31.1.10

Satoshi Otomo came as a substitute Suchao Nucnum

By Gunawan WidyantaraJanuary 27, 2010 22:30:00Suchao Nutnum departure that could provide a major impact on the game was made ersib P Bandung mourning, but the arrival of new players from Japan, Satoshi Otomo is expected to revive the spirit of the players Persib.


Shaven-haired players knew that if the great expectations Bobotoh switch to the shoulder, but he confessed ready to answer these challenges."I know it will assume no responsibility lightly, hopefully I can answer the big question Bobotoh by dedicating the victory," said Satoshi Otomo told Goal.com Indonesia through his interpreter.

Read More..

Eight Bank Increases Rates

No More Problems in Banking Liquidity
Thursday, January 28, 2010 | 02:31 pm 


Jakarta, Kompas - the international agency Fitch Ratings raised ratings of eight banks in Indonesia from BB to BB +. this shows, the first quarter of 2009 despite the world situation is still not recovered from the crisis, the financial performance of banks in Indonesia is quite good. 


Eight banks increased their ranking by Fitch Ratings on Wednesday (27 / 1), the Bank Mandiri, Bank Rakyat Indonesia, Bank Central Asia, Bank CIMB Niaga, Bank Danamon, Bank Internasional Indonesia, Bank NISP OCBC and UOB Bank Buana. 


Earlier, on January 25th, the same institution to raise the rank of Indonesia `s debts in foreign currency, from BB to BB + with stable outlook. 


Read More..

Radja Nainggolan Indonesian descent players who played in Serie A

Football lovers soon could see the descendants of one of Indonesia's son competing in Serie A League. That's because King Nainggolan recently joined Cagliari as a loan player. 

King is a 22-year-old quarterback, had a father and mother bloody berkenegaraan Batak Belgium. So far, King became a citizen of Belgium and Belgium had defended in Kirin Cup against Chile in the last year. 


Italian football has known since 2005 when Piacenza pulled from Belgian club, Germinal Beeschot. His career began to shine in the 2008-09 season, where he performed as many as 38 times and scored three goals in Serie B. 


Read More..

30.1.10

Optimize The Performance Of The Mozilla Browser

Have you ever felt friends fit again, although quiet cafes that make browsing the user but still slow, really slow downloads as well ... it's because each booth / room've bitrate n the bandwidth limit ... well now that the problem might be solved this way: 


1). Open Mozilla Firefox Browser 


2). In the Address bar type: about: CONFIG 


3). Search string below: (make sure all srting under "TRUE") example replace: Network.http.pipelining FALSE ==> right click and select "Toggle" Network.http.pipelining TRUE Network.http.pipelining.maxrequests 64 Network.http.proxy.pipelining TRUE NETWORK.PROXY.SHARE_PROXY_SETTINGS FALSE <=== This must be False 

Read More..

27.1.10

Sweet parting with Suchao Nutnum

Wednesday, January 27, 2010 | 15:25 pm
BANDUNG, KOMPAS - Last Match midfielder Thailand, Suchao Nutnum, for Persib Bandung running sweet. How not, Persib big win 6-1 (2-0)
on the opponent to his seventeen, Persik Kediri, in the Stadium "Si Jalak Harupat", Soreang, Bandung regency, Tuesday (26 / 1). Suchao also donate a beautiful goal in the 64th minute.
Goal was created when heavy rains flushed the stadium. Suchao took a corner kick on the right side of the goal. Arched kick through the goal line at the top right corner. Herman goalkeeper caught the ball and throw it in the future. However, the assistant referee's flag hoisted at the center's goal is considered a sign of legitimate goals.
Apart from that goal, role in midfield Suchao in action yesterday was very dominant. Movement with Eka Ramdhani, Atep, and Anga Gilang Kusumah many tender to provide feedback to the striker duo of Cristian Gonzalez and Hilton Moreira.

Read More..

Celebrate Victory, Materazzi Berlusconi Wear Face Mask

Action tease defender Marco Materazzi immediately invite laughter Inter Milan supporters.
By IVENA KasatyoJanuary 25, 2010 09:22:00
What nonsense behavior Inter Milan defender Marco Materazzi. These veteran players did not play by coach Jose Mourinho as Inter beat AC Milan 2-0 in the Derby Della Madonnina in Serie A competition, on Monday (25 / 1) morning pm.
However, he celebrates his team victory with a little tease. Once the final whistle sounded, he was immediately put on a mask with a face like Silvio Berlusconi, owner of the Milan clubs as well as Prime Minister of Italy.

