tag:blogger.com,1999:blog-72206751207962006172024-02-01T21:26:12.027-08:00SejagatUnknownnoreply@blogger.comBlogger102125tag:blogger.com,1999:blog-7220675120796200617.post-18781680051564637582011-06-24T05:52:00.001-07:002011-06-24T05:53:19.981-07:0010 tips to help improve your wireless network<span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace; font-size: x-small;"></span><br />
<h1 style="color: #434343; font-weight: normal; margin-bottom: 10px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;"><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace; font-size: small;">10 tips to help improve your wireless network</span></h1><div><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"><br />
</span></div><div><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"><br />
</span></div><h2 style="color: #434343; font-weight: bold; margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace; font-size: small;">1. Position your wireless router, modem router, or access point in a central location</span></h2><div><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"><br />
</span></div><div><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"></span><br />
<h2 style="color: #434343; font-weight: bold; margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace; font-size: small;">2. Move the router off the floor and away from walls and metal objects (such as metal file cabinets)</span></h2><div><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"><br />
</span></div><br />
<h2 style="color: #434343; font-weight: bold; margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace; font-size: small;">3. Replace your router's antenna</span></h2></div><div><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"><br />
</span></div><div><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"></span><br />
<h2 style="color: #434343; font-weight: bold; margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace; font-size: small;">4. Replace your laptop's wireless PC card-based network adapter</span></h2><div><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"><br />
</span></div><br />
<h2 style="color: #434343; font-weight: bold; margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace; font-size: small;">5. Add a wireless repeater</span></h2></div><div><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"><br />
</span></div><div><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"></span><br />
<h2 style="color: #434343; font-weight: bold; margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace; font-size: small;">6. Change your wireless channel</span></h2><div><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"><br />
</span></div><br />
<h2 style="color: #434343; font-weight: bold; margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace; font-size: small;">7. Reduce wireless interference</span></h2></div><div><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"><br />
</span></div><div><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"></span><br />
<h2 style="color: #434343; font-weight: bold; margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace; font-size: small;">8. Update your firmware or your network adapter driver</span></h2><div><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"><br />
</span></div><br />
<h2 style="color: #434343; font-weight: bold; margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace; font-size: small;">9. Pick equipment from a single vendor</span></h2></div><div><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"><br />
</span></div><div><h2 style="color: #434343; font-weight: bold; margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace; font-size: small;">10. Upgrade 802.11a, 802.11b, and 802.11g devices to 802.11n</span></h2></div><div><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"><br />
</span></div><div><span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;">Please Go this link : <a href="http://www.microsoft.com/athome/setup/wirelesstips.aspx">details</a></span></div>Unknownnoreply@blogger.com2tag:blogger.com,1999:blog-7220675120796200617.post-69934477112700393072011-01-21T03:00:00.000-08:002011-01-21T03:00:37.883-08:00SHAOLIN<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhG40XuB88Quf0Sew9ORRZ8lohS9ARgutua_K0UXJXVYX7sRmYi7dK5nhc2Q5uOsdjMwXNwS9qLdqa8ghVd1wiU4jnnlrXsZ3AhXPQdkNk2NRxXqTRT95AHi8lTOy1AHFMvKN4WXGINcME/s1600/shaolin_temple.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhG40XuB88Quf0Sew9ORRZ8lohS9ARgutua_K0UXJXVYX7sRmYi7dK5nhc2Q5uOsdjMwXNwS9qLdqa8ghVd1wiU4jnnlrXsZ3AhXPQdkNk2NRxXqTRT95AHi8lTOy1AHFMvKN4WXGINcME/s320/shaolin_temple.jpg" width="235" /></a></div><br />
Ni cite wa mau tgk.........<br />
<br />
<br />
<br />
<b>Release Date:</b> 27 January 2011<br />
<b>Language:</b> Cantonese<br />
<b>Subtitle:</b> English / Chinese<br />
