Rabu, 28 Desember 2011

Biodata Ayu Ting Ting


so cool yah gua ngomongin ayu ting ting Biodata Ayu Ting Ting
  • Nama Artis : Ayu Tingting
  • Nama Asli : Ayu Rosmalina
  • TempatLahir : Depok kalo gua di bogor
  • Tanggal Lahir : 20 Juni 1992, Zodiak Gemini cuma beda 1 tahun ma gua hahha
  • Profesi : Penyanyi dangdut, presenter, model
  • Tinggi badan : 160 cm kurang lebih sih
  • Berat badan : 45 kg kurus amat ya
  • Prestasi :
    Bintang sari ayu 2006
    Putri Depok 2006
    Mojang Depok, Presenter Kuis (ANTV)
    Album Dangdut (Geol Ajep2)
  • Album : Dangdut (Rekening Cinta), Goyang Sejati (ANTV), Dangdut Yoo (TPI), Kamera Ria (TVRI), Dangdut Pro (TVRI) Foto Ayu Ting Ting Alamat Palsu

Lagu Alamat Palsu sebenarnya telah beredar sejak 2007 lalu, namun berkat Ayu Tingting dan Produsernya yang giat mempromosikan lagu ini, maka baru pada 2011 inilah lagu Alamat Palsu booming, dan menjadi berkah bagi Ayu Tingting untuk memetik ketenaran alias popularitas dan materi yang berlimpah.

Lagu Ayu Tingting Alamat Palsu memiliki lirik yang simple, mudah dicerna dengan alunan musik yang khas dangdut yang mengajak orang sadar atau tidak sadar untuk ikut mendengungkan lagu ini.

wallahu alam bismirobic

Lirik Lagu Ayu Ting Ting Alamat Palsu :

Ya...ya.yaaaaa (3X)
#


Kemana... Kemana... Kemana...
Ku Harus Mencari Kemana...
Kekasih Tercinta... Tak Tahu Rimbanya
Lama tak datang ke rumah..........


##
Kemana... Kemana... Kemana...
Tinggal Nya sekarang Dimana...
Kesana Kemari Membawa Alamat...
Namun Yang kutemui bukan dirinya..
Sayang yang kuterima alamat Palsu
Ku tanya sama teman teman semua..
Tapi mereka bilang tak tahu..


Sayang mungkin diriku sudah tertipu
membuat aku frustasi dibuatnya...


To ##
To #

Kamis, 22 Desember 2011

download Dreamweaver portable


Macromedia Dreamweaver 8 (Portable)



Macromedia Dreamweaver 8 (Portable)

Macromedia Dreamweaver 8 (Portable) ini merupakan sebuah program untuk mendesain, dan membuat sebuah halaman WEB,
Begitulah inti dari program ini.

Macromedia Dreamweaver 8 (Portable) ini merupakan program bersistem PORTABLE, artinya tidak perlu di Instal,

Untuk Download Macromedia Dreamweaver 8 (Portable)
Silahkan Klik DI SINI
TERIMA KASIH.........
Saling Berbagi.....


Senin, 19 Desember 2011

bom terorist di Palu



Palu - Sebuah benda mencurigakan dan diduga bom ditemukan warga di Pasar Daging Babi Palu, di Jalan Sulawesi, Kelurahan Maesa, Palu Selatan, Sulawesi Tengah, Senin (19/12/2012) sekitar pukul 05.30 WITA. Temuan itu lalu dilaporkan warga kepada aparat Kepolisian Resor Palu.

Kepala Kepolisian Resor Palu AKBP Ahmad Ramadhan kemudian segera mengontak Kepala Satuan Brigade Mobil Polda Sulteng setelah mendapat laporan warga tersebut. Sekitar pukul 06.00 WITA Tim Penjinak Bom Brimob pun turun ke Tempat Kejadian Perkara dan segera mengisolasi lokasi.

"Setelah melakukan pemeriksaan dengan x-ray, diketahui bahwa ada rangkaian kabel dan switcher dalam benda itu, sehingga untuk keamanannya benda itu dimasukkan ke dalam disposal box, tidak didisposal di lapangan," jelas Ramadhan.

Teror bom di Pasar Khusus Daging Babi di Palu ini terjadi kali kedua. Pada Sabtu, 31 Desember 2005 silam, sebuah bom berdaya ledak tinggi meledak di pasar ini. Sebanyak 8 orang warga tewas dan 56 lainnya luka parah. Bahkan ada yang mengalami cacat permanen. Seorang di antara korban tewas ketika itu adalah Komandan Tim Intelijen Korem 132 Tadulako yang berbelanja bersama istrinya.

Teror bom ini kembali membuat warga setempat was-was. Salah seorang warga mengaku kembali was-was mengikuti ibadah Natal dan Tahun Baru nanti bila ada lagi ancaman atau teror bom serupa.

sumber : http://www.detiknews.com/read/2011/12/19/095708/1794196/10/pasar-daging-babi-di-palu-diteror-bom?9911012

Sabtu, 17 Desember 2011

Seandainya saya Anggota DPD RI

sampah di jalan baru


Seandainya saya Anggota DPD RI
gambar ini menunjukan betapa tidak adanya kepedulian dari setiap masyarakat terhadap lingkunganya .