Read More..

Replace Ferrara Claudio Gentile?

If Rafael Benitez so close to Turin, former Italian national coach U-21's still want to work with Juventus.By Gunawan WidyantaraJanuary 28, 2010 01:30:00
According to sources in Italy, Claudio Gentile is currently in Turin and will conduct negotiations with Juventus director Roberto Bettega.
La Gazzetta dello Sport and Tuttosport reported probably old lady as a Gentile will appoint a replacement coach Ciro Ferrara.
Although not yet confirmed, a source said the former Italian national coach U-21 that would only deal with the team until next summer.
Juventus are still struggling with a variety of plans. Liverpool boss Rafael Benitez, who votes is not the solution can be realized quickly. Juve reportedly wanted a Gentile caliber leader to rise from the slump the team and asked him to prepare the squad before Benitez close to Turin in June.

Read More..

The promise Suchao Back To Persib

Fascinated with the support of fans making attacking midfielder from Thailand were promised back grazing on Persib.By Yuslan KisraJanuary 26, 2010 21:48:00
Suchao Nutnum apparently had enough violence in the Persib Bandung, despite being with the team nickname was "Maung Bandung" terblang short enough, because only half of the season.
Because of that, he promised to re-graze on Persib next season, if only the team management Thailand Electric Power (TPE) FC, a team where he will graze after leaving Persib, gave permission.
"I promise to return to Persib next season if the team management TPE I let go," said Suchao in Thai which translates Persib his goalkeeper Kosin, found after his last fight melakoni Persib, Tuesday (26 / 1).
Ditambakan, Persib has become a second home for him. Suport and enthusiasm of the "Bobotoh" every P ersib compete makes him hope that one time back grazing with Persib.

Read More..

History of HIV ? AIDS

Want to know more clearly read his article?
click here

Read More..

Programing BATCH KNOWN TO WIND # ZE

"I do not regret one bit for not being able to know many things, but I will
very, very sorry if you do not understand a thing "
[y3dips]

BEGIN

* INTRODUCTION: This paper was made to introduce what batch file programming
, and how to create a batch file. yesterday I was not invited
learning perl, now "batch programming" .. be aware of. programming is beautiful!


Batch file programming is nothing & & no not just a batch [a] command
Commands DOS (Disk Operating System), was from here known as the
The batch. This causes Batch Programming has become so
tough (for Wind # ze Offcourse) because it gives full control
for DOS, [equivalent to * nix is a shell OPS.Syst Programing, red]

Commands used are all the commands in DOS OPS.SYS

As for the list of commands [taken from XP OPS]: for os win9xkemungkinan
not much different, to find out is to type help
at a DOS prompt.

C: \ DOCUME ~ 1 \ y3dips> help
For more information on a specific command, type HELP command-name
Assoc Displays or modifies file extension associations.
AT Schedules commands and programs to run on a computer.
Attrib Displays or changes file attributes.
BREAK Sets or clears extended CTRL + C checking.
CACLS Displays or modifies access control lists (ACLs) of files.
CALL Calls one batch program from another.
CD Displays the name of or changes the current directory.
CHCP Displays or sets the active code page number.
Chdir Displays the name of or changes the current directory.
CHKDSK Checks a disk and displays a status report.
CHKNTFS Displays or modifies the checking of disk at boot time.
CLS Clears the screen.
CMD Starts a new instance of the Windows command interpreter.
COLOR Sets the default console foreground and background colors.
COMP Compares the contents of two files or sets of files.
COMPACT Displays or alters the compression of files on NTFS partitions.
CONVERT Converts FAT volumes to NTFS. You can not convert the
current drive.
COPY Copies one or more files to another location.
DATE Displays or sets the date.
DEL Deletes one or more files.
DIR Displays a list of files and subdirectories in a directory.
DISKCOMP Compares the contents of two floppy disks.
Diskcopy Copies the contents of one floppy disk to another.
DOSKEY edits command lines, recalls Windows commands, and creates macros.
ECHO Displays messages, or turns command echoing on or off.
ENDLOCAL Ends localization of environment changes in a batch file.
ERASE Deletes one or more files.
EXIT Quits the cmd.exe program (command interpreter).
FC Compares two files or sets of files, and displays the differences
between them.
FIND Searches for a text string in a file or files.
FINDSTR Searches for strings in files.
FOR Runs a specified command for each file in a set of files.
FORMAT Formats a disk for use with Windows.
FTYPE Displays or modifies file types used in file extension associations
GOTO Directs the Windows command interpreter to a labeled line in a
batch program.
GRAFTABL enables Windows to display an extended character set in graphics
mode.
HELP Provides Help information for Windows commands.
IF Performs conditional processing in batch programs.
LABEL Creates, changes, or deletes the volume label of a disk.
MD Creates a directory.
Mkdir Creates a directory.
MODE Configures a system device.
MORE Displays output one screen at a time.
MOVE Moves one or more files from one directory to another directory.
PATH Displays or sets a search path for executable files.
PAUSE Suspends processing of a batch file and displays a message.
POPD Restores the previous value of the current directory saved by PUSHD
PRINT Prints a text file.
PROMPT Changes the Windows command prompt.
PUSHD Saves the current directory then changes it.
RD Removes a directory.
Recover recovers readable information from a bad or defective disk.
REM Records comments (remarks) in batch files or CONFIG.SYS.
REN Renames a file or files.
Rename Renames a file or files.
REPLACE Replaces files.
Rmdir Removes a directory.
SET Displays, sets, or removes Windows environment variables.
elas per-sintax/perintah, type [command] /?
example: C: \ DOCUME ~ 1 \ y3dips> echo /!
it would appear
Displays messages, or turns command-echoing on or off.

