Tuesday, March 31, 2009

25 highly anticipated open-source releases coming this year

These open-source browsers, dev tools, mobile apps and more promise that 'Oooh, cool!' sense of discovery.
By Esther Schindler
When big companies release new software, they launch it with lots of hoopla: press tours, technical conferences, free T-shirts. Open-source projects, even the well-known ones, generally release their major new versions with a lot less fanfare. The FOSS (free and open-source software) community is often too busy coding and testing to bother with marketing, even when the new "point release" of the software is really remarkable.

And there are plenty of remarkable open-source applications on the way this year. Quite a few projects are quietly (or not so quietly) working on major releases or significant upgrades that they aim to make available sometime during 2009. I've rounded up 25 of the most notable here.


There are browsers and operating systems, mobile platforms, development tools, productivity applications, IT administration tools, collaboration software and a few hard-to-classify items. Some of these you've heard of; others may be relatively obscure but should give you the wriggly "Oooh, cool!" sense of discovery.

You're sure to feel that one or two really important upcoming releases are missing. (You try paring the list down to a couple dozen candidates!) But the FOSS community spirit can serve here too. Please add your nominations for can't-miss open-source releases of 2009 to the article comments, including links to the project sites, and we'll all benefit.
Browsers and operating systems

Ten years ago, who'd have thought there could still be so much innovation in Web browsers in 2009? Microsoft Corp. may intend to keep up the pace with Internet Explorer 8, but the FOSS options are at least as compelling.

Mozilla Corp.'s Firefox 3.5 promises a native parser for JavaScript Object Notation (JSON), a data exchange format frequently used in Web apps, and several features to enhance rich media Web content, including support for the HTML 5 video element and the Ogg Vorbis and Theora open audio and video codecs.

And then there's whatever Google Inc. is planning for its Chrome browser, based on the open-source WebKit engine. The company is playing it close to the vest, but we do know Mac and Linux versions of the browser are in development.

Linux fans have much to look forward to, too. Following the release of Ubuntu 9.04, the "Jaunty Jackalope," in April, the Ubuntu team is planning for Ubuntu 9.10, the "Karmic Koala," to see the light of day in October 2009. Among the promised new features are integration with the Amazon EC2 APIs, so users can set up their own cloud using entirely open tools, and a kernel mode setting for a smooth and flicker-free start-up. The Ubuntu Netbook Edition will get the latest technology from the mobile Internet project Moblin, including better screen support.

Every other Linux distribution is sure to get better, too, along with associated operating system components. For example, Novell openSUSE 11.2, scheduled for November, should include KDE 4.3, GNOME 2.28, Linux kernel 2.6.30 (or higher), a Web-based YaST interface and netbook support.

Red Hat Fedora 11 is slated for release by this summer, with several updates. The project's goals include making Fedora boot and shut down faster (you'd be at the log-in screen in 20 seconds), changing supported architectures and default installed kernels, and improving support for fingerprint readers.

source : computerworld
Monday, March 30, 2009

Best Tips Online Schooling

Any student who is on the lookout for online schools home would probably have been swamped with the many options marketed to them over the internet. Therefore, it is not a wonder that many students feel confused on the right college selection as they may not know the way to nail down the advantages that certain colleges have over others. Although many renowned colleges charge higher fees for their courses, the extra costs incurred may not necessarily be justified by the facilities, recognition and educational value that they provide to students


If you have kids and you are not secure with the quality of education they will get when sent to conventional schools, you can enroll them to onlineschooling. You will be the one to control the time and you will know exactly what you kid needs and what they need to improve in terms of learning.

You are aware that kids spend most of the time playing. When you send them to school, you will not know the things they will be doing there. In online schooling, you are secure about the proper knowledge your kids have to get. In conventional schools, one teacher has to teach more than twenty students at a time. This will divide the attention of the teacher and your kids can be the one to receive least amount of attention and online college can give your kids the proper attention they need. Aside from that, you kids will be comfortable on the way they learn.

Online schooling is not widely available in huge amount of numbers. If you wish to get your kids enrolled, just find the best online school best for kids. Search for the most outstanding online school on the net. Choose the one with good reputation on teaching kids as they will be the one to feed your kids with what they need, how much is online school ? Ask for some advices in choosing which online school is the best. Enroll your kids now and experience the convenience your kids can get while schooling. Your kids do not have to suffer much in order to learn. Give your kids the convenience they need while studying.

source :kapanpun.com

'60 Minutes': What's next for the Conficker worm?

The following is a transcript of a "60 Minutes" report on Internet viruses that aired Sunday.

The Internet is infected. Malicious computer hackers have been creating more and more weapons that they plant on the Internet. They call their weapons viruses and worms--they're creepy, crawly toxic software that contaminate our computers without our ever knowing it. You can be infected by simply visiting your favorite Web site, or just by leaving your computer on, overnight while you're asleep.

And the problem is growing, exponentially. Last year the number of infections tripled. And an entire industry of computer security professionals is in a race to keep the hackers from their goal, which is usually to steal your money.


One of the most dangerous threats ever, a computer worm known as "Conficker," is spreading through the Internet right now. By some estimates, 10 million computers have been infected worldwide.

At Symantec, the company that makes Norton antivirus software, engineers have been tracking Conficker since last November as it worms its way across the globe.

"This map is showing a visual representation of where all of the known infections of Conficker are across the world," explained Steve Trilling, a Symantec vice president who says the worm is now living on millions of computers, mainly in corporations.

So far, the bad guys who created it haven't triggered Conficker. It's just sitting out there like a sleeper cell.

"Imagine a network of spies that has infiltrated a country. And every day, all of the spies are calling in for their instructions on what to do next," Trilling explained.

Asked what the worm is being asked to do, Trilling told Stahl, "That's the interesting thing. The only thing the worm is being asked to do is to ask for further instructions."

For several months, Trilling says the worm has just been sitting there, awaiting instructions.

It's that ominous, because once the hackers issue instructions, Conficker could turn menacing in an instant.

With one click, the worm's creator can instruct it to suck sensitive data, like bank passwords and account numbers, out of millions of computers, or launch a massive spam attack to clog up the works.

The newest targets of worms are social networking sites. Trilling demonstrated to Stahl how it might work.

Looking at a real Facebook page, Trilling explained, "We added your friend and colleague Morley Safer, you can see down there on the left."

He says a worm can crack into a Facebook account, like Morley's, and send a message to anyone on his friends list.

It's a message a friend or colleague, like Stahl, would be sure to open since it comes from a trusted friend. Stahl took the bait and clicked on what looked like Morley's video link.

"Something looks a little off," Trilling remarked. "You're already infected."

As Trilling demonstrated on a second screen, the hacker "owned" Stahl's online movements. "From here on out, everything you do, gonna show up on the hacker's machine," he explained.

So when Stahl typed her username and password into a bank Web site, it appeared instantaneously on the hacker's screen, along with her bank account details.

"Every single keystroke you hit, in fact, if you make a mistake and hit a backspace, that shows up in the window," Trilling explained.

The hacker then followed her around, as she browsed the Internet from CBS News to Amazon.com.

"So, if I buy something, they're gonna have my credit card," Stahl remarked.

"Everything you type in, your address, your credit card, it's all gonna show up in that window," Trilling warned.

A minefield on the Internet
The Internet has become a minefield. Hackers have hidden their malicious software known as "malware" on some of the most trusted Web sites, like eBay, the Miami Dolphins football team, even my.barackobama.com.

Trilling says too few people have top-notch, up-to-date security software.

"There is something that would have prevented me from answering Morley's message. Or I would never have gotten Morley's message?" Stahl asked.

"As soon as you clicked on that link and you had security software, you would immediately get an alert. 'This is a bad Web site.' And it would have blocked the attack. You would have never been hit. Putting on that software, you're preventing yourself from becoming a victim," Trilling advised.

But according to Symantec's own figures, the hackers are inventing up to 15,000 new infections every day, designed specifically to get around the latest anti-virus protections. Symantec has to send out updates every five minutes.

"You sell the antivirus, anti-worm stuff. I mean, how do I know you're not just saying, 'Go out and get this,' 'cause you sell it? I mean, you know... there's a sort of conflict of interest here," Stahl pointed out.

"Well look, Lesley, in 60 minutes we are blocking nearly 400,000 threats around the world. If you're goin' out on the Internet and you're not protected, it's like walkin' outta your house and leavin' the door open," Trilling argued.

But Mary Rappaport says all the doors on her home computer were locked tight. She had antivirus software and a firewall, and so she thought she was safe to do her banking online. But then she noticed something odd going on and called the bank.

"They told me that three charges in the last three days had been made to my account. One for $3,000, one for $4,000, and one for $1,200," she recalled.

Rappaport knew she had to act quickly.