<b>Genre:</b> Action<br />
<b>Running Time:</b> 2 Hours 11 Minutes<br />
<b>Director:</b> Benny Chan<br />
<b>Cast:</b> Andy Lau, Nicholas Tse, Jackie Chan, Fan Bing Bing, Wu Jing<br />
<br />
<br />
<b>Synopsis:</b> As a covert officer in the CIA's Counter-Proliferation Division, Valerie Plame (Naomi Watts) leads an investigation into the existence of weapons of mass destruction in Iraq. Valerie's husband, diplomat Joseph Wilson (Sean Penn), is drawn into the investigation to substantiate an alleged sale of enriched uranium from Niger. But when the administration ignores his findings and uses the issue to support the call to war, Joseph writes a New York Times editorial outlining his conclusions and ignites a firestorm of controversy. <br />
<br />
(Source: <a href="http://www.gsc.com.my/Movie/MovieContents.aspx?search=2010.184.shaolin2010.221">Cinema Online)</a>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-7220675120796200617.post-217930038922530572011-01-20T20:07:00.000-08:002011-01-20T20:07:26.428-08:00ARISTA 7048<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxLdhDsh2R7oTPv3o7AtRB8XX2vuGyHYkHJrdmBEzgCruVlXgeT9GHrS51CkPbN43AZBOlR7aceqzeGsnrelMn_VDC_SCFk8HVL9Nts84iCVTpeUsLHLrqrDIDWaJw4B_p4Y5wDP6pDQQ/s1600/7048.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxLdhDsh2R7oTPv3o7AtRB8XX2vuGyHYkHJrdmBEzgCruVlXgeT9GHrS51CkPbN43AZBOlR7aceqzeGsnrelMn_VDC_SCFk8HVL9Nts84iCVTpeUsLHLrqrDIDWaJw4B_p4Y5wDP6pDQQ/s1600/7048.png" /></a></div><br />
<br />
<br />
<br />
<br />
<br />
<br />
<h4>High-Performance Gigabit Ethernet Access</h4><ul><li>Non-Blocking 48 1000 Mbps (RJ-45) & four 1/10GbE uplinks (SFP+)</li>
<li>Layer 2/3 switching up to 176 Gbps and 120 Mpps</li>
<li>40 gigabits of interconnect capacity from leaf to the spine</li>
</ul><h4>Deep Buffer Architecture</h4><ul><li>768 MB of packet memory</li>
<li>All ports can simultaneously buffer up to 50ms of traffic</li>
<li>Fair allocation of bandwidth with 8 virtual output queues per port for congestion mgmt</li>
</ul><h4>Arista EOS™</h4><ul><li>Extensible operating system customizable to customer needs</li>
<li>Fine-grain modular protected memory architecture</li>
<li>Access to Linux tools</li>
</ul><h4>High Availability</h4><ul><li>In-service-software-upgrades (ISSU)</li>
<li>Self-healing stateful fault repair (SFR)</li>
<li>Hot swappable, redundant power supplies and fans</li>
</ul><h4>Layer 4-7 Integration</h4><ul><li>Citrix Systems NetScaler VPX Integration</li>
<li>Layer 4-7 Load Balancing and Application Security</li>
</ul><h4>Datacenter Optimized</h4><ul><li>1 rack unit (RU) </li>
<li>Front-to-rear and reversible airflow options for flexible mounting</li>
<li>Power efficient</li>
</ul><br />
Details Here :<a href="http://www.aristanetworks.com/en/products/7048"> Arista </a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7220675120796200617.post-68741234738718952652011-01-20T19:56:00.000-08:002011-01-20T19:56:16.900-08:00Cisco star joins Arista Networks " Gourlay will be responsible for product and solutions marketing, communications, and the <a href="http://www.aristanetworks.com/en/Technology_Partners">strategic alliances</a> of Arista Networks (which is a vendor that builds <a href="http://www.aristanetworks.com/en/Solutions">networking platforms</a> enabling customers to build network systems optimized for high-performance computing, virtualization and cloud deployments). "<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjae8E6kFIApPFK3q3Y7LMx67aNGkxdrW21CDl_sV4-lONM3B2iXyF-V-IQrOJpfMR7aGLsTjQLgShyphenhyphen7MAenzfYwv1Jpshvvu8ogF1EW8w0nkD80Clj3V_J1BjKt6v7iHcFDfpXu2evv1M/s1600/douglas-gourlay.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjae8E6kFIApPFK3q3Y7LMx67aNGkxdrW21CDl_sV4-lONM3B2iXyF-V-IQrOJpfMR7aGLsTjQLgShyphenhyphen7MAenzfYwv1Jpshvvu8ogF1EW8w0nkD80Clj3V_J1BjKt6v7iHcFDfpXu2evv1M/s1600/douglas-gourlay.gif" /></a></div><br />
<br />
<br />
Details Click Here : <a href="http://www.networkworld.com/community/node/44526">Networkworld</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7220675120796200617.post-9945438832331641792011-01-10T00:02:00.000-08:002011-01-10T00:05:02.840-08:00Safee Sali Beraksi di Luar NegaraKejayaan anak buah " Raja " memenangi Piala AFF 2010 membawa sinar baru dalam mutu bola sepak negara.Terutamanya penyerang sensasi negara " kasut emas Asia Tenggara " memberi ruang dan peluang pada dirinya untuk mencuba nasib di ISL ( Liga Super Indonesia ) . Ini membuktikan anak tempatan mampu untuk mendapat tempat di luar negara. Biarpun hanya di Indonesia, ini satu permulaan yang baik untuk kemajuan bola sepak negara. Persib Bandung , Persib Balik Papan, Pelita Jaya adalah antara kelab indonesia yangberminat untuk mendapatkan khidmat beliau(Safee Sali).<br />
<br />
