Tuesday, November 29, 2011

Surgery Beauty Retouch Mode On Features Panasonic Cameras

Innovation in pocket digital cameras did not just stop at the implementation of Hi-Def video and magnitude of megapixels alone, but also in other creative features. Recent example can be found in the ranks of the latest pocket cameras Panasonic output.

Some of the Panasonic Lumix range of cameras that have been equipped with touch screen, now rely on new features related to beauty, the Beauty Retouch.

What's that mode Beauty Retouch mode? Beauty Retouch is a feature that will allow you to edit photos in an instant through the camera without the need to help the computer device. You could say Beauty Retouch mode feature is an enhancement of previous Panasonic Cosmetic mode.

The second difference lies in the completeness of this feature and how to use options. If the feature Cosmetic mode you can only do limited photo editing change the level of light dark skin color alone, the Beauty Retouch mode, you can perform a variety of other adjustments that much more complete on the face in the photo.

Cosmetic mode will be active while you record the image. While Beauty Retouch mode can only be used after the photo was taken. Beauty Retouch Mode adjustment consists of two distinct parts of Aesthetic Retouch Retouch and Make-up.

The first is the Aesthetic Retouch. Here are five adjustments that can be done, including fashion 'clear skin' that serves brighten skin tone, 'shine removal' to remove stains that appear on the face, 'whitening of teeth' to whiten teeth, 'lift up' to give effects on the cheek to make it look more gaunt, and 'eye emphasis' that serve to give effect to your eyes look bigger. So arguably, an effect that is in Aesthetic Retouch like the effect of digital plastic surgery results.

The second is a Make-up Retouch. This option consists of several make-up effects that can be added on your face. There is an option 'foundation' to give the effect of foundation, 'lip color' to provide color to the lips, 'cheek color' to give effect blusher and 'eye shadow' to give effect to the eye coloring.

This one feature is quite handy if you shoot a friend or spouse who has not had time to dress up so they will not be disappointed when viewing images with a face that is too "plain".

What to watch, make sure the appropriate angle shooting. If the images of faces taken from the side or from a rather unique angle, like from above or from below, the camera will be difficult and will even fail to deliver maximum results to dress your shot.

So, make sure the face is taken from the front so you can beautify your subject. All these features can be enjoyed on the latest Panasonic pocket camera models that have used a touch screen like the Panasonic Lumix DMC-FP7 and the Panasonic Lumix DMC-FX78.

Tuesday, November 15, 2011

Flash Decompiler Trillix 5.3.1370.0

Flash Decompiler Trillix is a feature rich and powerful SWF to FLA converter, which will help you decompile Flash movies, convert SWF elements into multiple formats and edit SWF movies (dynamic texts, hyperlinks and more) on the go without Flash Studio installed. Moreover, you will be able to extract all elements from the SWF file and save them to your hard drive in various formats. And last, but not least, is that Flash Decompiler supports batch conversion mode. You can simply leave several files to convert and go have a cup of coffee while Flash Decompiler is working. Now Flash Decompiler fully supports Flash 5, 6, 7, 8 and Flash 9!

Unique Edit SWF capabilities of Flash Decompiler let you edit sounds, images, colors, gradients, lines, texts and links even without conversion to FLA. A built-in explorer makes browsing your PC for Flash movies and adding them even for batch decompilation and conversion extremely simple. Intellectual item-by-item preview, user-friendly controls with fully-customizable interface make Flash Decompiler a feature-rich user-friendly environment for professional work.

With Flash Decompiler you can easily export SWF elements to your hard drive: Flash Video to AVI, MPEG, FLV and FLA, save sounds as WAV or MP3, images - as PNG, JPEG and BMP, texts as RTF, TXT and HTML. Flash Decompiler Trillix lets you convert the whole SWF file into FLA, or export certain Flash resources into FLA format. Flash Player EXE files are decompiled the same easy way as common SWF files. Capture SWF movies from the Internet with Flash Decompiler! Now Flash Decompiler also features 2 web plug-ins for Internet Explorer and FireFox to save Flash movies online.

Features:
• Full support of Flash 5, 6, 7, 8 and 9 including AS 2.0 and 3.0
• Extract all Flash file resources into various formats
• Extract Flash video into AVI, MPEG and other playable formats
• Batch decompilation and conversion of Flash movies
• Edit more Flash objects now without converting to FLA: images, dynamic texts, hyperlinks, sounds, colors and lines
• New scalable shining interface with ribbon bar
• Advanced built-in Flash player to preview and playback your Flash movies
• ASCII, Hex, Pi-code and common ActionScripts representation
• Detailed configuration of SWF to FLA conversion (motion tweens, library, FLA format, AS and other settings)
• Take screenshots of Flash file played
• Unique global ActionScripts search in all tasks simultaneously
• Simple and effective adding of multiple files or folders to the Tasks list
• Easily change the background color of any SWF file
• Detailed tag information panel
• Save Flash Movie in Internet Explorer and FireFox plug-ins are supplied for simple saving of SWF movies online
• The software is digitally signed to verify Eltima quality and software authenticity
• Many other convenient features for professional Flash decompilation.

DOWNLOAD

Monday, November 7, 2011

Wireless LAN Security with Ms.Windows

* Wireless LAN networks provide freedom of movement, but also require you to address security issues that are not as prevalent on a private cabling system for a wired LAN technology suck as Ethernet
* The main security issues =
- authentication of wireless clients
- confidentiality
- data integrity of wireless LAN frames.

That have 2 authentication on IEEE 802.11 Standard (WEP)
1. Open system authentication does not provide authentication. It provides identification using the wireless adapter's MAC address. Open system authentication is used when no authentication is required . (Free Access)
Process Open system authentication is

The authentication-initiating wireless client sends an IEEE 802.11 authentication management frame that contains its identity.
The receiving wireless AP checks the initiating station's identity and sends back an authentication verification frame.

2. Shared key authentication is not secure and is not recommended for use. It verifies that an authentication-initiating station has knowledge of a shared secret. This is similar to preshared key authentication for Internet Protocol security (IPSec). The 802.11 standard currently assumes that the shared secret is delivered to the participating wireless clients by means of a more secure channel that is independent of IEEE 802.11. In practice, a user manually types this secret for the wireless AP and the wireless client.
Shared key Process is

The authentication-initiating wireless client sends a frame consisting of an identity assertion and a request for authentication.
The authenticating wireless node responds to the authentication-initiating wireless node with challenge text.
The authentication-initiating wireless node replies to the authenticating wireless node with the challenge text that is encrypted using WEP and an encryption key that is derived from the shared key authentication secret.
The authentication result is positive if the authenticating wireless node determines that the decrypted challenge text matches the challenge text originally sent in the second frame. The authenticating wireless node sends the authentication result.

This is recommended for campuses.

Authentication with IEEE 802.1X (WPA,WPA2)
*Elements of 802.1X
- port access entity
- Authenticator
- Supplicant
- Authentication Server

EAP (Extensible Authentication Protocol) Overview
- EAP Over RADIUS (server)

- IEEE 802.1X Authentication Process for EAP-TLS Process for EAP(Extensible Authentication Protocol)-TLS

Conclusion if u wanna get a full security on your wireless use WPA2, because this design for enterprise network and required a radius (server) authentication. but this setup is more complicated but provided additional security (Protection against dictionary attack)

For SEtup your Router security ,u may check your ip from ipconfig
( Click Ctrl + R (Run) > cmd > ipconfig )
Copy your Default Gateway n paste into your Web Browser address,then it will brought your to setup your router ...Just change your security from WEP to WPA for a higher security protection...

Monday, October 31, 2011

How to get backlinks by doing it right Ping

I Will Share How to ping blog properly in order to get a Backlink.

Here are tips and tricks Blog with Ping On the right:

1. Using sites such as the Ping service providers
www.pingomatic.com
www.pingler.com or can search in google

2. On the column name you can fill your blog with your blog name or title of your article.
home page on the column contents with your home page url or url your article
as an example.

http://apple-hq.blogspot.com/. You can also enter a URL address where you anchored backlinks complete example:


3. Click the send button.

4. The results are immediately visible the next day. Visit the Yahoo! site address http://siteexplorer.search.yahoo.com to see the results of your ping.

7. You only need one ping to any website to which you anchored backlinks. Do not do ping times to a website where you anchored backlinks. Later olehGoogle considered spamming.
6. Congratulations you've pinged correctly and backlinks are you can.
How do I ping properly?

If you've run all of the above process and get backlinkdengan quickly, then your backlinks will be seen will be seen immediately even in a matter of hours. So do this process with careful lest you be doing the spamming.
When you are considered to make the process of spamming then your website will be jailed / banned by google and disappeared from circulation. Google your stay at the prison called the sandbox. You basutuh a very long time to get out of this prison. This also is when google kindly, if your website will forever tidaka alias received life sentences. Do not arrived. So beware.

Wednesday, October 12, 2011

Mp3 player exeze wmr (rating ipx8) and Laser pointer

ipx8 ratings on mp3 player exeze WMR means gadgets can be used while submerged continuously. Equipped capacity of 4 gb and special earphones for use in water, exeze WMR allows you to listen to 1000 songs while swimming. Certainly useful to fight boredom when (eg) you're swimming across the Sunda Strait.