The bank replaced the stolen money and suggested that she merely change her password. That was to be the end of it. But the next day, she was checking her balance. "And I saw $1,000 being moved from my son's savings account into my checking account," she recalled. "Right before my eyes. I saw my money being moved."

A hacker was trying to move all her money into one account, her checking account, to make it easier to transfer overseas. Luckily, the bank was able to freeze her accounts before she lost any more money.

"I had what I thought were adequate protections. You know, I had anti-spyware software," she said. "And antivirus."

"And I thought I had a good enough firewall. Wrong!" Rappaport told Stahl. "My understanding anyway is that they were able to get some sort of bug onto my system that disabled the ability to update these software programs."

Mary suspects her teenage sons picked up the bug while downloading from music or game Web sites. But it could have come from any number of Web sites.

Going to Google
Stahl asked Google what they're doing to deal with these big problems, because their search engine is what most people use to surf the net.

Stahl went to talk to Vint Cerf, one of the founding fathers of the Internet, and now a vice president at Google. The company itself says that one in every 100 Google searches brings up an infected site.

"People are blaming Google 'cause if you do the search, they say, you--Google--should be responsible if we get infected," Stahl remarked. "Now you've heard that."

"I have heard that, and I think that's a very bizarre way of looking at things," Cerf replied.

Google's position is that it's not the policeman of the Internet, but its engineers do scour the Web and issue warnings about malicious infections, or malware.

"If we happen to see what we believe is malware on that Web site, then when you go there we will pop up a Web page and it says, 'We think we found malware on this site. Maybe you don't want to go there,'" Cerf explained.

"Now I understand that if you go there anyway, Google sends you a second warning, saying: 'Are you kidding? Are you serious? We told you not to go there.' Something like that," Stahl said.

"Of course people still go," Cerf acknowledged. "And at that point it's their problem."

"The more you hear about this, the more you feel that if you bank online, shop online, open an e-mail, I mean, that almost anything you do puts you in jeopardy," Stahl remarked.

"That's a true statement. There are things. Bad things can happen. On the other hand, I've been on the Net ever since the Net started, and I haven't had any of the bad problems that you've described," Cerf replied.

But tens of millions of people have--one if four Americans, according to recent reports, as the hackers get more and more sophisticated.

Hunting hackers
Don Jackson is a hacker hunter. He is director of threat intelligence at SecureWorks in Atlanta, which protects corporations against cyber-attacks and tracks the hackers who launch them.

"Part of my job is to know the enemy, to know our adversaries," he explained.

To Jackson, the enemy is a hacker. "An enemy is somebody who wants to use computers to hurt somebody else or to make money for themselves."

Using an assumed name, "Gozi," Jackson infiltrates chat rooms where hackers sell their worms and viruses to their clients: other hackers. He asks for a demo so his company can create software to disable the malware. The hackers, he says, are typically young, male and often from Russia.

Asked how he tracks them down, Jackson said, "Well, they're like any other business. They have to advertise to get clients."

As Jackson explains, these brazen hackers do this openly on the Internet. "Unfortunately they're all too easy to find," he said.

He says many Russian hackers are in cyber-gangs that display fascist symbols, like a Swastika and anti-American artwork. They boast about all the dollars they've stolen from the rich Americans. A single hacker can make $30,000 a month and be championed in local newspapers.

"There's an example recently where two boys were arrested actually and then let go the next day, but the article in the newspaper wasn't that they were arrested and that they committed a crime, but saying: 'Look at our two local boys made good. They've cheated some greedy Westerners out of so much money,'" Jackson explained.

"They're heroes," Stahl remarked.

"They are," he agreed. "And it's bringing money into the local economy."

Russian authorities tend to look the other way, which explains why members of the cyber gangs have no fear. They even show their faces on the Internet.

One of the hackers, who calls himself "Tempest," is just 14 years old and working full time. "So he can't legally drive a car and he can't join the army, but he can hack into banks and siphon money out," Jackson remarked.

It's not known who's behind the computer worm Conficker, whether it's a gang of Russian hackers or some solitary evil genius. This worm is wily--it keeps mutating. Security software companies have been kept very busy.

But Conficker can jump over protections. While Stahl was reporting this story in early March, she was stunned to learn that the wily worm had struck CBS News.

"People were havin' problems with their BlackBerries, their logons," explained Louie Pelaez, a network engineer.

He says Conficker is so aggressive, it took CBS technicians 24/7 over 10 days to hunt down and quarantine the affected computers.

"Do you actually know where it started? Can you pinpoint it?" Stahl asked.

"We really will probably never know exactly how it infected the network," Pelaez said. "We just know that, you know, once it hit, it began to propagate."

CBS News has now contained the infection, but Pelaez says Conficker could still be hiding undetected somewhere within the network.

Asked if he thinks CBS is safe, or if this could happen again, Pelaez told Stahl, "No, I pretty much thought that we were pretty solid. You try to secure a network. But there's no guarantee that somebody can't come up with something that will, you know, wreak havoc."

Conficker investigators have been talking about an April Fool's attack, because in dissecting the worm, they can see it's been programmed to receive new instructions on April 1. But nobody knows if the instructions will be benign, or something that could disrupt the entire Internet.

source :news.cnet.com

Keepin' it real fake, part CXCIV: Nokia N83 is not a Nokia N83



While the shortly flaunted N83 never did amount to anything back in the day, we can safely say the device you see above is definitely not what the suits in Espoo had in mind. The touchscreen-based smartphone looks about as thick as an N95, though we can't recall ever seeing a flavor of Symbian look anything like this. If you care to know, the phone sports a 400 x 240 resolution panel, 0.3 megapixel camera (ha!), dual SIM card slots, Bluetooth, FM radio module, about two to three hours of talk time and a 3.5 millimeter headphone jack. But hey, it's only a buck 'o five off-contract, or exactly the price of freedom according to certain puppets.

[Thanks, facelessloser]


Hot Spot

* Dual sim card dual standby
* Flat touch screen
* Bluetooth
* FM radio
* E-book reader
* MP4,MP3
* Silde to unlock
* 3.5mm international standard earphone port
* Language :English/Chinese

Features

1.16:9 WQVGA LCD, 260k QVGA ; PX: 240*400
2.200 group contacts
3.T-Flash Card Suphporting,Support TF card extend to 8GB max
4.0.3 Mega pixel camera for Picture & Video capability,solomobi.com test put out biggest size is 640*480
5. Stereo Loud speaker, 64 chord ring tone
6. MP3 & MP4 player
7. GPRS & WAP connectivity, MMS Transceive
8. U disk support function to keep the information storage
9. Bluetooth
11.calendar,To do list,Alarm,World Clock,Spotwatch
12.caller picture,caller Ring Tone,caller video
13. Telephone directories:200groups of contacts, support incoming call with big head sticker,group ring tone
14. Schedule power on/off: support to start/close under set time
15. Alarm clock:5 groups, support alarm clock when machine’s closed, can set from Monday to Sunday
16. Games: 2 common games
17.MP3/MP4/Handsfree/SMS group sending/Voice recorder/WAP/Handwritting input/Bluetooth/GPRS download/MMS/Memory extended/ dual sim dual standby/ Radio/bluetooth/calendar/alarm clock/calculator/Currency converter/Unit converter/VIP/mobileQQ...

Specifications

Network : GSM900/1800MHz
SIZE :( L × W × H )92×52×14mm

BATTERY : Lithium Batteries (1000mAh)


COLOR : black


STANDBY TIME : About 220-260Hours


TALKING TIME : About 2-3Hours

source : solomobi and engadget

7 Tips in Keeping a Healthy Life by Wimar's World

Report by Maro Alnesputra

Episode Wimar World's theme of 'keeping a healthy life' can be spelled out this time as a light but filling episode. Why? Because even though the topic lightly, but many important things that need to be known by the Indonesian people.

Discussion between the exclamation WW, Ade Rai, and Dr Olivia Zallyanty. Michael really can give new views on how to live healthy. Apparently healthy way of life must be clear, simple, not boring, and that clearly is not burdensome. Therefore see the main tips 7 (of the many tips given in this episode) in the form of living healthy.


7 Tips in Keeping a Healthy Life

1. The realistic goal Step By Step & The Right

WW : What do peling important in the exercise or fitness program in order to form the body healthy and in shape?
Ade Rai: Gol a realistic and Step by Step Two things above is the most important things done
WW: Exercise is most important?
Ade Rai: Summary movement, is clearly the most important.