ECHO [ON | OFF]
ECHO [message]

ECHO type without parameters to display the current echo setting.

please try to learn one by one:)


* PRE Programing

Let's type in the console / command wind # ws promptnya using
command / sintax ECHO
which serves to display a message, just like printf in C & & perl

Now we will show the text Hello world: P

C: \ DOCUME ~ 1 \ y3dips> echo hello world
The resulting output is
hallo world

use the command / sintax that can be used; please try.

* Programing
If we had typed in the console / command prompt on windows and now
we'll programming by using the editor [let cool slightly]
what we need?
1. notepad
2. editor at the Dos prompt [edit.exe, I'll wear ginian easy,: p]
3. your favorite editor ..

* save the file with the name of free berekstension BAT: ex [name]. BAT
further to our discussion use the DOS let edit.exe easy:)


* START Programing
+ + use of ECHO
now we do like the above, ie print "HALLO WORLD"

open from the command prompt edit.exe
C: \ DOCUME ~ 1 \ y3dips> edit
will display an editor,
type the command: ECHO hallo world
and save the name hallo.bat

run from the command prompt
C: \ DOCUME ~ 1 \ y3dips> hallo.bat
then the output will appear:
C: \ DOCUME ~ 1 \ y3dips> echo hello world
hallo world

hmm. echo seen in the show!, therefore we
add @ in front of the command, @ ECHO
C: \ DOCUME ~ 1 \ y3dips> auedit hallo.bat
add @ to become @ echo hello world
save and execute files hallo.bat, what is obtained
C: \ DOCUME ~ 1 \ y3dips> hallo.bat
hallo world
:) More sweet is not it? without any visible echo, wah tired of typing "@" and hold in front of the echo command, for that use the @ ECHO OFF
will turn off all display kelayar echo, so that will not echo sintax
come shown,

we try:)
C: \ DOCUME ~ 1 \ y3dips> edit hallo.bat
@ echo off
echo hello world
echo eat ah
echo study continues
echo maen dunk!

save and run, it will produce the following output


C: \ DOCUME ~ 1 \ y3dips> hallo.bat
hallo world
eat ah
learning continues
play dong!

not fun, hehehhehe:): P

+ + use of CLS
we see helpnya
C: \ DOCUME ~ 1 \ y3dips> CLS /?
results:

C: \ DOCUME ~ 1 \ y3dips> cls /?
Clears the screen.

CLS

execute: C: \ DOCUME ~ 1 \ y3dips> gantinama.bat

generated if there hallo.txt files, are:

file exists
----- -------- process
replacement work

:) Cool not ...


+ + The use of ERASE: P
C: \ DOCUME ~ 1 \ y3dips> edit hapus.bat
@ ERASE hello.txt

hello.txt been destroyed ..

Read More..