     Seandainya saya jadi Anggota DPD RI, yang pertama saya lakukan adalah menanamkan kepedulian kepada masyarakat terhadap lingkungan .
karna menurut saya semua berawal dari hidup bersih dan menjadikan pikiran jernih.

     Jika masyarakat sudah menterapkan "kepedulian lingkungan" pasti masyarakat akan mencintai udara segar, dan saya akan memberlakukan jadwal atau satu hari dalam seminggu tanpa kendaraan bermotor dan di alihkan memakai sepeda (seperti yang saya mimpikan sejak dulu). dan pada akhirnya akan berdampak baik pada alam ;)


Kamis, 15 Desember 2011

mata cowo vs mata cewe


Cowok dan cewek emang sama-sama tertarik pada hal-hal yang visual. Tapi, menurut buku Why Men DoAlign Leftn’t Listen and Women Cant Read Maps karangan Allan dan Barbara Pearce, ada beberapa perbedaan antara mata cewek dengan mata cowok. Ini berhubungan dengan biologi dan kebiasaan yang berlangsung sejak ribuan tahun yang lalu.

1. Pandangan cewek lebih melebar, pandangan cowok lebih tajam
Cowok sering banget kepergok lagi ngelirik cewek lain yang lewat di sebelahnya. Padahal, cewek juga sering kok mengagumi cowok ganteng yang kebetulan melintas. Bedanya, cewek nggak perlu menoleh karena jangkauan pandangan cewek lebih dari 180 derajat. Ini karena mata cewek punya lebih banyak jenis kerucut dalam retinanya.

Mata cowok ukurannya lebih besar dari mata cewek, dan otak menyusunnya seperti sebuah terowongan. Artinya, cowok bisa ngeliat lebih jelas, lebih tepat, dan lebih jauh dibanding cewek. Mirip teropong deh.

2. Cowok lebih bisa melihat di dalam gelap
Kalo udah malem, lebih baik jangan serahkan tugas nyetir pada cewek. Soalnya, ternyata cowok emang lebih mahir ngeliat di dalam gelap dibanding cewek. Apalagi, cowok juga punya kemampuan spasial yang lebih baik di otak kanannya.

Sebaliknya, cewek biasanya kesulitan melihat jarak jauh di dalam kegelapan. Kemampuan ruang yang terbatas juga bikin sebagian besar cewek sulit menentukan arah laju kendaraan lain di malam hari.

3. Mata cewek bisa melihat lebih banyak
Sejak ribuan tahun yang lalu, otak cowok dipersiapkan untuk berburu. Kita harus bisa melihat banyak hal dalam area yang sempit. Otak kita secara otomatis menyempitkan penglihatan kita supaya bisa memusatkan perhatian pada satu hal yang khusus, misalnya binatang buruan.

Pada cewek nggak seperti ini. Sebagai spesies yang terbiasa bertugas melindungi sarang atau tempat tinggal, otak cewek pun terprogram untuk mengolah semua informasi visual yang masuk di lingkup yang lebih luas. Inilah kenapa cewek lebih gampang mencari barang hilang dibanding cowok, karena otaknya bisa memproses lebih banyak “gambar” dalam satu waktu dibanding cowok.

Sabtu, 10 Desember 2011

password smadav


untuk usb
predator
predator 64


2
198
share
Cara Hack Password Smadav ini sangat berguna bilamana anda Lupa Password Smadav anda. Sehingga anda tidak dapat menggunakan tool dan menyeting Smadav. Fitur password protect ini hanya ada pada Smadav Pro. Seperti yang kita ketahui, fitur ini berfungsi agar tidak sembarang orang dapat mengubah-ubah settingan dan menggunakan tool Smadav. Jadi hanya Si Admin saja yang bisa mengotak-atik settingannya. Namun bagaiman bila si Admin lupa passwordnya? Nah,berikut mari kita ulas step by step.
Cara Hack password Smadav
Berikut caranya :

  1. Ketika anda mendapati bahwasanya anda lupa password Admin Smadav, tutup saja Smadavnya. Lalu buka Registry Editor (Start – Run – ketik “regedit” – Enter) dan buka key HKEY_CURRENT_USER\Software\SMADAV. (huruf “A” yang didepan “D” itu seharusnya segitiga, bukan “A”. Tapi karena itu karakter ascii jadinya tidak muncul)
  2. Cari string UsePassword, klik 2 kali dan ganti value yang semula 1 menjadi 0.
    Cara Hack password Smadav
    Cara Hack password Smadav
  3. Sekarang itu buka kembali Smadav-nya, anda tidak akan dimintai password. :)
  4. Lalu buka menu Setting, centang pada opsi “Gunakan password untuk admin Smadav” dan klik Edit password untuk mengganti passwordnya dengan yang baru.
    Cara Hack password Smadav
  5. Masukkan password anda yang baru dan klik Save. Sekarang passwordnya sudah berhasil diganti. :)
    Cara Hack password Smadav
Nah, sekarang coba anda otak-atik registry software lainnya. Barangkali menemukan sesuatu yang unik. :)
Jangan pernah lelah untuk belajar & tetap stay update @ http://www.binushacker.net :)