2.Read Relation between Weight & Fat

Ade Rai: People sometimes feel that the more the more important is the balance of body weight with high body, the fat content should also be
WW: Fat is your size?
Ade Rai: 7.5%, and usually the degree of overweight is lemaknya more than 30%

3.Diet Must be realistic

WW: What is the most important in the diet?
Ade Rai: No 1. Diet should not be boring, be creative and variatif
No 2. Diet should not make us weak
WW: He should be arranged for not hungry?
Ade Rai: It is thus a need to be key, because when we do not feel hungry, we need to set the pattern of eating

4. No Words To Starting late

WW: When is the right age to start practice? Such as whether the age of 61 I was too late?
Ade Rai: Age is the most fitting at this time also, which means there is never a word too late to start training from now

5.Sports Must Clearly aim

WW: What is correct that there is no age too late to start sport?
Dr.Michael: I agree with Ade Rai's brother, every time is valuable. Whatever your age, start to practice is always good.
WW: So, anyone can start at any time to practice a sport or fitness?
Dr. Michael: Yes, but you must always remember is that when practice started, or exercise, should always be clear what purpose? Is just to improve health or may have other purposes? For example, there may be who want to practice because you want to prevent infected ostopeorosis factors caused by the bone.

6.Sports and Lifestyle is not pressure

WW: What is the meaning of sports for the Olive?
Olive: For me it is a lifestyle sport and not pressure. I That was a way of life, so that I may not be as strict mas Ade, because even though I daily eat healthy food, sometimes with the cheat still like to eat ice cream, chocolate and the like. So I feel it is better way of life and not pressure.
WW: If you mean food is kept ya?
Olive: Yes, if I have children later, I learn him to promiscuous in the eating, as if to eat it-Bush Bush, he will think very long to include other things in the body, such as cigarettes, etc..

7. Enjoy Ice Cream!

WW: If I may, snack / cemilan Ade Rai is the most like to eat that weekend?
Ade Rai: Ice Cream!

--- ---

At the end of the word, this episode many times of use for you-all of you who prefer ngemil than tread mill, who prefers to be fed the meat of the rape, and who prefer a game of nge-nge-gym.

Start to change the way of life we all become more healthy.

Why?

Because the people who started from intelligent nation is healthy! Get smart us!

source : perspektif.net/

Microsoft's new anti-Apple ad: Hardware is cheap!

Microsoft kicked off a new Crispin Porter + Boguksy-produced Ad campaign today with an advertisement aimed at people struggling in a tough economy. The ad doesn't really focus on Microsoft's Operating System software. In fact, nowhere during the commercial does Vista even make an appearance. I'll sum up the message for you:

"We allow our software to be installed on really cheap machines"


The hardware in question is the $699 at Best Buy HP - Pavilion Laptop with AMD Turion™ X2 RM-72 Dual-Core Mobile Processor. The price goes up to $850 with Vista Pro.

It is the epitome of what people dislike about PCs.

- It runs Vista Home on a slow AMD mobile processor. It has DDR2 RAM which is what $300 Netbooks run. This is the type of setup that sparked the "Made for Vista" lawsuits.

- Its screen is abysmal. One reviewer said this model series "has the worst screen I have ever seen in my life. It's the 1440x900 screen and the viewing angles are so poor that even when sitting directly eye level with the screen it is totally washed out. If I go a little bit off-axis the screen results in a negative image. I was using the default settings. Unfortunately I didn't read reviews before i purchased." Ouch!

- It is loaded up with trial crapware and trial antivirus software that will need to be purchased or wiped offf the machine. Most people prefer to just format the drive and start with a fresh install of Windows (XP or 7).

- Its networking is five years old. 802.11G wireless and 100Mb Ethernet are surpassed by $300 Netbooks. 2004 called. It wants its motherboard back.

- The battery is said to last 2.5 hours. Real world usage is always close to around half of that. That means you can't watch a full movie on a battery charge. It also means that it will probably poop out on that commuter flight from Los Angeles to San Francisco.

- The thing is almost two inches thick and weighs in at almost eight pounds. Do you think that PC buyer wants to be hauling that thing around? She didn't look like she spend her afternoons pumping iron on Venice Beach.

And, after all, this machine is a piece of ... hardware. Microsoft makes software. You could just as easily throw Linux on that laptop - or even Mac OS with the Hackintosh hack.

Again, the takeway is that Microsoft will install their software on an extremely shoddy computer.
And this poor girl, the actress that Microsoft hired to play a person who is not an actress, is going to get a heavy, bulky slow Vista Home machine with a poor display, old networking equipment and weak battery loaded up with crapware.

"I'm a PC!"



Bravo Microsoft.

If I were running the show over there, I'd point to the ASUS Eee 1000HE running XP. It really is different from anything Apple (currently) has in its lineup and offers the user a genuinely good experience for a recession friendly price.

Intel boosts speed of low-power processors

The new chips should boost the speed of applications without increasing power usage over that of earlier chips

Intel is expected to refresh its line of laptop chips Monday with new ultra-low-voltage processors that should make ultraportable laptops operate faster without sacrificing battery life.

IDC Study Results: The Common Resource Gap Facing Midsize Companies and the Time-Tested Alliance that Can Save Them - read this white paper.

Intel currently offers ultra-low-voltage processors for fully functional thin and light laptops, such as Apple's expensive MacBook Air and Lenovo's ThinkPad X300. These chips fit into small spaces and draw less power than conventional laptop chips. The chips are about the size of a dime, or 60 percent smaller than mainstream laptop chips.he chips are about the size of a dime, or 60 percent smaller than mainstream laptop chips.


Laptops with the new chips should boost the speed of applications while drawing the same power as with the earlier chips. The chips will run at clock speeds of up to 1.6GHz, a speed bump from earlier chips that ran at up to 1.40GHz. Depending on the applications, existing ultraportable laptops with ULV chips run from anywhere between four to seven hours.

"There should be no difference to battery life with these speed bumps," said a source familiar with Intel's plans.

The chips will be available on Monday, according to the source. They will be a part of Intel's Montevina mobile platform, which bundles mobile laptop chips and wireless capabilities into laptops.

Are you ready for event-driven business? - watch this webcast.

The refresh comes ahead of Intel's planned release of new ultra-low-voltage processors for inexpensive laptops, which are due in the second quarter as part of the updated Montevina Plus platform.

The new chips include the dual-core Intel Core 2 Duo SU9600 chip, which will run at 1.60GHz, include 3MB of cache and draw 10 watts of power, according to an Intel document seen by IDG News Service. It will be priced at $289 for 1,000 units. The single-core Intel Core 2 Solo SU3500 chip will run at 1.40GHz, with 3MB of cache. It will be priced at $262.

Intel is also releasing faster low-voltage (LV) processors as part of the laptop chip refresh. The Intel Core 2 Duo SP9600 dual-core chip will run at 2.53GHz, an improvement from previous LV chips that ran at up to 2.40GHz speed, according to the document. The chip will include 6MB of cache, draw 25 watts of power and be priced at $316.

Also being launched is the SL9600 Intel Core 2 Duo, which will run at 2.13GHz, include 6MB of cache and draw 17 watts of power. It will be priced at $316, according to the document.

By Agam Shah

source : infoworld

Capello hope in Rooney-Gerrard More


London - Wayne Rooney and Steven Gerrard appear good time against Slovakia last week. It is therefore natural that Fabio Capello back in the hope of both the Ukraine and again this midweek.


Rooney contributed to two goals in the fight which took place at the Wembley Stadium, while Gerrard contribute an assist for the goal by Emile Heskey dilesakkan. Stevie G is not playing in the second round, but Capello still satisfied with the appearance for 45 minutes.

Italy coach home is his movement without the ball is both a powerful weapon for The Three Lions. He will also plan to return to free roam in the area of both defense Ukraine on Wednesday (1/4/2009) later.

"I'd like Rooney and Gerrard to move more freely when we hold the ball. I want them to play that way," he said dilansir such as Sky Sports.

"I'm very happy when playing Rooney. He is different from the other players and always appear together with a good national team. I am very confident it will print a goal-scorer for us and I also memberitahunya about what he should do in front of the wicket."

At the 2010 World Cup qualifying Group 6 European zone, the UK is still firmly in the top Klasemen with a collection of 12 value. Meanwhile, Ukraine is in the order three with seven points raihan.

source : Rossi Finza Noor - detiksport

Secret Success of Young Businessmen

Story of the business that started from zero, and reap success, it may not be new. entrepreneur from zero is not a simple matter.

In the middle of the road, always appear a variety of obstacles. But their business travels a way that business from zero to achieve success and remain interesting to note. Especially if the story is the younger. So, what secret of successful young entrepreneurs?

Borrowing term Jennie S Bev, also author of Indonesian origin who lived in California, United States (U.S.) in the introduction to the book of Acts Collection Young Entrepreneur of Success from doing Zero, Secret So Young Entrepreneur (DAR! Mizan, 2008) paper Faif Joseph, for entrepreneurship actually very simple, namely by increasing the mindset and begin to open their own businesses.

