek information are evil. Individuality is evil. Judgment should be made based upon a moral standard set in conformity rather than resistance. Lives are ruined in the name of corporate profit and information is hoarded as a commodity.

Damn Whitehats, you were once like us.

I was a Whitehat. I had an awakening. I saw the security industry for what is really is. I saw the corruption, the lies, the deceit, the extortion of protection money in the form of subscription services and snake-oil security consultants.

I wanted to know, I wanted to understand, I wanted to go further then the rest. I never want to be held down by contracts and agreements.

You say I should grow up. You say I should find better things to do with my time. You say I should put my talent to better use. You're saying I should fall in line with the other zombies and forget everything I believe in and shun those with my drive, my curiosity, tell them it's not worth it, deny them of the greatest journey they will ever experience in their lives.





I am not a blackhat. The term is insulting, it implies I am the opposite of you. You think i seek to defeat security, when I seek something greater. I will write exploits, travel through networks, explore where you are afraid to go. I will not put myself in the spotlight and release destructive tools to the public to attract business. I will not feed the fear and hysteria created by the security industry to increase stock prices. I can, and will, code and hack and find out everything I can for the same reasons I did years ago.

I am a Hacker, dont try to understand me, you lost all hope of that when you crossed the line. You fail to see the lies and utter simplicity behind the computer security industry. Once, you may have shared my ideals. You fail to see the fact that security is a maintenance job.

Youve given up hope for something better. You fail to see yourself as worthless, fueling an industry whose cumulative result is nothing. I dont hate you, I dont even really care about you - If you try to stop me, you will fail, because I do this out of love -- you do it for money.

This is our world now.. the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt cheap if it wasn't run by profiteering gluttons, and you call us criminals. We explore... and you call us criminals. We seek after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat and lie to us and try to make us belive it is for our own good, yet we're the ciminals.

Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for.

I am a Hacker, and this is my manifesto. You can't stop me, and you certainly can't stop us all.

Read more "manifesto hacker..."

HACKER

1. Hacker Definition
Hackers are in Indonesian language is called hackers are people who study, analyze, and then if wanted, can create, modify, or even exploit the system contained in a device such as computer software and computer hardware such as computer programs, and administrative matters other, especially security. [Wikipedia, 2009]

From time to time the definition of "hacker" has evolved, but at this time can be defined as "people who enjoy learning the ins and outs of comp system. And experimenting with it. "Eric Raymond, author of" The New Hacker's Dictionary (MIT Press 1994), writing features hackers as follows:
- Joy of studying detail comp system. Or programming language.
- Joy to the practice of programming rather than just menteorikannya
- Respecting others hacing results.
- Learn programming with the rapid
- Advanced in the operating system / language specific programming (Unix)

True hackers are not criminal groups such as the belief network of destruction of many, but it must be admitted that from time to time there are quite a lot of abuse by hackers use their skills and to pengethuan things destructive and negative, do various crimes or doing meddling with the mess and damage files of [Artha, 2001]

Hacker is a set or some group that aims to develop science pengengetahuan and sharing information freely with no limits. Hacker is someone who is interested to know in depth about the work of a system, computer, or computer network. They consist of the network expert programmers. They, too, who contributed to build the Internet through the development of the UNIX operating system [Syrozone, 2009]

Hacking is a computer program through the activities of others to. Hacker is someone who likes to explore computers, have the expertise to make and read a particular program, and obsessed with watching the security (security) it. Hacker has a double face; there is something dear thief [Poskota, 2009] Read more "HACKER..."

A. CRACKER

Cracker. Is the dark side of computer security professionals who stray too far. The script kiddies, the Black Hat, the people without knowledge except how to do hacking. This group does not know how the computer works. A cracker does not care about the community and not think about consequences of their actions. The Cracker despised in hacking forums and identical to the damage and "Google". The cracker want everything under their control are stored in the record. They do not seek information for themselves and depend on anyone who gave it to them. They were what people want to-be. [Teguhramadhan, 2004]

Cracker is a term for people looking for weaknesses to the system and enter personal interests and make a profit from the system in enter such as: the theft of data, deletion, and many others. The young cracker cracking is generally done to improve / use of network resources for its own sake.





Read more "A. CRACKER..."