Monday, December 14, 2009

Next Year, 3.5 Inch Hard Disk Predicted Rare


The supply of hard disk drive (HDD) 3.5 inch for desktop and server began to shrink. Apparently the hard drive manufacturer surprised by strong demand abruptly to 3.5 hard drive "it.

According to Digitimes, the Taiwanese suppliers had predicted that there will be increasing demand to drive 2.5 "used in notebooks. Due to rapidly growing demand in notebooks this year, Western Digital (WD), Seagate, Hitachi, Toshiba and Samsung Electronics also increased production HDD 2.5 "him for notebooks.

But none of these producers who estimates that the desktop market will also rise rapidly. WD and Seagate is currently the two main suppliers of HDD 3.5 ". Together, they control more than 80 percent market share. And because both are busy focusing on the notebook, they do not increase production of its hard drive for desktop.

Analysts now predict that there will be scarcity of desktop hard disk drives in mid-2010. Of course, this deficiency will cause prices to rise.

Sunday, December 13, 2009

New rules of Facebook


Facebook finally inaugurated their new rules about the privacy issues of control have been many protests over the last few months.

Before formalizing these new rules last week, Mark Zuckerberg, founder of Facebook to send an open letter to all 350 million users. When he promises that there will be changes at Facebook.

In essence, the new choices available to allows users to customize any status updates or anything they post and upload. For example the content can be seen and others.

"Facebook did the transformation of the world's ability to control information online, by encouraging more than 350 million people to personalize who can see any content that they put anything," said Elliot Scharge, Vice President of Communications, Public Policy and Marketing Facebook to information The official, December 10, 2009.

Scharge mention, it designed Facebook so people can control what information you want to share with whom. "That's the reason why we attract the attention of our service user groups from around the world," said Scharge. "The announcement that we do today aims to meet the needs of users," he said

The most significant change made Facebook privacy options which are now available for all users every time they update the status or upload photos. There are now options that allow users to change the content is visible to just friends, friends of friends, all people, or customize their own.

Another new feature provided is the ability to make a list of friends and friends grouped based on what users want to share with them.

This option allows users to share photographs with family only, or make an opinion can be read by everyone. Finally, Facebook is also eliminated the regional network, well-worn features to a site with 350 million users.

Saturday, December 12, 2009

8 most influential women

Women have been at the helm of affairs of their country for several generations, but in the 20th century the number of famous women leaders to increase manifold. 8 women are listed below led the country through times of turbulence and peace.

1. Indira Gandhi - Prime Minister of India


Born to India's politically influential Nehru family, he was India's first woman Prime Minister. Hard-nosed pragmatist, he ruled the country with firmness and determination, hard and take tough decisions when necessary. He was killed by two guards himself in 1984.


2. Margaret Thatcher - Prime Minister of the United Kingdom


Dubbed the "Iron Lady" for her tough stance against the former Soviet Union, he led the country through the recession and high unemployment rate into a period of relative prosperity, and increase in stature among the nations. He was the first woman to lead a major political party in the United Kingdom.

3. Benazir Bhutto - Prime Minister of Pakistan


Daughter of Prime Minister of Pakistan Zulfikar Ali Bhutto, the country he ruled from 1988-1990, and 1993-1996. He was assassinated in 2007, during the election campaign. It is widely expected that he will continue to be the Prime Minister's third term notes.

4. Corazon Aquino - President of the Philippines


Asia's first woman president, she was a novice when he was elected president shortly after the assassination of her husband. He is a strong supporter of women's rights and democracy as opposed to the dictatorial rule of Ferdinand Marcos.

5. Sonia Gandhi - India's Congress Party Leader


It is believed by many to be the power behind the throne, he did not hold political office, but state regulations. Italy's birth, he adopted India as his country after her marriage to Rajiv Gandhi. He has been nominated as the third most powerful woman in the world.

6. Eva Perón - wife of President of Argentina


The second wife of President Juan Peron, she was a very strong woman, because the effects on her husband, and fight for the rights of the poor and the women of Argentina. He ran the Department of Health and Labor, and found the woman's first major political parties in the country.

7. Golda Meir - Prime Minister of Israel


Referred to as "the best in the Cabinet" by Daivd Ben Gurion, he was the fourth Prime Minister of Israel. The crisis is largest during the period of 1973 Yom Kippur War, where he made the decision to avoid pre-emptive attack, which gained approval from the greatest ally, the United States.

8. Sirimavo Bandarnaike - Prime Minister of Sri Lanka


The first woman in the world to become Prime Minister of a country, he rules Sri Lanka three times, 1960-1965, 1970-1977 and 1994 to 2000. He is the head of the Sri Lanka Freedom Party for 40 years until his death. His term saw the country to see through the good and bad times, and during the last semester he was more popular abroad than he did in his own country.

Friday, December 11, 2009

top 10 famous hacker


The expertise of a hacker is often considered 'troublesome' number of victims. Yet not all be branded as negative hackers, many of them are using their expertise for the purposes of viewing or improve weaknesses in the computer software.

But the effect, caused by a number of hackers who used his skills for evil purposes is often a hacker got a negative view of society.

The journey to become a hacker himself traveled through a long journey. To become a famous hacker, often have to deal with the prison. Just look at the way 10 the following world-renowned hackers as reported by the Telegraph, Sunday (29/11).

1. Kevin Mitnick
Born August 6, 1963 this is one of the computer hacker most controversial in the late 20th century. United States Court even referred to him as a criminal fugitive most wanted computer in America. Kevin's been known to break into computer networks of major telecommunications companies such as Alcatel, Fujitsu and Motorola.

The FBI arrested Kevin Mitnick in January 1995 in her apartment in the city of Raleigh, North Carolina on charges of assault against the government. Currently, he job as a security consultant computer network system.

2. Kevin Poulson
Long before he became a senior editor at Wired News, Men's full name is Kevin Lee Poulsen was known as an excellent hacker. Born in Pasadena, United States, 1965 was never broken into the fixed line network owned by Los Angeles radio station KIIS-FM, so he often won the radio quizzes. Even over the phone via a radio quiz show he can win a major prize, a Porsche.