Laser pointer

need to give a presentation immediately after the tsunami? Then you need a laser pointer waterproof. Jetlasers (rating ipx8) has many types of lasers and laser pointers high power waterproof. Type its top is made of titanium, hold the fall of 2 meters, and can be used continuously while submerged in water. The only problem is where to get a projector that is waterproof?

Gps garmin (rating ipx7)

Your phone may be equipped with GPS, but sooner or later the cell phone lithium battery will die. After a disaster, it may be difficult to get a place to recharge. Garmin gps receiver uses aa batteries can be replaced so easily. All types of its top has a rating of IPX7, which means it can operate even if submerged. There are many types of options, including a touchscreen Oregon 450 or a conventional gpsmap 62s. You just select your preference.

External hdd/ssd iosafe rugged portable (rating ip68, mil-std-810g)

Rugged portable after test-firing using a shotgun.

These manufacturers produce the most powerful gadgets, maybe in the whole world. Just motto "disaster-resistant hardware". Its products are more expensive and some even promising fireproof storage enclosure! Rugged portable type itself is claimed to be suppressed to 2.5 tons, fell from a height of 3 feet, submerged to a depth of 10 meters for 3 days, and soak up the chemicals for 1 hour. If protection fails, iosafe provide data recovery warranty on every product. Manufacturers are even bullet-proof demonstrating that its products. Not only strong, too fast with a rugged protable usb 3.0 connection. In fact, the price is not expensive, starting at $ 149.

Digital Cameras Panasonic DMC-ft 3 (rating ipx8, mil-std)

The most powerful pocket camera today is the panasonic ft3. This camera can be used up to a depth of 12 meters, most of the others. This camera also bear an impact when dropped from a height of 2 meters, again the most powerful of the other camera. Even so, ft3 stay slim. In fact, this camera has a built-in gps, altimeter, compass, and barometer. Ability photograph? Sophisticated. 12 megapixel sensor can even produce 3-dimensional images and video recording full HD 1920 × 1080 pixels.
create a waterproof throughout certainly more difficult because the design of the lenses should be removed. Even so, some producers are able to do so. Olympus DSLR E-5 is the most powerful available today. The camera is impact resistant, dust, cold temperatures, and water. In fact, a colleague claims to have e-5-soak it, snapped two photos, and raised it again without damage. Despite countless "rhinoceros", the body of magnesium E-5 remained mild. High-resolution swivel screen, 12 megapixel sensor, and one of the fastest AF system makes the e-5 nearly invincible in the field.

Friday, October 7, 2011

Default BitDefender Total Security 2011 Build 14.0.24.337

BitDefender Total Security 2010 Build 14.0.24.337 | 226 Mb

BitDefender Total Security 2011 provides comprehensive proactive protection against all Internet security threats, along with system maintenance and backup, without slowing down your PCs. Combines Superior Proactive Protection from e-Threats with Backup and PC Tune-up for the Ultimate in Security... that won’t slow you down! BitDefender®, a global provider of award-winning antivirus software and data security solutions, has launched BitDefender2011 – its new line of security solutions providing state-of-the-art proactive protection from today’s most damaging viruses, spyware, hackers, spam, phishing attacks, and other common Internet security threats.

BitDefender Total Security features Antivirus, Firewall, Antispyware, Privacy Control, Parental Control, TuneUp (registry cleaner, PC cleaner, file schredder, disk defragmenter), BackUp Manager for corporate and home users.
BitDefender Total Security provides the ultimate proactive protection for your PCs. It combines state of the art protection against viruses, spyware, hackers, spam and other Internet security threats. Its system maintenance and PC backup tools keep your PC running fast and protected from data loss.

BitDefender Total Security is designed for users who desire the ultimate in protection from Internet security threats and data loss, with integrated backup and PC maintenance tools to keep their PC running at peak performance. Total Security includes all of the features and benefits of Antivirus and Internet Security, as well as the following new features:
• Data backup – safeguarding data by creating backup copies to local and removable drives, CD-R/RW or DVD-R/RW
• PC Tune-up – improving PC performance by removing unnecessary files and registry entries
• Trace clean-up – which completely erases files and “traces” of files from disks to prevent recovery

BitDefender Total Security includes an enhanced feature set:
• Online Backup: BitDefender offers users the ability to backup sensitive data online to ensure it is secure if something goes wrong – like your computer is stolen or a hard drive failure. Unlike competitive offerings, BitDefender Online Backup offers incremental, versioned and differentiated backup modes to better meet customer’s specific needs.
• Increased Privacy Protection through Instant Messaging Encryption: Supporting Yahoo! Messenger and MSN Messenger, BitDefender ensures that no one can eavesdrop on instant messaging traffic between two PCs with BitDefender installed
• Increased Storage Protection with File Vault: With BitDefender File Vault, a secured storage space for personal information or sensitive files kept locally in your computer, encrypted data is stored that is invulnerable to theft or to a security breach.
• Improved Integrated Online Security: BitDefender Total Security provides users a full range of proactive protection technologies for secure everyday online activities such as banking, shopping, browsing or socializing. Web, email and Instant messaging traffic are now scanned in real-time for viruses, spyware, phishing and identity theft attempts.
• More control via Home Network Management: For home users, BitDefender provides the ability to manage the security of a home network from a single location. BitDefender software from other computers in the network can be remotely configured, while tasks such as scans, tune-ups and updates can be scheduled and run.
• Other Improvements include: an improved Gamer mode, a Laptop mode, increased performance with lower resources consumption, enhanced usability, and firewall (IDS and IPv6 support) support.

BitDefender Total Security provides comprehensive proactive protection against all Internet security threats, along with system maintenance and backup, without slowing down your PCs.

Confidently download, share and open files from friends, family, co-workers – and even total strangers
• Protects against viruses and other malware using industry-leading technology NEW
• Scans all Web, e-mail and instant messaging traffic in real-time
• Provides an unmatched detection rate of new threats based on two different proactive technologies
• Blocks spyware programs that track your online activities

Protect your identity: shop, bank, listen and watch, privately and securely
• Blocks web pages that attempt to steal your credit card data
• Prevents personal information from leaking via e-mail, Web or instant messagingNEW
• File Shredder permanently erases sensitive files and traces of files

Guard your files and conversations with top-of-the line encryption
• Instant Messaging Encryption keeps your conversations private on Yahoo! and MSN Messenger
• File Vault securely stores personal information or sensitive files
• Automatically backs up files and folders

Connect securely to any network at home, at the office, or away
• The two-way firewall automatically secures your Internet connection wherever you are
• Wi-Fi monitor helps prevent unauthorized access to your Wi-Fi network

Protect your family and their computers
• Parental Control blocks access to inappropriate websites and e-mail
• Limits kids’ access the Internet, games, etc. to specific times
• Makes it easy for you to manage the security of your network from a single location

Play safely, play seamlessly
• Reduces the system load and avoids requesting user interaction during game play

Get fine-tuned performance from your computer!
• Removes unnecessary files & registry entries, for improved performance
• Optimized scanning technology skips safe files for better scan speed and lower system load
• Antispam stops unwanted e-mail from reaching your Inbox
• Laptop Mode prolongs battery life

Let professionals solve any security issues
• Assistance with common issues built directly into the product
• Free technical support for the entire duration of the product licens

New and Improved in BitDefender Total Security 2011:
* Quick Scan. The new Quick Scan uses in-the-cloud technology for better detection and improved response time to new and unknown viruses.
* Dashboard Shortcuts. All BitDefender 2011 products enable users with specific needs—like parents and gamers—to create their own dashboard and shortcuts to frequently-used functions.
* Search Advisor. BitDefender 2011 provides safety ratings for search results and warnings about visited websites that may contain spyware or other malware.
* Smart Help. BitDefender now includes a series of personalized suggestions, warnings, and safeguards that are relevant to the recent activity performed by the user.
* Video Tutorials. Get instant support and viewing of video tutorials that take you step by step through the actions required to configure BitDefender.
* Improved Parental Control. Parents have remote access to review children's online activity and change parental control settings.
* Performance Optimizer. Detect which applications are slowing down the PC and suggests corrective actions to improve the performance.
source

Friday, August 19, 2011

IBM's experimental computer chip mimics brain

Computer giant IBM says it has developed a prototype computer chip that mimics the human brain.

IBM said last night experimental "cognitive computer chip" could eventually lead to machines that "mimics the brain's ability to perception, cognition and action."

"The chip is an important step in the evolution of computers, calculators for learning systems, marking the beginning of a new generation of computers," said Dharmendra Modha, manager for IBM Research.

"Future Applications of information technology will increasingly demand features that are not effectively delivered by the traditional architecture."

IBM said the computer cognitive, such as the human brain, will "learn through experience, found a correlation, making hypotheses, and remember - and learn from -. Results"

Roger Kay of Endpoint Technologies Associates, said IBM's "take the architecture of the brain and say 'you can do an electronic ability to mimic what we know about the brain, how the brain works."

"They did not get to the point where it's all the practical work, but, but they proved the concept" he said.

"This is a new frontier."

According to IBM, artificial intelligence, who conducted research since 1956, computer chip capable of swallowing can lead to complex, real-time information through multiple sensors and translate them into action.