Senin, 05 Desember 2011

cara mengobati orang yang di ganggu jin


Nabi Shallallahu ‘alaihi wa sallam bersabda :
إِنَّ الشَّيْطَانَ يَجْرِي مِنِ ابْنِ آدَمَ مَجْرَى الدَّمِ
“Sesungguhnya setan itu dapat berjalan pada tubuh anak cucu Adam melalui aliran darah.” (HR. Al-Bukhari, Kitab Al-Ahkam no.7171 dan Muslim, Kitab As-Salam no. 2175)
Fenomena kesurupan masih mengundang perdebatan hingga saat ini. Kalangan yang menolak, (lagi-lagi) masih menggunakan alasan klasik yakni “tidak bisa diterima akal”. Semoga, kajian berikut bisa membuka kesadaran kita bahwa syariat Islam sejatinya dibangun di atas dalil, bukan penilaian pribadi atau logika orang per orang.

Tapi kita sebagai orang islam harus percaya akan adanya alam ghaib.

Pengobatan terhadap orang yang kesurupan jin mempunyai dua bagian :

1. Pencegahan kesurupan

Di antara upaya pencegahan adalah dengan menjaga semua larangan, taubat dari segala macam kesalahan dan dosa, juga membentengi diri dengan beberapa dzikir, do’a dan ta’awwudz yang di syariatkan.

2. Pengobatan Kesurupan

Yaitu dengan cara seorang muslim –yang hatinya sejalan dengan lisan dan ruqyahnya- membacakan bacaan bagi orang yang kesurupan. Dan pengobatan dengan ruqyah yang paling ampuh adalah dengan surat Al-Fatihah, 1 ayat kursi, dua ayat teakhir surat Al-Baqarah, Qul Huwallahu ahad (surat Al-Ikhlas), Qul A’uudzubirabbil Falaq (surat Al-Falaq), dan Qul A’uudzubirabbin Naas (surat An-Naas), dengan memberi tiupan pada orang yang kesurupan dan mengulangi bacaan tersebut sebanyak tiga kali atau lebih, dan ayat-ayat Al-Qur’an lainnya.1 Sebabseluruh isi Al-Qur’an adalah penyembuh bagi apa yang ada di dalam hati, penyembuh, petunjuk, dan rahmat bagi orang-orang yang beriman.

Dalam pengobatan ini diperlukan adanya dau hal, yaitu :

Pertama, dari pihak orang yang kesurupan jin, yakni berkaitan dengna kekuatan dirinya, kejujuran tawajjuhnya (menghadap) kepada Allah عزوجل, ta’awwudz yang benar yang sejajar antara hati dan lidahnya.

Kedua, dari sisi orang yang beruapaya mengobatin, di mana dia pun harus demikian, karena senjata yang dipergunakan itu minimal harus seimbang dengan senjata lawan. 3

__________________
1. Lihat Sunnan Abi Dawud no. 3420, 3896, 3897, 3901, Ahmad V/210, dan lainnya dari Hharijah bin ash-shalt رضي الله عنه, lihat Silsilah al- Ahaadiits ash-Shahiihah (no. 2027)

2. Lihat al-Fat-hur Rabbani, Tartiibu Musnad al-Imam Ahmad XVII/183.

3. Lihat mengenai bacaan ruqyah yang panjang dan bermanfaat dalam kitab, Wiqaayatul Insan minal Jinni was-Syaithan (hal. 81-84), juga Ash-Shaarimul Battaar (hal. 190-117), karya Syaikh Wahid ‘Abdus Salam Baali. Lihat juga Zaadul Ma’ad IV/66-69, serta Iidhaahul Haqq fii Dukhuulil jinni bil Insi war Radd ‘alaa Man Ankara Dzaalik, karya al-‘Allamah ‘Abul Aziz bin ‘Abdullah bin Baaz( hal. 14). Dan Fataawa Ibni Taimiyah XIX/ 9-65 dan XXIV/276. Demikian juga al-Wiqaayah wal ‘Ilaaj minal Kitab was Sunnah, karya Muhammad bin Syay’i (hal. 66-69). Selain itu juga lihat juga cara mengusir jin dari rumah, dalam kitab al-Wiqaayah wal ‘Ilaaj, Muhammad bin Syaay’I (hal. 59). Dan juga ‘Aalamul jinni wasy Syayaathiin, karya al –Asyqar (hal. 130)