In view of Jennie, everyone is successful personification itself. For, success is a mindset, it is not a journey or destination (success is a way to think or behave, not the travel and destination). But the suspicion still prevalent in the community found that entrepreneurship associated with the large and well established employers. Also not uncommon to assume that entrepreneurship is purely just to pursue wealth.

That's why, when talking about her successful businessman, who always made barometer is how the entrepreneur is to create abundant wealth through a business that was built. While not always the case. According to the famous young, Sandiaga Salahudin Uno, courage and optimism that is the initial capital must be owned by someone active for entrepreneurship.

After that, the men said that frequently disapa this password, select the appropriate business interests and talents with the opportunity to see in the market. With a large interest, will occur through the passion and spirit, maintain, and humming.

"Finally, just do it now. Do not count too, disconnect, start, and do now! "Said the former Chairman of the Public Agency Center of Indonesian Young Entrepreneurs Association (Hipmi CPP) is the period 2005-2008. Password expressed optimism that seems to be a number of major capital successful young entrepreneurs. Only a Indraguna Henry, owner of The Bridal Auto Indonesia, car wash "snow blower."

Before establishing a car wash now beromzet Rp7, 5 billion per month, the man who was born in Bandung, 28 August 1973, this fall up in the attempt. be passed various forms of business, but many times he was also busted and back to point zero. Male graduates of the University Maranatha Bandung during lectures sold fried chicken has become a salesman various electronic products to toys.

He was salesman of the product of Chinese origin toys to supply some toy store in Bandung. In fact, after finishing graduate course Henry had trusted to distribute the card chip Telkom worth Rp20 billion. But work hard in a flash due to poor Be spree. Bad habit that is sirna after he Fangky married Christina in 2003.

Thanks to the idea to open the car washing business of law bermodalkan with Rp150 million, he opened the car wash business at the end of 2003. "This amount is actually small enough to open a business," said Henry. From the capital of the Rp35 million he used to rent a place worth Rp75 million. The rest is paid after three months of running a business.

The rest of capital for equipment. But Henry had much to cover the cost of lack of equipment. Henry initially less attractive business community. But for Henry it is part of the game must be passed. Desires to change the image of car wash, which become dirty clean and comfortable, with innovative and travel realized through the snow The Auto Bridal.

Henry also continues to innovation in business start washing the car ice cream, parlor car, motor bridal. Each week, The Auto Bridal Indonesia to serve a minimum of 120,000 freight cars with clean Rp35 thousand per car.

"Usually the benefits are 100 percent of the capital," said Henry. Henry awarded Outstanding Entrepreneurship Award Asia Pacific Entrepreneurship Awards (AFEA) 2008. The Auto Bridal Indonesia currently have 84 branches spread across the country. Henry is currently working to expand the business wing relative to the land of Malaysia.

Other success stories indicated Isaiah Surya Widjaya, owner of PT Mandiri Baksomas King who now have 14 restaurants and 40 partners. Isaiah, the top male master Hawaii Pacific University graduate fields of computer, developing and meatball frozen food (frozen food) with a variety of seafood taste. Isaiah was initially only run the business her parents built in 1982.

As they often help serve customers since small, male birth Jakarta, 31 January 1971, this is very familiar with the culinary world. After the family of S-2 in 1998, Isaiah began to learn the management of restaurants. Situlah him from the indulgence of the appetite to eat the Conference to develop a meatball with a variety of business sense.

In 2002 he started to open outlets in serious baksonya flag with PT Mandiri Baksomas King. At first he opened five outlets in the area of Fantasy World, Ancol, North Jakarta, and one outlet in Kemayoran. To open outlets in Kemayoran, Isaiah's parents were the capital of Rp55 juta.Yesaya also innovate by creating a frozen food.

Now, through business, Isaiah can omzet reach Rp200 million per month. Success stories that are shown as Henry and Isaiah Faif also disclosed in the book. entrepreneurship success is not solely assessed how successful someone from collecting property, but more how someone can establish, build, and run a business out of something that does not have or have not been previously run.

source: okezone.com

Free Download Google Chrome 2.0 Portable


We know that most of the power users like and love Mozilla Firefox over any other browsers. But there are few users who are actually liking the new adventure of Google that has gained many good reviews ever since it was released in last September.

Google Chrome has been updated to 2.0 recently and you can download it from the Chrome site. If you are using Chrome as a primary browser then you might like to carry the portable version the Chrome on your USB thumb drive to use the favorite browser on any Windows machine.



Though Google is not providing the portable version of the browser, some enthusiasts have managed to create a portable version of the browser. You can get the portable version of the browser from the below link. Don’t get confused as the site is in German language.



Download the portable version of the Chrome 2 from stadt-bremerhaven site and then extract it. Once you extract the download pack you will get a folder named Portable Google Chrome. Open the folder and double-click on Chrome Loader file to run the browser.

Download Google Chrome

Read To :

* Google Chrome Most Hold Hacker Attacks

source : intowindow

Free Download 20 Mobile Internet Applications To Handphone and PDA

Free Download Mobile Internet Applications To Handphone and PDA.It's very good and complete to your handphone and PDA.So...try this :

1. Mobiseer
http://www.mobiseer.com
You can search for a mobile website, mark or save the address for the purpose of further and also create a mobile web page for sites that do not have a webpage with the mobile favorite links for faster access.

2. Treemo
http://www.treemo.com
This site can help you to publish video, photos and more other features either through the normal web or your mobile equipment.

Publication Blog, Photos, Videos etc.

3. Blogs.Xanco.com
http://blogs.xanco.com
You can publish blogs directly from mobile phone using your SMS or email.

4. Gatsb
http://www.gatsb.com
You can publish photos camera phone directly to your web application with the mobile web is.

5. MixelPix
http://www.mixelpix.com
You can publish your photos directly from your mobile phone with direct dialing to the Internet.

6. SpotMob
http://www.spotmob.com
You can create videos from your mobile phone in 3GP format and publish directly to the web.

7. Umundo
http://umundo.com
You can publish video and images directly from your mobile phone to the web.

8. UPhoneBlog
http://www.uphoneblog.com
You can publish your picture as a photo blog and use it in various websites that require an image url.

9. Zannel
http://www.zannel.com/index.htm
Here, you can video and picture sharing photos events that occurred and to notify the family and your friends.

RSS

10. LIteFeeds
http://www.litefeeds.com
RSS subscription for your mobile.

11. http://mobifeeds.net
http://mobifeeds.net
You can access RSS feeds directly mobifeeds with this and can be accessed from the phone with a GPRS or 3G access.

12. NewsAlloy
http://www.newsalloy.com
You can get rss feeds from websites you like and access them from your mobile.

13. PhoneFeeds
http://www.phonefeeds.com
Here, you can change the website or RSS feed website that is difficult to read your mobile phone to be more easily legible.

Mobile Search Engine

14. Mowser
http://mowser.com
Search engine specifically for browsing from mobile.

15. Tappity
http://www.tappity.com
You can search, submit and rating sites, and also your mobile sharing with others.

16. WamPad
http://wampad.com
Mobile search engines for a variety of information including social networks like MySpace.

Other

17. Flurry
http://flurry.com
You can access email, rss feeds and find out information about your friend.

18. Goosync
http://www.goosync.com
You can synchronize Google Calendar to your mobile phone or PDA.

19. MoMail.co.uk
http://www.momail.co.uk/page/default.asp
Here, you can access all your email accounts directly from a mailbox tersentralisasi.

20. PlusMo
http://plusmo.com/homepage/home.shtml
Widgets for mobile services that you have more than 20,000 widgets for you to choose.

source : variouse source

Increase Alexa Ranking Tips

At this time of course there are many people who do not know how to improve the ranking alexa.This is very important for the progress of your website or blog.

Here are some tips and tutorial how to improve alexa ranking that I can from various sources:


1.Install Alexa Toolbar in your Internet browser that you do not have.you can download here:

* for Internet explorer

* for Mozila Firefox

2.Install alexa widget in blog. you can get the download from alexa site here.

3.Setting your Web or Blog a Home Page on the Internet browser.
is very simple:

For Internet Explorer 7 (IE7)

1. Internet explorer, please run it.
2. View to the top, there is a bar menu. Click the "Tools" menu, select "Internet Options".
After its exit option, make sure you are on the General tab, write your blog address in a field that is. eg http://anang-news.blogspot.com. Click the Apply button and then click the OK button.
For users of FireFox essentially the same, similar step-like:

For Firefox 3:

1. Please run Firefox it.
2. Click the Tools menu, click Options ...
3. After the exit options, click the Main tab. Fill in the name of the home page with the address of your blog. click the OK button. Done.

