Wednesday, June 18, 2008
Tuesday, June 17, 2008
DIVShare Got Hacked last night
Thanks for being a part of DivShare. Late last night we were alerted of a security breach that allowed a malicious user to access our database, which included user e-mail addresses and other basic profile information. No financial information has been accessed by any unauthorized parties. We have taken extreme measures to secure the site in the last 24 hours and are currently in the process of rolling out new security precautions, which is why many files were unavailable earlier today. We apologize for this inconvenience and for the oversights that allowed this security breach to take place. We take the security of all data and files very seriously and are embarrassed and regretful that an intrusion was allowed to take place on our watch.
Please rest assured that no financial information whatsoever has been compromised. While we are not aware of what data has actually been accessed or copied, the database included user e-mail addresses and other data you may have saved to your profile, such as your first name. We are not aware of any files being accessed without permission, but we recommend that you change your account password and the passwords on any private folders as a security precaution.
We can’t apologize enough for allowing this breach to take place. We know how important security is for all our members and their files, and we are taking every precaution available to ensure that this doesn’t happen again. We ask for your patience as we roll out new security upgrades in the coming days, and we pledge to keep your files and user information under the tightest security possible from here on out.
Please don’t hesitate to contact us at support@divshare.com with any questions or concerns.
You see what i mean? so change your pass now, if you are one of divshare member and use same pass for another account.
Firefox aims for download record
So far Mozilla has not said exactly when on 17 June the attempt to break the record will begin. Firefox first appeared in early 2004 and since then has steadily eroded Microsoft's hold on the web browsing world.
"There is actually no record for the greatest amount of software downloaded in one day, so for 24 hours from the moment we push the bits live, that's when the countdown starts," he said.
Mr Kim said Mozilla had no specific target for the number of downloads it would like to achieve on the day but racking up five million would be "awesome".
By comparison, Firefox 2.0 registered 1.6 million downloads on the day it was made available on 24 October, 2006. More than 1.3 million people have pledged to download the new version on 17 June.
WEB BROWSER STATS
- Internet Explorer - 83.27%
- Firefox - 13.76%
- Apple Safari - 2.18%
- Opera - 0.55%
- Netscape - 0.14%
Source: OneStat
Friday, June 13, 2008
Domain cost
But is it going to be worth it? And where do you stop with the combinations? .com, .co.uk, .info and then there's the 'do I add a dash ( - ) just-to-be-on-the-safe-side.com, .org, .biz' ? I would say, probably not. The .com brand is so widely known that most people will automatically type in a .com extension on any website they are trying to find.
Private Registration
This option will keep your private details, name, physical address and email address unavailable to anyone checking the ownership of your domain on "Whois". Internet law requires that all information about domain registration be publicly available and "Whois" maintains the databases that hold this information.
If you buy a private registration, your details will not be available to just anyone who wants to check your domain for specific ownership. There are many domain owners who don't think this is necessary but, on the other hand, private registration can help you avoid spam, crank emails and unwanted phone calls.
It is worth bearing in mind that any emails you send from the US that are commercial in nature, like:
i) Promoting a product or affiliation
ii) Suggesting that the reader visit your sales page
iii) Offering a discount for purchasing some product
are required, by the US Can-Spam Act, to have your correct, physical mailing address visible to your email recipients and the correct email address you sent the advertisement from, so this kind of defeats the object of private registration in some ways.
Protected Registration
This form of domain registration protects you from inadvertent expiration of your domain registration, including credit card expiration, failed billing or outdated contact information. It also makes it more difficult to accomplish most malicious domain transfers by Internet predators. Effectively, your domain would be held for you until you renewed the registration.
It can cost more than $25 a year for this service, depending on who you are using for this protection. If you are a small marketing venture, selling a piece of software, an affiliate product or an ebook on a niche product, you may not need this upsell. However, if later your domain starts making lots of money, and you decide that you do need it, you can easily add it.
Business Registration
This level of domain registration keeps need-to-know information about your business in the Whois database. That information can include a map to your store, website photo, business description, phone number and links to vital pages of your website.
The vital information your customers might need to facilitate business deals with your business is visible to millions of searchers in the Whois domain name database.