For example, a cognitive computer system to monitor the water supply problem of global warning that a tsunami can use the sensor network that monitors inputs such as temperature, pressure, wave height, and acoustics.

"Making Sense of the input in real time flowing in the more confusing would be a Herculean task for today's computers, but it would be natural for the brain-inspired," said IBM.

"Imagine the traffic lights can combine images, sounds and smells and the flag before a disaster strikes a dangerous intersection," said Modha.

Until now, IBM said, he managed to produce simple applications using the prototype chips such as navigation, pattern recognition and classification.

IBM said the computer chips cognitive reproducing biological synapses, neurons and axons in the human brain using algorithms and silicon circuitry.

They have integrated memory (synapses replicated), calculation (reproduced neurons) and communication (axons answer), he said.

The "long-term goal" is to build a chip with 10 billion neurons and 100 trillion synapses, which only consumes one kilowatt of power and occupies less than two liters of volume.

For the second phase of the project, known as Synapse - or systems Adaptive Plastic Scalable neuromorphic electronics - IBM says it has joined with researchers at Columbia University, Cornell University, the University of California (Merced) and the University of Wisconsin (Madison).

IBM said the project received US21 million in new funding from the Pentagon's Defense Advanced Research Projects Agency (DARPA).

Earlier this year, an IBM supercomputer known as Watson beat two male competitors in the popular Jeopardy TV quiz show in America!

Watson, named after the founder of IBM, Thomas Watson, capable of understanding natural human speech and provide quick answers to complex questions.

Watson's last machine that was developed by IBM to challenge the human race - in 1997, the IBM computer named "Deep Blue" defeated chess champion Garry Kasparov in a match of six games.

Saturday, August 6, 2011

Internet Music Capture and Radio Recorder 4.1.6.7

Internet Music Capture and Radio Recorder 4.1.6.7

Automatically batch captures hundreds of songs from streaming play list stations.
iTunes Radio, Sky Radio, Shoutcast Radio, Digital Imports Radio, and many more.
Select by Country, Station and Style. Thousands of stations.

Features:
Capture to MP3, WMA, WAV (WAV files can be burned to CD as standard audio).
Auto sensor only starts capture when sound is heard.
Track info is added to the captured file when capturing to MP3, WMA.
Detects adverts and omits them from recording.
With Auto Stop timer and Auto Start schedule timer.
Add your own stations and create favourites list.
Easy to use software, no need to read the help file.
Extensive encoder options for MP3, WMA, WAV.
Automatically creates files correctly titled and with the artist name.
18 Band equaliser with frequency boost for playing and capture.
Includes a set of audio tools.

Pass : vndownload.org

Thursday, July 28, 2011

Pilihan Gadget Terbaru 2011

1.Aplikasi Terbaru iPad 3G PhoneitiPad


Aplikasi Terbaru iPad 3G PhoneitiPad – Kabar terbaru yang menggembirakan untuk pemakai iPad 3G yg pengin nelfon pake gadget iPad 3G bahwa untuk saat ini telah tersedia fitur atau aplikasi PhoneitiPad yang mengambil keuntungan dari adanya koneksi ke jaringan seluler dan memungkinkan pengguna melakukan panggilan dan menerima panggilan seperti halnya bertelepon. Selain itu dengan aplikasi ini pengguna juga bisa mengirim dan menerima pesan teks sms.

Aplikasi PhoneitiPad
Aplikasi PhoneitiPad ini tidak tersedia secara resmi di App Store namun dijual lewat toko aplikasi Cydia dengan harga $19.99. Oleh karena itu untuk menggunakan aplikasi ini pemilik iPad 3G harus melakukan jailbreak terlebih dahulu tablet mereka dan memasang Cydia dalam sistem repositori aplikasi di dalam iPad.
Berikut langkah-langkah yang harus dilakukan untuk memasang Aplikasi Terbaru iPad 3G PhoneitiPad ini:
1. Cari nomer seri (serial number) dari perangkat yang dapat ditemukan dari System > General > About. Catat nomernya karena ini akan digunakan sebagai identitas unik PhoneItiPad.
2. Beli aplikasi ini dengan mengunjungi http://www.iphoneislam.com/phoneitipad/ (bisa lewat komputer). Masukkan angka seri ketika diminta.
3. Jalankan Cydia dan tambahkan repositori http://apps.iphoneislam.com. Cari PhoneItiPad lalu pasang.
4. Jika langkah 3 telah dilakukan maka aplikasi akan langsung siap bekerja dan bisa digunakan untuk menelepon serta mengirim sms.

Tweak ini dikembangkan oleh iPhoneIslam yang juga mengembangkan FaceIt3GS, patch perangkat lunak yang memungkinkan pengguna iPhone 3GS memakai FaceTime. Seperti diketahui FaceTime sebelumnya hanya bisa dipakai di iPhone 4, iPad 2 dan iPod touch 4G. Tweak ini juga belum tentu bisa bekerja di iOS 5 dan membutuhkan iOS 4.x.x jailbreak. Jadi, resiko ditanggung sendiri. from Teknoup
price : $19.99


2.Spice M-6800 FLO Spesifikasi Review


Spice M-6800 FLO Spesifikasi Review – Berita gadget tentang Spice M-6800 FLO terbaru 2011. Spices telah meluncurkan ponsel touchscreen mobile terbaru yaitu Spice M6800 FLO yang super keren, untuk info selengkapnya baca artikel Spice M-6800 FLO Spesifikasi Review di bawah ini.

Spice M-6800 FLO
Spices telah meluncurkan ponsel touchscreen mobile terbaru Spice M6800 FLO, dengan 3D user interface di seluruh dunia. Spice M-6800 adalah layar sentuh 3.15-inch yang menampilkan 3D User Interface.
Spice M-6800 FLO berfitur kamera 3,2 mega-pixel, Video Recording, FM Radio, memori internal 43.8M, jack dan dukungan memori eksternal hingga 8GB.
Spice M-6800 FLO konektivitas termasuk Wi-Fi, Bluetooth, USB dan ini didukung oleh baterai 1000 mAh standar yang memberikan waktu bicara 4 jam.
Spice M-6800 FLO Spesifikasi
* Dual band GSM mobile phone supports 900/1800 MHz network
* 3.1? inches touchscreen display with 3D UI and 240 x 400 pixels resolution
* 3.2 megapixel camera with digital zoom, Wide screen video recording
* Capture images up to 2048 x 1536 pixels resolution and records videos in .3GP
* SMS, MMS, Email, GPRS, EDGE, Bluetooth v2.1, Wi-Fi, IM, Social networking
* Built with 43.8 MB internal memory and supports up to 8GB T-Flash memory card
* Store up to 1000 phone book entries and 500 text messages
* Music player, Video player, FM radio with recording, Java, Preloaded with games
* Available in Turquoise blue, Jet black, Spice yellow colours
* 1000mAH Li-ion battery with 4 hours of talk time and 250 hours of standby time
* Dimensions are 107.8 mm x 53.6 mm x 12.5 mm with 91 grams of weight

Spice M-6800 FLO Spesifikasi
Itulah sedikit informasi artikel terbaru dari kami tentang “Spice M-6800 FLO Spesifikasi Review” semoga berguna dan bermanfaat. Dan bisa anda baca juga artikel lainnya tentang Handphone Acer Liquid E Ferrari Terbaru 2011 yang mungkin lebih menarik.
price : Yet to be launched in Indonesia


3.BlackBerry Bold 9930 Spesifikasi Review


BlackBerry Bold 9930 Spesifikasi Review – Informasi gadget tentang BlackBerry Bold Touch 9930 yang beritanya akan di pasarkan ke seluruh belahan dunia. Untuk info tentang fitur, review, dan spesifikasi dari BlackBerry Bold 9930 bisa anda baca di bawah ini.

BlackBerry Bold 9930
RIM telah mengumumkan produk terbarunya BlackBerry QWERTY yaitu ponsel BlackBerry Bold 9930 yang mirip dengan “BlackBerry Bold 9930″ untuk lineup Bold nya. BlackBerry Bold 9930 yang berfitur layar sentuh VGA 2.8-inch dan di umumkan berjalan seperti BlackBerry OS 7.
BlackBerry Bold 9930 berjalan pada 1.2GHz prosesor Qualcomm dan memori 8GB fitur penyimpanan, kamera 5 megapiksel dengan 720p HD video recording, Wi-Fi dan Bluetooth. Untuk info tentang harga BlackBerry Bold 9930 belum diketahui, karena belum ada kabar dari pihak RIM.
BlackBerry Bold 9930 Specification
Size:115 x 66 x 10.5 mm, approximately 130g
Display:2.8″ capacitive touch screen display – VGA (640×480), 287 dpi resolution
Keyboard:Ultra-easy QWERTY keyboard, optical trackpad
CPU 1.2 GHz Processor
Memory:768 MB RAM; 8 GB on-board memory, plus microSD slot supporting up to 32 GB cards
Camera:5.0 MP camera, supports 720p HD video recording
Accelerometer/Magnetometer Orientation Sensor (Accelerometer), Digital Compass (Magnetometer), Proximity Sensor
GPS:Built-in GPS / aGPS
Wifi: Dual-Band Wi-Fi – 802.11 b/g/n at 2.4 GHz and 802.11 a/n at 5 GHz:
9900: Tri-BandHSPA+,Quad-BandGSM/EDGE
9930: Dual-BandCDMA/EV-DORev.A,Dual-BandHSPA+,Quad-Band GSM/EDGE
Bluetooth :Bluetooth® 2.1+EDR support
Operating System:BlackBerry 7 OS
Battery : 1230 mAh removable, rechargeable battery


BlackBerry Bold 9930 Spesifikasi
Itulah sedikit informasi teknologi terbaru tentang “BlackBerry Bold 9930 Spesifikasi Review” semoga bermanfaat, untuk info tentang harga belum kami ketahui mungkin akan menyusul. Dan anda juga bisa baca artikel lainnya juga seperti BlackBerry Bold 9900 Spesifikasi Review yang mungkin lebih menarik

price : Yet to be launched in Indonesia


4. Samsung mobile galaxy S2


Samsung Mobile menampilkan jagoan barunya yang akan hadir di tahun ini yaitu Android Galaxy S2 di ajang Ajang MWC 2011, penerus Samsung Galaxy S ini memiliki Spesifikasi yaitu OS Android 2.3 Gingerbread, layar yang semakin lebar (4,3 inci), kamera belakang 8MP, kamera depan 1.3MP, prosesor dual-core 1GHz (atau bisa saja Orion 1.2 Ghz), koneksi HSPA+, Bluetooth 3.0, hingga wifi 802.11 a/b/g/n.


