Wednesday, December 31, 2008

Via SMS ,chat to Gmail


How often you chat with someone and he does not respond to your chat because he is leaving the computer?

Now users can keep the Conversation to continue running even if the person who invited the chat away from the computer. With features from Gmail Labs, the user can send SMS text messages directly from Gmail. These features combine the best of IM and text, users will chat with friends from home and will reply to chat only with a little touch of the keyboard.

User just click "Settings" and select the tab "Labs." Scroll down to see "Messaging (SMS) in Chat" and select "Enable" and "Save Changes." Research conducted Gmail Labs also allows Gmail users in the United States to send via mobile phone, but if users want to send text messages to friends, can use the phone number from the United States anywhere in the world. Users can type a phone number to the search box in the chat window on the left, and select "Send SMS". Users can also select the contact you want to send SMS for the first time, and then save the phone number in their contact. Once the user name for the phone number, the user can start chatting. If the name is stored, the user can select the name of the contact, and then write a chat in the chat box, and choose Send SMS.

When users receive text messages from Gmail on your phone, then the message will come from any area code 406. Users can reply to the text via mobile phone text as usual. Dirutekan will reply message back to the server and Gmail will be any chat window in Gmail user's friends. Each message from a friend will come from a number of different areas 406, so the user can reply to a message directly to the people that it's correct. Messages from the same person, will always come from the same number, so that users can make bookmarks in the phone.

If users receive a message from someone who does not want to chat from your phone, then stay reply with the word "block". If the user does not want to get the text from anyone using Gmail, live reply with the words "Stop". The message text is entered in the mobile message that may cost extra. (h_n)

source : beritanet.com
Translate by : Me

Adding Tattoos Beckham, the wife protests


By Eggi Paksha

Previous body Beckham already familiar with the tattoos. Various images carved permanent in some parts of the body. Start from the base of the neck to the arm.

Initially, Victoria does not interfere with the hobby "nyeleneh" is her husband. Former Spice Girls vocalist is even happy with the image attached to the body Beckham.

I started to attitudes that do not continue when Beckham decided to add one more tattoo on the left arm recently. Action sepekan this done before he joined with colleagues one team in Milan.

According to one source close to Beckham told The Sun, Beckham decision to add tattoos to make Victoria a little peeved. Parties, he did not suspect her husband will add tattoos on the body.

"During this Victoria actually pleased with her husband's tattoos. But he hopes Beckham does not add more tattoos on the body. Victoria want no part in the skin Beckham left," said the source, such as GOAL.com This Tuesday (29/12).

Recently, Beckham carve a new tattoo on the left arm. Tattoos are against one paragraph excerpt from the Bible.

In the eyes of Victoria Beckham is a man who is maintaining health. Goodbye, Beckham is not smoking and drinking. The only worry that Victoria Beckham is addicted to tattoos.

"She (Victoria) Beckham will worry addicted to tattoos and do not know when to stop," said the source.

Currently, AC Milan are to undergo their annual tour to Dubai, Saudi Arabia. Beckham is hoping to do their own follow with colleagues today. Milan have not yet determine their own attitudes towards tattooing on the body of Beckham.

Yes, this is not a nice tattoo bring the problems that result in disunity in the household.

Source : goal.com
Translate by : Me

Milan kept Security Bodyguard


Dubai, WEDNESDAY - The presence of AC Milan in Dubai, United Arab Emirates (UAE) to get tight control. Moreover, Milan said armed officers, because of reports that David Beckham will become a terror target.

Milan came to the country, on Monday (29/12) night. Tuesday next day, they direct train hard. Milan will face in the Dubai tournament friendship opponent German club, SV Hambur next week.

Strict control directly given to AC Milan, especially to David Beckham who recently joined. For, there are reports that their presence will be used by Beckham as a terrorist target.

40 personnel to monitor the players closely. Beckham appears to practice with Paolo Maldini. Meanwhile, Clarence Seedorf separate from colleagues as having a special training session. Wherever they move, and guards keep watch. They practice at Al Nasr Sports Complex.

Meanwhile, the presence of Milan to the UAE also reap the blessings of others. Fly Emirates airlines to increase the value sponsornya to Milan from 1 million euros to 2 million euros (about Rp 24 billion).

source : bola.kompas.com
Translate by : Me

In the 2009 Information Technology Industry will be possible to drop


Based on research from the CMI (the Chartered Management Institute), the news industry IT (Information Technology) is now undergoing a crisis of confidence as business leaders in sectornya, concerned with the increase in costs and the low level of credit. Some 56 percent of the results of the survey conducted by CMI, said that increased energy costs will have a negative impact in their IT business in 2009. While 42 percent said that the problems that infest the IT industry in form of credit problems.

Meanwhile, according to CMI, 81 percent of the respondents stated that there is still a possibility to survive in the current economic crisis. CMI predicted around 17 percent of IT professionals in the IT industry will move or change jobs in 2009, and as much as 30 percent of the respondents claim that they plan to add extra work in the years ahead, and the remaining 22 percent only want to build a 'transferable skill' in place the same.

Three of the ten staff in the IT sector stated that the gap between the global spectrum of technology and skills of each staff will have a negative impact on their performance in 2009, predicted that worse was delivered as much as 69 percent of the respondents, namely the reduction of staff.

No one surprised with this condition. According to Jo Causon, marketing director and corporate affair CMI, however, the number of the senior team in the organization is very disappointing, especially as fears to give the staff so that they make a vague search for other jobs. Now, more than that, it's time to start investing wisely because if a company or organization to think that competence is something that expensive, so investors should also start thinking about the cost and loss of errors that may be made by the company. (H_n)

source :beritanet.com
Translate by : Me

10 Tips for Securing Computer When Vacation


Jakarta - Holiday has arrived, many workers insideman choose to take leave to spend holidays at the end of the year. This means that tens and even hundreds of desktop computers in the office of idle no sir.

Make sure your computer is safe in the office or at home, so keep quiet holiday. Whether it be a laptop in the office or home, or taken a vacation, you need to consider the following:

1. Before leaving the office or home, make sure the computer and the monitor is switched off. If you must Computer standby so that you can work the remote, most do not turn off the monitor.

2. Let safe, pull the plug that connects the computer with the power source. In addition to minimize bad things such as korslet, also to save electricity.

3. Turn off and pull the plug your computer equipment such as printers, Uninteruptible Power Supply (UPS), speakers, computers and other equipment. Do not forget to also turn off the alarm clock in order not to disrupt other employees who picket duty in the office during holidays.

4. Back up data on the computer or server before the holiday. This will be useful if a malfunction occurred when the system that cause data loss.