Maximizing Internet Bandwidth In Windows

Basically the windows OS has limited bandwidth for Internet connection as much as 20% of the total bandwidth that should be maximal.
If we want to increase Internet bandwidth connections so that faster and faster can be a way to reduce or clear the bandwidth limitations in Windows so that we can maximum use of existing bandwidth.
Follow the instructions as below:

1. Click Start
2. Click Run
3. Type gpedit.msc
4. then click Ok
5. Once entered click Administrative Templates
6. then click Network
7. after open-click QoS Packet scheduler
8. then click on Limit Reservable Bandwidth
9. And after the open to Enable Setting
10. Then change bandwidth limit to 0
11. Click Apply, ok
12. Then exit and restart the computer

Use OpenDNS for control of the internet connection faster and more secure:

1. Click Start
2. Click Control Panel
3. Select Network & Internet Connection
4. Click Network Connection
5. Right-click Local Area Connection select Properties
6. Select Internet Protocol (TCP / IP) and Click Properties
7. Click the Use Following DNS Server
8. Fill with Preferred DNS Server numbers: 208.67.222.222
9. Fill in the Alternate DNS server with numbers: 208.67.220.220
10. Then click OK
Read More..

Cain & Abel

Cain & Abel is a very popular tool and penggunaannyapun very simple way, to suck out Cain & Abel can be taken at TOOLS topic.

The steps that must be done:

1. Install the program Cain & Abel
2. Run Cain
3. To perform sniffing action, click the Sniffer tab
4. Click the tab APR
5. Click the menu Configure - configure dialog will appear containing about some configuration tab - click the Sniffer tab - will appear to some information about the adapter, IP Address, etc. - click on a line below the last menu that contains a description of our computer IP address, MAC, etc. -- then OK.
6. Cain's active by clicking the Start button
7. So that our computers have the routing capabilities, click the Start button APR
8. Run Command Prompt
9. Communicate with the target computer by pinging the IP address the target computer, for example c: \ ping 192.168.0.2, in some cases we have to do pinging (in my experience, pinging is the fastest way to communicate with the target computer) is more than one computer , it aims to make another computer as a gateway.
10. In Cain tables there are two parts of the same bermenu Status, IP Address, MAC Address, etc.. To get started, click on the table top, then click the plus sign (Add to list)
11. New dialog will appear ARP Poison Routing. Click on the target computer IP Address in the left column and click on the gateway computer IP Address on the right hand column. Click OK

After the IP Address into the list, we are just waiting for the packet traffic is caught by Cain. To find out the results of a captured, click the tab passwords.

- How to work from Cain:

Cain & Abel poison the ARP table of the target computer so that the communication between the gateway and the target computer must go through our computers.

- Problems that are often found:

Cain & Abel is often identified as a virus by the antivirus, this is because the antivirus heuristic feature of second-guessing a file as a virus, this function aims to identify new viruses that have not been detected by the antivirus databases. However, this facility can sometimes be the "false warning" and assume certain programs, especially hacking tools as viruses, even other antivirus virus was also considered.

- How to prevent this snifing action:

To prevent this action, make changes to the MAC Address, in this type of MAC that we will change from dynamic to static. Way: c: \ arp-s [IP Address] [MAC Address] and to restore to its original state, change the attribute-s to-d

Read More..

KeyLogger Function

What if we lost a laptop? and what should we do?
The first way we can:
1. Asked mbah shaman
2. Police
3. Buy new
4. Install CCTV
5. Crying all night
This ridiculous that we do when as the above, as saying that we in the IT people will understand everything about IT (not what - what little too much) we should not do like the example above. Well
Story from the experience temen - temen maen me who likes games with their cheating
IT as a child I did not receive the treatment with their cheating on me hence I started looking about - guess what I can do to repay them?
It's show times, without thinking I take modemku and switched computer for browsing bututku ria in a while I get a good article on the site in which http://www.xxxx.com menjelsakan what keylogger
First I do not believe with all that but WOW will work well kok wah - wah I was too excited about the story well
Ok I'll explain now
What Is KeyLogger
Keylogger is a kind of tools used to pry people like mothers - women who like to gossip.
Type - type Keylogger
There Keylogger 2 forms, namely software and hardware. Both have different characteristics but one purpose, as well as Indonesia, although different - different remains one