Selain itu juga diperoleh informasi bahwa bobotnya adalah 116 gram dan ketebalan hanya 8,49 mm

Untuk Harga Samsung Galaxy S2 di salah satu toko online di Inggris di jual dengan harga yang cukup mahal yaitu sekitar 8 juta rupiah dan mulai melakukan pengiriman Galaxy S2 mulai 4 maret kemaren.


Berikut spesifikasi Galaxy S II dari situs Samsung :

- OS Android Gingerbread
- Network: HSPA+ 21Mbps/ HSUPA 5.76Mbps
- Samsung Dual Core Application Processor
- Dimensions: 125,3 x 66,1 x 8,49mm
- Layar: 4,3" WVGA SUPER AMOLED Plus
- Memori: 1GB RAM, 16GB/32GB, MicroSD (up to 32GB)
- Kamera: 8MP AF with LED Flash + 2MP Front
- Konektivitas: Wi-Fi a/b/g/n, USB 2.0 OTG
- Video: MPEG4, H.264, H.263, WMV, DivX, Xvid, VC-1, Recording & Playback 1080@30fps
- Baterai: 1650mAh

5. LG L-03C Spesifikasi


LG L-03C Spesifikasi Review Foto – Informasi gadget terbaru 2011. LG L-03C adalah salah satu handphone yang di puji menjadi ponsel kamera yang dapat memotret foto 12MP dan bahkan memiliki XEON flash layaknya kamera nyata yang anda miliki.

LG L-03C
LG L-03C bungkus optik 3x (35-105mm) PENTAX zoom lensa yang memiliki kecepatan rana yang menakjubkan dari 1 detik ke 1 / 1500 detik tersedia untuk 5 Frame rate juga. Selain kamera itu sendiri, perangkat ini dapat bertindak sebagai unit mobile nyata dengan ukuran lebar 3 inci dan resolusi 480 x 800. Menariknya ponsel ini memiliki panel kapasitif, sedangkan anda dapat mengontrol seluruh unit seperti smartphone apapun dan memiliki slot kartu MicroSD dengan kapasitas penyimpanan maksimum 16GB.
Melihat sebuah telepon Jepang menakjubkan bukanlah alasan untuk kejutan. Bahkan sebelum kita telah melihat beberapa unit mengejutkan dari ponsel JP’s kumis, tapi masalahnya adalah mereka sama baiknya dengan spesifikasi itu sendiri dan dalam beberapa skenario metamorfik aneh, setiap kali itu di gunakan oleh pelanggan – review mencerminkan kebalikan dari bagaimana terlihat begitu baik terhadap laporan PR nya. Sama seperti apa yang terjadi hari ini.
LG L-03C Specifications:
* 3G / GSM
* 12 Megapixel camera with 3x optical zoom and xenon flash
* 3-inch WVGA touchscreen display (800 x 480 pixels)
* Supports up to 2GB microSD and microSDHC cards to 16GB
* Support features Face CCD and a TV up to 100 minutes
* Li-Ion battery 350 hours standby time and 250 minutes of talk time

LG L-03C Terbaru 2011
Itulah informasi gadget terbaru tentang “LG L-03C Spesifikasi Review Foto” semoga bermanfaat, dan bisa anda baca artikel tentang LG Thrill 4G Spesifikasi Review yang lainnya juga.

Monday, July 4, 2011

Network Security Toolkit (NST) 2.13.0-1713 x86 (2011)

Network Security Toolkit (NST) 2.13.0-1713 x86 (2011) | 1.36 GB
Network Security Toolkit - this is one of the many Linux distributions, such as Live CD, to analyze network security.NST gives administrators easy access to a broad set of open network applications, many of which are included in the hundred best security tools recommended by the site insecure.org.The latest version of NST - 2.13.0 was released in January 2011.This version is based on Fedora 13 uses the kernel Linux 2.6.34.7-56.fc13 with the desktop environment Fluxbox.
When booting from the Live CD you will be prompted to download several versions for different hardware capabilities or the required services, including the PLOP.The default option desktop / laptop, which includes all utilities NST, USB support and console.All versions require a working DHCP server, otherwise youll have to enter the network settings manually.

You can install the NST and the hard drive, but this process is not so simple.In large organizations, is absolutely necessary to continuously monitor network activity and security, so install the NST to the hard drive will be extremely useful.
By the way, the assurance of the developer when a new version of the emphasis was on visual geolocation, which is shown in the screenshots.

So, Paul Bleykenbeyker (author) made a bid to create a framework to bind to the location and display the network checks with reference to geopozitsii (for example, a map of the route of packets can be displayed through the service of Google Earth).Utility ntop expanded opportunity to show the geographical location host.Prepared by the tool for locating IP addresses of intercepted traffic to their subsequent display on the map Google Earth and the formation of a static image maps.

Among other things, users of Fedora Linux are able to install all created in the NST project experience in the form of packets.

Whats inside him?

Let unassuming appearance Fluxbox does not confuse you.Although the interface is easy and simple, but it is available from a number of powerful network tools.Of protection from network intrusions can be mentioned Kismet, Snort, AirSnort, NMAP and Wireshark.Nessus a popular vulnerability scanner, which has not been given attention in the last BackTrack release (BT3), this time is included in the distribution.Help you monitor the status of network programs such as Nagios, Argus and Zabbix.

In addition to these administrative remedies, the distribution includes also the user of the program an email client (Pooka), instant messaging client (Pidgin), Web browser (Firefox), means for processing text and graphics (ImageMagick, XPDF, Nedit and other ), antivirus (ClamAV), communication terminal (GTKterm, Minicom), Remote Desktop (VNC, TSClient) and data recovery tools (cfdisk, Partition Image).I was surprised to find in the distribution free program for GPS navigation GPSDrive.Yet included MySQL and PostgreSQL, but if you need a mail server at your service Sendmail.

To run the programs included in the NST, you can use a Web interface (Web user interface, WUI), based on AJAX and JSON, or choose from a menu Fluxbox.If you know what youre looking for, just click the right mouse button on the desktop Fluxbox menu appears with all the programs that are separated by category.For example, all image checker system vulnerabilities can be found in sub Security Applications, and common tools for the network (such as Wireshark) located in Network Applications.You can blame the developers NST Fluxbox menu that some programs are present simultaneously in different categories, for example, the application is in the sub ATerm NST WUI and Desktop Applications.

If the program does not have a GUI or console requires for its setting, NST easier to work with it by placing it in the WUI.You can choose a simplified WUI, in which programs are grouped according to the problem to be solved (sniffing, monitoring or checking for the invasion), and from the categorized list.

WUI simplifies the use of programs.When choosing a program or task, you will be shown a page where you want to select a specific script to set up or operation.If you want to change your settings, this can be done easily by editing the configuration file or by entering the command parameters.On the page of each program also has a brief description and documentation.

Additional information: The user password root nst2003.