5. Disconnect (Disconnect) computer network access to all your workstations and servers. Turn off the modem to access the server or workstation.

6. Do not forget to lock the door of the room so that the equipment you work your computer safe.

For the use of laptop:

7. Do not leave the laptop in the car if you do not intend to bring the laptop while on holiday. Save your laptop in a safe place.

8. If you intend to bring the laptop while on holiday with the aircraft, do not enter the laptop into the luggage, but take it to pieces.

9. Make sure the laptop is in the dead or at least in hibernation position before bringing the laptop and travel.

10. Do not put the piles of goods on the laptop. The burden is too heavy on the laptop, your laptop can cause damage. Moreover, beverage shed on the laptop.
Dewi Widya Ningrum - detikinet
Translate by : Me

other article :

-
Tips for Reducing Risks are Computer Virus
- 7 Step to eradicate virus' K0pL4xZ '
-
4 Step Virus Prevention Conficker

England bring Obama sites Restrict Access the Internet


London - Barack Obama of fame that apparently also the globe enchanting English. I hesitate, hesitate, country, Prince Charles is to invite the President of the U.S. best efforts to restrict access to some Internet site.

Get this plan by the secretary of culture, media and sport UK, Andy Burnham.

detikINET quoted from Nytimes, Wednesday (31/12/2008), the UK can hope worked with Obama to determine the new rating system for the Internet site.

The aim is to default to the site in English,
given the current lot of content that is not consumed eligible children.

The standard here is similar to the standards that apply to the Motion Picture Association of America. Internet service providers (ISPs) will be required to limit access to sites that do not have a rating of age.

Burnham stressed that the plan is not a campaign against the freedom to have a voice, but just enough to secure the children from harmful content.
Fransiska Ari Revelation - detikinet
Translate by: Me
Monday, December 29, 2008

Free Download UxTheme Patch for Windows 7

UxTheme Patch for Windows 7 description


A patch for the theme manager of Windows 7



The theme manager (implemented in Uxtheme.dll), introduced back in Windows Codename: Whistler days, is responsible for drawing non-client parts of every window displayed within Microsoft Windows according to the styles defined in your active theme.

To keep the Microsoft Windows branding intact, Microsoft added digital signatures to their themes, of which are validated at theme installation and application (i.e. at boot). Due to this limitation, only a handful of themes can officially be used within Microsoft Windows.

This patch removes the aforementioned checks to provide the Microsoft Windows enthusiast community a free and easy way to enable third-party customization of the entire Microsoft Windows user interface.

UxTheme Patch for Windows 7 contains 3 DLL files that you can easily unrar and use.

NOTE: This patch was created for Windows 7 OS.

Download here




Other Article:
-
How to Change the Windows 7 Default Control Panel View
-
How to Customize the View in the Services Window in Windows 7
- Run Windows 7 in Virtual PC
- Free Windows 7 Transformation Pack Download
- Free Windows 7 Themes For Vista and XP
- 20 New Features of Windows 7


Tips for Reducing Risks are Computer Virus

Computer virus fell ill had not you? Moreover, the Windows operating system. In addition to creating a workplace computer down, the virus sometimes also damage the files you. He is these tips to reduce the risk of virus infected computer:

1. Do not click on a fraudulent file unknown
It looks like it funny? Double click ah ...., ... Eit, whoa. May file is a virus that will be active when in-click.

2. Get to know the content of your hard disk
Not know then no pity, as well as with your hard disk. Identify with the contents of your hard disk (including other storage), then you will know if there is a file that may be unknown, is a virus.

3. Save the file on a regular basis
Hard disk can be in analogy with a cupboard, if you regularly menatanya with the file2 are easily observed. So if there is a file that is not known .... Waspadai can be.

4. My Document information
Save the file in My Document is more easily impressed. However, if you damaged Windows (for example, because the virus) and must be in the format, the content of My Document will also be lost. The best way is to create a partition on the hard disk and you save the file there.

5. Beware if i change occurs (whatever little) on Windows
Sometimes the virus can change the settings in our computer, so if there is a setting that changes the computer without you change, you need to be wary. Make a system restore with the start -> All Programs -> Accessories -> System tolls -> System Restore. All files are back to when the restore point. So save important files before you change as system restore.

6. Use anti-virus necessary
Too many anti-virus is not always good, because sometimes a function of anti-virus can inhibit the anti-virus other. Simply install one anti-virus only (no need to use anti-virus paying). If the update with regularly, then that's enough to protect. For local antivirus that is not installed, can be used as an assistant (for example PCMAV or Ansav).

7. Show hidden files and file extensions
This trick can be used by users who quite familiar with the extensions and hidden files. In the Windows Explorer (in Windows XP) select Tools -> Folder Options. Then select View and select Show hidden files and folders and uncheck Hide extensions for known file types.
This is good enough to find file2 unknown.

8A. Special users,
Avoid download and install free programs or files that are not clear usulnya origin. Because sometimes the program and the file containing the virus in it. Downloadlah only from a trusted source.

8b. Special internet users
Do not open pornographic sites. Besides not good for the moral, sometimes porn sites have side jobs as a livestock virus.

Well, hopefully useful. If you have these tips that senada, please ya added.
Thank you.


Written by Hanif Rasyidi

Juventus Swap Iaquinta with Arshavin?




Have been since last June, the name of Andrei Arshavin into focus. Their success brings Zenit St Petersburg win out UEFA Cup performance and strengthening captivate epoch in the Russian Euro 2008, to make themselves more attractive big clubs. Klop with the desire of the players who have pleaded not like playing in the Zenit.

So far, several big clubs such as Barcelona, Real Madrid, Tottenham Hotspur, and Arsenal, so often dihubung-connect with Arshavin. Indeed, their efforts still do not produce results. Zenit Striker still objections release is 27 years old.

Believed, one of the sources of objection Zenit release Arshavin, is because they get Striker other difficulties with the quality as good as himself. This is indeed never spoke Zenit President, Alexander Dyukov, that if it will only sell players if he get the equivalent replacement.

Now appears a new club name is also believed to take Arshavin. According to tuttosport, the club is the Italian giant, Juventus. And Juventus have the card as to realize the arrival Arshavin, namely to make the swap with Vincenzo Iaquinta.

According to the media, even Iaquinta has been offered a large salary by the Zenit, despite remaining in this season, Zenit will not play in the Champions League, but in the UEFA Cup. He also promised a permanent place in the starting line-up for a criteria for Pavel Pogrebnyak.

The former Udinese player was already bored with the status' supersub 'disandangnya in which Juventus, and want a regular place in the team's core, in order to secure a position in Timnas Italy. This season, Iaquinta only play as a starter as much as four times, and print two goals.