Persib Bandung menjadi pilihan Safee Sali sekiranya semua berjalan lanjar. Menurut sumber, 70% urusan telah disempunakan. Sekiranya tiada apa-apa halangan, kita mungkin akan melihat anak tempatan menggegar ISL untuk musim baru nanti. ISL yang dijadualkan bermula MEI ini memberi ruang untuk Safee Sali mempersiapkan diri sebelum menjejakkan kaki di bumi seberang.<br />
<br />
Mengikut pengamatan saya, liga ISL lebih mencabar dan menarik. Banyak yang boleh dipelajari oleh Safee Sali. Mungkin disana, Safee Sali tidak akan keletihan mencari bola untuk menjaringkan gol sepertimana di sini. Tetapi mungkin Safee Sali akan keletihan kerana terlalu banyak bola dihantar kepadanya untuk dijaringkan.<br />
<br />
<br />
Sumber : Dijedok dari : Klik <a href="http://utusan.com.my/utusan/info.asp?y=2011&dt=0110&pub=Utusan_Malaysia&sec=Sukan&pg=su_01.htm">Sini</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7220675120796200617.post-51764151769968282032011-01-09T23:36:00.000-08:002011-01-09T23:38:56.418-08:00FaceBook<h2 class="post-title" style="color: #3d85c6; text-align: center;">FACEBOOK WILL END ON MARCH 15th!</h2><h2 class="post-title" style="color: #3d85c6; text-align: center;"> </h2><h2 class="post-title" style="color: #3d85c6; text-align: left;"></h2><h2 class="post-title" style="color: #3d85c6; font-weight: normal; text-align: left;"><span style="font-size: small;">“After March 15th the whole website shuts down,” said Avrat Humarthi, Vice President of Technical Affairs at Facebook. “So if you ever want to see your pictures again, I recommend you take them off the internet. You won’t be able to get them back once Facebook goes out of business.”</span></h2><h2 class="post-title" style="color: #3d85c6; font-weight: normal; text-align: left;"><span style="font-size: small;"> </span></h2><h2 class="post-title" style="color: #3d85c6; font-weight: normal; text-align: left;"><span style="font-size: small;">Source :Click <a href="http://weeklyworldnews.com/headlines/27321/facebook-will-end-on-march-15th/">This</a></span></h2><h2 class="post-title" style="color: #3d85c6; font-weight: normal; text-align: left;"><span style="font-size: small;"> </span></h2><h2 class="post-title" style="color: #3d85c6; font-weight: normal; text-align: left;"><span style="font-size: small;"> </span> </h2><h2 class="post-title" style="color: #3d85c6; text-align: center;"></h2><h2 class="post-title" style="color: #3d85c6; text-align: center;"></h2><h2 class="post-title" style="color: #3d85c6; text-align: center;"></h2><h2 class="post-title" style="color: #3d85c6; text-align: center;"></h2>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7220675120796200617.post-62322127755378035992010-11-25T10:52:00.000-08:002010-11-25T10:52:07.387-08:00<h1 id="watch-headline-title" style="color: black; font-weight: normal; text-align: left;"><span style="font-size: small;"><span class="" dir="ltr" id="eow-title" title="Bon Jovi - It's My Life"><iframe class="youtube-player" frameborder="0" height="390" src="http://www.youtube.com/embed/vx2u5uUu3DE" title="YouTube video player" type="text/html" width="425"></iframe> </span></span></h1><h1 id="watch-headline-title" style="color: black; font-weight: normal; text-align: center;"><span style="font-size: small;"><span class="" dir="ltr" id="eow-title" title="Bon Jovi - It's My Life"> </span></span></h1><h1 id="watch-headline-title" style="color: black; font-weight: normal; text-align: center;"><span style="font-size: small;"><span class="" dir="ltr" id="eow-title" title="Bon Jovi - It's My Life"> </span><span class="" dir="ltr" id="eow-title" title="Bon Jovi - It's My Life">Bon Jovi - It's My Life</span></span></h1><div style="color: black; text-align: center;"><br />
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7220675120796200617.post-16456687322009197322010-11-25T10:47:00.000-08:002010-11-25T10:47:25.015-08:00<iframe class="youtube-player" frameborder="0" height="390" src="http://www.youtube.com/embed/vS8w0hNpJ2w" title="YouTube video player" type="text/html" width="425"></iframe><br />
<span style="font-size: small;"><br />
</span><br />
<br />
<h1 id="watch-headline-title" style="font-weight: normal; text-align: center;"><span style="font-size: small;"><span class="" dir="ltr" id="eow-title" title="The Corrs-Radio [unplugged]">The Corrs-Radio [unplugged] </span></span></h1>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7220675120796200617.post-35453943497236698922010-11-25T10:46:00.000-08:002010-11-25T10:46:17.263-08:00<iframe class="youtube-player" frameborder="0" height="390" src="http://www.youtube.com/embed/A87Mqo_yDV4" title="YouTube video player" type="text/html" width="425"></iframe><br />
<div style="text-align: center;"><span style="font-size: small;"><br />
