Monday, July 25, 2011

Windows XP will be dead on April 2014


Oops, no longer my computer can not be used again, I must be ready to auction it off, well and I'll think about it for a step forward, for my computer which has helped me in the surf.
Here's the story.

Although Microsoft had claimed will extend the life of Windows XP until 2020, Microsoft is now more incentive to encourage users to switch to Windows 7.
Because the version of this OS will actually dies in April 2014.

Community Manager for Windows Stephen Rose said many third-party software providers are reluctant to extend support to their applications in Windows XP.
That is, risk and complexity in dealing with the larger XP users.

Companies are still using this OS also must spend more to cost management.

Ooo that's the reason, well, I'm also getting ready to auction off my Windows XP, and replace it with Windows 7.
Good-bye Windows XP for the year 2014.

Saturday, July 23, 2011

Motivation Training : Asma Nadia, the most productive young Author in Indonesia

Asma Nadia is one of the most productive young writer in Indonesia today. within 6 years he has written 32 books, 18 anthology book s, and supervising more about 150 books. Not just a prolific, his work also gave birth best seller books. At least more than 500,000 copies of her books scattered across Indonesia, an extraordinary number for authorship in Indonesia. Asma Nadia has received seven national awards in the field of authorship, as well as invited in various international forums, including: Korea, Egypt, Malaysia, Hong Kong, and Brunei Darussalam.



Do you know what was Asma Nadia said When she first time asked to write?
"I'm not sure I could write, I'm not sure I'm talented!"
Then when it Asma Nadia convinced that he could write, until he finally try and achieve success.
What lessons can be drawn:
Lots of people do not realize her potential skill, but when they try and develop, in fact, their skill developing tremendously.

Motivation Training : Oprah Winfrey, the Queen of Talk Show in the world.

no exaggeration to say that Oprah Winfrey is the Queen of Talk Show in the World. Hundreds of the world's most important person is ever been a guest on her show. if other hosts can be proud of interviewing special important  people, oppositely most of the important people precisely of pride if invited by her. so much influence that Oprah Winfrey's is in the television world even a world of gossip commentator said:
"On television, there are three people that should not be insulted, Muhammad, J ****, and Oprah Winfrey"
What a great public trust her, and all originated from the Talk Show,
Now, Oprah became the world's richest female celebrity with a net worth reached $ 1.5 billion (Rp 13.5 trillion).



Did you know, what Oprah said when offered to be a host at her first talk show?
"I am a journalist, how could I host the talk show!"
What lessons can we take:
Even an Oprah, the biggest TV show host, was not previously aware of his outstanding talent in the field of talk show, so she hesitated to accept the offer tobe a talk show host. sometimes other people can see the our potential better than ourselves.

Thursday, July 21, 2011

Harry Potter 7 : The Deathly Hallows-part 2 has just been released

Watch the Harry Potter Deathly Hallows Part 2 Trailer


Harry Potter and the Deathly Hallows - Part 2, is the final adventure in the Harry Potter film series. The much-anticipated motion picture event is the second of two full-length parts. In the epic finale, the battle between the good and evil forces of the wizarding world escalates into an all-out war. The stakes have never been higher and no one is safe. But it is Harry Potter who may be called upon to make the ultimate sacrifice as he draws closer to the climactic showdown with Lord Voldemort.


Harry Potter stories at this time is The Deathly Hallows Part 2 was amazing. Snape is in charge of Hogwarts, school of magic, act arbitrarily against all the inhabitants of Hogwarts. no one dares to fight against Snape. as well as Professor McGonagall, she was not able to move slightly anything. Meanwhile, Harry Potter was saddened by the death of Dobby, the house elf who has been independent for the help Harry Potter, still have to find all the remaining Horcruxes. Harry Potter  had to get Horcruxes to be destroyed. because it is the only way to kill Lord Voldemort. In the confusion to find another Horcrux. Finally, Harry got the idea to call Griphook, a former employee at Bank Goblin Magic Gringots. because Harry Potter thought it was weird. the sword of Godric Griffindor is in the locker of a follower of Lord Voldemort, namely Bellatric Lestrange, as in telling people.



in this story, there is a unique story in which Snape was a Death Eater, was having an incredible loyalty to previous Hogwarts headmaster Albus Dumbledore. not only that, Snape turned out very, very dear to Harry Potter. what happens next .... in the sequel to Harry Potter this time, all will be revealed ... It all end here ...
based on a clue obtained by Harry Potter "only one can live" and "I open at the close"

to get the download link of the Harry Potter and the Deathly Hallows Part 2 movie, just request it in the comment below..