Title: Network Security Toolkit (NST) 2.13.0 1713
Version: 2.13.0 1713
Architecture: x86

DOWNLOAD : Klik Here

Monday, May 30, 2011

Corel DESIGNER Technical Suite

Corel DESIGNER Technical Suite X5 15.2.0.661 Incl.Keymaker-COR

Corel DESIGNER Technical Suite X5 15.2.0.661 Incl.Keymaker-CORE | 807 MB | HF | FS |FSonic

INFORMATION :

Create illustrations, diagrams and technical documentation with confidence with Corel DESIGNER® Technical Suite X5, the complete solution for visual technical communications. With industry-leading file compatibility, 3D repurposing, precise drawing tools and intuitive features, it supports your entire workflow. Publish technical documentation online or in print thanks to support for WebCGM, S1000D and other standards.
Complete technical graphics suite for technical diagrams, illustrations and schematics
* A complete technical graphics suite at an affordable price
* Technical illustration and design tools in an intuitive graphics environment
* Market-leading compatibility and industry standards compliance
* 3D visualization support - open and work with AutoCAD® DWG� & DXF�, Google® SketchUp� and 3DS files
* Built on CorelDRAW® � Includes CorelDRAW Graphics Suite X5 applications
What's included
* Corel DESIGNER® X5 � precision illustration and technical design software
* CorelDRAW® X5 � creative illustration and page layout software
* Corel® PHOTO-PAINT� X5 � easy-to-use, professional image editing application
* Corel® PowerTRACE® X5 � fast, accurate bitmap-to-vector conversion tool
* Corel CAPTURE® X5 � one-click screen capture utility
* Corel® CONNECT� � full-screen browser for searching digital content from your computer, network, external storage device or online sources
* Right Hemisphere® Deep Exploration� 6 CSE � 3D visualization software
* Microsoft® Visual Studio® Tools for Applications (VSTA) and Microsoft Visual Basic for Applications (VBA) � powerful automation tools
* SWiSH miniMax�2* � easy flash animation software
* PhotoZoom Pro 2* � photo enlarger plug-in for Corel PHOTO-PAINT
System Requirements
* Microsoft® Windows® 7, Windows Vista® or Windows® XP with latest Service Pack (32-bit or 64-bit Editions)
* Intel® Pentium® 4, AMD Athlon� 64 or AMD Opteron�
* 1 GB RAM
* 1.4 GB hard disk space (1.6 GB for typical installation without content). Up to 6.7 GB needed to install extra content
* Mouse or tablet
* 1024 x 768 screen resolution (768 x 1024 on a Tablet PC)
* DVD drive
* Microsoft® Internet Explorer® 7 or higher

DOWNLOAD :

From Hotfile :
Part 1.rar
Part 2.rar
Part 3.rar
Part 4.rar


From Fileserve :
Part 1.rar
Part 2.rar
Part 3.rar
Part 4.rar

From Filesonic :
Part 1.rar
Part 2.rar
Part 3.rar
Part 4.rar

Camfrog 5.5.241 + Crack


Information :
Camfrog Video Chat memungkinkan Anda untuk berkomunikasi secara real streaming video chat room di mana Anda bisa mendengar, melihat, dan chatting dengan banyak orang sekaligus.

Dapat Menggunakan pesan instan untuk mengenal mereka lebih dahulu sebelum Anda menggunakan Webcam chat, dan menambahkannya ke daftar kontak Anda.
Perangkat lunak videoconference ini juga bekerja di belakang firewall dan router. Camfrog Video Chat memungkinkan banyak pengguna menggunakan video conference di mana Anda dapat bergabung di Room mana saja sampai dengan 1000 pengguna dan klik saja nama user untuk bisa memulai melihat seseorang untuk diajak berkomunikasi dgn webcam anda.
Anda dapat menekan tombol 'berbicara' untuk berbicara dengan mereka diseluruh Room dengan menggunakan audio.

Video chat room di-host oleh broadband, jadi para pengguna yang menjalankan software Camfrog Video Chat Room Server dan dapat mengatur setiap penggunanya.

Anda sendiri sebagai multi-user video conference juga dapat bergabung dengan teman yang lainnya. Anda tidak memerlukan webcam untuk melihat orang lain, yang ada di beberapa Room yang lainnya.

Mungkin ada pengguna yang lain tidak mengizinkan pengguna tanpa menggunakan Webcams.
Camfrog Video Chat ini telah dioptimalkan bagi para pengguna broadband sehingga tampilan videonya akan berjalan dengan lancar dan tidak terputus-putus gambarnya.

Video Chat Rooms(3009) webcam chatrooms tersedia sekarang!Melihat dan mendengar banyak orang pada suatu waktu di salah satu audio multi-user banyak / video Room juga tercantum di sini.

Dan dituan-rumahi (Server) sendiri oleh pengguna Camfrog tsb.Pengguna dengan koneksi yang cepat dapat menjadi tuan rumah (Server) sendiri dari berbagai multi-user video conference yang lain secara gratis!

Pengguna Direktori(60306) user online sekarang!Menemukan seseorang untuk videochat dengan 1-on-1 menggunakan audio live streaming dan video dengan direktori pengguna webcam secara langsung.

Melihat foto orang yang sedang online dan mencari pengguna yang menggunakan Camfrog di wilayah Anda. Sangat mudah untuk melihat mereka, jika penggunanya adalah laki-laki atau perempuan dan jika mereka memiliki Web kamera tentunya. gratis untuk chatting dan dengan menggunakan video chatting juga tentunya!.

Persyaratan Sistem yang diperlukan
* Sebuah PC multimedia dengan prosesor 1GHz atau lebih cepat, RAM 512MB, DirectX 9 atau yang lebih baru.
* Sistem operasi Microsoft Windows 2000, 2003, 2008, XP, Vista atau Windows 7

Computer Scientists Say Hackers Prey On Those Who Don't Protect Themselves

Computer scientists observe that the people most at risk for the loss of private information and other computer problems are those who create easily guessed passwords and user names. They advise creating and regularly updating complicated passwords that contain upper- and lower-case letters as well as numbers. They also recommend running regular virus checks on the computer.
If you have a computer connected to the Internet, watch out! You'll be surprised to learn how often it's being attacked by computer hackers. Ivanhoe explains how to protect yourself and your PC.

It can strike at any time and can attack and destroy your computer. A virus hit Nicole Gentile's PC with a vengeance. "It was terrible," Gentile recalls. "It destroyed most of my files." And it also left her with a mess to clean up.

"It was a horrible feeling," she says. "I felt invaded and it caused me a lot of time and money to get everything fixed on my computer."

Nicole's ordeal is common. Computer scientists now reveal that computer hackers are using the internet to attack your computer every 40 seconds! "He or she will get on your computer and then see what is interesting on your computer." Michel Cukier, Ph.D., a computer scientist at the University of Maryland in College Park, told Ivanhoe.

Hackers can use disc space on your own computer and steal credit card numbers and personal info. Computer scientists also discovered hackers try common usernames and passwords to break into computers. "If you have a weak password, it will take a few minutes for that password to be found." Dr. Cukier explains.

Consumers should avoid easily guessed usernames like "test," "guest" and "info," and easy passwords like "1-2-3-4-5-6," "password" and "1-2-3-4." Instead, use longer, complicated usernames and passwords with random numbers and upper and lowercase letters.

"You try to make something as complex as possible." Dr. Cukier says. Changing usernames and passwords more often can help guard against future attacks. Also, anti-virus software may help keep computers hacker-safe.

"I bought a lot of virus protection software for my computer, so let's hope it works," Gentile says.

Hackers also break into large numbers of unsuspecting computers to control and manipulate the computers remotely for fraudulent purposes like identity theft, to disrupt networks and corrupt computer files.

HOW DO COMPUTER VIRUSES DAMAGE PROGRAMS? There are several different ways a computer can become infected. A virus is a small piece of software that attaches itself to an existing program. Every time that program is executed, the virus starts up, too, and can reproduce by attaching itself to even more programs.

When contained in an email, the virus usually replicates by automatically mailing itself to dozens of people listed in the victim's email address book. Unfortunately, viruses don't just replicate, they often cause damage. There is usually a trigger -- a command or keystroke -- that causes the virus to launch its "attack." This can be anything from leaving a silly message to erasing all of the user's data. For example, whenever the current minutes on an infected computer's clock equaled the day (for example, at 6:27 pm on the 27th of any given month), the Melissa virus would copy the following Bart Simpson quote into the current document: "Twenty-two points, plus triple-word-score, plus 50 points for using all my letters. Game's over. I'm outta here."

WHAT ARE WORMS? Worms are a different type of infection. A piece of worm software uses computer networks and security holes in specific software or operating systems to copy itself from machine to machine. Because Microsoft's Windows platform is so pervasive, for example, many hackers design their worms to exploit security holes in those products. In 2001, the worm Code Red spread rapidly by scanning the Internet for computers running Windows NT or Windows 2000. In contrast to a worm, a Trojan horse can't replicate itself at all: it is simply a computer program pretending to be something harmless -- a game, for example -- but instead does damage when the user runs it, often erasing the hard drive.

PROTECT YOURSELF FROM COMPUTER VIRUSES:

1. Buy virus protection software and keep it up-to-date.

2. Avoid downloading programs from unknown sources; stick with commercial software purchased on CD-ROMs.

3. Make sure that the Macro Virus Protection feature is enabled in all Microsoft applications.

4. Never double-click on an email attachment containing an executable program. These will have extensions like .exe, .com, or .vbs.

5. Consider switching to a more secure operating system, like Linux.

Test Drive Unlimited Night Mod PC (2011 ENG)

Information :
Test Drive Unlimited Night Mod PC (2011/ENG)
Publication Type: license / Genre: Racing (Cars) / Simulator / 3D
Developer: Eden Games / Atari / Year: 2011 / Platform: PC
Language: English and Russian / Tablet: Not required
Size: 2.81 GB/FS - UST - US - WU /


It is time to return to the sunny tropical island, where even the palm trees they know what real speed. With the first rays of light, followed by gusts of sea breeze on the way out the ones who most appreciate the freedom - the racers. Symphony of roaring engines drowns out noise of the surf, gleaming cars go at the start, and the wizard duels begin their road game. And there, behind the finish line, there are no winners and losers. There are only those who can not imagine my life without competition ...