</span></div><div style="text-align: center;"><span class="" dir="ltr" id="eow-title" title="Runaway -The Corrs Unplugged"><span style="font-size: small;">Runaway -The Corrs Unplugged</span></span></div><h1 id="watch-headline-title"><span class="" dir="ltr" id="eow-title" title="Runaway -The Corrs Unplugged"> </span></h1>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7220675120796200617.post-25010685262214350622010-11-25T10:43:00.000-08:002010-11-25T10:43:17.399-08:00<iframe class="youtube-player" frameborder="0" height="390" src="http://www.youtube.com/embed/vzerbXFwGCE" title="YouTube video player" type="text/html" width="425"></iframe><br />
<span style="font-size: small;"><br />
</span><br />
<h1 id="watch-headline-title" style="font-weight: normal; text-align: center;"><span style="font-size: small;"><span class="" dir="ltr" id="eow-title" title="The Corrs - Breathless [Official Video]">The Corrs - Breathless</span></span></h1>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7220675120796200617.post-46167033149743919442010-11-05T07:01:00.000-07:002010-11-05T07:01:03.922-07:00Firewall<h2 class="docChapterTitle" style="text-align: center;">What Are Firewalls</h2><h2 class="docChapterTitle" style="text-align: left;"><span style="font-size: small;"><span style="font-weight: normal;">Firewalls are an integral part of any secure network. As we continue the discussion of the various security features and designs, it is important to take an in-depth look at how firewalls protect a network.</span></span> </h2><h2 class="docChapterTitle" style="text-align: left;"><br />
3 Part : 1 - Firewalls</h2><h2 class="docChapterTitle" style="text-align: left;"> 2 - Types of Firewalls</h2><h2 class="docChapterTitle" style="text-align: left;"> 3 - Positioning of Firewalls</h2><h2 class="docChapterTitle" style="text-align: left;"><br />
</h2><h2 class="docChapterTitle" style="text-align: left;">Firewalls</h2><div class="docText">The term <span class="docEmphasis">firewall</span> has many definitions in the industry. The definition depends on how and to what extent a firewall is used in a network. Generally, a firewall is a network device that, based on a defined network policy, implements access control for a network.<a href="" name="idd1e18366"></a><a href="" name="idd1e18373"></a><a href="" name="idd1e18378"></a></div><div class="docText">Apart from doing this basic job, firewalls are often used as network address translating devices, because they often tend to sit on the edge of a network and serve as entry points into the network. </div><div class="docText"><br />
</div><div class="docText" style="text-align: center;"> shows the basic philosophy of a firewall setup.</div><div class="docText" style="text-align: center;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkiYZn_h_YGVTxY_YhRalS7Eh-9b96ZTQCddP6UudC911LYBB5kP_besptz1SzV9QcSDzmZ6ZMigcXWS3GZjhtx-__DbjWyPLBHDkGJ1sMCCKNtE-6DTX32CiNji4ZG5oWG1iuStyno8w/s1600/07fig01.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="155" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkiYZn_h_YGVTxY_YhRalS7Eh-9b96ZTQCddP6UudC911LYBB5kP_besptz1SzV9QcSDzmZ6ZMigcXWS3GZjhtx-__DbjWyPLBHDkGJ1sMCCKNtE-6DTX32CiNji4ZG5oWG1iuStyno8w/s400/07fig01.gif" width="400" /> </a></div><div class="separator" style="clear: both; text-align: center;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><br />
</div><div class="docText">Some important characteristics distinguish a serious, industrial-strength firewall from other devices that go only halfway toward providing a true security solution are:</div><ul><li><div class="docList">Logging and notification ability</div></li>
<li><div class="docList">High-volume packet inspection</div></li>
<li><div class="docList">Ease of configuration</div></li>
<li><div class="docList">Device security and redundancy</div><div class="docList"><br />
</div><h4 class="docSection2Title">Logging and Notification Ability</h4><div class="docText">A firewall is not much good unless it has a good logging facility. Good logging not only allows network administrators to detect if attacks are being orchestrated against their networks, but it also lets them detect if what is considered normal traffic originating from trusted users is being used for ungainly purposes. Good logging allows network administrators to filter much information based on traffic tagging and get to the stuff that really matters very quickly. Obviously, good logging is different from logging everything that happens.</div>"Good logging" also refers to notification ability. Not only do you want the firewall to log the message, but you also want it to notify the administrator when alarm conditions are detected. Notification is often done by software that sorts through the log messages generated by the firewall device. Based on the criticality of the messages, the software generates notifications in the form of pages, e-mails, or other such means to notify a network administrator. The purpose of the notification is to let the administrator make a timely modification to either the configuration or the software image of the firewall itself to decrease the threat and impact of an attack or potential attack.<div class="docList"><br />