Do you need it? That would depend on the nature and size of your business and your budget. This would be more of a marketing/budget decision. A small, start-up website selling one ebook would probably not need this additional service.
Buying expired domains
Let us say that you have found a series of niche keywords on parenting keyword. Now, if you want to buy some expired domain names based on this special keyword, you will need to ensure that the chosen keyword can convey a distinctive and special corporate branding ability.
The selected expired domain name should not only have a good searching placement in many major search engines, it should also be memorable and easily recalled. To establish branding with the selected expired domain name, you may consider the following salient points:
a) Choosing a keyword that relates to everyday experience and feelings could be an intelligent thing. For example, BabyFeeding or BabyHealth can instantly create a good rapport between a mother and her child.
b) Choosing a keyword like MasterDegree will appeal to all those studious people, who wish to pursue their master degrees. Here, the selected keyword connects the inbuilt feelings of people with that of the expired domain name.
c) A keyword that is easily searchable is better than the one that is almost impossible to remember and search. For example, a keyword like MyFavoriteSoup is quite inferior to MySoup.
Establishing a brand and a corporate identity over your chosen expired domain is very difficult and time consuming. However, with careful planning and by applying your intelligence mind, you can buy an expired domain that will allow you to create a special brand and niche web portal.
Yahoo and his New partner: GOOGLE
The news disclosed Thursday caused Yahoo! shares to plunge 10 percent as investors abandoned hope that Microsoft would renew a nearly five-month quest to buy the Sunnyvale, California-based company.
Thursday, June 12, 2008
World Cyber Games 2008 Begin
On 11 Juni 2008, The biggest competition will Begin At Jakarta Convention Center, with the PT. Telkomsel dan Samsung as the main sponcore, The winner will be send to the singapore on august. They wil playing game DoTA All Stars, HALO 3, Guitar Hero 3, Virtua Fighter 5, Need for Speed: Pro Street, dan FIFA 2008.
So are u interset?
Find A Proxy For Facebook
Proxies allow you to surf the internet with a high level of privacy, security and anonymity. When you access a website from the proxy server site, information like your browser type, location, operating system and IP address is eliminated and the proxy server website is recorded as the accessing computer instead of your computer. This helps you maintain the privacy, security and anonymity you desire, as it facilitates web browsing without your information being identified and bypasses the network filters and firewalls.
When you use a proxy server, your computer establishes connection with the proxy instead of the destination website, and thus the blocking or filtering firewall will be able to trace this connection only. Further this proxy server, which may be transparent or anonymous, will create a connection to the desired URL which you want to access such as Facebook.com, and retrieve that website, eliminating any trace of your computer.
The proxies allow users to browse through the Facebook website, profiles, post comments, blogs and surf the site for music. Sometimes, you may be required to use the IP address of the proxy (i.e. http://222.12.1.1), instead of the domain name, which can be retrieved by pinging the URL from command prompt.The process is very simple and convenient. You are not required to install or download any software to browse the blocked sites. All you have to do is type the desired URL (for example: www.facebook.com) on the main page and all connections and traffic to and from the destination URL is redirected via the proxy, making it look as if the traffic is evolving from the main proxy, thus bypassing the domain based URL filtering blocking system.
These proxies allow you to access any website without revealing your personal information, surf, download games and news, access online social networking websites and shopping sites, share videos, music, chat and a lot more.
Online Business is this safe?
The steps you can take vary from the most basic to the more advanced, which you will probably need help to achieve. Make sure you have the right anti-virus and anti-spyware software in place to protect you and perform your updates and scans on a regular basis. Make sure you have a secure firewall as well, since this will also help protect your data. If you employ a lot of people it is wise to make sure they are aware of the need to protect the business in every possible way. Don't assume that everyone knows what to do because not everyone does. It only takes one person opening an infected attachment on an email to cause havoc and lose you business as a result.
There is something of an assumption that hackers are only after personal information, but that isn't always the case. Some businesses have been the victim of hackers who have used their systems to distribute spam emails by the thousands, for example. If this happened to you, you can bet it would effectively shut down your website until the problem was sorted. Pure Hacking helps protect your Internet security by providing world-class penetration testing and ethical hacking risk management services. For a free consultation, please visit Penetration Testing.