Zenit will be buying some of the players in the Italian transfer market this winter. Dick Advocaat requires a player to survive and have placed missorkidea Portanova (Siena) and Christian Terlizzi Catania), as the players who sought it.
source :liputanbola.com

other article :
Buffon: I Soon Return

Liverpool stay on top league


Liverpool captain, Steven Gerrard and a two-goal lead Liverpool continued success in the top of the Premier League at the forum pengujung year 2008. The Reds win 5-1 on pen telak Newcastle, Sunday 28/12.

Liverpool can go to leave the rank of two, with Chelsea three points difference, after the Blues hold equilibrium Fulham 2-2.

Meanwhile, Arsenal, Porstmouth successfully bring the zone close to degradation, after the Gunners overcome former club kaptennya, Tony Adams with a thin score 1-0.

Sunderland new coach, Ricky Sbragia must suffer defeat in the first fight. Sbragia new gazetted as a permanent replacement for coach Roy Keane is witnessing The Black Cats The Everton 0-3 in the cage.

Here are the results of all Premier League games, Sunday night 28/12:
Newcastle 1 - 5 Liverpool
Arsenal 1 - 0 Portsmouth
Bolton 0 - 1 Wigan Athletic
Everton 3 - 0 Sunderland
Fulham 2 - 2 Chelsea
West Bromwich Albion 2 - 0 Tottenham Hotspur
West Ham 2 - 1 Stoke City
source : gilabola.com

Liverpool is fantastic

Liverpool - Being a leader in the forum, Liverpool ensure it with convincing victory over Newcastle United. Fantastic performance of the wide open road to the Champions League degree in English.

Visit to St James Park, Liverpool fight to the end of the year in jail with the Toons Army 5-1.
This victory makes them temporarily to hold the forum It shoots by collecting 45 points, three prominent figures from Chelsea, which must be satisfied with a 2-2 equilibrium play Fulham.

The results are very clear greeted with enthusiasm by the Harlem Gank this can be a step towards the champion title 18 years have never felt. Steven Gerrard admitted it is very satisfied with what were the head during the first half of the season.

"I play in a team best," said the Gerrrard This Goal. "We have fantastic players from the starting goalkeeper until the attacker. Nevertheless, we still have to work hard, and a lot of obstruction that must be passed if we want to stand where we are now," he continued.

Gerrard et al successfully mengelontorkan five touchdown hurdle to the host, this is their largest margin of victory in the English League this season. But the captain is satisfied that the most important points was brought to a full return to Harlem.

"We played well, and we are very satisfied with the results of the whole score. But the most important is the three points we can achieve," the supplement is 28 years old.
"Today we are very sharp in front of the wicket opponent, and should mendapt more goals and no disappointment at all, except for the fact that our operation a little more sharply in the first round."

Garrard feasible banyaknnya regret that wasted a golden opportunity in the first innings. Concerning this, I get a compliment to the direction of Shay Given that appear very bright and had the opportunity to make Liverpool frustrated.

"Newcastle have a world-class goalkeeper, who conducted the rescue signal. Commendation for full (Shay)," Gerrard pungkas

Liverpool will start the fight premiershipnya in 2009 with a visit to Britain Stadium, pen Stoke City, on 11 January future. (dtc / din)
source : beritabola.com

other article :
Liverpool stay on top league


How to Get Google Sitelinks


If you enter a word that is common at Google, for example, the Microsoft website at www.microsoft.com will appear first, and underneath there are about 4 lines that contain links in the web. That's called Google Sitelinks. Just under a second, third, and so on. Cool ya? As though the web is special. I was only about sites that get Google Sitelinks. What was this blog also get a gift from Google Sitelinks. Happiness ... How do I get one?



Unfortunately, there is no official document from Google that explain in detail so that our website or blog to get Sitelinks. Google's official documents that can be used as a reference is this.

The results of browsing and reading the document before, there are several factors or how to mendapatakan Google Sitelinks:

1. Should be the number one for certain keywords on Google

As far as I see on the Google Search Result, a site that only gets Google Sitelinks, the site which is located on the first order for a particular keyword. To get a high ranking on search engines can be used SEO techniques, the technique is essentially 2, namely:

  • Original article (not copy-paste) quality.
  • Strive to install other pages link to the page.
2. In hompage have at least 3 fruit link

Google quoted statement:

sitelinks we only display when a site has a minimum of three sitelinks available.

So a website page which contains a flash animation and captivating that there is only one button to sign in or log, can not get from Google sitelinks.

3. The link-click on the many visitors to our site

Google quoted statement:

We only show sitelinks for results when we think they'll be useful to the user.

The word "useful to the user" I artikan that readers who come to our homepage, click on the many links.

4. Relevant to the words that included a visitor to Google

Google quoted statement:

(If) we do not think that the sitelinks for your site are Relevant for the user's query, we will not show them.

This means that the links in sitelink, should be appropriate and relevant to the keywords entered by visitors.

5. Age or the number of site visitors?

There is a reference site that age must be at least 2 years to get sitelinks, it is not correct, because my blog is still a baby, just a few months but already have sitelinks. I expect Google also consider the number of pengujung or pageview. As a note, unique pageview for this blog (now) is> 3000 per hour. Point to-5 is related to point to-1. Most can be, the sites become the number 1 on Google for the keywords that the visitor will get the public to overflow.

Author: Oka Mahendra (http://tutorialgratis.net)

Other article :

- The ten Personal Branding through Blogging

The ten Personal Branding through Blogging

According to Romi Satria Wahono, there are 10 ways in the Personal Branding Through Blogging.
As written in the site ilmukomputer.com.Some way he did during the activities in this blogging, especially related to personal branding is as follows:

1. Provide complete Profile, Portfolio and CV . Information must be provided through our blog so that our people more easily find us. Important that we provide is a complete, we received the award, the portfolio and we work, we have the certification, list of publication paper, and how to contact us (address, phone, email, ym, etc.). Believe that the origin of the positioning of our positive, and we all served with any posts Ikhlash for the good of the people, Allah will not have the data we presume to do the crime.