Night modes include:
- Night
- Fog
- Cloudless day
- Storm
- A sunny day with clouds
- Mega Pack


CD-key: 1HQG-HMTD-M3X2-6W1H

System requirements:
Operating System: Microsoft XP / Vista / 7
Processor: Intel Pentium 4 3.0 Ghz or equivalent
Memory: 1,5 GB
Hard disk space: 7,5 GB free hard disk space
Sound device: compatible with DirectX
Video Card: GeForce 7600 256 MB or equivalent



http://www.wupload.com/file/3363781/TD_Unlimited-Night_Mod.part1.rar
http://www.wupload.com/file/3364065/TD_Unlimited-Night_Mod.part2.rar
http://www.wupload.com/file/3363734/TD_Unlimited-Night_Mod.part3.rar
http://www.wupload.com/file/3363862/TD_Unlimited-Night_Mod.part4.rar
http://www.wupload.com/file/3363722/TD_Unlimited-Night_Mod.part5.rar
http://www.wupload.com/file/3363598/TD_Unlimited-Night_Mod.part6.rar
http://www.wupload.com/file/3362911/TD_Unlimited-Night_Mod.part7.rar

Sunday, May 22, 2011

Strontium Launches World’s Fastest Matrix Series SSDs and Mainstream Gamma Series SSDs in India

Strontium Technology has recently launched in India at a Press Conference in New Delhi, the new Strontium Matrix Series SSD that is claimed to be world’s fastest Solid State Drives available in up to 128-GB storage capacity ideal for faster boot up and accelerated application performance.
Based on industry-leading 25nm NAND flash memory, the new Strontium SSD Matrix Series is targeted at corporate IT and PC enthusiasts desiring a substantial performance boost over conventional mechanical hard disk drive and it delivers more performance and reliability features.

The Solid State Drives enjoys solid advantages over the conventional hard disk drives which includes:

* Fast Performance — Games, applications and files load faster, while your system is more responsive
* Compatible — Proven technology with installations on tens of thousands of systems worldwide
* Flexible use — 2.5″ form factor for your notebook or netbook needs, or use with included 3.5″ bracket for your desktop computer
* Silent operation — No moving parts means zero noise and high reliability
* Low Power — Extend battery life for notebook and netbook users
* Reliable — Over 1,200,000 device hours mean time between failures (MTBF)

Key Features of Strontium SSD Matrix Series:

* 2.5-inch form factor
* 128GB Storage Capacity
* Marvell 88SS9174-BLD2 controller
* Random read / write performance up to 40,000/50,000IOPS
* Sequential Reading Speed / Write Speed with 415/175MB per second
* SATA-6; 6 Gb/s interface
* Up to 1500 G/1ms operating shock
* 1.2 million device hours
* MLC NAND Flash chips in leading-edge 25nm design

In the same event, Strontium also launched its new mainstream GAMMA Series Solid State Drive SSD available in 60 GB and 120 GB storage capacities.

The 2.5-inch standard size Gamma SSD uses25nm MLC NAND and Sandforce SF-1222 controller and is currently available in 60GB and 120GB storage capacities with read and write speeds of 200MBps and 100MBps respectively.

Key Features of Strontium SSD Gamma Series

* 2.5-inch form factor
* 60-GB / 120-GB Storage Capacity
* SandForce DF-1222 Controller
* Random read / write performance up to 40,000/50,000IOPS
* Sequential Reading Speed / Write Speed with 200 / 100 MB per second
* SATA-6; 6 Gb/s interface
* MLC NAND Flash chips in leading-edge 25nm design

Prices: The Strontium Matrix Series solid state drive is available in India for the price of Rs. 12,500 in only in 128-GB capacity while Gamma Series SSDs retails for Rs. 6,500 for 60-GB capacity and Rs. 10,500 for 120-GB capacity.

LCD Monitor ViewSonic VA1916W 19-inch

The ViewSonic VA1916W 19-inch (40.8 cm) Widescreen LCD Monitor available in India features fast 5ms response time, an true widescreen aspect ratio of 16:10, a 700:1 contrast ratio and it offers maximum resolution of 1440 x 900 pixels with upto 16.2 million colours.
The ViewSonic VA1916W 19-inch Widescreen LCD Monitor offers several user friendly features including automatic brightness adjustment, flexible height settings, wide viewing angles for sharing content, high Contrast Ratio and wall mounting option.

ViewSonic VA1916W Widescreen LCD monitor features 19-inch (408 cm) color TFT Active Matrix LCD display with anti-glare coating, 0.283 mm Dot pitch, fast response time of 5 milliseconds, high brightness of 300 cd/m2, high a high contrast ratio of 700:1 in 16:10 aspect ratio offering maximum resolution of 1440 x 900 pixels in WSXGA widescreen format at 60 Hz with capacity to render upto 16.2 million colors.
ViewSonic VA1916W Widescreen LCD monitor’s super fast 5ms video response delivers superior picture clarity for movies and games and Ultra-wide viewing angles allows up to 170 degree viewing angles provideing enhanced images from all directions. In addition 1000:1 to 2000:1 Dynamic Contrast Ratio (DCR) provides for darker black levels and better overall front-of-screen performance.

Dynamic Contrast Ratio technology

The ViewSonic VA1916W 19-inch LCD monitor features Dynamic Contrast Ratio which auto-adjusts the brightness of screen and maximize the contrast between black and white. The Contrast Ration ranges from 700:1 – 2000:1 under DCR.

The Dynamic Contrast Ratio (DCR) technology, enhances LCD contrast ratio up to 2000:1 and also enables automatic detection of the image signal, and controls the backlight brightness accordingly.

The Dynamic Contrast Ration (DCR) technology, allows user to be able to experience lower black levels while watching darker movies or video games and in addition, due to the fact that DCR technology being able to automatically detect image source to adjust LCD panel back light, the ViewSonic VA1916W monitor consumes less power compared to conventional LCDs, which have the backlight always on.

Widescreen

As against regular LCD monitors which offers aspect ratio of 4:3 (screen width : screen height), the ViewSonic VA1916W 19-inch Widescreen LCD monitor offers expanded aspect ratio of 16:10 providing more displayable horizontal area.

ViewSonic VA1916W flat screen LCD monitor’s widescreen panoramic aspect ratio of 16:10 allows 20-inch / 43.3 cm side area allows one extended horizontal space to display and comfortably view two application windows side by side. The display area parameters are 40.8 cm Horizontal, 25.5 cm Vertical, 48.3 cm Diagonal.

For instance, one can run browse the Internet or edit document or run any application for that matter in one virtual display area while watching a movie on the right. Any movies, video games, etc, maintains the original aspect ratio, in any dusl-screen area without any cropping or compression.

The wide screen display help increase work efficiency by allowing multiple windows with increased visibility. The Windows Vista’s sidebar on the right side of the screen can displays multiple applications and allows easy access to frequently used tools.

The ViewSonic VA1916W 19-inch Widescreen LCD monitor is fully Eco-friendly and comes equipped with ENERGY STAR Program Requirements for Computer Monitors and TCO’ 03 emission standards.

Available in Silver and Black colors, the ViewSonic VA1916W 19-inch Widescreen LCD monitor weighs 4.1 Kgs.


Viewsonic VA1916W 19-inch LCD monitor Features

* 19-inch (40.8 cm) Color TFT Active Matrix LCD, Widescreen WSXGA, 16.2 million colors
* 1440 × 900 pixels native resolution (WSXGA+) at 60 Hz
* 16 : 10 Widescreen Aspect Ratio
* 5ms Response Time
* Display Area: 40.8 cm Horizontal, 25.5 cm Vertical, 48.3 cm Diagonal
* Anti-glare screen
* Dot pitch – 0.283 mm
* Brightness – 300 cd/m2
* Contrast Ratio – 700 : 1
* Dynamic Contrast Ratio : upto 2000:1
* Dynamic Color Booster
* Viewing Angle – 150 degree horizontal, 140 degree vertical
* Tilt (down/ up) – 5 / 20 degree
* Swivel ( left/right) – 180 degree Height (72mm)
* Input Video – D-sub 15-pin connector
* Horizontal Refresh Rate – 31 kHz – 81 kHz
* Vertical Refresh Rate – 55 Hz – 76 Hz
* Video Bandwidth – 25 MHz – 135 MHz
* Maximum Refresh Rate – 75 Hz
* Power Management – TCO’03 and ENERGY STAR standards
* Wall Mount, VESA FDMI 100mm x 100mm
* Power Consumption – 32W (max), 1W in Sleep Mode
* Dimensions (W×H×D) 440 x 383 x 195 mm (with Stand)
* Weight – 4.1 Kgs
The Viewsonic VA1916W 19-inch Widescreen LCD monitor is available in India for price of Rs. 13,500 with 1 year warranty. Visit ap.viewsonic.com/in/ for more details about ViewSonic monitors in India.

Friday, April 15, 2011

Folder Guard 8.0

Folder Guard adalah software security yang dapat anda gunakan untuk mengkontrol akses ke file, folder, dan Windos resources lainnya seperti, Control Panel, Start Menu, dan lain2

USB Safely Remove

Singkat aj, ni software berguna untuk mempermudah proses cabut-pasang perangkat hardware yg terhubung dengan komputer anda melalui port USB. Entah itu Flashdisk, HardDisk External, Card reader, Printer, dll.



