sebagai penggantinya pada 2010 dalam sidang akhbar di PWTC, Kuala Lumpur, semalam.
I wonder what Pak Lah have done for Malaysia & rakyat.
Can anyone list out pembangunan or pembaharuan or any good ideas yg come from Pak Lah.
What Pak Lah want to do for Malaysia?
Hmmmm... Let me think...
Hmm.. Err..
Expo Islam Hadhari?
Khairy?
Just it?
Peralihan kuasa Jun 2010?
Why not now, bak kata Nik Aziz.
Apa yg Pak Lah nk provekan lg?
Where: Shah Alam Stadium, Shah Alam
Price: RM 33 AND UP
Ticket
PRICE CATEGORY
GETTING THERE
Jom Tengok !#$%^&*..... hehehehe
Synopsis
Jerry (Jack Black) is a junkyard worker who attempts to sabotage a power plant he suspects of causing his headaches. But he inadvertently causes his brain to become magnetized, leading to the unintentional destruction of all the movies in his friend's (Mos Def) store. In order to keep the store's loyal customers, the pair re-create a long line of films including The Lion King, Rush Hour, Ghostbusters, When We Were Kings, Back to the Future, Driving Miss Daisy, and Robocop , putting themselves and their townspeople into it. They become the biggest stars in their neighborhood.
(Source: Golden Screen Cinemas Sdn. Bhd.)
How to Enter
Post a blog describing your experience using the new NetBeans IDE 6.1, a tutorial, insight, tech tip, cool code sample, request for enhancements, etc. Your blog must be linked to a comment or trackback made to the NetBeans Blogging Contest site. Entries must be new material and not copied from something already written.more info go NetBeans Blogging Contest
10 - At your house
9 - At the office8 - On vacation
7 - At a wedding
6 - At the parents'
5 - On a plane
4 - In the car
3 - At a bar
2 - In a restaurant
1 - In a virtual world
More details at - Ask Men
source : askmen
10 - Adriana Lima
last year rank - 4
9 - Marisa Miller
last year rank - 12
8 - Rihanna
last year rank - 20
7 - Jessica Biel
last year rank - 5
6 - Scarlett Johansson
last year rank - 2
5 - Jessica Alba
last year rank - 3
4 - Eva Mendes
last year rank - 45
3 - Kate Beckinsale
last year rank - 16
2 - Alessandra Ambrosio
last year rank - 6
1 - Katherine Heigl
last year rank - 39
Step 1:
Put the game on mute. The music may be cute and fun, but its only cute and fun for so long before it becomes irritating. Add to that the frustration of constantly being close to your objective then losing, and its time for a change of pace. Put on something that motivates you.
Step 2:
Find the controller that works for you. The game says to use the left and right buttons, but if you’re the type that works better with the stick, use that instead. Many find the stick to give more fluid motions, and for this challenge, fluid is essential.
Step 3:
Start out easy. To start with, just try and beat the goal of 45 seconds. This is easy enough, and will give you a taste of how it really works. From here, try and run the race without getting hit by a bird. Once you've done that, try running the race and hitting 13 balloons. If you can do all of those, you're ready to do them all together!
Step 4:
Know the goal. In order to successfully beat the trainer and earn the Sigil, you need to hit 13 balloons, 0 birds and finish the race with a time of less than 39 seconds. For every bird you hit, you need another 2 balloons (1 to cover the birdstrike and another to cover the time you lost getting hit.) Getting 13 balloons is tough enough, considering their random placement and the trainer’s ability to snag ones you were hoping to get, so really try not to get hit.
Step 5:
Get as many balloons as you can in the initial stretch. This is CRTICALLY important! This is the ONLY stretch of race that you needn’t worry about the birds on. Therefore, concentrate all your energy in the first leg on snagging every balloon! If you can snag 5 or 6 here, you’ve got the makings of a win! If you walk away with less than 3, get ready for a hard race and if you get none at all, the race is a writeoff.
Step 6:
Try and stay as straight as possible. This is really hard since the camera angle is jerky and changes constantly, but after a few runs, you’ll get a good sense of where its going to go.