2. Target the theme paper to the Core Competency We Have. Decide and select areas of Competency garapan alias core that we would want in his career. Focus only on the theme of any posts around core Competency we are. If we have a lot viewfinder, a category in which some readers easier to understand our positioning. Positioning us we usually write on the blog and Subtitle. For example, I use the expressions: Learning, Researching, Entrepreneuring, Teaching, Inspiring and Motivating People. While the core focus Competency I chase each field are: Software Engineering, eLearning, Entrepreneurship, Student, Research Methodology, the Open Movement and Knowledge Management. Although many invisible, but in fact all that is still in a union criticism of each other. Try our own success story at the core of each Competency we chase each other. Success story can be a product, service, experience or research results. Success story and make the material things that we served more meaningful and berkarakter, and not especially crisp empty:)

3.Write a line with Target Readers and Use Language "Human". When the target audience is students, then I have to serve any posts with their language. Lingua franca, poetic songs of young people and their expression, sometimes I have to use, so that I can create cohesion alias rekatan with them. Using language that jaim paper, jayus and jablai shooting will make us flee, when a new paragraph to read any posts us. So, let's use the language "human being" good and true:) But do not get stuck to the shifting character or positioning, we still try to any posts in accordance with the characters and our positioning. When my character and positioning to the scientific, I would like to present the theme of love remains in the corridor with the scientific, logical and valid, although it still looks a touch of his heart:)

4. Target Keyword Kejar We are in the Search Engines. Search engine is a new search culture, this important concept that we must grasp. My aim keyword alias some keywords that match the core Competency me. How? With a lot of writing about a keyword, in fact we have already created the "flood" keyword in the search engine. I also allow people to discuss any posts or put me on their site or blog, which still give us a link to the URL. That actually helps improve backlink to our blog. I try to look for keywords: software engineering, elearning, Entrepreneurship, that appear in every search made by other people. When we betebaran articles in the various sites, the fact we have created a headache the real world with the virtual world:) When people use the Search Engine Optimization (SEO) for the money on the Internet, I use the SEO to improve and make a career leap in my job.

5. The note to the first theme of the Medium We Booming. When the theme and Pornography Act ITE to be booming, then I began to focus any posts to the theme of criticism of Law and ITE Pornography on the Internet. With the hope that the electrical current melesatnya search on the theme will lead us to a blog. That and a lot of TV, radio, and newspapers make my sources. So why can I? Yes search for cultural producers and journalists to the Internet, so they look for sources from the Internet, and when they finally find my writings. Please note that the marketing and branding activities is to develop the perception of others. So my writings are real arguments, which I understand dipersepsikan well on the field that I study it.

6. Build Community and Network Through Various Social Services Network. Many people laugh when I play in my Friendster and Facebook:). But both trends is the service that tune young people, students and our students. Remember that the majority of Internet users in Indonesia is the school and college students. Friendster account of Indonesia it is reported was ranked third worldwide. I want to make the readers of my viewfinder I can find both intentional or not, from a search engine or on any web services that they access. I do not want to lose them, because the posts on my blog some of my target to them. I do not prohibit including the fans that made my weight forum called Romi Satria Wahono Fans Club:)

7. Use Strategies and Heroic Paternalistik Positive Leadership. Our society is a society paternalistik. That makes the war Prince Diponegoro completed in 1830, why? although there are still thousands of troops who are ready to battle against the Netherlands. The reason for only one, because the Prince Diponegoro caught:) The nature of the community paternalistik is not a problem we use, which we used for the positive. I want to influence my readers with a variety of models influence tactic and style paternalistik Heroic leadership. Salam perdjoeangan with spelling words ala DJ OE and I always dengungkan, so that all understand that I'm on all my readers to not lazy, lethargic or lose motivation. They will take part if I berdjoeang also berdjoeang, and all will reduce Ikhlash sleep when I sleep I also reduce. That is positive and that paternalistik Heroic leadership:)

8. The note with Perbanyak Keyword Target Career. I developed any posts to the various keyword job and career that I viewfinder. I look for keywords, for example, software jury, jury multimedia learning, software engineering lecturer, a specialist software engineering, software engineering consultant, expert elearning, elearning consultant, etc.. The more I make any posts on the theme, the more chance I'll blog visitors were based on the results of their search engines do. I finally requested a lecturer in various places, a jury in a lot of competition and competition held various institutions in Indonesia, and the opportunity to lead and carry out various projects in the areas that I geluti. Once again remember the important concept, the legend did not pursue wealth, position, especially women's throne (halah):) I work a lot of legends that are useful to society, and watch it come to you all:)

9. More Product Themes About Us. When already has a product or service ready for sale, for example, I have the product content and elearning system that is ready to offer me, I perbanyak any posts with the theme of the service. This does not mean that I should write about the product itself, but I can only write how I make these products, the methodology that I use, how the success story at the time of implementation, implementation strategy, etc..

10.Create cooperation with the magazine or newspaper. When we have any posts more mature, I am sure will be a lot of magazines and newspapers print a partnership to bring us any posts mempublish through their newspaper or magazine. There are some magazines that are currently taking any posts my routine. So my only task of writing the blog, and they came to take the words that match the target readers of these magazines and newspapers. Bids from several publishers are also coming to chronicle my writings on this blog. 10-trick to this I think an important first step to bring us to become a professional blogger, where we can live from the writings and works of us.

by: anang

Other article :
-
How to Get Google Sitelinks




Saturday, December 27, 2008

Google Earth to become terrorists weapons


Google Earth is behind the bombardment events that occurred in Mumbai. However, the terrorist attacks in various locations in the south Mumbai last week to use digital maps from Google Earth. Technology is used to learn the position, especially to investigate the attack.

According to investigations conducted by Mumbai police, including when wet mengangkap a terrorist, from the fact that there are known terrorists have been trained in serious use Google Earth. They even use advanced technology such as the satellite phone and Global Positioning System (GPS).
Previously, Google Earth had received criticism in India, including by the previous president, APJ Abdul Kalam. In 2005, Kalam had warned if the facilities offered by Google Earth through digital maps can be misused by terrorists.

Indian security agents have even complained that Google Earth has been mengekpos Indian defense and other sensitive installations. Whereas in other countries, including China also has the same complaint concerning the location of the military that country.

Although the places that have become terrorist incaran the last week not to include in the defense or the location of sensitive installations. Google Earth used to do before the terrorist attack. They even use the map of tourist visit to Mumbai. These locations include two hotels, a restaurant, a complex place to live and train station. (HDI / pcworld)
source : infokomputer.com

INTER FIND KLUB for Adriano


Milan, BOLASportsLine / fi future Adriano Leite seems not at Inter Milan. Berulah often result, the Brazilian Striker eventually marginalized by coach José Mourinho. Adri indispliner consequence of the Inter seek to make other clubs that want to borrow.

In the last two years, Adriano attitude is not favored by two architects Inter. While still handled today. Adri often roam the night with donated their discotheque in the city of Milan. In addition, he also delayed several times and even exercise are often absent with a variety of reasons. Consequence of the actions that create a bad Adriano loaned to Sao Paulo for half the season.