CorelDRAW Graphics Suite X5 15.0.0.486 + (Version 15.1.0.588 Full Install )

CorelDRAW Graphics Suite X5 15.0.0.486 + (Version 15.1.0.588 Full Install )
Size : 876 MB

CorelDRAW Graphics Suite X5 : a new graphics package that allows you to confidently move forward any graphic project. Sharp tools, the best on the market compatible files and updated content will help you bring creative ideas into professional results, ranging from colorful logos and signs to unusual marketing materials and attractive web graphics. It consists of vector graphics CorelDRAW X5, raster graphics editor PHOTO_PAINT X5, a program for transforming raster images into vector Corel PowerTRACE X5, a program for creating screenshots Corel CAPTURE X5, as well as ebook on the work of the package CorelDRAW Handbook. This package combines the full range of excellent design capabilities, speed and ease of use.System requirements:
* Microsoft Windows 7, Windows Vista , Windows XP with latest Service Pack (32 bit or 64 bit version)
* Intel Pentium 4, AMD Athlon 64 or AMD Opteron
* 512 MB RAM (1 GB recommended)
* 750 MB of free hard disk space (1 GB for a typical installation with no content)
* Mouse or tablet
* Screen resolution 1024 x 768 (768 x 1024 on a Tablet PC)
* DVD/ROM drive
* Microsoft Internet Explorer 7 or later

Link Download

Saturday, April 9, 2011

Adobe Photoshop

Product Specifications

Platform: Windows
Licence:
Version: Full version
Language: English
DOWNLOAD


Product Description:

As the market leader for commercial bitmap and image manipulation software, Adobe Photoshop is continually improving its flagship product to ensure that its features, efficiency and results maintain industry-leading standards. Since 1987, Photoshop has made enacting the images of your imagination a possibility with its powerful, sophisticated innovations.

Adobe Photoshop CS5 software redefines digital imaging with powerful new photography tools and breakthrough capabilities for complex image selections, realistic painting, and intelligent retouching. Enjoy cross-platform 64-bit support and a wide range of workflow enhancements.
Adobe Photoshop CS5 features:

* Complex selections made easy-
Get precise results in fewer clicks when selecting intricate image elements, such as hair, and eliminate background color around selection edges. Automatically vary selection edges and perfect masks using new refinement tools.
* Content-Aware Fill-
Remove any image detail or object and watch as Content-Aware Fill magically fills in the space left behind. This breakthrough technology matches lighting, tone, and noise so it looks as if the removed content never existed.
* Superior HDR imaging-
Create photorealistic or surreal high dynamic range (HDR) images with unprecedented speed, control, and accuracy. Get better-than-ever results thanks to automatic ghost removal and greater control with tone mapping and adjustments, and even give single-exposure photos the look of HDR.
* State-of-the-art raw image processing-
Use the Adobe Photoshop Camera Raw 6 plug-in to nondestructively remove image noise while preserving color and detail; add grain to make digital photos look more organic; enjoy more control as you perform post-crop vignetting; and more.
* Extraordinary painting effects-
Achieve natural and realistic painting effects with the Mixer Brush, which offers on-canvas color blending, and Bristle Tips, which let you create lifelike, textured brushstrokes.

Monday, March 7, 2011

Bubble Shooter

MAINKAN
INFO GAME :

Mengirimnya:

Cari keasyikan dalam serunya memecah gelembung!
Cara Bermain:

Mouse = Bidik & Tembak

Tembak gelembung supaya menempel ke gelembung lain, membentuk kelompok 3 atau lebih yang berwarna sama, untuk menghapusnya. Semakin banyak gelembung yang dihilangkan dalam satu tembakan, semakin banyak poin yang diperoleh. Jika kamu salah menembak dan tidak menghapus gelembung, kadang-kadang muncul baris gelembung baru. Game akan berakhir saat kamu membersihkan papan atau gelembung sampai ke bawah layar!
Kategori:

* Kepandaian, Bubble Shooter

MENCETAK GOAL

MAINKAN
INFO GAME :

Mengirimnya:

Shoot panalty's against other clubs!
Cara Bermain:

use the mouse to shoot the ball
Kategori:

* Olahraga, Mencetak goal

Overhead Kick Game

MAINKAN
INFO GAME :

Mengirimnya:

Jika anda mendapatkan skor, maka akan terlihat mengagumkan-jika anda kehilangan skor, maka akan terlihat bodoh
Cara Bermain:

Mouse = Mengarahkan & Menembak
Atur waktu untuk tendangan anda secara sempurna untuk mencetak gol.
Kategori:

* Olahraga, Sepak Bola

MAGICAL KICk

MAINKAN
INFO GAME :
Mengirimnya:

Membutuhkan lebih dari sepasang jari ajaib untuk menemukan dan mengarahkan bola.
Cara Bermain:

Klik bola untuk mulai, kemudian klik untuk mengatur ketinggian, arah, dan mengangkat tendangan. Berikan perhatian ke arah angin.
Kategori:

* Olahraga, Sepak Bola

Penalty Shootout

MAINKAN
INFO GAME :

Mengirimnya:

Kadang pertandingan dimenangkan melalui tendangan penalti. Cetak gol kamu, bukan gol lawan!
Cara Bermain:
Sebagai Penyerang:
Tekan Spasi untuk menetapkan arah, ketinggian dan daya tendangan kamu.

Sebagai Kiper:
Klik untuk menggerakkan kiper ke tempat gol bertanda X untuk memblokir tendangan.

Kalahkan skor lawan dan blokir tendangan penalti mereka agar bisa lanjut ke putaran berikutnya!
Kategori:

* Olahraga, Sepak Bola

Speed Trucks

MAINKAN

INFO GAME :
Mengirimnya:

Berpacu dalam lumpur untuk terus menang!
Cara Bermain:

Panah = Mengemudi
N = Lesatan Nitro
P = Jeda

Menangkan balapan dan dapatkan uang untuk meningkatkan kemampuan dan menang lagi di balapan lainnya.
Kategori:

* Balapan, Arena balapan

Sunday, March 6, 2011

TRUCK TABRAK DIDEPAN

MAINKAN

INFO GAME :

Mengirimnya:

Apa pun bisa dilakukan saat kamu di arena, jadi silakan tabrak dan tubruk!
Cara Bermain:

Panah = Mengendarai

Klik jenis musik yang ingin kamu dengar, lalu klik “KENCANGKAN RADIO,” atau klik saja “TANPA RADIO.” Bangun kecepatan untuk mengatasi kerusakan parah kalau kamu menabrak mobil lain! Pengukur kesehatan musuh ditampilkan pada bagasi mobilnya. Poin kesehatan kamu ditampilkan di samping masing-masing sisi mobil kamu di sudut kanan atas. Upayakan agar mobil kamu satu-satunya yang bertahan di arena untuk menyelesaikan level!

Kemudikan ke power-up untuk memungutnya. Dapatkan uang ekstra untuk mengurus hantaman maut pada mobil. Setelah selesai tiap level, belanjakan uang kamu untuk memperbaiki, meningkatkan kemampuan, atau membeli mobil di bengkel.
Kategori:

* Balapan, Ketangkasan Mengendarai

DRIFT REVOLUTION

MAINKAN..

INFO GAME :


Mengirimnya:

Bergabunglah dalam perbaharuan Mercedes untuk aksi yang sempurna.
Cara Bermain:

Spasi = Gas
Panah Kiri/Kanan = Menyetir
Panah Bawah = Rem

Cakuplah jarak yang sejauh mungkin dalam waktu 60 detik, pergunakan waktu sebanyak mungkin dalam sudut 'putaran sempurna' (bagian hijau dari grafik ) untuk hasil maksimum.
Kategori:

* Balapan, Ketangkasan Mengendarai

Ketangkasan Bermotor

MAINKAN..

INFO GAME :
Mengirimnya:

Pamerkan ketangkasan kamu di stadion!
Cara Bermain:

Panah Atas/Bawah = Mempercepat/Mundur
Panah Kiri/Kanan = Condong ke Belakang/ke Muka
1-6 = Aksi Ketangkasan
Kategori:

* Balapan, Ketangkasan Mengendarai

SUPER TRUCK RACE

MAINKAN..

INFO GAME :
Mengirimnya:

Bawa truk anda dengan selamat ke garis akhir sambil mengumpulkan semua bintang
Cara Bermain:
Pergunakan tombol tanda panah anda untuk menyetir truk anda dan tekan spasi untuk dorongan ekstra!
Kategori:
* Balapan, Balapan mendaki

TRUCK ADVENTURES

MAINKAN..

INFO GAME :

Mengirimnya:

Petualangan pengiriman saat kecepatan ialah yang dibutuhkan!
Cara Bermain:
Panah Atas/Bawah = Mengemudi/Balik
Panah Kiri/Kanan = Keseimbangan
Shift = Dorongan
Z = Rem.
Kategori:
* Balapan, Balapan mendaki

MINING TRUCK

MAINKAN..