Kamis, 02 Juni 2011

hacker billing


Pertama-2 kita harus mengetahui cara kerja dari billing warnet itu sendiri, sebenarnya pas kita datang ke warnet dan duduk terus hidupin komputer, di layar biasanya akan tampak screen dari billing, dan keybord akan dikunci untuk menekan tombol Ctrl-Alt-Del, Alt-tab, Alt-F4 atau sebagainya yang hanya bisa digunakan buat si admin, dalam keadaan seperti itu sebenarnya si komputer sudah siap pake alias stand by, tapi kita di paksa untuk login di billing sialan itu, hmm dari situ berarti kita harus menghilangkan atau mengusir si billing dari permukaan layar, nah..nah..nah mari kita mulai, untuk menghilangkan si billing gila dari bumi ini, kita memerlukan software untuk menyembunyikan program yg bernama [ ZHider ], software itu dapat di Download diSini atau situsnya cari sendiri di mas google ya! lupa lagi uy dan ga berat ko! kurang lebih cuman 81KB.
Udah dapet softwarenya? Mari kita mulai, datanglah ke warnet yg jarang kamu datengin, karena biar si pawang warnet ga terlalu kenal sama kamu, carilah tempat duduk yang agak pojok dan usahakan warnet tersebut jangan terlalu kosong dan jangan terlalu penuh, karena kalo kosong nanti si pawang warnet heran ko ada yang maen tapi di billing kosong, dan jangan juga terlalu penuh ntar dia heran juga, ada yg datang mau maen terus liat di billing server ada yg kosong, eh, pas di liat ada mahluk usil lagi nongkrong di warnetnya. Nah, udah di pastikan kondisimu aman duduklah dengan tenang dan jangan tampakan wajah tegangmu karena takut ketahuan, pasang wajah innocence muka belas kasihan dan pengen di bogem mentah !! hehehe…
(yg terakhir ga lah)udah gitu masukin flashdiskmu yg udah terisi software ZHider, tunggu sampe ke detect, dan kamu login kyk biasanya, lalu buka flashdiskmu jalankan program Zhider dan stop lagi pemakaian billing, kalo dalam waktu segitu biasanya billing masih menandakan free alias gratis, nah billing gila itu udah tampak lagi di layar, sedangkan program Zhider kita berarti udah jalan, ok, mari kita jalankan aksi mendebarkan ini, tekan tombol Ctrl-Alt-Z dan taarraaaaaa…. si billing gila itu hilang!!! Dan kamu bebas browsing sepuasnya….
Kalo kamu udah selesai, tekan tombol Ctrl-Alt-X untuk menampilkan lagi si billing, dan login lagi seperti biasa dan kamu maen seperti biasa sampe batas yg kamu mau dan bayar ke si pawang untuk menghilangkan kecurigaannya.
Bahan2 harus disiapkan:
  • Program ZHider. download diSini
  • Muka bego
  • Mental yang kuat
Langkah-langkahnya:
  • Masuk warnet dan pasang muka bego biar ga dicurigai operator
  • Pastikan selain box/bilik yang kita tempati masih ada box lain yang kosong. Biar ga dicurigai juga sih.
  • Usahakan cari tempat yang jauh dari op, supaya ga ketahuan box kamu kosong apa nggak.
  • Nyalakan kompi dihadapan anda bila masih dalam keadaan mati.
  • Saat masuk login screen, login aja seperti biasa.
  • Jalankan ZHider yang sudah disiapkan di disket/flashdisk. Kalo belom ada, cari aja pake google.
  • Setelah ZHider dijalankan langsung aja logout.
  • Naah, di login screen ini kita mulai aksi mendebarkan kita. Tekan Ctrl+Alt+Z.. Jreeeng, login screen telah menghilang !!!
  • Browsinglah sepuasnya, tapi tetap pastikan ada box lain yang kosong. Kan aneh kalau ada yang masuk warnet, dia lihat udah penuh. Padahal di billing server kelihatan masih ada yang belum login.
  • Kalo sudah puass tekan Ctrl+Alt+X untuk memunculkan kembali login screen yang menghilang entah kemana
  • Login seperti biasa dan browsing beberapa menit sampai penunjuk tarif sampai ke angka yang kita kehendaki. Ini supaya ga dicurigai.
  • Logout. SIapkan muka bego, lalu bayar tarif.
Cara ini lebih mudah dilalukan bila si operator ga terlalu kenal sama kamu. Apalagi bila si op sering keluyuran.
Ini beberapa hotkey ZHider yang bisa digunakan, untuk hotkey lainnya silakan baca file readme yang disertakan bersama zhider
  • CTRL+ALT+Z Menyembunyikan jendela aktif
  • CTRL+ALT+X Menampilkan kembali semua jendela yang disembunyikan
  • CTRL+ALT+L Menampilkan dialog zhider
  • CTRL+ALT+M Menampilkan kembali semua jendela yang disembunyikan, dan juga menutup zhider.
Cara 2:
Nyalain kompi .Setelah loading windows tekan tahan Ctrl+Alt+Del sebelum keluar jendela billing(harus cepet coz jendela billing muncul hanya 2 detik setelah loading windows). Setelah kluar task manager klik [ End Task ] pada aplikasi [ client 008 ].
Cara 3:
Menggunakan software Billing Hack(bisa download di www.vb-bego.com). Software ini bahkan bisa mereset time billing.
Bisa juga sebelum nyalain kompi cabut kabel LAN di belakang CPU. Biar gak terlalu mencurigakan, cabut kabelnya sambil pura-pura pasang USB ato Flash Disk (sambil nyelam mancing ikan gitu deh pepatahnya).Trus nyalain kompi tunggu sampai jendela billing keluar. Klik Admin masukkan password default008. Trus di Exit Client&Password masukkan juga password 008. Abis tu, setelah muncul kotak yang terakhir cari tanda ****** yang letaknya paling bawah kiri, delet tanda tsb dan terakhir klik Exit Client yang terletak di sebelah kanan tanda yang telah kita hapus tadi. Jadi deh….
Kalo semua cara di atas ga bisa dilakuin, hentikanlah usahamu. Sesungguhnya perbuatan jahatmu tidak diridhoi Tuhan Kalo ketahuan langsung pertebal [muka bego-mu]. Misalnya bilang… Eh, kok jadi gini ya? Kemaren ga gini kok. Ato kata-kata lain, tergantung kreatifitas kamu.
sumber http://kyoshi.jw.lt