3. Adrian Lamo
Adrian Lamo's name is often dubbed as 'the homeless hacker' the article he often did its actions in coffee shops, libraries or internet cafe. Action the most attention was when he broke into the company's network of media, the New York Times and Microsoft, MCI WorldCom, Ameritech, Cingular. Not only that, he also managed to infiltrate the system's AOL Time Warner, Bank of America, Citigroup, McDonald's and Sun Microsystems. Now he is living as a journalist.

4. Stephen Wozniak
'Woz' as he was usually called. We have perhaps better known as a founder of Apple. But as a student, Wozniak has become a fairly competent hacker. 59-year-old man was known to have broken into the phone network that enables long distance calls without paying anything and without a time limit. The instrument was made during a student is known by the name 'blue boxes'

5. Loyd Blankenship
The man nicknamed the mentor was once a prominent member of a hacker group in 1980 Legion Of Doom. Blakenship is the author of The Conscience of a Hacker (Hacker Manifesto). The book, written after he was captured and published in the underground hacker ezine Phrack.

6. Michael Calce
From an early age Calce was known as a Hacker. Action to break the commercial sites of the world did when he was 15 years old. Men who use the name in any action MafiaBoy, is arrested when the break in 2000 ruffled eBay, Amazon and Yahoo.

7. Robert Tappan Morris
The name Morris is known as an internet virus maker in 1988, otherwise known as the 'Morris Worm' is known to damage approximately 6000 computers. Due his act he be sanctioned for social work for 4000 hours. Now he works as an educator at the Massachusetts Institute of Technology.

8. The Masters Of Deception
The Masters Of Deception (MoD) is a group of hackers based in New York. These groups often disrupt the phone network owned Telecommunications Company like AT & T. Some members of this group were arrested in 1992 and thrown into prison.

9. David L. Smith
Smith is known as the inventor of Mellisa worm, which was first discovered on March 26, 1999. Mellisa is often also known as "Mailissa", "Simpsons", "Kwyjibo", or "Kwejeebo". The virus is distributed via email. Smith himself eventually dragged to jail because the virus had caused approximately $ 80 million

10. Sven Jaschan
Jaschan to carve his name as a villain in the virtual world in 2004 when a malicious program Netsky and Sasser worms. Currently he works in a network security company.

Tuesday, December 8, 2009

computer hierarchy

Old method for comparing various computer classes are based on processing power. Analysts typically divide the computer into six categories: supercomputers, mainframes, midrange computers (mini computers and servers), workstations, notebooks, and PCs and various equipment.


Supercomputer

 The term does not refer to the supercomputer particular technology, but on the fastest computing machines are available in a period. Supercomputers usually handle the job very complicated for a series of very large data. Rather than just for processing and business applications, supercomputers typically run military and scientific applications, although its use for commercial applications, such as data mining, has increased. General supercomputer operates four to ten times faster than the next fastest computer classes.


Mainframe Computers

Although mainframe computers more and more regarded as another type of server, based on the sophistication scale performance and reliability, the mainframe remains a distinct class of system hardware and software features. Mainframe still popular in many large companies to komputansi broad applications and are accessed by thousands of users. Examples of mainframe applications include airfare reservation systems, payroll companies, and the calculation and reporting of student values.


Midrange Computers

Minicomputer also called, are relatively inexpensive, small, and compact, which perform the same function with mainframe computers, but in a more limited scope. Even the line between mini-computers to mainframes becomes less clear in terms of cost and performance. Minicomputer usually supports computer networks, allowing its users to share files, software, peripherals, and various other network resources. Minicomputer can provide flexibility for companies who do not want to spend money on IT in the form of mainframes that are less measurable.

Midrange Computer smaller is called the server. Servers are typically used to support the network, allowing users to share files, Software and other network equipment. Companies that have a great need for e-commerce website and have a very large often run the web and various e-commerce applications through several servers.


Workstation

The vendor computer workstations initially developed to provide a high level of performance required by the technicians. Thus, a workstation running the application of scientific, technical, financial and quite complicated. Workstations are usually based on RISC architecture (reduced instruction set computing) and provides high-speed calculations and high resolution graphics display. Computer is getting wide acceptance in the scientific community and recently in the business community.


PC

Pc became the dominant method to access workgroup applications. This computer is a system of ordinary microcomputers and general and that has become a standard tool for businesses, and more and more also for home. Computer is usually designed modular, with separate but connected monitor, keyboard and CPU.


Notebook

Microcomputers, notebooks are small, portable, and lightweight. Computer is designed for maximum comfort and convenience to carry, allowing access to processing power and data outside the office environment. It costs more than desktop for the same functionality.

panda antivirus for netbooks


Netbook / mini laptop is mostly using the atom processor lately very popular in many circles due to smaller and lighter than ordinary laptops and a cheaper price.
Performance of the Atom itself is more limited compared to other processors. Therefore, regular antivirus would be more burdensome than the performance of your netbook. Panda provides a solution to remove Panda Antivirus for Netbooks, which are created using the latest ultraportable technology very mild and does not burden the netbook performance. Antivirus uses TruPrevent technology and Collective Intelligence. Compatible with Windows 7.

Monday, December 7, 2009

Antara Adat Dan Ibadah

 
Ini adalah sub kajian yang sangat penting yang membantah anggapan orang yang dangkal akal dan ilmunya, jika bid’ah atau ibadah yang mereka buat diingkari dan dikritik, sedang mereka mengira melakukan kebaikan, maka mereka menjawab : “Demikian ini bid’ah ! Kalau begitu, mobil bid’ah, listrik bid’ah, dan jam bid’ah!”

Sebagian orang yang memperoleh sedikit  dari ilmu fiqih terkadang merasa lebih pandai daripada ulama Ahli Sunnah dan orang-orang yang mengikuti As-Sunnah dengan mengatakan kepada mereka sebagai pengingkaran atas teguran mereka yang mengatakan bahwa amal yang baru yang dia lakukan itu bid’ah seraya dia menyatakan bahwa “asal segala sesuatu adalah diperbolehkan”.