INFO GAME :

Mengirimnya:

Pertunjukan terkeren yang bisa anda lakukan ialah mengantarkan kargo berharga dari titik A ke B!
Cara Bermain:

Panah Atas/Bawah = Mengemudi/Balik
Panah Kiri/Kanan = Miring

Tunggulah truk untuk mengisi, dan pergi saat lampu berwarna hijau. Mengemudi melewati jalur, menyimpan kargo sebanyak mungkin, dan parkirkan di zona pembongkaran.
Kategori:
* Balapan, Balapan mendaki

TRUCK MANIA

MAINKAN..

INFO GAME :
Mengirimnya:

Pengemudi truk harus menjaga kargonya saat melintasi semua jenis dataran ...
Cara Bermain:
Panah = Mengemudi

Antarkan kargo kamu dengan selamat melintasi dataran tanah lapang tanpa menjatuhkannya!
Kategori:
* Balapan, Balapan mendaki

Pemadam Kebakaran

MAINKAN

INFO GAME :

Mengirimnya:

Tidak ada rintangan yang tidak bisa kamu atasi apabila harus mencapai temapt kebakaran.
Cara Bermain:

Tanda Panah = Mengemudi
Spasi = Menyemprot Api
Kategori:
* Balapan, Balapan mendaki

TRAKTOR MANIAK

MAINKAN..

INFO GAME :

Mengirimnya:

Ini bukan traktor kakekmu...
Cara Bermain:
Naik/Turun = Gas/Rem
Kiri/Kanan = Belok

Mengebutlah di setiap lintasan secepat mungkin untuk maju ke level berikutnya. Awaslah dengan rintangan-rintangan yang berbahaya—dan berhati-hatilah dengan muatanmu!
Kategori:
* Balapan, Balapan mendaki

Saturday, February 19, 2011

150 tools ultra hacker kit


AddrView
AddrView gives you the ability to analyze HTML pages and extract most of the address URL, contained in them. AddrView retrieves the URL of images (img - tag), links to other files (a - a tag), CSS files, frames, Flash files and more. You can save the extracted addresses list to text files, HTML or XML files, or add these addresses to the hut.

AnonFTP
This package contains / var / ftp area for anonymous FTP access.

AppToService
The program enables the command line to run regular applications as a service (service).
However, to install any application as a service is completely free - just enough to take the recommendations of the Windows XP FAQ.

arpinject
Any computer on the network can be easy to take and send a packet ARP_REPLAY. And thus make changes to the ARP table. Such an attack is called ARP Poisonig. Its result - redirect traffic to the desired host. Send the packet (s) can be programmatically by using a tool ARPInject.

aspack21
Very nice wrapper *. exe and *. dll files (in some cases the degree of compression is 70%). In addition, the program is good (especially for programmers who are trying to protect their trousers) the complexity of extracting compressed file. I understand that he ASPack packed ASPACK'om same Not bad, and that the program allows you to check before final packing job "prepackaged" exe-file, in violation of its normal operation, uncompress.
The new version has improved the speed of packing and adds an option "maximum compression". In unreported as the program runs 30 days. The interface is multilingual, including in Russian.

bios_pass_remover
brutus
Cable Modem Sniffer
CapKeys_DIGITAL
CGI Founder v1.043
Scanner CGI scripts
cports
craagle
CreditCardGjenerator
DeepUnFreez
E-mail Cracker
ezDataBase_Defacer
FTP Brute Forcer
Brootforce FTP
Mail Bomber 2.3
G00B3RS_phpBB_exploit_pack
Google_Hacker_1.2
grinder1.1

HackersAssistant
Software package for a hacker: Port Scanner, Ping Flooder, Server Slower, Connections, File Cleaner, Get Passwords, IP Validator, Web Browser, Ip Information, HTML Stealer, Site IP Retrieval, Winsock Scanner, exe Corruptor, Nuker, Hit Increaser, File Generator, Anonymous e-mail, Whois, Binary

HackTheGame
HackTheGame this game simulator life hacker. In which you take on the role of a hacker. Which xs for what and how to break the system. Join showdown with hack portals, in general, live a long and merry life. The main thing is not to get caught would be rubbish.

Hotmail Email Hacker / Hotmail HAcker Gold / Hotmail ScamPage / HotmailHack
In my still some sort of a heresy, not long running, hotmylo not so easy to hack

hydra-4.6-win
THC-Hydra - threaded cracker passwords to various services (FTP, POP3, IMAP, Telnet, HTTP Auth, NNTP, VNC, ICQ, PCNFS, CISCO, etc.) for UNIX platforms. With this tool you can attack several services at once.

iecv
Internet Explorer Cookies View

ipnetinfo
The program, which displays information about IP address. It allows you to display detailed information concerning the country, the owner of the domain, the range of available IP addresses, contact information and much more. This tool will be useful, for example, when you need to know the origin of the mail received from an unknown destination. For this is enough simply to copy the message headers from your email program IPNetInfo. It will extract itself from the text of all IP addresses and make the necessary search. The software uses several Whois servers, thereby maximizing the impact of the search for a specific network address. Among other things, it allows you to create HTML report, which stores all necessary information about the selected IP addresses.

john-17w
password cracker, currently available for UNIX, DOS, Win32. Its main aim is to detect weak passwords UNIX. To the program you can buy a collection of word lists over 600 MB, with the help of which greatly simplifies the selection of passwords.


Key Changer
Commercial ($ 8.00) is free from trojans, designed to find and change the product key, Windows XP, such as piracy on the validity (if any). XP Key Changer after launch, finds the proposed changes to the key, and the name and organization registered in the system provided by Windows XP. Program XP Key Changer allows you to change XP Product Key and all this information, one click on all machines. Works with all service packs, including Windows XP SP3!


Key_Logger

Legion NetBios Scanner v2.1


Mail Boomb_2.0 YAHOO


MooreR Port Scanner


MSN Flooder 2.0


NET BIOS Scanner


NetBIOS Name Scanner


NetResView


NFO Maker 1.0
This plugin is for viewing nfo and diz files, which are usually located in the downloaded archive.
Warning: as reported by the author, "Unfortunately there was an unfortunate mistake. Setting.reg File added to the archive with the plugin. Setting.reg file separately can be downloaded here

Untuk Plugins


Nimda :
"Nimda" is an Internet worm that spreads via the Internet as a file attachment in an e-mail, local area networks, as well as penetrating the unprotected IIS-servers. The original host file has the name of the worm README.EXE and is a program format Windows PE EXE, the size of about 57 kilobytes, and is written in Microsoft C + +.


NTPacker


On-Off MSN


PCAnyPass


Php Nuke Hacker v11.0

phpBB Annihilator / phpbb attack / phpbb bruteforcer / PhpBB pass extractor / phpBB_DoS / phpbb_spammer / phpBBAttacker / phpBBcracker
A set of tools for hacking, spam, flood, ddos, Brutus phpBB

PhpBuGScan


Ping & Nukes


Listener XP
The program allows to monitor network ports on your system, generating a pop-up window when trying to access the port. The program writes a log file of IP-addresses of connectable clients and sends you a request for permission to use it. You can enter the port numbers of their choice, or the program will prompt you to the default list. The program runs from the system tray.

pqwak2


procexp


ProxyPro


rainbowcrack-1.2-src win-lin


Remote Shut Down


ResHacker


RpcScan101


Sasser
Sasser virus looks like the exhausted millions of Internet users worldwide in summer 2003 lovesan (blaster). Already, he has several of its modifications, which experts say is even more harmful than the original. The same way according to experts, this virus does not pose a threat to your hard drive, but only prevents the use of them fully functional. Its distinctive features - a message appears on trying to connect to the ip address of another computer and the error message LSA Shell (Export version) and follows it to restart the computer from a fatal error process lsass.exe

SendMailer
Sends a message in HTML format and in any encoding without mail client. Checks completion of mandatory fields. Checks E-Mail on the right (syntax). Converts special characters into HTML format. Allows you to specify multiple addresses to choose from. Checks sent and reports errors. Ability to send a copy to the sender. Very easy to configure. Also fits easily into any design. Gives ample opportunity to hide the real address. If desired, sends information about the browser and the IP address

Server 2003 Keygen


Server Killer


showpassv10


sitedigger2
The program looks in the cache of Google potential vulnerabilities, errors, configuration problems on Web sites. The new version of the new version you can use FSDB / GHDB and generate 10 results for each signature. Posted as a large number of new signatures - open webcams, credit card numbers, etc.

SMBdie
WinNuke back! Introducing exploit completely kills or WinNT/2K/XP. NET machine with Network Share Provider (works on 139 and / or 445 port). Uses a malformed SMB (Server Message Block) packet is used anonymously, no account do not need to know - for only the IP address and computer name.


SQLScan v1.0
Utility guessing the password to Microsoft SQL server. Lets you scan a range of IP addresses. When backwater password creates an NT account with a blank password on a vulnerable system.



Stealth - HTTP Scanner v1.0 build 23
powerful tool for auditing security Web server, which looks at more than 19.000 vulnerabilities.

SuperScan4
Port scanner with a bunch of utilities. Also there is a useful utility that pulls out from companies (windows) all of the available Old using zero session.

tftpd32.273
a small freeware program, which includes simple to configure DHCP, TFTP, SNTP and Syslog servers as well as TFTP client


traceroute
This is a utility computer program designed to identify routes data networks TCP / IP.