Beginning this season, Adriano again called on Mourinho. Initially, he showed good behavior and appearance of ciamik. Mourinho even had time to have as a main spearheads. However, this Adri bad back kelakukan appear. He exercises several times absent and often go home the morning. RADIO Mourinho is making mencepaknya back from the team.

Increasingly difficult to gain the trust again that Portugal coach of origin. According to the news that Italian Football This Tuesday (23/12), Inter Milan have started looking for another club that would lend penyernag age is 26 years old.

Barsil club, Flamengo have to submit themselves to use energy Adriano. However, L'Imperatore seems more interested to fight with European clubs. I mention Chelsea have been willing to accommodate Adriano if you want to exit from Inter Milan.
Eky Rieuwpassa
source : infokomputer.com

ARSENAL WITHOUT JENDRAL


London, BOLASportsLine / soc Arsenal hope to improve the ranking in the Premiership while Klasemen big obstacles encountered. Francesc Fabregas captain is absent in a long time. Spain is a young half-a knee injury during a meet Liverpool last week.

According to the description of Arsène Wenger, Fabregas experienced due to injury tekelan hard kompatriotnya Xabi Alonso. As a result, the dropout Cesc ligamen middle right knee.

"But the news does not. Fabregas will miss three to four months. He could be more rapid comeback in time for at least four months," said Arsène Wenger, the soccernet, Tuesday (23/12).

Cederanya players aged 21 years to make the start Wenger square off to bring in new players in the winter transfer exchanges later.

"It's possible we will buy new players, but before we will find a solution internally. We are in no pressure," said Wenger. "We only have a small skuad and we must be realistic," he added.

Wenger is not looking for a substitute Cesc. He refused even telling the media that want to memboyong Andrei Arshavin's zenith St Petersburg.

If it does not bring in new players. The Professor can maximize Alex Song, abou Diaby, Denilson and Aaron Ramsey as a substitute Cesc left wing.

Cesc make tires lose their captain likely will be trusted to the goalkeeper, Manuel Almunia.
Eky Rieuwpassa
source : bolanews.com

Kaspersky: Leave Internet Explorer


Kasperky Database (10/12) recorded record of malicious code take advantage of the weakness of Internet Explorer. Even kasperky encourage users to leave Internet Explorer and switch to other internet browser, such as Mozilla Firefox and besutan google browser, Chrome.

Previously, hackers closed forum in November ago said there were hazardous code and weaknesses of all versions of Internet Explorer. Meanwhile, in the (9 / 12), a group of Chinese hackers KnownSec Team, meramu code is dangerous, and there is a commentary on the XML in Internet Explorer.

A result that caused many, such as malware can cause the growth, the internet banking users with Trojan-Win32 banker banker, steal personal data from computer users in the infected zombie network. That no less importance is also the adult sites and sites that potentially weak against SQL injection attacks.

In addition, the Microsoft respond, so that the user to observe some basic safety rules. As disable Active Scripting and memory protection.
source :infokomputer.com
(alvino)

Free Windows 7 Transformation Pack Download



Is a kind of desktop applications that can change the look and a computer such as Windows 7, which the original.
In addition, this application will also display the icon icon resembles a window-7 and want the other.
Other Article:
- How to Change the Windows 7 Default Control Panel View
-
How to Customize the View in the Services Window in Windows 7
-Run Windows 7 in Virtual PC
- Free Windows 7 Themes For Vista and XP
-20 New Features of Windows 7
- Free Download UxTheme Patch for Windows 7

Click here to download

Free Windows 7 Themes For Vista and XP



Window 7 Themes For Vista & XP | Size 5.30 MB | OS - Windows Vista and XP


Enjoy the look of microsoft’s Upcoming Operating System i.e Window 7 on your Windows XP & Vista system’s using the “Windows 7 Desktop Theme”.The Theme provides some nice refreshing changes to the same Vista look.

Other Article:
- How to Change the Windows 7 Default Control Panel View
-
How to Customize the View in the Services Window in Windows 7
- Run Windows 7 in Virtual PC
- Free Windows 7 Transformation Pack Download
- 20 New Features of Windows 7
- Free Download UxTheme Patch for Windows 7

Click here to Download

20 New Features of Windows 7

Many have no patience to wait out the Windows 7 (W7), successor of Windows Vista. Not as Microsoft keep many new features W7, but semiua confidentiality has expired, Microsoft gives developers a lot about the leak leak-W7 in the PDC. TTehcnologizer the opportunity to try W7 seems that the OS is ...really quite prospective!

First, you must know that the W7 will not have a drastic change in terms of software architecture as Vista from XP - Microsoft have promised that the users meakukan upgrade from Vista will not have compatibility problems. Because the W7 does not change much in the background screen, Microsoft can focus on the development experience of the use of the OS itself and not on various technical aspects such as security and stability.

Most of the changes that are packed W7 seeks to improve the ease and convenience of users, and below are some of the new features W7 has seen demonstrations in the Microsoft PDC.

Other Article:
- How to Change the Windows 7 Default Control Panel View
-
How to Customize the View in the Services Window in Windows 7
- Run Windows 7 in Virtual PC
- Free Windows 7 Transformation Pack Download
- Free Windows 7 Themes For Vista and XP
- Free Download UxTheme Patch for Windows 7

2. Taskbar

The biggest gain since the first time in the debut of Windows 95. Windows 7 is no longer displays a small icon application complete with the name of the application, but only large icons similar to Mac OS X. List window that is displayed when placing a mouse on the icon in the application also replaced with the user interface (UI) "Ribbon" that displays thumbnail window that opens in sideways.

Other tools that are connected to the computer as the camera will also appear in the taskbar with windows applications. Altogether these features make Windows 7 to appear attractive.

New taskbar in Windows 7

3. System Tray

Officially known as the "Notification Area," Microsoft finally allows users the tools to address the desktop area, which is often disorganized. Users can have any icons that are displayed in the System Tray, the icon to change the position and whether they are allowed to attract users with the notification.

4. Jump List

Jump menu list will appear in the Start Menu or when users click on one of the Taskbar application, provide several options on the user to perform various actions that supported the application. Figure below shows the jump list of Windows Media Player (WMP), which gives users the option to play the song, see the last songs played, and more.

Jump list

5. User Account Control (UAC) Better

UAC is one of the features that most users of Windows Vista doghouse. Now besides the "On" and "Off," users can choose to UAC only appear when installing an application or an application to change the configuration of Windows only. Not yet known whether these changes enough to make the UAC from the enemy into a friend, but at least this change will make Windows more friendly UAC.