Ungkapan seperti itu tidak keluar dari mereka melainkan karena kebodohannya tentang kaidah pembedaan antara adat dan ibadah. Sesungguhnya kaidah terseubut berkisar pada dua hadits.

Pertama  : Sabda Nabi صلی الله عليه وسلم.

“Artinya : Barangsiapa melakukan hal yang baru dalam urusan (agama) kami ini yang tidak ada di dalamnya, maka amal itu tertolak”.

Hadits ini telah disebutkan takhrij dan syarahnya secara panjang lebar.

Kedua : Sabda Nabi صلی الله عليه وسلم dalam peristiwa penyilangan serbuk sari kurma yang sangat masyhur.

“Artinya : Kamu lebih mengetahui tentang berbagai urusan duniamu”

Hadits ini terdapat dalam Shahih Muslim (1366) dimasukkan ke dalam bab dengan judul : “Bab Wajib Mengikuti Perkataan Nabi صلی الله عليه وسلم Dalam Masalah Syari’at Dan Yang Disebutkan Nabi صلی الله عليه وسلم Tentang Kehidupan Dunia Berdasarkan Pendapat”, dan ini merupakan penyusunan bab yang sangat cermat

Atas dasar ini maka sesungguhnya penghalalan dan pengharaman, penentuan syari’at, bentuk-bentuk ibadah dan penjelasan jumlah, cara dan waktu-waktunya, serta meletakkan kaidah-kaidah umum dalam muamalah adalah hanya hak Allah dan Rasul-Nya dan tidak ada hak bagi ulil amri [1] di dalamnya. Sedangkan kita dan mereka dalam hal tersebut adalah sama. Maka kita tidak boleh merujuk kepada mereka jika terjadi perselisihan. Tetapi kita harus mengembalikan semua itu kepada Allah dan Rasul-Nya.

Adapun tentang  bentuk-bentuk urusan dunia maka mereka lebih mengetahui daripada kita. Seperti para ahli pertanian lebih mengetahui tentang apa yang lebih maslahat dalam mengembangkan pertanian. Maka jika mereka mengeluarkan keputusan yang berkaitan dengan pertanian, umat wajib mentaatinya dalam hal tersebut. Para ahli perdagangan ditaati dalam hal-hal yang berkaitan dengan urusan perdagangan.

Sesungguhnya mengembalikan sesuatu kepada orang-orang yang berwenang dalam kemaslahatan umum adalah seperti merujuk kepada dokter dalam mengetahui makanan yang berbahaya untuk dihindari dan yang bermanfaat darinya untuk dijadikan santapan. Ini tidak berarti bahwa dokter adalah yang menghalalkan makanan yang manfaat atau mengharamkan makanan yang mudharat. Tetapi sesungguhnya dokter hanya sebatas sebagai pembimbing sedang yang menghalalkan dan mengharamkan adalah yang menentukan syari’at (Allah dan Rsul-Nya), firmanNya.

“Artinya : Dan menghalalkan bagi mereka segala hal yang baik dan mengharamkan bagi mereka segala hal yang buruk” [Al-Araf : 157] [2].

Dengan demikian anda mengetahui bahwa setiap bid’ah dalam agama adalah sesat dan tertolak. Adapun bid’ah dalam masalah dunia maka tiada larangan di dalamnya selama tidak bertentangan dengan landasan yang telah ditetapkan dalam agama [3]. Jadi, Allah membolehkan anda membuat apa yang anda mau dalam urusan dunia dan cara berproduksi yang anda mau. Tetapi anda harus memperhatikan kaidah keadilan dan menangkal bentuk-bentuk mafsadah serta mendatangkan bentuk-bentuk maslahat.” [4]

Adapun kaidah dalam hal ini menurut ulama sebagaimana dikatakan Ibnu Taimiyah [5] adalah : “Sesungguhnya amal-amal manusia terbagi kepada : Pertama, ibadah yang mereka jadikan sebagai agama, yang bermanfaat bagi mereka di akhirat atau bermanfaat di dunia dan akhirat. Kedua, adat yang bermanfaat dalam kehidupan mereka. Adapun kaidah dalam hukum adalah asal dalam bentuk-bentuk ibadah tidak disyari’atkan kecuali apa yang telah disyariatkan Allah. Sedangkan hukum asal dalam adat [6] adalah tidak dilarang kecuali apa yang dilarang Allah”.

Dari keterangan diatas tampak dengan jelas bahwa tidak ada bid’ah dalam masalah adat, produksi dan segala sarana kehidupan umum”.

Hal tersebut sebagaimana dikatakan oleh Syaikh Mahmud Syaltut dalam kitabnya yang sangat bagus, Al-Bid’ah Asabbuha wa Madharruha (hal. 12 –dengan tahqiq saya), dan saya telah mengomentarinya sebagai berikut, “Hal-hal tersebut tiada kaitannya dengan hakikat ibadah. Tetapi hal tersebut harus diperhatikan dari sisi dasarnya, apakah dia bertentangan dengan hukum-hukum syari’at ataukah masuk di dalamnya”.

Di sini terdapat keterangan yang sangat cermat yang diisyaratkan oleh Imam Syathibi dalam kajian yang panjang dalam Al-I’tisham (II/73-98) yang pada bagian akhirnya disebutkan, “Sesungguhnya hal-hal yang berkaitan dengan adat jika dilihat dari sisi adatnya, maka tidak ada bid’ah di dalamnya. Tetapi jika adat dijadikan sebagai ibadah atau diletakkan pada tempat ibadah maka ia menjadi bid’ah”.

Dengan demikian maka “tidak setiap yang belum ada pada masa Nabi صلی الله عليه وسلم dan juga belum ada pada masa Khulafa Rasyidin dinamakan bid’ah. Sebab setiap ilmu yang baru dan bermanfaat bagi manusia wajib dipelajari oleh sebagian kaum muslimin agar menjadi kekuatan mereka dan dapat meningkatkan eksistensi umat Islam.