</div><div class="docList"><br />
</div><h4 class="docSection2Title">High-Volume Packet Inspection</h4><div class="docText">One test of a firewall is its ability to inspect a large amount of network traffic against a configured set of rules without significantly degrading network performance. How much a firewall should be able to handle varies from network to network, but with today's demanding networks, a firewall should not become a bottleneck for the network it is sitting on. It is important to keep a firewall from becoming a bottleneck in a network because of its placement in the network. Firewalls are generally placed at the periphery of a network and are the only entry point into the network. Consequently, a slowdown at this critical place in the network can slow down the entire network.<a href="" name="idd1e18453"></a><a href="" name="idd1e18458"></a><a href="" name="idd1e18465"></a><a href="" name="idd1e18470"></a></div><div class="docText">Various factors can affect the speed at which a firewall processes the data passing through it. Most of the limitations are in hardware processor speed and in the optimization of software code that keeps track of the connections being established through the firewall. Another limiting factor is the availability of the various types of interface cards on the firewall. A firewall that can support Gigabit Ethernet in a Gigabit Ethernet environment is obviously more useful than one that can only do Fast Ethernet in a faster network such as Gigabit Ethernet.</div><div class="docText">One thing that often helps a firewall process traffic quickly is to offload some of the work to other software. This work includes notifications, URL filter-based access control, processing of firewall logs for filtering important information, and other such functions. These often-resource-intensive functions can take up a lot of the firewall's capacity and can slow it down.</div><a href="" name="ch07lev2sec3"></a><h4 class="docSection2Title">Ease of Configuration</h4><div class="docText">Ease of configuration includes the ability to set up the firewall quickly and to easily see configuration errors. Ease of configuration is very important in a firewall. The reason is that many network breaches that occur in spite of a firewall's being in place are not due to a bug in the firewall software or the underlying OS on which the firewall sits. They are due to an error in the firewall's configuration! Some of the "credit" for this goes to the person who configures the firewall. However, an easy-to-configure firewall mitigates many errors that might be produced in setting it up.<a href="" name="idd1e18488"></a><a href="" name="idd1e18493"></a><a href="" name="idd1e18498"></a><a href="" name="idd1e18503"></a></div><div class="docText">It is important for a firewall to have a configuration utility that allows easy translation of the site security policy into the configuration. It is very useful to have a graphical representation of the network architecture as part of the configuration utility to avoid common configuration errors. Similarly, the terminology used in the configuration utility needs to be in synch with normally accepted security site topological nomenclature, such as DMZ zones, high-security zones, and low-security zones. Use of ambiguous terminology in the configuration utility can cause human error to creep in.</div><div class="docText">Centralized administrative tools that allow for the simultaneous management of multiple security devices, including firewalls, are very useful for maintaining uniformly error-free configurations.<a href="" name="idd1e18515"></a><a href="" name="idd1e18518"></a><a href="" name="idd1e18523"></a><a href="" name="idd1e18528"></a><a href="" name="idd1e18533"></a></div><a href="" name="ch07lev2sec4"></a><h4 class="docSection2Title">Device Security and Redundancy</h4><div class="docText">The security of the firewall device itself is a critical component of the overall security that a firewall can provide to a network. A firewall that is insecure itself can easily allow intruders to break in and modify the configuration to allow further access into the network. There are two main areas where a firewall needs to have strength in order to avoid issues surrounding its own security:<a href="" name="idd1e18543"></a><a href="" name="idd1e18548"></a></div></li>
<li><div class="docText"> <span class="docEmphStrong">The security of the underlying operating system</span>- If the firewall software runs on a separate operating system, the vulnerabilities of that operating system have the potential to become the vulnerabilities of the firewall itself. It is important to install the firewall software on an operating system known to be robust against network security threats and to keep patching the system regularly to fill any gaps that become known.<a href="" name="idd1e18568"></a></div></li>