Step 7:
Stay in the middle of the track as much as possible. Believe it or not, the racetrack, while having the appearance of a wide open field, is actually quite narrow. Bumping the edges causes the camera to jerk and leaves you only one avenue of escape for incoming birds. Try and stay in the middle, so that way you can dodge to both sides instead of just one. Unfortunately, this has the double edge of letting you escape birds easily while exposing you to more of them.
Step 8:
Try your best to make course changes in advance. Jerking towards that balloon at the last minute almost always ends in disaster.
Step 9:
Try, try again! It may take you a hundred races to get the Sigil, but rest assured, the prize is worth the effort. Good luck!
Info : E-How
Step 1:
Secure your wireless router or access point administration interface Most routers and access points have an administrator password that's needed to log into the device and modify any configuration settings. Most devices use a weak default password like "password" or the manufacturer's name, and some don't have a default password at all. As soon as you set up a new WLAN router or access point, your first step should be to change the default password to something else. You may not use this password very often, so be sure to write it down in a safe place so you can refer to it if needed. Without it, the only way to access the router or access point may be to reset it to factory default settings which will wipe away any configuration changes you've made.
Step 2:
Don't broadcast your SSID Most WLAN access points and routers automatically (and continually) broadcast the network's name, or SSID (Service Set IDentifier). This makes setting up wireless clients extremely convenient since you can locate a WLAN without having to know what it's called, but it will also make your WLAN visible to any wireless systems within range of it. Turning off SSID broadcast for your network makes it invisible to your neighbors and passers-by (though it will still be detectible by WLAN "sniffers").
Step 3:
Enable WPA encryption instead of WEP Enable WPA encryption instead of WEP 802.11's WEP (Wired Equivalency Privacy) encryption has well-known weaknesses that make it relatively easy for a determined user with the right equipment to crack the encryption and access the wireless network. A better way to protect your WLAN is with WPA (Wi-Fi Protected Access). WPA provides much better protection and is also easier to use, since your password characters aren't limited to 0-9 and A-F as they are with WEP. WPA support is built into Windows XP (with the latest Service Pack) and virtually all modern wireless hardware and operating systems. A more recent version, WPA2, is found in newer hardware and provides even stronger encryption, but you'll probably need to download an XP patch in order to use it.
Step 4:
Remember that WEP is better than nothing If you find that some of your wireless devices only support WEP encryption (this is often the case with non-PC devices like media players, PDAs, and DVRs), avoid the temptation to skip encryption entirely because in spite of it's flaws, using WEP is still far superior to having no encryption at all. If you do use WEP, don't use an encryption key that's easy to guess like a string of the same or consecutive numbers. Also, although it can be a pain, WEP users should change encryption keys often-- preferably every week.
Step 5:
Use MAC filtering for access control Use MAC filtering for access control Unlike IP addresses, MAC addresses are unique to specific network adapters, so by turning on MAC filtering you can limit network access to only your systems (or those you know about). In order to use MAC filtering you need to find (and enter into the router or AP) the 12-character MAC address of every system that will connect to the network, so it can be inconvenient to set up, especially if you have a lot of wireless clients or if your clients change a lot. MAC addresses can be "spoofed" (imitated) by a knowledgable person, so while it's not a guarantee of security, it does add another hurdle for potential intruders to jump.
Step 6:
Reduce your WLAN transmitter power You won't find this feature on all wireless routers and access points, but some allow you lower the power of your WLAN transmitter and thus reduce the range of the signal. Although it's usually impossible to fine-tune a signal so precisely that it won't leak outside your home or business, with some trial-and-error you can often limit how far outside your premises the signal reaches, minimizing the opportunity for outsiders to access your WLAN.
Step 7:
Disable remote administration Most WLAN routers have the ability to be remotely administered via the Internet. Ideally, you should use this feature only if it lets you define a specific IP address or limited range of addresses that will be able to access the router. Otherwise, almost anyone anywhere could potentially find and access your router. As a rule, unless you absolutely need this capability, it's best to keep remote administration turned off. (It's usually turned off by default, but it's always a good idea to check.)
info : E-How
Step 1:
Jot down the current network settings Start by getting your current network settings. This can be done by opening a Command Window (DOS) and typing in IPCONFIC /ALL
Step 2:
Find a Cheap Router ( wired is best if you don't have the need for wireless ). Searching Froogle will give you plenty of options. If you're not going to use the wireless function, disable it completely using the manufacturers instructions.