Related Search

Rabu, 09 Maret 2011

Six 'Disease' Rare in the World


A number of health problems caused by past trauma or just a mere suggestion. But, did you know that some disorders are rare and interesting. Curious?
Orgasm 200 times per day A British woman, Sarah Carmen, having an orgasm to 200 times each day. Investigate a calibaration, Carmen syndrome called Permanent Sexual Arousal Syndrome (PSAs).
This syndrome makes the blood flow so smoothly into the area so that the stimulation of sexual organs continue to arise. This situation must often be Carmen forced to have sex for all his desire to terlampiaskan.
In addition, Carmen is also easy to reach a climax when in action. The boyfriend admitted difficulty satisfying and fulfilling sexual needs are so great Carmen.
Allergies water These health problems experienced by Ashleigh Morris. Since the age of 14, a woman from Melbourne was declared allergic to water for various temperatures. He will experience a painful rash so his body touched the water. Even sweat can make pain.
Remember continue When getting older, middle-aged women usually already senile. However, this does not apply to AJ (pseudonym is given to researchers from a university). Female 42 years old can remember everything in great detail, ranging from years to hours of an incident that happened to him.
Devotees Tic TACS Natalie Cooper did not want too idolize Tic TACS. However, the 19-year will fall ill if you consume any food. Doctors could not explain this disorder. Apparently, Cooper's stomach can only accept TACS mint Tic.
Laughter = fainted? Kay Underwood have to be careful when expression. The reason, she would faint all of a sudden when you're happy, angry, afraid, surprised, amazed, even embarrassed. Since seven years sillam, Underwood was diagnosed with a condition that suddenly made him limp or cataplexy. Excessive emotion can make his muscles suddenly helpless. He can pass out more than 40 times a day due to the emotions he felt.
In addition, Underwood also suffer from narcolepsy, a condition that makes it instantly asleep. Underwood does not own. Narcolepsy affects about 30 thousand people in the UK. About 70 percent of them also suffered from cataplexy.
Allergies modern technology One more type of allergy that is not less strange that is allergic to modern technology. This disorder is experienced by Debbie Bird. He is allergic to a number of advanced technological tools, such as cell phones and microwave cookware.
Bird is very sensitive to electromagnetic waves or radiation of technological tools. Her skin became red and swollen eyelids while adjacent to these tools. This situation makes a spa manager, who is also her husband, turning his house into an electromagnetic free zone. Thus, Bird can live healthy.

Minggu, 06 Maret 2011

Tips Graffiti


Graffiti is an art that developed in urban streets. Its development began in the 70s on the European continent. At first the gang graffiti is used as the identity and specific groups.Graffiti gang used as a way to control a region.

Unlike Indonesia, the graffiti was already there in the days of colonialism. When it is used as a propaganda graffiti evoke the spirit of the nation against Dutch colonialism.By writing something like "Ajo Boeng Boeng!" On the walls, although with big risk if caught by Dutch troops (usually spelled VOC).
Some terms in the graffiti:
Bomb Activity or process being carried out while making graffiti.
Piece Every single work that has been made in a single word or abbreviation.
Tag Or it can be said Typical signatures are included in one piece or without a piece.
Drip Cat is melted because it was too thick when sprayed.
Cans Cans containing paint used for graffiti.
Caps Cans head shapes and sizes that produce a variety of sprays.
Marker In a way markers, but markers are permanent and high wetness.
Sketch The concept of graffiti written on paper.
Bomber Someone who makes graffiti
Crew A group consisting of a few graffiti bomber who all have their own nicknames.
Wheat Paste The images on paper that is attached to the wall by using flour.
Blockbuster A very large piece, its length can reach tens of meters.
Stencil A graffiti made by using molds.
Mask Closing or safety breathing at the time of bombing.

Selasa, 01 Maret 2011

Ipad


Using Brushes in IPAD application, Kassan apply his skills in painting. Utilizing this application as if to make artists feel is Using actual canvas board. By using applicationsBrushes, David Kassan takes 3 hours to produce one painting.

The application was originally made for the iPhone and iPod touch is, in the end have been redesigned again for a larger screen for the iPad. This application provides flexibility in color incised from high quality brushes, to create beautiful art on your mobile device

"I have used brushes on the iPhone with a very small screen. However, after theapplication is on IPAD brushes that have a wide screen, it helps to feel the subject ofpainting and color composition that is better than the iPhone, "said David Kassan proud