<li><div class="docText"> <span class="docEmphStrong">Secure access to the firewall for administrative purposes</span>- It is important for a firewall to have secure mechanisms available for allowing administrative access to it. Such methods can include encryption coupled with proper authentication mechanisms. Weakness in the implementation of such access mechanisms can allow the firewall to become an easy target for intrusions of various kinds.</div><div class="docList"><br />
</div><div class="docList">An issue related to device security is the firewall's ability to have a redundant presence with another firewall in the network. Such redundancy allows the backup device to take up the operations of a faulty primary device. In the case of an attack on the primary device that leaves it nonoperational, redundancy also allows for continued operation of the network.</div><div class="docList"> </div><div class="docList"> </div><div class="docList"> </div><h3 class="docSection1Title">Types of Firewalls</h3><div class="docText">In order to gain a thorough understanding of firewall technology, it is important to understand the various types of firewalls. These various types of firewalls provide more or less the same functions that were outlined earlier. However, their methods of doing so provide differentiation in terms of performance and level of security offered.</div><div class="docText">The firewalls discussed in this section are divided into five categories based on the mechanism that each uses to provide firewall functionality:</div></li>
<li><div class="docList">Circuit-level firewalls</div></li>
<li><div class="docList">Proxy server firewalls</div></li>
<li><div class="docList">Nonstateful packet filters</div></li>
<li><div class="docList">Stateful packet filters</div></li>
<li><div class="docList">Personal firewalls</div></li>
</ul><div class="docText">These various types of firewalls gather different types of information from the data flowing through them to keep track of legitimate and illegitimate traffic and to protect against unauthorized access. The type of information they use often also determines the level of security they provide.</div><a href="" name="ch07lev2sec5"></a><h4 class="docSection2Title">Circuit-Level Firewalls</h4><div class="docText">These firewalls act as relays for TCP connections. They intercept TCP connections being made to a host behind them and complete the handshake on behalf of that host. Only after the connection is established is the traffic allowed to flow to the client. Also, the firewall makes sure that as soon as the connection is established, only data packets belonging to the connection are allowed to go through.<a href="" name="idd1e18636"></a><a href="" name="idd1e18641"></a><a href="" name="idd1e18644"></a></div><div class="docText">Circuit-level firewalls do not validate the payload or any other information in the packet, so they are fairly fast. These firewalls essentially are interested only in making sure that the TCP handshake is properly completed before a connection is allowed. Consequently, these firewalls do not allow access restrictions to be placed on protocols other than TCP and do not allow the use of payload information in the higher-layer protocols to restrict access.</div><a href="" name="ch07lev2sec6"></a><h4 class="docSection2Title">Proxy Server Firewalls</h4><div class="docText">Proxy server firewalls work by examining packets at the application layer. Essentially a proxy server intercepts the requests being made by the applications sitting behind it and performs the requested functions on behalf of the requesting application. It then forwards the results to the application. In this way it can provide a fairly high level of security to the applications, which do not have to interact directly with outside applications and servers.<a href="" name="idd1e18661"></a><a href="" name="idd1e18666"></a><a href="" name="idd1e18669"></a></div><div class="docText">Proxy servers are advantageous in the sense that they are aware of application-level protocols and they can restrict or allow access based on these protocols. They also can look into the data portions of the packets and use that information to restrict access. However, this very capability of processing the packets at a higher layer of the stack can contribute to the slowness of proxy servers. Also, because the inbound traffic has to be processed by the proxy server as well as the end-user application, further degradation in speed can occur. Proxy servers often are not transparent to end users who have to make modifications to their applications in order to use the proxy server. For each new application that must go through a proxy firewall, modifications need to be made to the firewall's protocol stack to handle that type of application.