Step 3:
Plug the ethernet cable that came with the router into the WLAN port on the router.
Step 4:
Plug the other end of the ethernet cable into the ethernet port on the cable modem.
Step 5:
Connect the router power supply to the router
Step 6:
Connect an ethernet cable to 1 of the LAN ports on the Router and the other end into your computer.
Step 7:
Turn on your computer If the router(most do) has a DHCP server built into it, your PC will get an IP address for the router.
Step 8:
After the computer has finished starting up, try and visit a web site to see if your computer has gotten a connection.
Step 9:
Check your network settings as in STEP 1, if you do not have a DNS setting, you may have to manually enter using the manufacturers instructions.
info : E-How
Step 1:
Type "about:config" into the address bar and hit return.
Step 2:
Scroll down and look for the following entries: network.http.pipelining network.http.proxy.pipelining network.http.pipelining.maxrequests
Step 3:
Alter the entries as follows: Set "network.http.pipelining" to "true" Set "network.http.proxy.pipelining" to "true" Set "network.http.pipelining.maxrequests" to some number like 30. This means it will make 30 requests at once.
Step 4:
Lastly right-click anywhere and select New-> Integer. Name it "nglayout.initialpaint.delay" and set its value to "0". This value is the amount of time the browser waits before it acts on information it recieves.
info : E-How
---------------------------------------------------
Liza Ilias, current gf Ajai.
Info : Murai
DAP pulau majlis angkat sumpah MB Perak hari ini
Penasihat DAP Pusat, Lim Kit Siang berkata, tindakan tersebut diambil kerana pelantikan Ir. Mohammad Nizar Jamaluddin, 51, daripada Pas yang merupakan wakil rakyat parti ketiga dan terkecil dalam kerajaan campuran itu tidak mendapat mandat daripada Jawatankuasa Eksekutif Pusat (CEC) DAP.
dipetik dari utusan malaysia
Amaran kepada Guan Eng -- Jangan buat kenyataan semarakkan ketegangan kaum – PM
PUTRAJAYA 12 Mac – Perdana Menteri, Datuk Seri Abdullah Ahmad Badawi hari ini memberi amaran kepada Ketua Menteri Pulau Pinang, Lim Guan Eng supaya tidak membuat kenyataan yang boleh memarakkan ketegangan kaum....
dipetik dari utusan malaysia
Release Date | 14 February 2008 |
Language | English |
Classification | U |
Running Time | 1 hour 32 minutes |
Director | Doug Liman |
Cast | Hayden Christensen, Rachel Bilson, Jamie Bell, Samuel L. Jackson, Diane Lane. |
Synopsis
David Rice is a “Jumper”, a teleporter, who can go anywhere, anytime. He can see 20 sunsets in one day, whisk his girlfriend across the world in the blink of an eye and grab millions of dollars in minutes. But his life takes a sharp turn when he finds himself relentlessly pursued by a secret organization sworn to kill Jumpers. Forming an uneasy alliance with another young Jumper, David enters a war that has been raging for thousands of years. Chased around the world, he slowly discovers a stunning truth about his own past and his family. From the American Midwest to the streets of Tokyo and the ruins of Rome, David’s global odyssey is the first chapter in an epic adventure.
Trailer go to : click
IPv6 is short for "Internet Protocol Version 6". IPv6 is the "next generation" protocol designed by the IETF to replace the current version Internet Protocol, IP Version 4 ("IPv4").
Most of today's internet uses IPv4, which is now nearly twenty years old. IPv4 has been remarkably resilient in spite of its age, but it is beginning to have problems. Most importantly, there is a growing shortage of IPv4 addresses, which are needed by all new machines added to the Internet.
IPv6 fixes a number of problems in IPv4, such as the limited number of available IPv4 addresses. It also adds many improvements to IPv4 in areas such as routing and network autoconfiguration. IPv6 is expected to gradually replace IPv4, with the two coexisting for a number of years during a transition period.
Some introductory information about the protocol can be found in our IPv6 FAQ. For those interested in the technical details, we have a list of IPv6 related specifications.
Where can I get an IPv6 implementation for my system?
There is software available for most operating systems in common use today. Find your favorite OS on our list of IPv6 implementations. We also have a collection of "how to install" documents for various systems.
What applications run over IPv6 today?