Tuesday, June 10, 2008
The New Route to an American War with Iran
Initially, limited air attacks on Iranian military targets may not prove to be unpopular in the United States. Outsiders rarely grasp that hostility to Iran's revolutionary Islamic government is almost as deep-seated in many parts of the United States as hatred of the American 'Great Satan' is among much of the Iranian people. This is hardly surprising given that the Islamic Republic of Iran is the only country in the world which has humiliated not one but two US presidents: Jimmy Carter over the Tehran hostages crisis in 1979-81 and Ronald Reagan in the Iran-Contra affair of 1986-7.
Even many Congressional Democrats would no doubt be ready to support limited air strikes on Iran if the Iranians could be plausibly linked to incidents in Iraq in which American personnel had been killed. Whatever their reservations about the Iraq war, both Democratic presidential contenders, Hillary Clinton and Barack Obama, have been noticeably bellicose in their comments about Iran.
Once air attacks on Iranian military targets have begun, they would no doubt become a regular occurrence. American and world opinion would quickly become used to them, familiarity soon blunting initial outrage in most quarters. Like the intermittent Anglo-American air campaign against Saddam Hussein's Iraq during the 1990s, the air strikes on Iran would eventually seem unremarkable. Even Operation Desert Fox in December 1998, a series of major air attacks on Iraq in retaliation for Saddam Hussein's expulsion of UN weapons inspectors, excited only limited international indignation.
Not only would people become used to air attacks on Iran, lessening likely hostile reaction to a shift to nuclear targets, but the attacks themselves would prepare the way for later strikes on nuclear sites by steadily destroying Iranian defences. Anti-aircraft batteries, radar systems, and command and control facilities would have to be destroyed to ensure the safety of US aircraft hitting IRGC 'terrorist bases' however 'limited' the initial air strikes were said to be.
Once Iranian defences have been sufficiently degraded and diplomatic attempts to curb Iran's nuclear ambitions have failed, as they probably will, the Bush administration can easily switch to attacking Iranian nuclear sites in the knowledge that such attacks will provoke a much reduced level of international outrage.
Although most scenarios see the excuse for US air attacks on Iran as being an incident in Iraq involving the deaths of US ground personnel caused by Iranian weapons and/or forces, a maritime incident might have advantages for the United States. The most feared Iranian retaliation in the event of an American attack on the country is an attack on tanker traffic in the Strait of Hormuz which would send world oil prices rocketing into the stratosphere.
If a maritime incident set off hostilities between the United States and Iran, American naval forces in the Gulf could immediately seek to repeat their success in Operation Praying Mantis back in April 1988. On that occasion US forces crushed Iranian naval power in less than twenty-four hours.
Most large surface units of Iran's navy are obsolete, but in recent years Iran obtained three Kilo class diesel attack submarines from Russia. US naval commanders have expressed concern about the threat posed by these vessels to Gulf shipping and they will no doubt welcome the opportunity to destroy them as soon as possible.
Of course the Iranians have so far done their best to avoid provoking the Americans. The arrest of the British naval boarding party in March was a local IRGC initiative and the incident was soon brought to a close by the Tehran government before the Americans could exploit their ally's difficulty as an excuse for war. If a suitable incident does not arise soon, Bush and Cheney may have to create one to justify their planned attack on Iran. Perhaps US naval vessels will be sent into Iranian territorial waters in the hope of provoking a violent response. This was what was done in the Gulf of Tonkin in 1964 and resulted in the famous 'incident' which led to full American participation in the Vietnam War. Will the American Congress and people fall for the same trick a second time?
Getting SSH Proxy to Work Under Vista
and grabbed a copy of FoxyProxy for Firefox so that your proxies do the right thing on demand. All is well, except you're constantly getting "Empty return from Server" or "The proxy server is refusing connections", and now you're starting to really think hard about installing XP. (Granted, you probably should, but let's assume that's not an option.)
Well, turns out that Vista is again being "helpful". (i have a long standing hatred of things that are "helpful" because they usually just get in the way. While this can be cathartic when driving steam rollers, it's often less so when you're working on software.)