Wednesday, July 20, 2011

Current Top 10 Hackers



Basically Hacker is a term for a person or group of people who contributed usefully to the network and operating systems in the world, make the assistance programs and networks for world. They, Hackers, can also be categorized a job being done to find the weaknesses of a system and provide ideas or opinions that could correct weaknesses in the system they found

But, just a lot of hackers who use their artificial network program to do something negative, such as stealing account passwords, break into the security key of a site, and others. And even now, the general image in the eyes of hackers actually viewed as a criminal in the cyber world. And it is undeniable that the hackers' brain is great smart. Especially in today, more and more hackers are competing to be the best

Here is a list of 10 best hacker in the world today:

1. Kevin Mitnick
Kevin is the first hacker whose face was plastered in posters of "FBI Most Wanted." Kevin was also a "Master of Deception" and has written a book entitled "The Art of Deception". This book explains the various social engineering techniques to gain access into the system.

2. Linus Torvalds
A real hacker, develop the Linux operating system which is a combination of "Linus MINIX". Linux operating system has become the operating system "standard" of hackers. Together with Richard Stallman with the GNU-Linux build its initial version and collaborate with programmers, and hackers around the world an also developpers to develop the Linux kernel.
3. John Draper
2600Hz Inventor of the single tone using a plastic whistle that was a gift from the box sereal. He is a pioneer of the use of 2600 Hz tone and is known as Phone Phreaker . 2600 Hz tone used as a tool to make a free phone call . In the development, tone 2600 Hz is no longer made with a plastic whistle, but uses a tool called "Blue Box".

4. Mark Abene
As one of the "Master of Deception" Fiber optics, inspiring thousands of teenagers to learn the phone's internal system state. Mark Abene is also named as one of 100 people a genius by New York Magazine.
Using Apple computers, Timex Sinclair and Commodore 64.
His first computer was a Radio Shack TRS-80 (trash-80).

5. Robert Morris 
A son of scientists from the National Computer Security Center, which is part of the National Security Agencies (NSA).
First wrote the Internet Worm was so momental in 1988. He infected thousands of computers connected in a network.


6. Richard Stallman
One of the "Old School Hackers", working at the Artificial Intelligence lab MIT. feeling disturbed by commercial software and private copyright. the GNU Akhirnya establish which stands for GNU NOT UNIX. Using very first computer in 1969 in IBM New York Scintific Center at the age of 16 years.

7. Kevin Poulsen
Commit fraud against the digital radio station KIIS-FM, ensuring that it is the caller to the 102 and won the Porsche 944 S2.


8. Ian Murphy
Ian Muphy was along with three colleagues, hacking into the AT & T's computer and compose its internal clock-setting. it had led to public telephone users get a "midnight" discount  at the time of the afternoon, and people who had to wait until midnight, paid the high bills .

9. Vladimir Levin
Graduated from St. Petersburg Tekhnologichesky computer University. Cheating CitiBank and profit 10 million dollar. Arrested by Interpol at Heathrow Airport in 1995

10. Steve Wozniak
Build an Apple computer and use the "blue box" for its own sake.

Thanks to : ioobee.blogspot.com

Apple and Android Threat Vulnerable Cyber Criminals

SAN FRANCISCO - Syamntec CEO, Enrique Salem said that the application for smartphones and tablets become a new threat for all sorts of attacks that usually attacks the computer.
Applications available from Apple at the App Store and Google on Android Market are vulnerable to attacks by hackers who want information placed on handsets and tablet computers.

"It's very difficult for Apple and Google. Because the threat will occur in the future. Although it is still too early to call a mobile security threats," said Selam, as reported by Bloomberg on Thursday (02/05/2011).


Symantec, the biggest security software maker, could spend as much as USD 860 million more to help the expansion in mobile phones. The company is also looking for targets in the cloud services, or the delivery of computing over the Internet, and virtualization, software that helps servers run more efficiently.
The company is shifting its focus as a surge in demand for smartphones, tablets and cloud computing, while businesses and consumers limit the purchase of personal computers.