Rabu, 23 Februari 2011

WHAT'S WITH FACEBOOK? Good Bad Facebook, Analysis of Positive and Negative up



In recent years, social networking site Facebook is being warmly into conversation in the community. This is in line with the presence of the initiative to formulate a religious view on the phenomenon of Facebook itself. However, if we all already know what it up?. Before we talk more about Facebook, it's good we know beforehand the history up, and what are the benefits and harm from Facebook itself.
Who does not know the sites up. Today, almost every person in the world including Indonesia, has contracted the virus up. Ranging from young children, parents, even children already know and enamored of social networking site Facebook.
Up (abbreviated FB) is a social networking website launched on February 4, 2004 and was founded by Mark Zuckerberg, a 21 year old, a Harvard graduate and former Ardsley High School student. Its membership was initially restricted to students of Harvard College. In the next two months, its membership expanded to other schools in the Boston area (Boston College, Boston University, MIT, Tufts), Rochester, Stanford, NYU, Northwestern, and all schools are included in the Ivy League. Many other universities are then added in succession within one year after its release. Finally, people who have an email address of a university-mail from all over the world can also join this site.
Furthermore, also developed a network for top-level schools and some large corporations. Since 11 September 2006, people with e-mail address whatever-mail can register on Facebook. Users can choose to join one or more networks are available, based on top-level schools, the workplace, or geographic region.
Until July 2007, this site has the largest number of registered users among the sites that focus on schools with more than 34 million active members from around the world possesses. From September 2006 to September 2007, its ranking rose from 60th position to the position of the 7th most visited sites, and is the number one site for photos in the United States, ahead of other public sites such as Flickr, with 8.5 million photos uploaded every day.
Networking sites are so much in the virtual world, ranging from Friendster, Live Connector, Tagged, MySpace, Hi5, FUPEI to Facebook. However, no other social networking sites that can rival the appeal up to the user (the user). In 2007, there is the addition of 200 thousand new accounts per day More than 25 million active users to use up every day. The average user spent about 19 minutes per day to perform various activities on Facebook. Now Facebook has employees 250 - 1000 people, with an income of $ 50 - $ 100.
Facebook is one social networking service is free internet in which we can form a network by inviting friends. And from the network that we form, we can observe their activities, following the game / join a game that is recommended, add friends or our network based on school organization, the domicile of us, and so on. You could say the facilities to make friends and build social life.
In 2008, Indonesia is a country of Southeast Asia's most rapid development of his Facebook users, ie, 645 percent to 831,000 users of Facebook, and the fifth highest in the world after America, Britain, France and Italy, and has the potential to increase in large scale (The Jakarta Post 22 May 2009).
Lately, criticism arose from a number of scholars since FB is considered to encourage the infidelity, so they find a way to regulate online behavior in Indonesia. NU spokesman Abdul Muin Shohib states that up and the like are prohibited because they do not spread the religion of Islam, but to gossip. Notices are meant to warn Muslim Indonesia because many of Facebook and Friendster users are students, and it is feared up infiltrated cyber pornography (The Jakarta Post May 22, 2009).
Fatwa unlawful use facebook, also advanced by Pondok Pesantren Java-Madura joined in Pondok Pesantren Putri Communication Forum (FMP3), up tend to be used as a tool for Female (approach) with the opposite sex, are used to speaking openly about intimate issues or support vulgar behavior, so that the otherwise unlawful. according to the forum, Islam has its own guidelines to determine the characteristics of the opposite sex who want to become life partners.
Why do they forbid facebook? for that, to avoid confusion feedback about Facebook, it's good we know the positive and negative impacts up.
Here are the benefits that can be drawn from the Social Network Facebook:

1. For the Gathering, among old friends, new friends, and family.
2. To gather the family relatives, brothers, relatives are scattered,
3. As a media discussion, media propaganda, exchange information and invite goodness.
4. As an advertising medium, both fish free with how to post and paid ads that have been provided.
5. As a media campaign to win the presidency and vice 2009.
6. Building a community of certain groups, certain schools, certain tribes, certain religion, a particular hobby.
7. Train to communicate, train writing, to express opinion, train comment.
8. For media store family photos, photo and video memories can be shared as well.


Some things are the adverse effects of FaceBook:

1. Reduce performance because the company's employees, faculty and students playing facebook at work, surely reduce working time.
2. Less attention to the family, this happens because the parents less and less time with the children and their families due up.
3. Tergantikannya social life because some people feel enough to interact through the up, thereby reducing the frequency of face to face.
4. Limitation of personal and social sphere is blurred, because the up we are free to write anything, often without realizing we write down things that should not be submitted to the social sphere.
5. The spread of important data that should not, Facebook users often do not realize some important data that should not be displayed publicly.
6. Pornography, like other social networking sites that make use of any such site to pornographic activities.
7. Misconceptions, such as cases of dismissal because an employee who does not supposed to write on facebook, also occur prosecution to court because of misunderstandings on Facebook.


Judging from the positive and negative impacts of using up these, all passed away in our own self. When discussing the impact of good and bad effects are endless, because all will continue to grow and hard to be dammed. Therefore, the presence of up should be addressed with wisdom, removed the bad and take the benefits. If it can be said, up more communicative and interactive and can broaden our horizons all, without having to linger late in this controversy. Because, it's good to strengthen the control of the hearts, minds, our own faith in addressing the development of information technology.