First, the proxies. Chances are VERY good that this is enough to get you going: You need to use127.0.0.1
as your localhost address rather than localhost
.This is because Vista "helpfully" configures IP6 above IP4. (IP6's version of "localhost" is "::1:", but i'm pretty sure that putty will choke on that.)
Change your Proxy Host Name and things should work just fine.
If not, you'll need to punch a hole through your local firewall for that port. (thanks to The Great FB who provided that tip). To do that, you'll need to go to your Control Panel (seriously, switch to classic view. You're not an idiot.), Windows Firewall, then click on the Allow a program through Windows Firewall on the left side. (this will bring up the Settings/Exceptions tab) and [Add port...] Name: Proxy ; Port number: 1080 (or whatever port you're using) ; (*) TCP ;[OK]
That got me online and hopefully you too.
Wi-Fi Hacking (NEW) Tool
Wi-Fi hackers have gotten more advanced and your private information is even more at risk. The recent Black Hat conference in Las Vegas featured a demonstration by Errata Security that detailed how a hacker can use new tools to steal your encrypted cookies and passwords and then control your online sessions.
Online Casino Sites
Namely, the tendency is that female players on top online casinos comprise a substantial part of all online casino players. Besides, the point is that female players have been claiming their intention to be a factor on classy online gaming sites. Encouraged by the lower costs of broadband internet and greater access, women players are acknowledged to continuously spend more time online, respectively more time gambling than men. In tune with this current trend, online casinos are adapting to cater for the growing demographics of female players.
Top online casinos are becoming regular at providing attractive bonuses and campaigns like weekly Ladies Nights promotions. All of these offer huge prizes to attract women players focusing on particular games craps, video poker, roulette.
Casino reviews reveal that women are frequenting mainly casino sites which offer social networking. Having in mind the idea of bringing more women players to their sites, many of the top online casinos have developed Ladies Only forums.
Many of these online casino sites have even established educational portals where they have placed information which helps the new players to learn all about how to play online. Statistics shows that these best-ranking online gambling sites are regularly bringing out new attractions to draw players by putting forward high-value prizes, free games and different kinds of competitions.
Sunday, June 8, 2008
Wireless Networks Are Everywhere
Sunday, June 1, 2008
Spyware is one of the biggest threats
Spyware is one of the biggest threats to your privacy and the security of your data. It's also the number one cause of system slowdowns on computers because it uses precious system resources including RAM (memory) and hard drive space.
Malicious software may also shut down or disable your anti-virus program or your firewall program. It may prevent the normal activity of your anti-Spyware software. It may prevent you from accessing Task Manager or msconfig or regedit.
Adware programs may create new icons on the Windows desktop, task bar, or system tray. They may also create popup windows that you are unable to close. If your computer mysteriously dials the phone on its own, it may be infected with a porn dialing program.
Tuesday, May 13, 2008
Casino Reviews
There are hundreds of virtual casinos rated as top online casinos by the casino reviews articles available on the net. Those casinos offer a huge variety of appealing features and are getting more innovative in their desire to pull more online players.
Online casino games free have made the online gambling not only affordable but also easily accessible. With these free versions, the consumer requires no software as he can open the game easily and directly through browser window. This saves the labor of registration, fees as well as other expenses and thus makes the gaming fully a fun. Thus with free casino games gambling is like a video game that can be played anywhere anytime. In this way, the casino games can be spread throughout the world and can be played by those who have never touched the real casino table.
Friday, April 18, 2008
Tutorial john the ripper
Sunday, April 13, 2008
Wireless gear
about where you find wireless and what flavor of wireless you can expect to find in each device and place. Then we spend some time looking at the nitty-gritty details about the standards and certifications — explaining key concepts like 802.11 and Wi-Fi — so that you’ll understand
exactly which pieces of wireless gear work together, and which don’t. We also review the pieces and parts that make up a wireless network. If you’ve already got a wireless network in place, you can skim through this quickly it’s always there for you to refer back to if you want. Finally, we review the equipment and services you need to connect your wireless networks to the Internet. Don’t underesti-mate the importance of this step — the value of your net-works increases exponentially as they are connected to other networks.