Sesungguhnya bid’ah adalah sesuatu yang baru dibuat oleh manusia dalam bentuk-bentuk ibadah saja. Sedangkan yang bukan dalam masalah ibadah dan tidak bertentangan dengan kaidah-kaidah syari’at maka bukan bid’ah sama sekali” [7]

Syaikhul Islam Ibnu Taimiyah dalam Al-Qawa’id An-Nuraniyah Al-Fiqhiyah (hal. 22) berkata, “ Adapun adat adalah sesuatu yang bisa dilakukan manusia dalam urusan dunia yang berkaitan dengan kebutuhan mereka, dan hukum asal pada masalah tersebut adalah tidak terlarang. Maka tidak boleh ada yang dilarang kecuali apa yang dilarang Allah. Karena sesungguhnya memerintah dan melarang adalah hak prerogratif Allah. Maka ibadah harus berdasarkan perintah. Lalu bagaimana sesuatu yang tidak diperintahkan di hukumi sebagai hal yang dilarang?

Oleh karena itu, Imam Ahmad dan ulama fiqh ahli hadits lainnya mengatakan, bahwa hukum asal dalam ibadah adalah tauqifi (berdasarkan dalil). Maka, ibadah tidak disyariatkan kecuali dengan ketentuan Allah, sedang jika tidak ada ketentuan dari-Nya maka pelakunya termasuk orang dalam firman Allah.

“Artinya : Apakah mereka mempunyai para sekutu yang mensyari’atkan untuk mereka agama  yang tidak dizinkan Allah?” [Asy-Syuraa : 21]

Sedangkan hukum asal dalam masalah adat adalah dimaafkan (boleh). Maka, tidak boleh dilarang kecuali yang diharamkan Allah.

“Artinya : Katakanlah. Terangkanlah kepadaku tentang rezki yang diturunkan Allah kepadamu, lalu kamu jadikan sebagiannya haram dan (sebagiannya) halal. ‘Katakanlah, ‘Apakah Allah telah memberikan izin kepadamu (tentang ini) ataukah kamu mengada-adakan saja terhadap Allah?” [Yunus : 59]

Ini adalah kaidah besar yang sangat berguna. [8]

Yusuf Al-Qaradhawi dalam Al-Halal wal Haram fil Islam (hal.21)berkata, “Adapun adat dan muamalah, maka bukan Allah pencetusnya, tetapi manusialah yang mencetuskan dan berinteraksi dengannya, sedang Allah datang membetulkan, meluruskan dan membina serta menetapkannya pada suatu waktu dalam hal-hal yang tidak mendung mafsadat dan mudharat”.

Dengan mengetahui kaidah ini [9], maka akan tampak cara menetapkan hukum-hukum terhadap berbagai kejadian baru, sehingga tidak akan berbaur antara adat dan ibadah dan tidak ada kesamaran bid’ah dengan penemuan-penemuan baru pada masa sekarang. Dimana masing-masing mempunyai bentuk sendiri-sendiri dan masing-masing ada hukumnya secara mandiri.

[Disalin dari kitab Ilmu Ushul Al-Fiqh Al-Bida’ Dirasah Taklimiyah Muhimmah Fi Ilmi Ushul Fiqh, edisi Indonesia Membedah Akar Bid’ah,Penulis Syaikh Ali Hasan Ali Abdul Hamid Al-Halabi Al-Atsari, Penerjemah Asmuni Solihan Zamakhsyari, Penerbit Pustaka Al-Kautsar]
__________
Foote Note
[1]. Maksudnya ulama dan umara
[2]. Ushul fil Bida’ was Sunan : 94
[3]. Ini batasan yang sangat penting, maka hendaklah selalu mengingatnya!
[4]. Ushul fil Bida’ was Sunan : 106
[5]. Al-Iqtidha II/582
[6]. Lihat Al-I’tiham I/37 oleh Asy-Syatibi.
[7]..Dari ta’liq Syaikh Ahmad Syakir tentang kitab Ar-Raudhah An-Nadiyah I/27
[8]. Sungguh Abdullah Al-Ghumari dalam kitabnya “Husnu At-Tafahhum wad Darki” hal. 151 telah mencampuradukkan kaidah ini dengan sangat buruk, karena menganggap setiap sesuatu yang tidak terdapat larangannya yang menyatakan haram atau makruh, maka hukum asal untuknya adalah dipebolehkan. Dimana dia tidak merincikan antara adat dan ibadah. Dan dengan itu, maka dia telah membantah pendapatnya sendiri yang juga disebutkan dalam kitabnya tersebut seperti telah dijelaskan sebelumnya.
[9]. Lihat Al-Muwafaqat II/305-315, karena di sana terdapat kajian penting dan panjang lebar yang melengkapi apa yang ada di sini.
Kategori: Bid'ah Dan Bahayanya
Sumber: http://www.almanhaj.or.id
Tanggal: Selasa, 5 Juni 2007 01:17:04 WIB

tidur...

بِاسْمِكَ اللّهُمَّ أَحْيَاوَأَمُوتُ

Segala puji bagi Allah yang menghidupkan aku kembali setelah mematikan aku dan kepada Allah akan bangkit

Sunday, December 6, 2009

Maroon 5 - Sunday Morning

Sunday morning rain is falling
Steal some covers share some skin
Clouds are shrouding us in moments unforgettable
You twist to fit the mold that I am in
But things just get so crazy living life gets hard to do
And I would gladly hit the road get up and go if I knew
That someday it would lead me back to you
That someday it would lead me back to you

That may be all I need
In darkness she is all I see
Come and rest your bones with me
Driving slow on Sunday morning
And I never want to leave

Fingers trace your every outline
Paint a picture with my hands
Back and forth we sway like branches in a storm
Change the weather still together when it ends

That may be all I need
In darkness she is all I see
Come and rest your bones with me
Driving slow on Sunday morning
And I never want to leave

But things just get so crazy living life gets hard to do
Sunday morning rain is falling and I'm calling out to you
Singing someday it'll bring me back to you
Find a way to bring myself back home to you

And you may not know
That may be all I need
In darkness she is all I see
Come and rest your bones with me
Driving slow on Sunday morning

James Blunt - You are beautiful

My life is brilliant.