4.Create any posts in your blog about alexa

5.Increase number of visitors to your blog.

source : variouse source

Sunday, March 29, 2009

Available Free - Insurance, Health Quotes Online

When quotes are available for free, insurance, health options, and financial planning no longer seem daunting. And when you shop around for health insurance providers, keep in mind that your goal is to find a balance between associated costs and benefits coverage. For a plan to be a sound choice, it should provide you with benefits that exceed its costs.

As you look around for providers, remember to:


1. Research, compare, and evaluate. Costs and coverage vary with different policies. Different providers give you varying services. Get in touch with several providers and request for a quote. They normally give you one for free. Insurance, health options, and plans are better evaluated with actual figures on hand.

2. Choose what is appropriate. Buying more than would meet your needs is unnecessary and would just waste your resources. So take the time to understand each policy carefully. When you do, you will see that a single comprehensive plan is financially sound. You don't need duplicate coverage in varying health insurance plans.

3. Read and understand exclusions very well. This section tells you when you are most at risk of being denied coverage. So if you have a pre-existing condition (asthma, for example), pay close attention to what's included and what's not.

4. Know your maximum benefits under each plan. Look for these in the quotes you got for free. Insurance, health coverage limits, and various services are costs to providers. It's thus natural for risk businesses to impose limits on these benefits. Make sure you understand how the limits work.

5. Keep contact information on hand. Ask for agents' or companies' business cards and keep these on file. That way, when you have questions and claims issues in the future, you'll know where and who to turn to for information. Even if you are sourcing your coverage from other providers, you will find these pieces of information useful for future references.

Bottomline: don't let anyone rush you into making a choice. No one cares about your health and well-being like you do.

John S. Willard is an insurance expert and director of popular website Frickaseed.Com. He provides honest information and advice on matters like free insurance health and much more. Check out the site for more info!

by :John S. Willard
source : ezinearticles

Melissa virus turns 10

A decade ago there was no Facebook, no iPhone, and no Conficker. There was dial-up and AOL and a nasty virus called Melissa that ended up being the fastest spreading virus at the time.

CNET News talked to Dmitry Graznov, a senior research architect at McAfee Avert Labs who was among the researchers who worked to fight the Melissa outbreak and track down the creator.

Q: How was Melissa discovered?
Graznov: Avert as a whole discovered it as did some of the competitors. It was submitted to us by customers as it started to spread around the world (on March 26, 1999).

What made Melissa different from previous viruses?
Graznov: It was the first mass-mailing virus, which used e-mail to spread on a large scale.

What harm did the virus do?
Graznov: In some cases the load on the e-mail servers in some organizations was so high that the servers were effectively shut down.

How many computers were affected and what did the virus do?
Graznov: Hundreds of thousands of computers were affected. That's a guess...Melissa infected other documents a user opened in Microsoft Word. It also connected to Outlook if it was running and selected 50 entries in the address book and e-mailed an infected document to those addresses...including mailing lists...As a result, the virus was sent not just to 50 people, but to thousands of people easily. We didn't have any firm numbers to go by, but we did have reports from customers saying their Exchange servers were overwhelmed.

How long did the outbreak last?
Graznov: Several days, but the infections continued to be registered for a long time after that. It was just a macro virus and we were well equipped to provide detection and removal for people's computers even then...The fact that it was so widespread in the world already meant it took a long time to remove the infections.

Security researcher Dmitry Graznov as he looked in 1999 when he was chasing down the creator of the Melissa virus for McAfee Avert Labs.
(Credit: Dmitry Graznov)

How did the virus writer get caught?
Graznov: I was running, actually still am, a project called Usenet Virus Patrol, which scans Usenet articles for viruses. The author of Melissa posted the virus to a newsgroup called "alt.sex." It was zipped up and sent as if it was a list of passwords to like 80-something different porno sites...It was just bait to entice people into downloading it and opening it. Once it was opened, it started e-mailing itself around. It was relatively easy to go back and find the exact Usenet posting that started all this. In the header of the posting it was possible to find out not only the e-mail address from which it was sent but also the IP address of the computer from which it was sent. That IP was linked to an AOL account and from that the FBI subpoenaed AOL and they provided the dial-in logs...and found out what computer was assigned that IP address and from what telephone number the call was made. The AOL account was a compromised one...The phone call that used that account came from New Jersey and the FBI linked the phone number to a particular address. That is how they found the guy's computer...The data we provided them was the clue that led straight to the criminal. (David L. Smith pleaded guilty and was sentenced to 20 months in prison and $5,000 in fines.)

What was the motivation behind Melissa?
Graznov: There was no material gain. Back then, people didn't do it for money. They did it for mischief, for fame...Today there is huge money in computer crime...Back then, we had 200 times fewer pieces of malware than we have today.

Any comments on Conficker and Melissa and how far we've come?
Graznov: Conficker is a completely different type of thing. It's not a macro virus. It's an executable and a botnet, and it downloads lots of stuff on your computer. It's basically a network for sale. It can be rented out. It can be used for password stealing. Back in 1999 there wasn't such a thing as a business model for malware...Today, big money is involved in computer malware. You cannot even compare them.

by: EM
source : cnet

Saturday, March 28, 2009

Windows geeks warm to Macs

Vista's woes and Apple's move to the Intel platform have helped kick open the corporate doors to Macs, so it's no surprise that some Windows developers prefer working on Macs

At Simply RFiD, a half-dozen software developers yearned for Macs at work. They liked the power and reliability of the Apple machines. Oddly, Simply RFiD made the switch to Mac Pros for its developers to write code for Windows computers.

IDC Study Results: The Common Resource Gap Facing Midsize Companies and the Time-Tested Alliance that Can Save Them - read this white paper.

"We're small and don't want to deal with tech support issues, and that's what Windows has become," says Carl Brown, a software engineer and president of Simply RFiD, which helps companies use radio frequency identification technology. "The only reason why we even run Windows is because we're a Windows developer."


[ Check out Tom Yager's look at the Nehalem Mac Pro in "The Mac reborn." | Get the analysis and insights that only Randall C. Kennedy can provide on PC tech in InfoWorld's Enterprise Desktop blog. And download our free Windows performance-monitoring tool. ]

Let's face it: Techies love great technology, and so it's no surprise that some Windows developers prefer working on Macs, which are considered by many to be the best desktop computers on the market today. Microsoft, on the other hand, is still trying to cover up its Vista black eye. For many techies, the much maligned Vista operating system has become a symbol of backward innovation.

[ Not just the creative types but even IT pros are demanding Macs. | In another twist, iMacs are a good bang for the buck, reports CIO. ]

Macs have made giant strides in the enterprise in recent years, thanks to Vista's woes, Apple's move to the Intel platform and emerging trends such as desktop virtualization and software-as-a-service that make it easier to access applications using a non-Windows computer. All have helped kick open the corporate doors to Macs. Last year, the Yankee Group surveyed 750 senior IT executives and found that nearly 80 percent have Macs in their environment, up from 47 percent in 2006.

Are you ready for event-driven business? - watch this webcast.

"We wanted to use Macs exclusively five years ago, but it wasn't feasible because there were just too many Windows applications that had to run on a PC," Brown says. "We all had Windows PCs at work and Macs at home but couldn't justify the Mac as our main PC. With Intel boxes, virtualization and SaaS, now you can."

Windows geeks wanting Macs?
Most Apple enterprise enthusiasts come from creative and sales ranks, such as marketing departments and iPhone-toting execs. "I don't think we'd ever entertain rolling out Macs unless there was some kind of creative or digital component," says Michael Iacona, CIO of TMP Worldwide Advertising and Communications. "They are much more expensive" and harder to manage.

Yet there are signs that techies want their Macs, too. At Simply RFiD, .Net developers run Visual Studio in a VMware virtualization machine on a Mac Pro-a very stable and fast platform for programmers. In fact, Brown contends that VMware on a Mac Pro runs Windows better than Windows runs Windows.

Moreover, with a click of the mouse, software developers can instantly flip to the Mac OS. They can quickly open up iChat videoconferencing or tap into one of many Internet services that Simply RFiD uses, such as Google Apps for email and collaboration and Netsuite for back office functions. It helps that Macs are known for their easy interaction with Internet-based services.

Simply RFiD engineers aren't alone in their affection for the Mac. Other IT pros are demanding Macs, often spurred by an appreciation of Apple's reputable hardware and zest for technological innovation. The fact that Mac OS X is Unix-based also means many developers feel at home.

Unbreakable Windows!
Software developers, though, can be a fickle lot. For instance, Brown spent the last two days hooking up a fully patched $500 Vista machine to a $2,000 Apple monitor to see what would happen. There were a lot of annoying prompts, he says, but the system worked well enough.

IDC Study Results: The Common Resource Gap Facing Midsize Companies and the Time-Tested Alliance that Can Save Them - read this white paper.