China as top carbon polluter
Until now it has been generally believed that the US remains "Polluter Number One".
Next month's University of California report warns that unless China radically changes its energy policies, its increases in greenhouse gases will be several times larger than the cuts in emissions being made by rich nations under the Kyoto Protocol.
Unlimited Bandwidth for Blogging
For recent years blogging is one of the most up-to-date things to do when people surf in the internet; almost everyone who in touch with internet such as teenagers, workers and school kids are familiar with blog. Blog is a tool to write their journal that you want and spread it to the world via internet. Not only that, the blog’s visitor could wrote comment about the blog’s entry they feel like commenting. It means, we can interract with blog owner for the article that we read.
With http://www.thoughts.com, blogging is very easy and simple, and there are lot of blog services in the internet. Some sites provide not only blog but also upload videos and photos where we could upload our favorite photos. We could also chat in thoughts forum, or community forum, where people choose topic for the day or the week and discuss it in real time.
Blogging is a very unique way to connect with people around the world. We were able to know there are others who share a similar way of think or way of life with us. We could also share our thoughts and knowledge in thoughts forum. Hopefully we will gain more information, and in some way, it good to shape our mind.
Using Domains Expired To Make Online Profits
Other simple methods include registering your domains expired with convenient PPC and affiliate engines that provide a tiny share of income that arises out of successful sales or clicks. You can also use a good expired domain name to build a web site, develop it with good content and later sell them at premium rates to any interested parties. These are some of the simple methods that allow you to use the hidden power of domains expired to make a large pool of income. If you are careful enough in using your expired domains, you can earn a hefty profit and a sustained residual form of income.
Thursday, April 10, 2008
Domain in science
In biology, domain (also superregnum, superkingdom, or empire) is the top-level taxon of organisms in scientific classification, higher than a kingdom. Domain (or its synonyms) is the most inclusive of these biological groupings
In mathematics, a domain of a k-place relation L ⊆ X1 × … × X'k is one of the sets X'j, 1 ≤ j ≤ k
and can define to as:
- the domain of a function
- one of the domains of a relation
- an ordered structure studied in domain theory
- a ring-theoretic domain, an integral domain or a Euclidean domain — types of ring
- an open and connected set
- domain of discourse in symbolic logic
But ussualy we know domain as :
The address of a site, without the protocol, path, page or other items attached. For example, microsoft.com is a domain, however, a full URL could be http://www.microsoft.com/stuff/page.html
Saturday, January 12, 2008
Backup Your file
The least expensive devices are Iomega zip drives and disks. Zip disks come in 250MB and 100MB sizes. You must buy a zip drive designed for 250MB disks to use 250MB disks. All zip drives can work with 100MB zip disks. Zip drives come with software for backing up data to zip disks or you can copy the folder that all your data is under ("My Documents" or "Documents and Settings" to a zip disk if it will all fit.
CDRW drives can be used like a 650MB floppy disk when using CDRW disks and packet writing software that comes with the drive. The disks you create will be readable only on other CDRW drives or CDR/DVD drives that support the multi-thread standard. All drives capable of reading CDRW disks require software to be installed that supports reading CDRW disks. You should use software that supports the UDF standard (most current CDRW packet writing software does) when writing files on your CDRW drive and install UDF reader software on computers with multithread CD or DVD drives that you want to read CDRW disks. Drives with early implementations of multithread may not be able to read CDRW disks even with UDF reader software installed. Free UDF readers are available from Ahead Software and Roxio. CDRW drives may come with backup or disaster recovery software but you should look carefully at the software bundled with a CDRW drive before purchasing it.
Unlike the previous devices, tape drives are designed specifically for backing up data. They hold more data, 4GB to more than 40GB, and require running a backup program both to backup or restore files. A tape drive cannot be used like a large floppy disk. Windows 95/98/ME does not come with backup software so you must use the software, if any, that comes with the tape drive, or purchase backup software. Windows NT has a backup program that works with most SCSI tape drives. Windows 2000/XP has a backup program that works with any removable media that can be written to from within Windows (e.g. zip, jaz, CDRW) and most tape drives. Tape is the least expensive media for very large amounts of data.