Configuration page UAC in Windows 7

6. Performance

Microsoft said that they do a lot of changes to improve performance and stability of Windows 7, such as reducing the boot time to enable some applications in parallel, the new memory management methods and more. While this is still too early to discuss performance, we must await the arrival of the version that is almost finished to get him the means, but according to Technologizer, Windows 7 feels very quickly operated in a Dell laptop Microsoft loaned - and clean from the bloatware.

7. Stage Device

This new feature to collect all related peripherals in one place for easy user such as configuration, features, documentation services and even the purchase of printer ink and others.

Device Stage W7

8. Libraries

If you already know the concept of the library for songs such as the itunes, the concept of the library in Windows 7 also will not be foreign to you. This feature collects all the files on your PC to type in each library for easy management of the media. SFor example, all the images from all PC and the network will be collected in a photo library that can be accessed in one place like the image below.

Libraries feature of Windows 7

9. HomeGroups

Windows 7 to introduce a new feature called HomeGroups network that aims to ease some of the computer network to share files and peripherals - as if all that is located on a PC the same. Although the features of Windows Networking since it is always the same aims, in fact configuration to use the network printer is still too difficult for most users.

10. "Peeking" (tout)

Peeking features in Windows 7 easier for users to quickly read the content in one window without the need to interact with the window. Placing mouse over the thumbnail window on the Task Bar will change all open windows except for a transparent window is selected. S In addition to "snoop" window applications users can also tout the Windows desktop.

Peek features in Windows 7

11.Sidebar Not Used More

Jika dibandingkan dengan widget Mac OS X yang dapat ditempatkan di desktop , perbedaan paling mencolok dari gadget Microsoft adalah peletakannya pada sidebar di sebelah kanan layar. If compared with the Mac OS X widgets that can be placed on the desktop, most colorful difference from the Microsoft gadget is laying it sidebar on the right of the screen. In W7, the sidebar is removed because they use too many places there and the gadget can now be placed directly on the desktop. Despite this fact can also be done in Vista.

12. ITunes Compatibility

W WMP format now supports two media favorite Apple: AAC for audio and H.264 for video. WMP also can find the iTunes library on the existing network and play the content. Apple Fairplay DRM is not supported, but somehow I play a video podcast that beresolusi sizable visible in the bad WMP.

Podcasts low resolution in WMP

13. WMP is minimal

Ke When you right-click on a media file in Windows Explorer and use WMP to play, WMP will appear in a minimalist mode that does not dominate your desktop. You also can play the media preview pane in Windows Explorer without the need to launch the WMP at all.

Windows Media Player with the minimalist view

14. Streaming Multimedia

W7 add features delivery media files from PC to the various tools that support streaming music such as the Sonos system through the network. Microsoft said that the W7 will change to the file in a format that can be played by your media player. This also means that Microsoft is again approaching the last aspiration Bill Gates made the Windows media center at home. . Media Center version of Windows 7 also get a big upgrade.

Playing the media from the network through the Windows 7

15. Automatic window settings

Slide window near the edge of the right or left of the window will directly change the size of a half screen. This is intended to facilitate you arrange two windows side by side in (such as the browser or Word documents) so you can easily work on the two windows at once.

16. Finding An All Places

W7 feature named "Search Federation" allows you to mengikutkan various computer, network and storage media sites to search in Windows 7.

Federated search in the W7

17. Themes

Microsoft is no longer deliver major changes in features in Windows customize the theme. Di W7 In W7 Microsoft provides a new theme that voters better with the preview feature in the original size and allow you to save custom themes with just a few clicks. Microsoft also plans to change the name of a Themes Styles.

Configuring themes in Windows 7

18. Windows Live

Officially, Microsoft has little to fix the applications on the W7, does not like Vista. Applications Photo Gallery, Movie Maker and email has been downloaded for free to be called Windows Live Esentials, although Microsoft still hopes the various PC vendors will resemble the Windows Live Essentials, in which they sell.

Windows Live Photo

19. New Paint

Windows Paint is a lot to remember to get big upgrade, now appear with the Ribbon UI of Office 2007 that has now become standard in many Microsoft applications. Although many consider Paint.net as an alternative replacement for Paint better.

Paint a new version of Windows 7

20. Touch Screen Features

Windows 7 is the first version of Windows that supports multi-touch that allows you to control the OS with both hands. Many still doubt whether the multi-touch will merevolusi the PC world as he merevolusi world's mobile phone. Currently there are almost no PC outstanding in the market that supports features touch screen other than the TouchSmart from HP and Dell Latitude XT. (via Technologizer )
source :udaramaya.com

WHO Celebrities the most admire on the Internet?


Movie Stars' Hancock ', Will Smith, appears to be magnets for young people. At least, it proved as Smith selected as the most desired celebrities to chat with teenagers.

Actor star of successful films to reach the box office this predicate in the poll dibesut by the social networking site that is quite famous, Bebo. Smith be the most popular celebrities to be friends online.

He was selected by 31 percent of respondents who participate. Being in second position with the percentage that is far terpaut movie stars' High School Musical ', Vanessa Hudgens Raised by 30 percent.

I know the other stars, Brad Pitt only reach 5 percent of votes. Meanwhile, former wife, Jennifer Aniston meraup 11 percent voters.

However dismal for Paris Hilton. Parties in the same survey, 52 percent of respondents consider sosialita as Hilton should be prohibited from writing the blog on the Internet. This so as Metro and cited detikINET, Saturday (13/12/2008). (Fyk / fyk)
Fino Yurio Kristo - detikinet

"King of Pop" Michael Jackson severe illness

Michael Jackson, 50 years old, reportedly suffering from lung disease, which can be fatal, news reports said.

"King of Pop" is suffering defisiensi antitrypsin Alpha 1, which is a rare genetic disease, said the report has not been confirmed, while adding he likely will undergo transplanting lungs.

"He has been suffering from this disease for many years, but serious illness increases," said Ian Halperin, author of books about Jackson, to In Touch magazine, as reported DPA.

"It requires transplanting lungs, but it may be too weak for the Model ... But the problem is most severe bleeding in the large intestine. It can be killed."

Jacko, so it dikerap singer is called, the famous blessing hitnya "Thriller" and "Bad", almost unable to say words left eye and nearly blind.

Jacko similar life now 'solitary', because he rarely appears in public. Several weeks ago, he healing in Los Angeles, put Zorro-style mask.

Sister, Jermaine Jackson, submitted to the FOX News television channel: "It was less healthy."
source : antaranews

Chinese Site NYT Block, Block P2P Australia and bit torrent


Several months ago, when the Olympic Games held in Beijing, Chinese government has broaden access to Web sites that can be viewed by residents of China. However, the policy is changed.