Sabtu, 19 Februari 2011

The Hacker


To the HackHackers with the expertise to see and fix vulnerabilities in computer software, usually later published openly on the Internet for the system to be better. Unfortunately, few people take the evil use that information to crime - they are usually called a cracker. Basically the world of hackers and crackers are no different from the art world, here we are talking art Internet network security.I hope the science of network security in this paper is used for good things - not be a Hacker Cracker. Do not until you get karma for using science to destroy property of others. Moreover, at present the need for hackers is increasing in Indonesia with more and more dotcommers who want to IPO in the stock market. Good name and the value of a dotcom could fall even become worthless if the dotcom collapse. In this case, the hackers are expected to be a security consultant for the dotcommers it - because the HR police and security forces in Indonesia is very very weak and pathetic in the field of Information Technology & Internet. What may make cybersquad, private cyberpatrol budayakan perhaps necessary for survival dotcommers in Indonesia on the Internet.Various Internet network security techniques can be easily obtained on the Internet, among others, in http://www.sans.org, http://www.rootshell.com, http://www.linuxfirewall.org/, http:// www.linuxdoc.org, http://www.cerias.purdue.edu/coast/firewalls/, http://www.redhat.com/mirrors/LDP/HOWTO/. Some of these techniques in the form of books that the number of its several hundred pages that can be taken free of charge (free). Some Frequently Asked Questions (FAQ) about network security can be obtained at http://www.iss.net/vd/mail.html, http://www.v-one.com/documents/fw-faq.htm. And for the experimenter some scripts / programs which have become available, among others, in http://bastille-linux.sourceforge.net/, http://www.redhat.com/support/docs/tips/firewall/firewallservice.html .For those readers who wish to gain knowledge about the network can be downloaded free of charge from http://pandu.dhs.org, http://www.bogor.net/idkf/, http://louis.idaman.com/idkf . Some books softcopy form that can be taken free of charge to the capture of http://pandu.dhs.org/Buku-Online/. We have to thank especially the Scout team led by I Made Wiryana for this. At this time, I do not really know any place that is active discussion Indonesia discuss these hacking techniques - but may be partly discussed in the mailing list information such as kursus-linux@yahoogroups.com & linux-admin@linux.or.id which operated by the Indonesian Linux Users Group (Ltsp) http://www.kpli.or.id.The simplest way to see the weakness of the system is to seek information from various vendors such as http://www.sans.org/newlook/publications/roadmap.htm # 3b about the weakness of the system they have created yourself. In addition, monitoring the various mailing lists on the Internet related to network security such as the list http://www.sans.org/newlook/publications/roadmap.htm # 3e.Described by Front-line Information Security Team, "Techniques Adopted By 'System Crackers' When Attempting To Break Into Corporate or Sensitive Private Networks," fist@ns2.co.uk http://www.ns2.co.uk. A Cracker generally men aged 16-25 years. Based on the statistics of Internet users in Indonesia, then in fact the majority of Internet users in Indonesia are young children at this age as well. Indeed, this age is the age that is ideal in studying the new science, including the Internet, very unfortunate if we do not succeed menginternetkan to 25,000 Indonesian school s / d in 2002 - as the foundation for the future of Indonesia is in the hands of our young kids this.Well, the young cracker cracking is generally done to improve the capability / use of resources in the network for its own sake. Generally, the cracker is opportunistic. Seeing the weakness of the system to carry out the scanner program. After gaining root access, the cracker will install a back door (backdoor) and close all existing general weakness.As we know, generally the various companies / dotcommers will use the Internet to (1) web hosting their servers, (2) e-mail communication and (3) provide access to web / internet to its employees. Internet and Intranet network separation is generally performed using techniques / software firewall and proxy server. Seeing the conditions of use of the above, weaknesses in the system generally can penetrate through the mail server for example with external / outside that is used to facilitate access to the mail out of the company. In addition, by using aggressive scanners & program-SNMP SNMP community strings that force can change a router into bridge (bridge) which can then be used for a stepping stone to get into the internal corporate network (Intranet).In order for crackers protected during the attack, the technique cloacking (incognito) is done by jumping from the previous machine has been compromised (conquered) through telnet or rsh. At an intermediary machine that uses Windows attack can be done by jumping from program Wingate. In addition, the jumps can be done through a proxy device that the configuration is not good.After a successful jump and into other systems, usually a cracker to probe the network and collect the information needed. This is done in several ways, for example (1) use nslookup to run the command 'ls', (2) view HTML files on your web server to identify other machines, (3) to see various documents on the FTP server, (4) connecting to mail server and use the command 'expn', and (5) shows the user's finger in other external machines. The next step, a cracker will identify the components of a network that is trusted by whatever system. These network components are usually the administrator machine and the server that is usually considered the most secure in the network. Start by checking access & NFS exports are critical to various directories like / usr / bin, / etc and / home. Exploitation of the machine through the weakness of the Common Gateway Interface (CGI), with access to the file / etc / hosts.allow.Next cracker should identify network components that are weak and can be conquered. Crackers can use the program in Linux like ADMhack, mscan, nmap and many other small scanner. Programs such as 'ps' and 'netstat' in for a trojan (remember the Trojan horse story? In the classic story of ancient greece) to hide the scanning process. For cracker advanced enough to use aggressive-SNMP scanning to scan equipment with SNMP.Once the cracker managed to identify the network components are weak and can be conquered, then the cracker will run a program to conquer the weak daemon program on the server. The program on the server daemon is a program that usually runs in the background (as daemon / demon). The success of conquering this daemon program will allow a cracker to gain access as 'root' (the highest administrator in the server).To eliminate the trace, a cracker usually perform the cleaning operation 'clean-up' operation in a way to clean a variety of log files. And add the program to enter from the back door 'backdooring'. Changing. Rhosts file in / usr / bin for easy access to a machine be conquered through rsh & csh.Furthermore, a cracker can use a machine that has been conquered for his own benefit, eg retrieve sensitive information that should not be read; mengcracking another machine by jumping from the machine be conquered; install a sniffer to see / record the various traffic / communications that pass, even they can turn off the system / network by running the command 'rm-rf / &'. The latter will be very fatal consequences because the system will be destroyed at all, especially if all the software in put in the hard disk. Process re-install the entire system must be done, would be a headache if it is done on machines that run mission critical.Therefore all machines & routers that run mission critical should always check the safety & the patch by newer software. Backup is very important especially on machines that run mission critical in order to be saved from the act of crackers that disable the system with 'rm-rf / &'.For those of us who wrestle daily on the Internet usually it will greatly appreciate the presence of the hacker (not cracker). Because thanks to the hackers, the Internet is there and can we enjoy today, and even continued to be improved to become an even better system. Various weaknesses in the repair system because intelligence fellow hackers who often times they will be working on improvements. voluntarily because of his hobby. Moreover, often the result of his hacking distributed freely on the Internet for the purposes of the Internet community. A culture of mutual aid & Noble actually grew up in an Internet virtual world that typically seem futuristic and far from the social sense.Development of the hobbiest hackers has become critical to the sustainability / survival in vehicle dotcommers Indonesian Internet. As one of fact, in the near future God willing, around mid-April 2001 will be held hacking competition on the Internet to break into a server that has been determined beforehand. The hacking competition at hatched by young children in the Indonesian Linux Users Group (Ltsp) Semarang driven by young people like Kresno Aji (masaji@telkom.net), Agus Hartanto (hartx@writeme.com) & Lekso Budi Handoko (handoko @ riset.dinus.ac.id). Like many other young children, they generally have capital tight budget - help & sponsorship would be very useful and expected by this young fellow.Hopefully all this will add to the spirit of readers, especially young readers, to move in a world of exciting and challenging hackers. If Captain Jean Luc Picard said in the film StarTrek Next Generation, "To boldly go Nowhere no one has gone before".