Many common Internet applications already work with IPv6, and more are being ported. See our list of IPv6 enabled applications.
How can I get help with IPv6? Or find out more about it?
A new mailing list for IPv6 users has been established. If you are interested in deploying IPv6 for your site, this could be a valuable resource for you. We've also compiled a list of other sites with IPv6 information.
Go to click
IPv6 address formats
The IPv6 address size is 128 bits. The preferred IPv6 address representation is: xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx where each x is a hexadecimal digit representing 4 bits. IPv6 addresses range from 0000:0000:0000:0000:0000:0000:0000:0000 to ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff.
In addition to this preferred format, IPv6 addresses may be specified in two other shortened formats:
- Omit leading zeros
Specify IPv6 addresses by omitting leading zeros. For example, IPv6 address 1050:0000:0000:0000:0005:0600:300c:326b may be written as 1050:0:0:0:5:600:300c:326b. - Double colon
Specify IPv6 addresses by using double colons (::) in place of a series of zeros. For example, IPv6 address ff06:0:0:0:0:0:0:c3 may be written as ff06::c3. Double colons may be used only once in an IP address.
An alternative format for IPv6 addresses combines the colon and dotted notation, so the IPv4 address may be embedded in the IPv6 address. Hexadecimal values are specified for the left-most 96 bits, and decimal values are specified for the right-most 32 bits indicating the embedded IPv4 address. This format ensures compatibility between IPv6 nodes and IPv4 nodes when you are working in a mixed network environment.
These two types of IPv6 addresses use this alternative format:
- IPv4–mapped IPv6 address
This type of address is used to represent IPv4 nodes as IPv6 addresses. It allows IPv6 applications to communicate directly with IPv4 applications. For example, 0:0:0:0:0:ffff:192.1.56.10 and ::ffff:192.1.56.10/96 (shortened format). - IPv4–compatible IPv6 address
This type of address is used for tunneling. It allows IPv6 nodes to communicate across an IPv4 infrastructure. For example, 0:0:0:0:0:0:192.1.56.10 and ::192.1.56.10/96 (shortened format).
Go to : click
Creating a PowerPoint presentation means juggling a lot of pieces — moving, formatting, and editing objects such as AutoShapes, pictures, text boxes, and the slides themselves. It’s not always immediately apparent how to select one of these items or how to navigate within it. Here are a few indispensable keyboard shortcuts that will quickly become second nature, saving you and your users a significant amount of time.
Note: A comprehensive list of PowerPoint shortcuts is available as a PDF download.
credit ->Jody Gilbert clickNumber 10 BMW 1-Series Coupe
Number 9 Mercedes GL550
Number 8 Lamborghini Reventon
Number 7 Lotus Exige S 240
Number 6 Jaguar XF
Number 5 Lexus IS-F
In previous years, Toyota’s upper-crust affiliate Lexus has been scrutinized for its lack of performance branding. In the fore coming year, the luxury line attempts to break this stigma with the IS-F. Lexus disclosed at the 2007 North American Auto show that the “F” designation was the codename for its very first sketch some 20 years ago. But we assure you this four-door should be a staple for future generations. Crafted on a highly modified skeleton of the IS 250 and 350 sedans, it utilizes an aluminum-block, 32-valve, DOHC, 5.0-liter V8, with an intelligent variable-valve timing configuration and direct-to-cylinder injection with secondary port injectors, amassing 416 horsepower and more than 370 lb-ft of torque. Above all else, the greatest ingenuity was applied to the world’s first paddle-shifted eight-speed automatic transmission. Finessed correctly via the well-proportioned gear ratios and the pilot should reach 0-60 mph in just 4.9 seconds. The IS-F doesn’t skimp on aesthetics either, being treated with a bulging hood, sleek front fenders and vents, rear deck spoiler and quad-tail afterburners.Number 4 Aston Martin DBS
Number 3 Bentley Brooklands
Number 2 Audi R8
Number 1 Rolls-Royce Phantom Drophead
Resources:
www.bmwusa.com
www.mbusa.com
www.lamborghini.com
www.lotuscars.com
www.jaguar.com
www.lexus.com
www.astonmartin.com
www.bentleymotors.com
www.audiusa.com
www.rolls-roycemotorcars.com
By Kristian Alexis - http://www.askmen.com
:)