Since last weekend, those living in mainland China now can no longer access the site's New York Times. They try from the city of Beijing, Guangzhou and Shanghai will maybe get a message that the site is not available.

It closed access to the New York Times extend the number of sites that are blocked Chinese government. Previously, the BBC site, Voice of America and Asiaweek has been blocked earlier, but several days later the sites can be accessed again.

No explanation of why access to the New York Times blocked. Even the Ministry of Foreign Affairs in Beijing said to the Times that they do not know the details. However, an official at the International Press Center in Beijing said in the Times that the restriction is likely only a technical problem.

no further information about whether the restrictions will be revoked.

Australia Block P2P and bit torrent

If the China blocked sites, the government of Australia is different. They will soon be filtering the Internet, precisely block all traffic P2P (peer to peer) and bit torrent.

Initially, the government proposes that the filter will only block sites child pornography and terrorists for the sake of security and make all children feel safe. However, Australia's online censorship and revealed his desire to expand the experiment to include the government filter traffic for download.

Plans to protests in various cities across Australia. Protests and petitions did not digubris by the government, which will be piloted this week.
source : kompas.com
WIE

Train ticket using the USB


JAKARTA, THURSDAY - The more the product of connection USB ditambahi, but this one really outside predominance. Imagine, the new ticket with a USB connection!

Tickets for the new connect the USB can be found in several regions of France. In some areas, the company's French national railway (SNCF) is to try ticket RFID (radio frequency Identification), which has a USB connector to the online ticket-ticket can the money through the PC.

Contactless ticket is 8mm thick and has a 4GB internal memory. Because using the USB interface, Neo Wave - the company behind the idea is unique - can afford to build security features into the high-level tickets to Dwele is not left untouched people. Weneo system called Smart ID is currently being tried out on 1,000 people.
source : kompas.com
WIEK
Monday, December 22, 2008

Troy Bayliss be Bricked by Various Rossi Bid


Bologna - Valentino Rossi challenging Troy Bayliss to race in World Superbikes (WSBK) in 2009 mdendatang. WSBK admitted that the drivers tempted to accept the challenge Rossi.

However, Bayliss admitted to himself require more money to receive challenges such MotoGP world champion. Bayliss believes can be overcome Rossi in Superbike racing.

For, according to world champion three times the WSBK The Doctor will have difficulties in Superbike motorcycle. "I spoke with Valentino, and he said I want to race with me," said Bayliss.

"I do not think it difficult for him to compete in the Superbike. For, Yamaha motorcycles, which also has a fast, so there is no problem for him to drive the motor Superbike quickly. Valentino Rossi is Valentino Rossi," he added.

Rossi, but the desire to race with Bayliss sirna already. The origin of the drivers that Australia has a career in the world Superbike racing. That is done not long after the snatch title champion a third time.

"For now, I have to stop racing and I'm happy with this plan. I'm happy because the last time I raced in kejuaran this as a world champion," added the Australian origin of the drivers.

"I Create, accept the challenges that need the money very much as 1 million Pounds Sterling and it will not happen," pungkas drivers 39 years old, such as disitat MCN, on Monday (22/12/2008).
(hmr)
Hendra Mujiraharja - Okezon

Troy Bayliss be Bricked by Various Rossi Bid

Bologna - Valentino Rossi challenging Troy Bayliss to race in World Superbikes (WSBK) in 2009 mdendatang. WSBK admitted that the drivers tempted to accept the challenge Rossi.

However, Bayliss admitted to himself require more money to receive challenges such MotoGP world champion. Bayliss believes can be overcome Rossi in Superbike racing.

For, according to world champion three times the WSBK The Doctor will have difficulties in Superbike motorcycle. "I spoke with Valentino, and he said I want to race with me," said Bayliss.

"I do not think it difficult for him to compete in the Superbike. For, Yamaha motorcycles, which also has a fast, so there is no problem for him to drive the motor Superbike quickly. Valentino Rossi is Valentino Rossi," he added.

Rossi, but the desire to race with Bayliss sirna already. The origin of the drivers that Australia has a career in the world Superbike racing. That is done not long after the snatch title champion a third time.

"For now, I have to stop racing and I'm happy with this plan. I'm happy because the last time I raced in kejuaran this as a world champion," added the Australian origin of the drivers.

"I Create, accept the challenges that need the money very much as 1 million Pounds Sterling and it will not happen," pungkas drivers 39 years old, such as disitat MCN, on Monday (22/12/2008).
(hmr)

Obama Spam attacks Containing Virus


Jakarta - President elect Barack Obama the United States shortly kepresidenannya future career start. But for spammers, the spam attacks around the U.S. president is elected not finished.

According to Symantec Messaging and Web Security, which cited detikINET Wednesday (17/12/2008), while John McCain has been known to lose in the U.S. presidential election in November and still detect spammers send e-mail attack their garbage.

In fact, the spam attacks are more vicious because it is equipped with malicious code. Subject of the selected actors are enough to provoke interest menelisik recipient of the e-mail, such as' Mr. Obama Be First Black President 'or the other.

The message is that Obama has been selected to become the U.S. President to-44 and the recipient of the message are encouraged to click a link written, 'Watch His amazing speech at the November 5'.

However, beware misguided. For, by clicking on the link internet users will acquire the download malicious code. Next, the computer can be infected with the virus will be the victim or other malicious programs.

In addition to video, cyber criminals also try to captivate potential victims with offers of money metal pesiden Barack Obama. Bids are admitted ngaku-printing come from New England Mint, which offers the history of this coin with a price of U.S. $ 9.95 plus shipping.

However, again, there is no good intention behind the bid. The purpose of the spam is to get credit card information from e-mail users who are not vigilant. (Ash / fyk)
Ardhi Suryadhi - detikinet

5 Most Popular Feature on Google

Dewi Widya Ningrum - detikinet

Jakarta - There are many special features in the Google search engine that can help us find what we find. In between you may already know.

Some of the features popular on Google, as quoted from Techdream, Friday (17/10/2008), is:

1. The calculation of simple mathematics.
Google's search engine can do simple math calculations such as addition, multiplication, division or subtraction, as have the ability to function as a calculator. Type the number you want to be counted along with calculations to sign in the box search engine, for example: 5 3 * 5, and press the Enter key or click the Search button on Google.

2. Currency conversion.
Currency conversion facility is also available in the Google search engine. Just type the figures currency followed signs that want to convert from a certain currency to the desired currency in the search engine, for example: 100 USD in INR, and press Enter.