Jumat, 11 Februari 2011

Enterobacter sakazakii


Pollution Infant Formula: Enterobacter sakazakii
Do not underestimate the problem of dilution formula. It was not a joke because the data can be used as illustration in Africa; 30% of infants died before age one year because of the milk with water is not clean and the wrong way dilution. Improper dilution not only make your child sick or malnourished, but also causes other complications. That is why, the composition of water and milk with the right dose is required.
One contaminant that should be addressed very seriously, is the contamination of milk by bacteria. This is consistent with a variety of news lately become warm conversation in the community. Community unrest began with the preaching of the research team concluded that IPB is 23% milk formulas contain Enterobacter sakazakii.
The bacteria has the potential to cause inflammation of the digestive tract (enteritis), infections of blood circulation (sepsis), as well as infection of the lining of spinal cord and brain (meningitis).
In response to these findings, we recommend that you do not necessarily act rashly. Action alert, more selective in choosing dairy products, full of attitude of prudence is also needed in preparing and giving formula milk to your baby.
Unlike breast milk that contains an antibacterial substance, formula is not bakteriostatis (resist the development and reproduction of bacteria) so easily become a breeding ground for bacteria. The condition of the newborn's body, even more who are born prematurely - are particularly vulnerable to the bacteria.
Actually, other than E. sakazakii, there are other, more types of bacteria should be wary of, namely E. coli and Salmonella. In the Indonesian National Standard (SNI) 01-2970-1999, as an indicator of sanitation still include coliform bacteria E. coli, not Entereobacteriaceae. While the Committee on Food Hygiene (CCFH) recommends the number of samples for testing E. sakazakii for the industry is not as much as the number of samples for Salmonella testing. This indicates, that although E. sakazakii is considered dangerous and should watch out for in the formula, but the risk is not as Salmonella.
The process of bacterial contamination in infant formula could originate from when milk from cows milked. lika not hygienic milking process will allow the development of bacteria. But with advances in technology and knowledge of the milking process, it can be minimized the possibility of bacterial contamination. For example, using a milking machine, thus reducing the risk of contaminated milk from outside air.
The process of microorganism contamination can also occur during storage and during processing. The bottom line processing of infant formula should always be maintained and remain sterile, ranging from milking process to date are processed in the factory. Looking at dairy processing is now very sophisticated and can be guaranteed quality so that contamination of bacteria otherwise nil.
Besides microorganisms contamination, SNI is also set requirements for types of contaminant metals such as copper, lead, zinc, tin, mercury, and arsenic. Given these requirements, infant formula manufacturers are required to provide collateral security in accordance with predetermined. Food and Drug Supervisory Agency (BPOM) usually conduct periodic supervision of various products on the market, not just formula, but other types of food.
But that should realize is, there is no food that is zero risk (no risk at all), but good management will produce food with a very low risk. Modern consumers already have to open horizons of knowledge of food safety information so they can position themselves appropriately to issues that evolved to ensure the health of yourself and family.
♂Azisbay. Diberdayakan oleh Blogger.