My life is brilliant.
My love is pure.
I saw an angel
Of that I'm sure.
She smiled at me on the subway.
She was with another man.
But I won't lose no sleep on that night
'Cause I've got a plan.

You're beautiful, You're beautiful,
You're beautiful, it's true.
I saw your face in a crowded place,
And I don't know what to do
'Cause I'll never be with you.

Yes, she caught my eye
As I walked on by.
She could see from my face that I was flying high,
And I don't think that I'll see her again,
But we shared a moment that will last 'til the end.

You're beautiful, You're beautiful,
You're beautiful, it's true,
I saw your face in a crowded place,
And I don't know what to do
'Cause I'll never be with you.

Dalalalala Dalalalala Dalalalala Dalalalala Daha...

You're beautiful, You're beautiful,
You're beautiful, it's true.
There must be an angel
With a smile on her face
When she thought up that I should be with you,

But it's time to face the truth.
I will never be with you.

U2 - With or Without You

See the stone set in your eyes
See the thorn twist in your side.
I wait for you.
Sleight of hand and twist of fate
On a bed of nails she makes me wait
And I wait without you

With or without you
With or without you.

Through the storm, we reach the shore
You gave it all but I want more
And I'm waiting for you

With or without you
With or without you.
I can't live with or without you.

And you give yourself away
And you give yourself away
And you give, and you give
And you give yourself away.

My hands are tied, my body bruised
She´s got me with nothing to win
And nothing left to lose.

And you give yourself away
And you give yourself away
And you give, and you give
And you give yourself away.

With or without you
With or without you
I can't live
With or without you.

With or without you
With or without you
I can't live
With or without you
With or without you.

Yellowcard - Only One

Broken this fragile thing now
And I can't, I can't pick up the pieces
And I've thrown my words all around
But I can't, I can't give you a reason
I feel so broken up (so broken up)
And I give up (I give up)
I just want to tell you so you know

(Chorus)
Here I go, scream my lungs out and try to get to you
You are my only one
I let go, but there's just no one who gets me like you do
You are my only, my only one

Made my mistakes, let you down
And I can't, I can't hold on for too long
Ran my whole life in the ground
And I can't, I can't get up when you're gone

And something's breaking up (breaking up)
I feel like giving up (like giving up)
I won't walk out until you know

(Chorus)
Here I go, scream my lungs out and try to get to you
You are my only one
I let go, but there's just no one who gets me like you do
You are my only my only one

(Music Intro)


Here I go, so dishonestly leave a note for you my only one, and i know you can see right through me so let me go and you will find someone

(Chorus)
Hear i go,scream my lungs out and try to get to you
You are my only one
I let go, but there`s just no one, no one like you
You are my only, my only one
My only one (x3)
you are my only one

Yellowcard - Believe

Think about the love inside the strength of heart
Think about the heroes saving life in the dark
Climbing higher through the fire
Time was running out
Never knowing you weren't going to be coming down alive

But you still came back for me
You were strong and you believed

Everything is gonna be alright
Everything is gonna be alright
Everything is gonna be alright
Be strong believe

Be strong believe

Think about the chance I never had to say
Thank you for giving up your life that day
Never fearing only hearing voices calling out
Let it all go the life that you know
Just to bring them down alive

And you still came back for me
You were strong and you've believed

Everything is gonna be alright
Everything is gonna be alright
Everything is gonna be alright
Be strong believe

Everything is gonna be alright
Everything is gonna be alright
Everything is gonna be alright
Be strong believe
[radio voice]
again today,
we take into our hearts and mind
Those who perished on this site one year ago
and also,
those who came to toil in the rubble
To bring order out of chaos,
to help us make sense of Our despair

Wanna hold my wife when I get home
Wanna tell the kids they'll never know
How much I love to see them smile
Wanna make a change right here right now
Wanna live a life like you somehow
Wanna make your sacrifice worthwhile

Everything is gonna be alright
Everything is gonna be alright
Everything is gonna be alright
Be strong believe

Everything is gonna be alright
Everything is gonna be alright
Everything is gonna be alright
Be strong believe

Everything is gonna be alright
Everything is gonna be alright
Everything is gonna be alright
Be strong believe
(background voice):Think about the love inside the strength of heart
Think about the heroes saving lives in the dark

Everything is gonna be alright
Everything is gonna be alright
Everything is gonna be alright
Be strong believe
(background voice):Think about the chance I never had to say
Thank you for giving up your life that day

(radio voice): The world will little note, nor long remember what we say here, but it can never forget what they did here.

Saybia -The Second You Sleep

You close your eyes
And leave me naked by your side
You close the door so I can’t see
The love you keep inside
The love you keep for me

It fills me up
It feels like living in a dream
It fills me up so I can’t see
The love you keep inside
The love you keep for me

I stay
To watch you fade away
I dream of you tonight
Tomorrow you’ll be gone
It gives me time to stay
To watch you fade away
I dream of you tonight
Tomorrow you’ll be gone
I wish by God you’d stay

I stay awake
I stay awake and watch you breathe
I stay awake and watch you fly
Away into the night
Escaping through a dream

I stay
To watch you fade away
I dream of you tonight
Tomorrow you’ll be gone
It gives me time to stay
To watch you fade away
I dream of you tonight
Tomorrow you’ll be gone
I wish by God you’d stay

Hey
Stay

I stay
To watch you fade away
I dream of you tonight
Tomorrow you’ll be gone
It gives me time to stay
To watch you fade away
I dream of you tonight
Tomorrow you’ll be gone
It gives me time to stay
To watch you fade away
I dream of you tonight
Tomorrow you’ll be gone
I wish by God you’d stay

Stay awake
Stay
Stay

I wish by God you’d stay

Ngeblog dapat uang

Halo teman-teman..