So well, in fact, that his team got together to discuss the latest Windows trends-and buzz started swirling about bringing PCs back. Microsoft's Live platform, along with its shared server for small or large organizations, "looks pretty cool," Brown says. He's also encouraged by new Microsoft products that are smaller rather than bigger, a sign Microsoft is moving away from traditionally massive, monolithic applications that requre two days to patch.

"We've been watching what [Ray Ozzie, chief software architect] has done there the last few years," says Brown, "and it's kind of exciting to see that Microsoft might have a soul again."

By Tom Kaneshige

Hack contest sponsor confirms IE8 bug in final code

by : Gregg Keizer
The final version of Microsoft Corp.'s Internet Explorer 8 (IE8) does contain the vulnerability used to hack a preview of the browser at last week's Pwn2Own, the contest's sponsor confirmed today.

But the exploit used by the computer science student to break the release candidate of IE8 -- and walk away with a Sony laptop and $5,000 in cash -- won't work on the final version of IE8 as long as it's running in Windows Vista Service Pack 1 or Windows 7, said Terri Forslof, manager of security response at 3Com Corp.'s TippingPoint unit.


Questions had arisen about the exploitability of IE8 almost immediately after the Pwn2Own hack because Nils, the German student who gave only his first name, hacked IE8 Release Candidate 1 (RC1), while Microsoft released the final code less than 24 hours later.

Today, Forslof put the chatter to rest by confirming that IE8's RTW, or "release to Web" portions, were immune from Nils' hack. "His exploit did, in fact, employ the technique found by Sotirov and Dowd," said Forslof, referring to work by Alex Sotirov and Mark Dowd, two researchers who announced last summer that they were able to bypass two of Vista's biggest security defenses, ASLR (address space layout randomization) and DEP (data execution prevention).

Microsoft made changes to IE8 between RC1 and the final code that blocked Dowd's and Sotirov's circumvention technique, thereby making Nils' exploit moot -- but only in some situations, said Forslof today.

"Nils' exploit is only broken when IE8 is running in Windows Vista SP1 or Windows 7," she said. "The vulnerability is absolutely there, so for IE8 on Windows XP, which lacks ASLR and DEP, it can be exploited using commonly known techniques."

Also at risk, said Forslof, are users running IE8 on the browser's Intranet security zone, no matter what operating system is on the machine. "If an organization is compromised, the flaw could still be exploited from the internal network on machines running Windows Vista and IE8," she said.

Forslof declined to confirm whether the bug also exists in older versions of IE, such as IE7. "We're not going to comment on that because we're still confirming the vulnerability on the previous versions ourselves," she said. "So we'll let Microsoft handle that [announcement]."

But Forslof suspects that IE7 is vulnerable. "My guess would be yes," she said. "A lot of times, researchers look at the current software, in this case IE7, find a bug, then they test on the beta of the next. If they find it there [in IE8], they wait and see whether it's fixed in the final."

Microsoft has said little about the IE8 vulnerability, although during an online Q&A on Wednesday, the browser team noted that Nils' exploit wouldn't work on the RTW edition. "We can say that the attack as demonstrated in Pwn2Own at CanSecWest will not succeed on the RTW build released on March 19 because of changes that can block the ASLR+DEP .Net bypass demonstrated by Dowd and Sotirov," said Kymberlee Price, a program manager for IE8 security.

Mozilla Corp., whose Firefox browser was also hacked by Nils last week, plans to patch that flaw, as well as another that just went public, next week. However, Microsoft has not spelled out a timetable for an IE fix.

source : computerworld

New Nokia 5030 Handphone XpressRadio



XpressRadio Nokia 5030 mobile phone comes with music features to new users. In one package the Nokia 5030 mobile phone sales XpressRadio a BL-5C battery, AC-3 compact charger, WH-101 stereo headset, and a manual. Nokia 5030 XpressRadio is the first mobile phone with an FM radio antenna, which will eliminate need for external speakers or headset. Features FM radio and channel selector buttons are in addition to mobile phones, with the quota within a day to listen to time, talk time and up to 10 hours. XpressRadio Nokia 5030 mobile phone comes with a powerful speaker, and in two colors red and GRAPHITE. Nokia 5030 mobile phone XpressRadio will present in the second quarter in 2009, with prices estimated 40 Euro or $ 53.



Nokia 5030 main specifications XpressRadio:

* General: 2G Network GSM 900 / 1800, GSM 850 / 1900
* Status: Coming soon. Exp. release 2009, Q2
* Dimensions: 108 x 45 x 15 mm, 62 cc
* Weight: 82 g
* Display: 1.8 inch TFT, 65k colors, resolutions 128 x 160 pixels, plus 5-way navigation key
* Features:
o Sound Vibration, polyphonic, MP3, video ringtones tones
o Speakerphone
o SMS
o Browser
o FM Stereo Radio
o Games
o Voice memo
o flashlight
o T9
o Built-in Antenna
o Dedicated radio keys
* Memory: Phonebook 1000
* Colors: Red, GRAPHITE
* Battery: Standard battery, Li-Ion 1020 mAh (BL-5C) Stand-by 525 h, Talk time 10 h

source : beritanet

The Secrets of Celebrity Diets - 5 Snacks the Celebrities Don't Want You to Know About

The Secrets of Celebrity Diets are really no secret. We all know that celebrities have the money to hire dieticians, personal cooks, and personal trainers. Most of us can only dream of having the luxury to afford personnel like this. Here's a SECRET, the only thing they are really buying is motivation. Celebrities are too busy and lazy to make their own food, buy their own groceries or follow a workout plan.


Celebrities hire people to tell them when and what to eat and which exercise to perform. So they are really no better than you just lazier. You aren't lazy are you? Of course your not! If you were lazy you wouldn't be researching weight loss plans on the internet.

Snacks are a dieter's best friend, because without them we would feel as if we were being cheated out of something. Snacks are one of the Secrets of Celebrity Diets. Snacks don't have to be boring and bland. By the way some of the snacks I'll show you are not even considered diet snacks at all!

Here are my top 5 Snacks that will help you lose weight:

These snacks are formulated for the recommended caloric intake of women; men can just double the amounts shown below.

1. 1 Laughing Cow light garlic and herb cheese wedge and 3 reduced-fat Triscuits.
2. 2 graham cracker squares with 2Tb of Peanut Butter
3. 1 container of regular chocolate pudding and 1-90 calorie pack of caramel rice cakes (no change for men)
4. 1 banana with sugar-free caramel drizzled on top (no change for men)
5. 4 slices of honey ham with 2Tb of honey rolled in a lettuce leaf.

Those are my top Snacks that I rely on a regular basis to keep me away from the potato chips and ice cream. The snacks I outlined above are about 200 calories or less so they are perfect for snacking. Here is another technique I use to control my snacking on "Fat" foods, I simply cut them out of temptation all together. They don't even make it to the shopping cart. If they don't make it in your house then you won't be tempted to eat them during a moment of weakness.

I know I was only going to reveal one of the Secrets of Celebrity Diets. But here is another that will give you access to more snack ideas and all the recipes you'll need to get you on your way to losing weigh like a celebrity. Strip That Fat is the premier weight loss software. Strip That Fat is like having your own personal trainer and dietician on your computer. You will feel like you spent thousands on a personal dietitian and cooking classes.

You are not too lazy to cook your own food are you? You will be able to make excellent meals using only the foods that you like to eat. This software program is one of the Secrets of Celebrity Diets that they don't want you to know about. You soon will know what it's like to lose weight like a celebrity.

Jeremy Reynolds- Fitness and Diet Professional DID YOU KNOW THAT: A study of 19,000 Americans found breakfast skippers are more likely to gain weight because they are more inclined to overcompensate for the loss of key nutrients at breakfast by eating more fat-rich, high-energy foods later in the day. If you want to know more about Eating Healthy to Lose Weight and KEEP IT OFF

By Jeremy Reynolds
source : ezinearticle

All in One PC, Practical and economical energy



A new innovation in the PC world try Advan offered through a product deskbook, who claimed to be a product all in one PC. The notebook and desktop specifically designed to reduce the cable is chaotic, to facilitate the installation process.

Advan Deskbook is designed with a CPU that is built in with LCD monitor, DVD Room, USB port, LAN port, and stereo speakers. This product is claimed to scrimp because of the practical and can be used on the table or swing on the wall, and can be moved to various places.


Corner of the screen tilt can be adjusted in such a way, that can be adjusted with the point of view of users, even to the extreme corners of the (1350).

As quoted from the description detikINET authorized, Friday (27/2/2009), in addition to practical, Advan deskbook also claimed not ravenous energy, because electricity consumption is only 65 watts.