In addition, Salem is also said that for Apple users, the threat does not end with mobile devices. Mac laptops and desktops will increasingly become the target of malware as they gain popularity.
Tom Neumayr, Apple's spokeman, had no comment about the prediction CEO of Symantec. The same was done by Gina Weakley, a Google spokewoman, did not immediately respond to requests for comment.

Thanks to Okezone.com

Tuesday, July 19, 2011

This is the User Interface of Windows 8

SAN FRANCISCO - Microsoft is fulfilling his promise to demonstrate the operating system Windows 8. Then what kind of the interface of the owner of giant software ?

By Microsoft, the user interface of Windows 8 is to cover the gap between conventional PC users, with user-based tablet that much more on the touch screen. The company is clearly aiming to create a new OS into a friendly touch screen, by presenting a large button on each application.

Launched by the Tech Report, Thursday (5/2/2011), pull the video also revealed that the developer would get the Windows code 8 to run applications using HTML5 and JavaScript. It will blur the distinction between local software and web applications.

It also the user interface of Windows 8, is also featuring the Metro design used on Windows Phone. The user interface displays the hours and days, including the iconic power management and ease of access to applications.



Unfortunately no further details about Windows 8, which indeed is merely a demo video. Including when the final version will be released soon, although there will likely be presented in 2012 by Microsoft.
Here are a few aspects of the new interface we showed today:
• Fast launching of apps from a tile-based Start screen, which replaces the Windows Start menu with a customizable, scalable full-screen view of apps.
• Live tiles with notifications, showing always up-to-date information from your apps.
• Fluid, natural switching between running apps.
• Convenient ability to snap and resize an app to the side of the screen, so you can really multitask using the capabilities of Windows.
• Web-connected and Web-powered apps built using HTML5 and JavaScript that have access to the full power of the PC.
• Fully touch-optimized browsing, with all the power of hardware-accelerated Internet Explorer 10.



Scientific Linux 6.1 Alpha 2

Troy Dawson has announced that the second alpha release of Linux, Scientific 6.1 distribution built by compiling the source packages for Red Hat Enterprise Linux 6.1, is ready for testing: "The second alpha release for Scientific Linux 6.1 has been released All. Packet has been through more testing. There some packages that we're investigating, so we are still in alpha stage and not alpha 1 beta Changes:. redhat-logos-updated syslinux-splash.png and plash.xpm .. gz, adding SVG files into the source tar ball; yum auto-update - fix security problems with the configuration file tmp; added our changes to the report be updated and the package plymouth; mksh - we get it to compile; fence-virt - has to be recompiled with the old QMF packages removed from the repository; elrepo-release updates to the latest version ...."
Scientific Linux is a recompiled Red Hat Enterprise Linux, co-developed by Fermi National Accelerator Laboratory and the European Organization for Nuclear Research (CERN). Although it aims to be fully compatible with Red Hat Enterprise Linux, it also provides additional packages not found in the upstream product; the most notable among these are various file systems, including Cluster Suite and Global File System (GFS), FUSE, OpenAFS, Squashfs and Unionfs, wireless networking support with Intel wireless firmware, MadWiFi and NDISwrapper, Sun Java and Java Development Kit (JDK), the lightweight IceWM window manager, R - a language and environment for statistical computing, and the Alpine email client.





 Download:
SL-6-i386-2011-06-23-Install-DVD.iso (3,609MB, SHA1),
SL-6-x86_64-2011-06-23-Install-DVD.iso (4,187MB, SHA1).

Thanks to distrowatch.com

Saturday, July 9, 2011

Free Download IDM 5.18 build 8 Portable



Now is a little difficult to find a download manager application that is portable. Well, this time you can download the IDM (Internet Download Manager) version 5.11 Build 8, which is portable for free.

Internet Download Manager is quite popular among the public. For those of you who do not know the function of IDM, the following explanation.

Internet Download Manager is an application that is enabled to download various files from the internet, advantages such as application donwload other manager, that is not damaging files (could go back) when the files being downloaded has not been completed, and you turn off your pc / laptop then if you restart the pc / laptop, you can return it to continue downloading your files.

Portable Internet Download Manager can you put in your flash. In fact not only the flash, you can put it in storage media devices, such as memory cards, portable hard drives, and other devices.

If you want to download it please click here.
Related Posts