</div><a href="" name="ch07lev2sec7"></a><h4 class="docSection2Title">Nonstateful Packet Filters</h4><div class="docText">Nonstateful packet filters are fairly simple devices that sit on the periphery of a network and, based on a set of rules, allow some packets through while blocking others. The decisions are made based on the addressing information contained in network layer protocols such as IP and, in some cases, information contained in transport layer protocols such as TCP or UDP headers as well.</div><div class="docText">Nonstateful packet filters are fairly simple devices, but to function properly they require a thorough understanding of the usage of services required by a network to be protected. Although these filters can be fast because they do not proxy any traffic but only inspect it as it passes through, they do not have any knowledge of the application-level protocols or the data elements in the packet. Consequently, their usefulness is limited. These filters also do not retain any knowledge of the sessions established through them. Instead, they just keep tabs on what is immediately passing through.. The use of simple and extended access lists (without the <span class="docEmphStrong">established</span> keyword) on routers are examples of such firewalls.<a href="" name="idd1e18695"></a><a href="" name="idd1e18700"></a><a href="" name="idd1e18703"></a><a href="" name="idd1e18710"></a></div><a href="" name="ch07lev2sec8"></a><h4 class="docSection2Title">Stateful Packet Filters</h4><div class="docText">Stateful packet filters are more intelligent than simple packet filters in that they can block pretty much all incoming traffic and still can allow return traffic for the traffic generated by machines sitting behind them. They do so by keeping a record of the transport layer connections that are established through them by the hosts behind them.<a href="" name="idd1e18722"></a><a href="" name="idd1e18727"></a><a href="" name="idd1e18730"></a><a href="" name="idd1e18737"></a></div><div class="docText">Stateful packet filters are the mechanism for implementing firewalls in most modern networks. Stateful packet filters can keep track of a variety of information regarding the packets that are traversing them, including the following:</div><ul><li><div class="docList">Source and destination TCP and UDP port numbers</div></li>
<li><div class="docList">TCP sequence numbering</div></li>
<li><div class="docList">TCP flags</div></li>
<li><div class="docList">TCP session state based on the RFCed TCP state machine</div></li>
<li><div class="docList">UDP traffic tracking based on timers</div></li>
</ul><div class="docText">Stateful firewalls often have built-in advanced IP layer handling features such as fragment reassembly and clearing or rejecting of IP options.</div><div class="docText">Many modern stateful packet filters are aware of application layer protocols such as FTP and HTTP and can perform access-control functions based on these protocols' specific needs.</div><a href="" name="ch07lev2sec9"></a><h4 class="docSection2Title">Personal Firewalls</h4><div class="docText">Personal firewalls are firewalls installed on personal computers. They are designed to protect against network attacks. These firewalls are generally aware of the applications running on the machine and allow only connections established by these applications to operate on the machine.</div>A personal firewall is a useful addition to any PC because it increases the level of security already offered by a network firewall. However, because many of the attacks on today's networks originate from inside the protected network, a PC firewall is an even more useful tool, because network firewalls cannot protect against these attacks. Personal firewalls come in a variety of flavors. Most are implemented to be aware of the applications running on the PC. However, they are designed to not require any changes from the user applications running on the PC, as is required in the case of proxy servers.<br />
<h2 class="docChapterTitle" style="text-align: left;"> </h2><br />