Deskbook is present in three variants, ie, touch screen 14 inch 15.4 inch and 17 inch. Full specifications are as follows:

DC-40T

* 14 "WXGA
* Processor Intel Celeron M410 1.46G
* 1Gb DDR2 Memory
* 80Gb SATA hard disc
* DVD Combo
* GML943 + Intel GMA 950 graphic card
* 4in 1 card reader
* LAN
* WIFI
* Built in Stereo Speaker
* Slim keyboard & mouse
* Titan black color
* 12 months warranty


D5C-38 / 39

* 15.4 "WXGA
* Intel Celeron Processor M380/390
* 1.6G
* 1Gb DDR2 Memory
* 80Gb SATA hard disc
* Combo DVD / DVDRW
* Intel GMA900 graphic card
* 4in 1 card reader
* LAN
* Built in Stereo Speaker
* Slim keyboard & mouse
* Available in Titan Black / white glossy
* 12 months warranty


D7T-80 (2 GB)

* 17 "WXGA
* Processor Intel core2 Duo T5800 2.0
* GHz
* 2 GB DDR2 Memory
* 160GB SATA Hard disc
* DVDRW
* Intel GMA 950
* ALC655 AC97 CODEC
* LAN 10/100 M
* Wifi
* 4 in 1 card reader
* Built in Stereo Speaker
* Slim keyboard & mouse
* Titan black color
* 12 months warranty

by : faw

source : detikinet
Friday, March 27, 2009

How to Borrow Money in Tough Times

We are living in interesting times, but as small business owners, that does not mean we can suspend what we need to do, reset the game, or choose not to move forward. If we do that, we have lost the game altogether.

Money remains the juice that keeps business going, and if your business needs money to make next season’s products, build a new facility, or open a new shop, you will need to go after it one way or another.


Here are four tips for seeking the money you need:

1. Start by going to a bank where you have a relationship. If you do not have a banking relationship, start one. Local banks are doing well, in general, so check them out. Every state regulates the banks, so you can find out about the financial condition of a local bank by going to your state’s Web site and then going to the financial institutions area.

2. Interview the lenders. Make an appointment with a lending officer either by phone or in person to discuss what he or she can do for you. Be prepared to talk about what you are doing, how much money the company is making (gross and net revenue), and how the loan would increase your gross and net revenue. Find out the amount you could borrow, the terms, the penalties, and the lender’s expectations. Ask what else the lender will do for you: I always ask what will make my company and me more than just a depositor or a borrower. Also find out if the bank holds its own loans rather than selling them off.

3. Understand that you will have to personally guarantee the loan. In the 1980s, when Lee Iacocca took over bankrupt Chrysler, he personally guaranteed Chrysler’s debt—that’s why he got so much money out of the company. Do not be offended.

4. Most business owners can get better terms and a lower interest rate through a traditional banking source. Some credit unions can work with businesses as long as the business is a depositor, so that’s another group to work with. Learn the difference between regular lenders and hard-money lenders. Hard-money lenders charge much higher interest rates, and the terms are much more stringent.

Marilyn J. Holt, CMC
source : businessweek

A-DATA launches laptop-ready 2.5-inch 512GB XPG SSD at CeBIT


We heard way back in January that ASUS' S121 would be the world's first laptop with a 512GB SSD, and now we've reason to believe that very drive could be coming from the labs at A-DATA.


Here at CeBIT, the company has launched what it's claiming is the industry's highest capacity SSD (in the 2.5-inch form factor) with its 512GB XPG SSD. The drive promises to provide 230MB/s read and 160MB/s write rates while shuffling data around on the SATA II interface. As expected, it comes housed in a durable aluminum casing to shake off those occasional bumps and bruises, but there's sadly no word on price or availability. Next stop: 1TB. (Hopefully, anyway.)

by Darren Murph,
source : engadget

Top 7 health tips - Facts and Tips for Better Living

EXERCISE HEADACHES — Some people with heart disease may get head
pain instead of chest pain. Like chest pains, cardiac headaches begin
during exercise and subside when exercise stops. See a doctor for an
exercise stress test if the pain of your “exercise headache” is
severe, you normally do not get headaches, you smoke, you are older
than 50, or you have any risk factors for heart disease such as high
blood pressure or a family history of heart disease


HEALTHY GUMS, HEALTHY LUNGS — Millions of Americans have difficulty
breathing, and chronic lung problems are the sixth-leading cause of
death in the United States. Research points to a link between gum
disease and respiratory problems. Diseased gums can make breathing
problems more difficult to solve, doctors said. Studies previously
have linked heart disease, diabetes, and premature child delivery to
oral health. The research indicates that maintaining oral health is
not just important for dentition, it could also delay the onset, or
slow the progression, of respiratory diseases, said Roger Smith,
national oral health advisor for Delta Dental Plans Association.
There is no proof yet that periodontal disease causes respiratory
problems, but there are significant associations between a person’s
periodontal status and the likelihood that previously existing
breathing problems will worsen, scientists said.

RELIEVE SORE EYES — A negative side-effect for avid computer users
is eyestrain. Long hours staring at a screen causes us often to
forget to blink and replenish moisture to our eyes. But there is a
way to relieve sore eyes. A common way to treat eyestrain is even
closer than your fingertips. Rub your hands together briskly for 10
seconds, generating heat. Close your eyes and place your palms over
your eyes, resting the heels of your hands on your cheekbones and
your fingertips on your forehead. Do not apply pressure. Hold your
hands in place for at least one minute while you relax your facial
muscles and breathe deeply. The deep breathing coinciding with the
warmth of your palms combines to relax the weary muscles around your
eyes.

WALK BEFORE DESSERT — It is very tempting to go right to dessert
after finishing your main course. However, remember that it takes
several minutes for your brain to sense that you are full. So, before
grabbing dessert, go for a walk. By the time you are done walking,
you just might find that you have lost the craving!

BABY BOTTLE TEETH SYNDROME — Good dental care begins at birth.
Healthy teeth let children chew food easier, learn to talk clearly,
and smile with self-assurance. According to the American Dietetic
Association, to avoid tooth decay, do not put your infant, toddler,
or young child to bed with a bottle of formula, juice, or milk. All
of these fluids contain sugar, whether natural or added, and can
contribute to the development of baby bottle teeth syndrome. This
syndrome results when liquid bathes the teeth and gums as a result of
falling asleep while sucking on the bottle, causing tooth decay. The
predominant areas of decay are the front teeth, since the liquid
stays there the longest. If your toddler needs the comfort of a
bottle to fall asleep, make sure it is a bottle of water.

LOST TEETH MAY PORTEND STROKE — A report in the journal “Stroke”
suggests a link between tooth loss and periodontal disease and
increased risk of ischemic stroke. Ischemic strokes - the most common
type of stroke - result from a blockage in an artery leading to the
brain. In the study, men with fewer than 25 teeth when they entered
the study had a 57 percent higher risk of ischemic stroke than those
with 25 or more teeth. The link between ischemic stroke and
periodontal disease, which is caused by bacterial infections, adds to
the growing body of evidence that infection plays a role in stroke
and heart disease, said Kaumudi Joshipura, associate professor of
epidemiology at Harvard School of Dental Medicine and Harvard School
of Public Health. “The association of ischemic stroke with tooth loss
persisted even after we controlled for periodontal disease history,
which could reflect severe periodontal disease in the extracted
teeth,” Joshipura said. Surprisingly, the scientists also found the
tooth loss-stroke risk link was higher among nonsmokers than among
smokers. Smoking tobacco is a risk factor for both ischemic stroke
and periodontal disease. “We do not know why nonsmokers showed a
higher association,” Joshipura said. “But that lends support to the
argument that the association between tooth loss and stroke is not
all due to smoking.”

FISH DIET CHASES CANCER — Eating a fish-rich diet seems lower levels
of the hormone leptin, which has been associated with obesity and
increased risk of heart disease. Researchers at the Mayo Clinic
studied neighboring African tribes, one tribe eating a fish-rich diet
and another tribe eating a primarily vegetarian diet. “Regardless of
body fat or body mass index,” researchers said, “leptin levels were
substantially lower among the fish-eaters than among vegetarians. We
speculate that a fish diet may change the relationship between leptin
and body fat and somehow help make the body more sensitive to …
leptin.” Leptin levels among the women in the study were particularly
noteworthy, the researchers said. Women usually have higher leptin
levels than men, but women who ate the fish-rich diet had lower
leptin levels than both men and women on the vegetarian diet. The
researchers cautioned, however, that the study subjects were “African
individuals living in a fairly rural environment. We do not know if
the findings will apply to a semi-overweight, urban-dwelling North
American population.”



source : bumeral.net


PS and Xbox Can Help Children Become Scientists


Michigan - to spend time playing games, some of the votes have a negative impact for the development of a child. But a psychology expert from Michigan State University to see the positive development of the game for children.