Now we'll know a few types of keylogger software versions:
a. PC Spy Keylogger
b. Invisible Keylogger
c. KGB Keylogger
I think enough to sample the product this keylogger, ok I will take the first example for the PC Spy Keylogger, the following
Now we will know the next version of Keylogger Hardware:
Some providers of diversified hardaware keylogger can be found at the following sites:
1. www.keyhost.com
2. www.keykatcher.com
3. www.amesisco.com
4. www.keyloggersdirect.com
Which will make the question, how well to buy a tool - this tool?
Maybe it could range from U $ 100 more. The disadvantages are as follows:
a. Easy on the detection
b. The most expensive was clearly
Well perhaps only the explanation of much for me and I want to write too tdak more detail in because of fear even in use for this - it is not good


The following example script keylogger antidote:
Example programs made here is a simple example. I use the Visual Basic programming language. Easy to understand but, sangking easy until now nobody can also create sophisticated applications through this VB ... hiks ... Everyone deals with the language much more difficult to reply, in fact the output is much better when made with VB (for easy time yah). For me the problem is easy or not depends on what the output. Why should the way marnok learn to America ...
Let us direct to manufacture yah ...
1. Open the Visual Basic Designer you (I pake v.6)
2. Add a TextBox control, then give the value of the property "Name" to "txtPassword"
3. Log into the form code window, fill in the following source code:

'<- START CODE ->'
'*********************************************
'EXAMPLE OF ANTI KeyLogger TO VISUAL BASIC'
'**********************************************

'FOR EXPLANATION OF THE FUNCTION API, JUST FIND THE INTERNET:)
Private Declare Function VkKeyScan Lib "USER32" Alias "VkKeyScanA" (ByVal cChar As Byte) As Integer

Private Declare Sub keybd_event Lib "USER32" (ByVal bVk As Integer, ByVal bScan As Byte, ByVal dwFlags As Long, ByVal dwExtraInfo As Long)

'Function For Creating Value From Interval Certain Random ....
Function RandomNumber (ByVal LowerBound As Single, ByVal UpperBound As Single) As Single
Randomize Timer
RandomNumber = (UpperBound - LowerBound) * Rnd + LowerBound
End Function

Private Sub txtPassword_Change ()

TxtPassword.Locked = True '<== Deliberately not Let Food Resource Many
LoopC As Byte Dim i As Byte

LoopC = RandomNumber (3, 254) 'Create a Random Value From 3 to 254

i = 0

'A lot of Keyboard Random Event Delivery Every time Type ...
Do While LoopC> i
'Send Event Keyboard Disrupting Let The Random Value Which Arrested Keylogger
Call keybd_event (VkKeyScan (RandomNumber (32, 126)), 0, 0, 0)
i = i + 1
Loop


DoEvents' love the opportunity of other programs work:)
TxtPassword.Locked = False
End Sub
'<- END CODE ->'


Run ... you will see will look as follows:

Figure 1. Application Monitoring Anti Keylogger
Feel free to experiment with a keylogger. Oh, yes I downloaded from the site one example of a simple keylogger that you can download also shared the concerns of all of this article. Sample output is:

Figure 2. Keylogger application with the watchful eye.
From here you can see, we made the application (Figure 1) I enter it only 3 characters. However, strangely the keylogger (figure 2) gives the results of monitoring more dar 3 characters. Well, I think you already understand the algorithm of the source code above. Yup! Exactly, it was not the keylogger culprit but we were intentionally to outsmart keylogger keyboard capture the actual event we do not make but made by the program and the keyboard event is not issued in the position of the text blink in memory but that will be used in programs that use this case keylogger it means he's caught !!!.... well ... hmmm confused
Well, suppose my password is "IDA", and will fill the application form input (fig. 1). First of all when I press the letter "I" on the keyboard. keylogger will receive the output of typed letters plus typing letters sent by the program that we created with the form and the random number. Similarly, when I type the next letter is "D", and so on. See the following formula:
Output Keylogger = (One character is typed) + (character created by the application program randomly Random X Value)
X = times / total
If'm so ... Certainly, the growers will keylogger confusion given the results of monitoring keylogger. huehueheueheue .. kapok let anyone prankster who used keylogger to steal the rights of people .... Finally wueeekkk ... maybe not quite this article also explains about the security concerns of this keylogger. Well, the advice I learn. Because if you just read it, and hold not developed ... I give the same but you put your seeds in dry soil. Useless ... I want a friend - can be a great friend of all. Amen. .

Read More..