3. Viewing time in various cities around the world.
You can find out the local time in a city or other countries. Just type in the time [name of city / country] in the search box to find out easily with the local time in a city / country. The time in Barcelona.

4. Conversion units.
In addition to functioning as a calculator, the Google search engine can also convert the size. For example: 100 inch in meters.

5. Check your spelling.
Google also have the facilities to check spelling, good spelling for a word objects, such as names and places, which may not appear in the program or spell check dictionary standard.

Success would like to Blog? Read this tip

What secret of success-loved blog? Five qualified international bloggers are currently conducting a roadshow in several cities after attending Blogger Party 2008 at Jakarta, last month. They share tips success.

The opportunity to speak at Muhammadiyah University in Yogyakarta, Wednesday (19/11) afternoon, Mark Tafoya from the United States, Mike Aquino of the Philippines, Jeff Ooi of Malaysia, Lee Kin Mun from Singapore and Australia's Anthony Bianco from sharing experiences with students of the local secret tips to be successful bloggers.

"The key is the quality of the content of your blog. If you have a blog content is good, readers will disseminate to others and they will visit the many crowd-blog," said Lee, Singapore origin bloggers such as This detik.com. Blog-nyaterkenal satirical comedy with content in blogs, mrbrown.com.

Lee added, is not a write things that are controversial to reach the high traffic. However, if the content is not quality, traffic will not survive long and left the American blog readers.

Mark Tafoya, the original blogger United States with a successful blog network culinarymedianetwork.com also suggested that the blog is written in English so that it can reach a broad.

"Many people want to know about the situation of a country, about a certain matter. That's why you should also write a blog in English," said Mark.

As Mike Aquino of the Philippines raised the suggestion of classical, namely, the blog that discusses the specific case specific. For example, a blog a matter of special tourism. (Tribune)

Cracker India-Pakistan War on the Internet

Antarserumpun battles that occurred between the virtual world cracker Indonesia and Malaysia had also occurred cracker between India and Pakistan.

Both bunker any other attack. No bullet or limit the drift through life. That there is only attack "off" with each other how to respond to attacks paralyze the opponent site. As a result of these attacks, a number of sites in both kubuh changed the face.

Quoted from the site Theinquirer Saturday (29/11), using the technology expertise, cracker from both countries to reciprocate the attacks. Cracker is for a person who can lead-atik Internet site with sophisticated defense system site. In the world of the Internet, often identical position cracker with a negative action. While hackers to more positive image because only penetrate the defense sites and to notify the weakness of the administration's energy system manufacturer site.
One of the attacks was a cracker of Pakistan to the Indian government school sites. Then cracker India take over the site. They announced that the site is under their control. The owner of the site recommended membenahi site.

There are still many other attacks launched by both sides. Since mid-November, a number of sites have been paralyzed by a cracker from the two countries.

Quest is expected to continue because of the relationship the two countries is still worsen. Especially India and Pakistan as a country that has a human resources excellence in the world of information technology.
Free Hotmail email service that is now in the power of Microsoft, created by the people of India.
(Trbun)
source: scriptintermedia

Huawei interested Enchantment Android


Jakarta - Huawei Technologies has officially joined the Open Handset Alliance. They also are preparing to launch smart phone (smartphone) based Android platform in 2009.

Android platform is designed to differentiate the universal mobile phone specifications and to provide an architecture for the application vendors joined in the alliance that consists of a set of software.

With the support platform Android, a member of the Open Handset Alliance to promote a set of mobile software integrated with the operational system, middleware and various applications.

Li Jilin, Vice President of Communications said Huawei, a member of the Open Handset Alliance is an important step in global strategy Huawei.

"And now we use to develop smartphone platform Android, which we will launch 2009," he said, as quoted detikINET from the written description.

Smartphone shipments to the world during the years 2007 to 2011 is estimated fuel increased an average 37.7 percent per year. SMeanwhile, in 2011, shipping is predicted to increase sharply to be 400 million units from only 110 million units in 2007.

Smartphone also predicted will control 24.2 percent of the global mobile phone market in 2011, and this number will increase by 30 percent in 2012.
Ardhi Suryadhi - detikinet
source : detiknet

( ash / ash ) (Ash / ash)
Saturday, December 20, 2008

Virus Targets Popular Internet Explorer Browsers


An anti-virus company is warning the public about a security hole in the Microsoft's Internet Explorer web browser.

Officials at Trend Micro say a security hole in Explorer could allow hackers to take over your computer by tricking you into visiting tainted Web sites. Officials at Trend say as many as 10,000 sites have been compromised since last week.

Some security experts recommend you use another Internet browser until the problem has been fixed.

According to Microsoft, the virus affects "Windows Internet Explorer 7 on supported editions of Windows XP Service Pack 2, Windows XP Service Pack 3, Windows Server 2003 Service Pack 1, Windows Server 2003 Service Pack 2, Windows Vista, Windows Vista Service Pack 1, and Windows Server 2008."

The company also says Microsoft Internet Explorer 5.01 Service Pack 4, Microsoft Internet Explorer 6 Service Pack 1, Microsoft Internet Explorer 6, and Windows Internet Explorer 8 Beta 2 on all supported versions of Microsoft Windows are potentially vulnerable.

"At this time, we are aware only of attacks that attempt to use this vulnerability against Windows Internet Explorer 7. Our investigation of these attacks so far has verified that they are not successful against customers who have applied

source : msnbc.msn.com

IE7, Firefox get security fixes


By Shaun Nichols

The two most popular browsers on the market each received security updates on Wednesday.

Both Mozilla and Microsoft posted patches to address flaws in the latest versions of Internet Explorer 7 and Firefox.

The Mozilla patch addresses some eight security flaws in versions 2 and 3 of the browser. Among the fixes are several vulnerabilities which could be targeted in cross-site scripting attacks, as well as one which could be exploited to remotely execute code.

Ironically, the update also brings with it a drop in security protection for some Firefox users. The 2.0.0.19 update signifies the end of security support for the browser.

Additionally, Mozilla will be shutting down anti-phishing protections for the Firefox 2 due the Google ending support for the browser's phishing site blacklist.

Mozilla is advising any users who haven't already upgraded to the latest version of the browser to do so.

Meanwhile, Microsoft issued an out-of-cycle update for Internet Explorer 7. The patch was first announced yesterday in response to a series of attacks in the wild on an unpatched flaw.

The update addresses a vulnerability in the way IE7 handles certain text files. If exploited, an attacker could use the flaw to remotely execute code on a targeted system.

The release comes just eight days after Microsoft issued its monthly patch for separate flaws in IE, Office and Windows.

source : itnews.com.au

Copyright © 2008 vnunet.com