According to Professor Linda Jackson, personnel psychology from Michigan State University, game consoles such as Sony Playstation or Microsoft Xbox is able to help children realize the ideals-citanya become a scientist or engineer. In addition, for children to become a scientist or engineer will be increased thanks to the game in the game console.

Telegraph, Thursday (26/3/2009) launch a study revealed that, the brain's ability of children aged 12 years will be increased when playing Xbox and PS. Improvement of the brain that is working to create a visual-spatial intelligences of a child developing as children learn to understand each of the images are in the screen.

"Games are a means to exercise the ability to see children in science, technology, engineering or mathematics," said Jackson.

According to Jackson, the conclusion is based on studies conducted over three years. Research that seeks game exploring the relationship between the academic and social life of a child. The questions the researchers asked, about the lives of children in the use of gadgets such as mobile phones, video game.

Jakson said, difficult for a child to stop playing video games. So according to him, which must be done is to encourage game developers to create games that can increase the visual and spatial intelligences rather make a game an element of violence.

Games for this is often dituding as a ringleader on the occurrence of cases of violence such as shooting in schools all over the world. (srn)

by : SYH
source : okezone

How to recover the lost or forgotten password of Cisco switches?

This tips will help you to explain the password recovery methods for the Cisco layers 2 switches. You can use these steps also to recover the Cisco layers 3 switches (for example 3550 and 3750 series).

Follow the step-by-step procedures to recover the lost Cisco switches password:

First make sure, you have connected your PC to the console port of switch using any emulation software.

Now turn the power switch off and back on to recycle the power then release the mode button for few seconds after the LED above port 1 turns off.

Now your switch first prompt will look like this:


switch:



First run the flash_init command to initialize the flash.

switch: flash_init



After running the flash_init command, the following information will appear as under:



1. switch: flash_init

2. Initializing Flash...

3. flashfs[0]: 21 files, 2 directories

4. flashfs[0]: 0 orphaned files, 0 orphaned directories

5. flashfs[0]: Total bytes: 7741440

6. flashfs[0]: Bytes used: 4499456

7. flashfs[0]: Bytes available: 3241984

8. flashfs[0]: flashfs fsck took 7 seconds.

9. ...done initializing flash.

10. Boot Sector Filesystem (bs:) installed, fsid: 3

11. Parameter Block Filesystem (pb:) installed, fsid: 4

Now run the load_helper command to load any helper images.

switch: load_helper

Issue the dir flash: command to view configuration file name with detail.

switch: dir flash:

Now type the rename flash:config.text flash:config.old command to rename the previous configuration file.

switch: rename flash:config.text flash:config.text.old

Here run the boot command to restart the switch.

switch: boot

Now after booting process, type enable to enter enable mode at the switch prompt.

Switch> enable

Now again type the rename flash:config.old flash:config.text command to rename the previous configuration file.

Switch#rename flash:config.old flash:config.text

Here run the copy command to transfer the configuration file to running-config

Switch#copy flash:config.text system:running-config

Now go to global configuration mode and set the new password.

Switch# configure terminal

Switch (config)# enable secret password (type here new password)

At the end saves the running configuration to NVRAM.
Switch# write memory

source : computerfreetip

How to Dual Boot Windows 7 with XP or Vista



If you're dying to try out Windows 7 but aren't ready to give up your installation of XP or Vista, let's take a look at how to dual boot Windows 7 with XP or Vista.


Step 0: Download the Windows 7 Beta and Burn It to a DVD



Assuming you've already downloaded a fresh copy of Windows 7, you'll need to burn it to a DVD in order to do a fresh installation. To handle this task, grab a copy of the most popular CD and DVD burning tool ImgBurn, burn the ISO to a DVD, and move right along to step 1.
Step 1: Partition Your Hard Drive

Before you go installing Windows 7, the first thing you need to do is create a new partition on your hard drive to hold the new installation of Windows. Partitioning your hard drive will vary depending on whether you're running XP or Vista—namely because Vista has a partition tool baked in, XP does not.
Partition Your Hard Drive in XP

To partition your hard drive in Windows XP, you'll need to download some sort of third-party partitioning software. There are a lot of options available, but I prefer to stick with the previously mentioned GParted live CD, a free, open source boot CD that can handle all kinds of partitioning duties.



To use it, just download the GParted Live CD, burn it to a CD, then reboot your computer (booting from the disc). You'll boot right into the partitioning tool. HowtoForge's previous guide to modifying partitions with GParted is a great place to start, but it's a fairly basic procedure:

1. Resize your current OS drive to free up enough space for a Windows 7 partition (the minimum system requirements ask for 16GB).
2. Create a new partition from the newly freed space.
3. Apply your changes.

Partition Your Hard Drive in Vista

The folks at Redmond were kind enough to include a disk partitioning tool in Vista if you know where to look. So go to Control Panel -> System and Maintainence (skip this one if you're in Classic view) -> Administrative Tools -> Computer Management. Once you launch the Computer Management tool, click on Disk Management under the Storage heading in the sidebar. It's partitioning time.




Luckily we've already gone down this road before in step-by-step detail, complete with pictures, so check out our previous guide to creating a new partition in Vista. In a nutshell, you'll need to shrink your current OS partition to free up at least 16GB of disk space (per the Windows 7 minimum system requirements), then create a "New Simple Volume" from the free space.
Step 2: Install Windows 7

Now that you've done all the heavy lifting, it's time for the easy part: Installing Windows 7 on your new partition. So insert your Windows 7 disc and reboot your computer (you'll need to have enabled booting from your DVD drive in your system BIOS, but most PCs will have this enabled by default).



Once the DVD boots up it's a simple matter of following along with the fairly simple installation wizard. When you're choosing installation type, be sure to select Custom (advanced) and choose the partition you set up above. (Be careful here. Choosing the wrong partition could mean wiping your other Windows installation altogether, so make sure you pick the new partition you just created.)

After you select the partition, go grab yourself a drink and let the installer do its work. Windows will run through some installation bits, restart a few times in the process. Eventually you'll be prompted to set up your account, enter your license key, and set up Windows. Keep your eyes open for fun new Windows 7 features, like your new homegroup (and the accompanying password). When it's finished, you're up and rolling with your new Windows 7 installation.



Congratulations! You should now have a new entry for Windows 7 on your boot screen when you first start up your computer. You've now got all the tools necessary to dual-boot Windows 7 and XP or Vista—or even to triple-boot Windows 7, Vista, and XP.

This isn't the only way to set up a multi-boot system by any means, but it's how I pulled it off. If you've got a method of your own that you prefer, let's hear it in the comments.

Read To :

- How to Change the Windows 7 Default Control Panel View
-
How to Customize the View in the Services Window in Windows 7
-
Free Windows 7 Transformation Pack Download
- Free Windows 7 Themes For Vista and XP
- 20 New Features of Windows 7
- Free Download UxTheme Patch for Windows 7

By Adam Pash

source : lifehacker

Lian-Li Intros New PC-B10 Computer Chassis


It would seem that not a week goes by without Taiwan-based PC chassis manufacturer Lian-Li coming up with some new model targeting either our living-room or office. This week, it launched the PC-B10 Mid Tower chassis, a product designed mostly for those users who are looking for a PC case that's both cool, as far as the temperature on the inside is concerned, and visually attractive.



Without a doubt, the looks of the PC-B10 will be the first thing anyone will notice, and that's because Lian-Li's new case has a very sleek, brushed aluminum look, which will certainly draw some attention.


The PC-B10 case is designed to house Micro-ATX or ATX motherboards and has 7 PCI slots, which are well ventilated with special vented brackets. And speaking of ventilation, it's very important to mention the fact that this PC case sports two fans on the front (1x 140mm at 900RPM + 1x 120mm at 1500RPM) and one rear 120mm at 1000RPM extraction fan, all of which feature removable dust filters.



Lian-Li PC-B10 - open
Enlarge picture
Furthermore, the chassis supports 5x 5.25-inch optical drive bays with one optional 1x 3.5-inch external and four additional internal 3.5-inch bays for HDD’s in an anti-vibration cage. The HDD cage is accessible from the left side panel, and each HDD is mounted with anti-vibration grommets to reduce noise from HDD vibrations. Also, the top panel is removable with the multimedia I/O ports on the top panel consisting of 2x USB2.0, 1x IEEE1394, as well as HD+AC97 Audio.

Now, for two issues you've most likely been waiting for, namely pricing and availability. Hence, as Lian-Li informs us, the new PC-B10 mid-tower PC chassis will be arriving in stores at some point towards the end of April, while the MSRP will be of around 250 US dollars, which is not exactly a small sum, but it's probably worth it, given the level of quality a Lian-Li case will provide (after all, we've been able to see first hand some of the company's cases at this year's CeBIT show and were quite impressed by the quality of the craftsmanship and finishing).

source : gadgets.softpedia.com