Saya ingin membagi kabar (untuk yang belum tahu), bahwa sekarang sudah ada sebuah peluang bisnis online yang bernama NegeriAds.Com

Bagi yang belum tahu, NegeriAds.Com adalah sebuah jaringan periklanan PPC di mana kita bisa mendapat uang dengan dua cara, yaitu: menjadi advertiser / publisher.

Advertiser adalah orang yang menitipkan (memasang) iklannya pada jaringan NegeriAds.Com. Jadi nanti dapat uangnya kalau ada yang berkunjung ke website kita lalu membeli produk yang kita iklankan.

Kalau Publisher, adalah orang yang menayangkan iklan-iklan para advertiser yang dititipkan di jaringan NegeriAds.Com. Nanti untuk setiap iklan yang tampil dan di-klik orang, kita dapat komisi sekian rupiah.

Bagi yang tertarik untuk menjadi advertiser, untuk menyebarkan iklan tentang produk-produk Anda, atau produk-produk yang Anda affiliasikan, bisa mulai mencoba untuk mengiklankannya di jaringan NegeriAds.Com

Cost per Click (CPC) sangat murah, hanya mulai Rp 400 / klik / iklan. Dan dengan dilindungi oleh sistem Anti Fraud (1 klik / IP / hari), Anda bisa lebih tenang dan yakin bahwa setiap sen uang yang Anda keluarkan tidak sia-sia.

Bagi para affiliate dan reseller, bisa menjadikan jaringan NegeriAds.Com pilihan alternatif (atau bahkan pilihan utama) untuk beriklan. Bagi para product owner, Anda pun bisa melakukan hal serupa plus merekomendasikan jaringan baru ini kepada para affiliate dan reseller Anda (karena persaingan di jaringan PPC lain sudah ketat).

Untuk yang ingin menjadikan blog / website yang sudah dimiliki sebagai sebuah MESIN UANG , segeralah bergabung menjadi publisher NegeriAds.Com, dan mulai jaring komisi dari klak-klik pengunjung pada blog / website Anda. Pendaftaran publisher 100% GRATIS.

Untuk yang belum memiliki website/blog? Ikuti panduan membuat sebuah blog gratis pada link di bawah, lalu daftarkan diri Anda untuk menjadi publisher NegeriAds.Com.

NegeriAds.Com memberikan sharing profit yang adil, 50%-50% antara network owner dan para publisher. Untuk jenis dan ukuran iklan, disediakan berbagai ukuran iklan berbasis text dan gambar dengan standard tampilan yang sesuai dengan ukuran IAB. Minimum payout hanya Rp 25.000 dan dibayar setiap tanggal 1-5 di setiap bulannya.

Tawaran yang cukup menarik jika saya menjadi seorang publisher :)

Pada akhirnya,

Untuk Anda yang ingin tahu lebih banyak tentang NegeriAds.Com dan ingin mendaftar (sebagai Advertiser atupun Publisher), silakan segera datang ke:

* NegeriAds.Com — info umum
* Panduan Advertsier — untuk panduan menjadi advertiser
* Panduan Publisher — untuk panduan menjadi publisher
* Panduan Memasang Kode — untuk panduan pemasangan kode iklan
* Panduan Membuat Blog — untuk panduan membuat sebuah blog gratis di *.blogspot.com (jika Anda belum mempunyai blog sebelumnya)

Silakan coba daftar & segera review jaringan tersebut. Pendaftaran 100% gratis.

Selamat mencari uang di internet :)

windows file systems

Windows file systems
Before formatting a volume or partition, consider the file system with which to format it. Windows 2000 and Windows XP support the NTFS file system, File Allocation Table (FAT), and FAT32. NTFS is the recommended file system for Windows 2000 and Windows XP because it supports several features that the other file systems do not, such as file and folder permissions, encryption, large volume support, and sparse file management. However, you must format the volume or partition as FAT if you plan to access files on that volume or partition from other operating systems, including MS-DOS, Windows 95, Windows 98, Windows Millennium Edition, and Windows NT 4.0.
Choose NTFS only if you are running Windows 2000 or Windows XP and you want to take advantage of NTFS features.
The following features are unique to NTFS:
  • Compression
  • Disk quotas
  • Encryption
  • Mount points
  • Remote storage
In addition, NTFS is required on all dynamic disks and GUID partition table (GPT) disks.

mplayer


mplayer is a movie player for Linux (runs on many other platforms and CPU architectures, see the documentation). It plays most MPEG/VOB, AVI, ASF/WMA/WMV, RM, QT/MOV/MP4, Ogg/OGM, MKV, VIVO, FLI, NuppelVideo, yuv4mpeg, FILM and RoQ files, supported by many native and binary codecs. You can watch VCD, SVCD, DVD, 3ivx, DivX 3/4/5, WMV and even H.264 movies, too.

MPlayer supports a wide range of video and audio output drivers. It works with X11, Xv, DGA, OpenGL, SVGAlib, fbdev, AAlib, libcaca, DirectFB, Quartz, Mac OS X CoreVideo, but you can also use GGI, SDL (and all their drivers), VESA (on every VESA-compatible card, even without X11), some low-level card-specific drivers (for Matrox, 3dfx and ATI) and some hardware MPEG decoder boards, such as the Siemens DVB, Hauppauge PVR (IVTV), DXR2 and DXR3/Hollywood+. Most of them support software or hardware scaling, so you can enjoy movies in fullscreen mode.

MPlayer has an onscreen display (OSD) for status information, nice big antialiased shaded subtitles and visual feedback for keyboard controls. European/ISO8859-1,2 (Hungarian, English, Czech, etc), Cyrillic and Korean fonts are supported along with 12 subtitle formats (MicroDVD, SubRip, OGM, SubViewer, Sami, VPlayer, RT, SSA, AQTitle, JACOsub, PJS and our own: MPsub) and DVD subtitles (SPU streams, VOBsub and Closed Captions).

mencoder (MPlayer’s Movie Encoder) is a simple movie encoder, designed to encode MPlayer-playable movies (see above) to other MPlayer-playable formats (see below). It encodes to MPEG-4 (DivX/Xvid), one of the libavcodec codecs and PCM/MP3/VBRMP3 audio in 1, 2 or 3 passes. Furthermore it has stream copying abilities, a powerful filter system (crop, expand, flip, postprocess, rotate, scale, noise, RGB/YUV conversion) and more. gmplayer is MPlayer with a graphical user interface. It has the same options as MPlayer.

mail merge in office 2007

Use mail merge to create and print letters and other documents
Use mail merge to create and print letters and other documents
You use mail merge when you want to create a set of documents, such as a form letter that is sent to many customers or a sheet of address labels. Each letter or label has the same kind of information, yet the content is unique. For example, in letters to your customers, each letter can be personalized to address each customer by name. The unique information in each letter or label comes from entries in a data source.
The mail merge process entails the following overall steps:
  1. Set up the main document. The main document contains the text and graphics that are the same for each version of the merged document. For example, the return address or salutation in a form letter.
  2. Connect the document to a data source. A data source is a file that contains the information to be merged into a document. For example, the names and addresses of the recipients of a letter.
  3. Refine the list of recipients or items. Microsoft Office Word generates a copy of the main document for each item, or record, in your data file. If your data file is a mailing list, these items are probably recipients of your mailing. If you want to generate copies for only certain items in your data file, you can choose which items (records) to include.
  4. Add placeholders, called mail merge fields, to the document. When you perform the mail merge, the mail merge fields are filled with information from your data file.
  5. Preview and complete the merge. You can preview each copy of the document before you print the whole set.

Saturday, December 5, 2009

command line panda usb vaccine

These arguments apply to the main executable (USBVaccine.exe), not to the setup program.
USBVaccine [ +system|-system ] [ /resident [/hidetray] [/autovaccinate] ] [/experimentalntfs] [/agreelicense] [drive units]
[drive units]:        Vaccinate drive unit [ A|B|C…|Z ]
+system :        Computer vaccination
-system :        Remove computer vaccine
/resident:        Start program hidden and prompt for vaccinating every new drive
/autovaccinate:     Automatically vaccinates any new drive inserted when used with the /resident command
/hidetray:        Hides tray icon when used with the /resident command

/experimentalntfs:    Enables the vaccination of NTFS USB keys. This is an experimental feature, use at your own risk. It’s recommended to backup your USB key before vaccinating it. Please send your feedback about this feature to http://research.pandasecurity.com/archive/Panda-USB-and-AutoRun-Vaccine.aspx

/agreelicense:        Use this parameter when you agree to the end user license agreement but want to avoid the agreement dialog being presented to the user

panda usb vaccine

The free Panda USB Vaccine allows users to vaccinate their PCs in order to disable AutoRun completely so that no program from any USB/CD/DVD drive (regardless of whether they have been previously vaccinated or not) can auto-execute.
The free Panda USB Vaccine also can be used on individual USB drives to disable its AUTORUN.INF file in order to prevent malware infections from spreading automatically. When applied on a USB drive, the vaccine permanently blocks the AUTORUN.INF file, preventing it from being read, created, deleted or modified. Once applied it effectively disables Windows from automatically executing any malicious file that might be stored in that particular USB drive. The drive can otherwise be used normally and files (even malware) copied to/from it, but they will be prevented from opening automatically.
Please take into account that vaccinating a USB drive is a non reversible operation and under some very unlikely conditions some applications could stop working. In any case if you do not have an AUTORUN.INF file in your USB drive it’s completely safe to vaccinate it.
Vaccinating NTFS file system formatted USB keys is supported by this program version, but this is an experimental feature, use at your own risk. It’s recommended to backup your USB key before vaccinating it.

autorun.inf

The Microsoft Windows Operating System uses the AUTORUN.INF file from removable drives in order to know which actions to perform when a new external storage device, such as a USB drive or CD/DVD, is inserted into the PC. The AUTORUN.INF file is a configuration file that is normally located in the root directory of removable media and contains, among other things, a reference to the icon that will be shown associated to the removable drive or volume, a description of its content and also the possibility to define a program which should be executed automatically when the unit is mounted.
The problem is that this feature is used by malware in order to spread to other computers infecting them as soon as a new USB drive is inserted into a new computer. What the malware does is copying a malicious executable in the drive and modifying the AUTORUN.INF file so that Windows opens the malicious file silently as soon as the drive is mounted. The most recent example of this is the Conficker worm which, in addition to spreading via the network, also spreads via USB drives.

Windows 7


Windows 7 (formerly codenamed Blackcomb and Vienna) is the latest version of Microsoft Windows, a series of operating systems produced by Microsoft for use on personal computers, including home and business desktops, laptops, netbooks, tablet PCs and media center PCs.

Windows 7 was released to manufacturing on July 22, 2009, with general retail availability set for October 22, 2009, less than three years after the release of its predecessor, Windows Vista. Windows 7’s server counterpart, Windows Server 2008 R2, is slated for release at about the same time.

Unlike its predecessor, which introduced a large number of new features, Windows 7 is intended to be a more focused, incremental upgrade to the Windows line, with the goal of being fully compatible with applications and hardware with which Windows Vista is already compatible.[5] Presentations given by Microsoft in 2008 focused on multi-touch support, a redesigned Windows Shell with a new taskbar, a home networking system called HomeGroup, and performance improvements. Some applications that have been included with prior releases of Microsoft Windows, including Windows Calendar, Windows Mail, Windows Movie Maker, and Windows Photo Gallery, will not be included in Windows 7; some will instead be offered separately as part of the free Windows Live Essentials suite.

la tomatina festival


La Tomatina festival in Spain gives new meaning to the expression 'playing with your food'. For most of the year Bunol is a ho-hum industrial town, 40km (25mi) from Valencia, quietly going about its own business. But come the last Wednesday of August, the town's streets turns into a salsa riot, with over 20,000 revellers pelting each other with large, red, squishy tomatoes.

The origins of La Tomatina aren't clear with several theories explaining how Bunyol has become home to the world's biggest tomato fight. However, the most plausible suggests that the most likely explanation dates back to 1945 when an annual parade of enormous figures with big heads (Gigantes y Cabezudos) was passing through the streets of Bunyol.
It seems that some youngsters tried to join in the parade and accidentally knocked over one of the giants who got to his feet and started swinging out at everyone around him. In retaliation the youngsters grabbed some tomatoes from a nearby vegetable stall and started throwing them at him until the police arrived to break things up.

The following year on the same last Wednesday of August these young people returned to the town hall square and started another tomato fight using their own tomatoes. Again the police intervened and in subsequent years the local council tried to ban the 'El día de la Tomatina' but with little success as event continued to grow year after year reaching the ludicrous size it is today.

Bing search engine

Bing (formerly Live Search, Windows Live Search, and MSN Search) is the current web search engine (advertised as a "decision engine") from Microsoft. Bing was unveiled by Microsoft CEO Steve Ballmer on May 28, 2009 at the All Things Digital conference in San Diego. It went fully online on June 3, 2009, with a preview version released on June 1, 2009. By August 2009, Bing had gained 9.3 percent of the United States Internet search market. However, by September, StatCounter stated that Bing's share of the US search market in September had fallen by almost one percentage point to 8.51%. Comscore claimed otherwise, stating that Bing's growth had held steady in September 2009, gaining 0.1 percent of the total United States Internet Search Market representing a market share of 9.4 percent.in October 2009 Bing's search share increased to 9.9%. Bing as a brand is also an attempt to eliminate the confusion caused by Microsoft’s “Windows Live” branding. Bing is now everything “search” related, whereas Windows Live encompasses the remnants of Microsoft’s consumer software products.
 
 

Office 2010

Microsoft Office 2010, codenamed Office 14, is the successor of Microsoft Office 2007, a productivity suite for Microsoft Windows and Mac OS X. Office 2010 includes extended file compatibility, user interface updates, a refined user experience and is planned to be released in June 2010. It will be available for Windows XP SP3 (32-bit), Windows Vista, and Windows 7. With the introduction of Office 2010, a 64-bit version of Office will be available for the first time, although only for Windows Vista and Windows 7 operating systems. Office 2010 is not supported on Windows XP Professional x64 Edition.

Office 2010 will mark the debut of free online versions of Word, Excel, PowerPoint, and OneNote, which will work in popular web browsers (Windows Internet Explorer, Mozilla Firefox, Google Chrome, and Apple Safari) but not in the Opera browser. Microsoft has confirmed that it will be released in the first half of 2010, and a public beta was made available in November 2009. A new edition of Office, Office Starter 2010, will replace the current low-end home productivity software, Microsoft Works.

Contents:
  • Microsoft Access 2010
  • Microsoft Excel 2010
  • Microsoft InfoPath Designer 2010
  • Microsoft InfoPath Filler 2010
  • Microsoft OneNote 2010
  • Microsoft Outlook 2010
  • Microsoft PowerPoint 2010
  • Microsoft Publisher 2010
  • Microsoft SharePoint Workspace 2010
  • Microsoft Word 2010
  • Microsoft Visio 2010 (not included in any Office 2010 Package)
  • Microsoft Project 2010 (not included in any Office 2010 Package)


https (hypertext transfer protocol secure)

Hypertext Transfer Protocol Secure (HTTPS) is a combination of the Hypertext Transfer Protocol with the SSL/TLS protocol to provide encryption and secure identification of the server. HTTPS connections are often used for payment transactions on the World Wide Web and for sensitive transactions in corporate information systems.
The main idea of HTTPS is to create a secure channel over an insecure network. This ensures reasonable protection from eavesdroppers and man-in-the-middle attacks, provided that adequate cipher suites are used and that the server certificate is verified and trusted.
The trust inherent in HTTPS is based on major certificate authorities which come pre-installed in browser software (this is equivalent to saying "I trust certificate authority (e.g. VeriSign/Microsoft/etc.) to tell me who I should trust"). Therefore an HTTPS connection to a website can be trusted if and only if all of the following are true:
  1. The user trusts the certificate authority to vouch only for legitimate websites without misleading names.
  2. The website provides a valid certificate (an invalid certificate shows a warning in most browsers), which means it was signed by a trusted authority.
  3. The certificate correctly identifies the website (e.g. visiting https://somesite and receiving a certificate for "Somesite Inc." and not "Shomesite Inc."
  4. Either the intervening hops on the internet are trustworthy, or the user trusts the protocol's encryption layer (TLS or SSL) is unbreakable by an eavesdropper.
As opposed to HTTP URLs which begin with "http://" and use port 80 by default, HTTPS URLs begin with "https://" and use port 443 by default.
HTTP is insecure and is subject to man-in-the-middle and eavesdropping attacks which can let attackers gain access to website accounts and sensitive information. HTTPS is designed to withstand such attacks and is secure (except for old deprecated versions of SSL).

 

Cancel or Close your Pay Pal Account

Are you a merchant who uses Pay Pal to receive payment for your merchandise or services? Do you need to cancel your Pay Pal Account? Follow these simple steps and you'll be able to close your account quickly and easily.

  1. Pay Pal can be a great alternative to having a regular merchant account, as set up is fast and simple. However, sometimes people outgrow their account, and find themselves ready to move onto another processor. If you need to cancel your pay pal account, the first thing you need to do is log in to your Pay Pal Account.
  2. You should be on the home screen. Click on the "My Account" tab.
  3. Click on the "Profile" subtab. There is no need to scroll through the options you see; simply click on the actual words; it is a link.
  4. Click the "Close Account" link found in the account information column.
  5. Follow the instructions provided. You may simply receive a confirmation message that your account has been closed successfully, depending on your current account standing. If you owe money or your have disputed items pending, you will be unable to close your Pay Pal account until they are resolved.
  6. Once your Pay Pal account has been closed, you might want to consider looking into getting a regular merchant account for your personal or business banking needs. Merchant accounts have competitive rates that are usually much cheaper than Pay Pal, and can provide you with a lot of great perks that you didn't have before. Just be sure to research and compare some of the merchant account set up fees, and gateway charges before you commit to one company.

hai...

this is my first post...