<h3 class="docSection1Title">Positioning of Firewalls</h3><div class="docText">Positioning a firewall is as important as using the right type of firewall and configuring it correctly. Positioning a firewall determines which traffic will be screened and whether there are any back doors into the protected network. Some of the basic guidelines for positioning a firewall are as follows:<a href="" name="idd1e18810"></a><a href="" name="idd1e18815"></a><a href="" name="idd1e18818"></a></div><ul><li><div class="docText"> <span class="docEmphStrong">Topological location of the firewall</span>- It is often a good idea to place a firewall on the periphery of a private network, as close to the final exit and initial entry point into the network as possible. The network includes any remote-access devices and VPN concentrators sitting on the its periphery. This allows the greatest number of devices on the private network to be protected by the firewall and also helps keep the boundary of the private and public network very clear. A network in which there is ambiguity as to what is public and what is private is a network waiting to be attacked.<a href="" name="idd1e18838"></a></div><div class="docList">Certain situations might also warrant placing a firewall within a private network in addition to placing a firewall at the entry point. An example of such a situation is when a critical segment of the network, such as the segment housing the financial or HR servers, needs to be protected from the rest of the users on the private network.</div><div class="docList">Also, in most cases firewalls should not be placed in parallel to other network devices such as routers. This can cause the firewall to be bypassed. You should also avoid any other additions to the network topology that can result in the firewall's getting bypassed.</div></li>
<li><div class="docText"> <span class="docEmphStrong">Accessibility and security zones</span>- If there are servers that need to be accessed from the public network, such as Web servers, it is often a good idea to put them in a demilitarized zone (DMZ) built on the firewall rather than keep them inside the private network. The reason for this is that if these servers are on the internal network and the firewall has been asked to allow some level of access to these servers from the public network, this access opens a door for attackers. They can use this access to gain control of the servers or to stage attacks on the private network using the access holes created in the firewall. A DMZ allows publicly accessible servers to be placed in an area that is physically separate from the private network, forcing the attackers who have somehow gained control over these servers to go through the firewall again to gain access to the private network.</div></li>
<li><div class="docText"> <span class="docEmphStrong">Asymmetric routing</span>- Most modern firewalls work on the concept of keeping state information for the connections made through them from the private network to the public network. This information is used to allow only the packets belonging to the legitimate connections back into the private network. Consequently, it is important that the exit and entry points of all traffic to and from the private network be through the same firewall. If this is not the case, a firewall may drop packets belonging to legitimate connections started from the internal network for which it has no state information. This scenario is known as asymmetric routing.<a href="" name="idd1e18880"></a><a href="" name="idd1e18885"></a></div></li>
<li><div class="docText"> <span class="docEmphStrong">Layering firewalls</span>- In networks where a high degree of security is desired, often two or more firewalls can be deployed in series. If the first firewall fails, the second one can continue to function. This technique is often used as a safeguard against network attacks that exploit bugs in a firewall's software. If one firewall's software is vulnerable to an attack, hopefully the software of the second firewall sitting behind it will not be. Firewalls from different vendors are often used in these setups to ensure that one incorrect or compromised implementation can be backed up by the other vendor's implementation.<a href="" name="idd1e18899"></a><a href="" name="idd1e18904"></a><a href="" name="idd1e18907"></a><a href="" name="idd1e18914"></a><a href="" name="idd1e18919"></a></div></li>
</ul><div class="docText">Positioning a firewall can be a complicated issue in a large network with multiple subsegments and entry points. Often a network that has not used a firewall in the past needs to be restructured to allow a firewall to be placed properly to protect it. This is necessary to create a single point of entry and exit and to remove the issue of asymmetric routing.</div><div class="docText"><br />
</div><h3 class="docSection1Title">Summary</h3><div class="docText">Firewalls are a critical component of any secure network. Firewalls in one form or another provide restricted access to a network based on a defined security policy. In order to make the best use of a firewall's capabilities, however, it is critical to position it in the network where it can provide the most security coverage possible.</div><div class="docText"><br />
</div><div class="docText">Credit for : <a href="http://book.soundonair.ru/cisco/ch07.html"> Book </a></div><div class="docText"><br />
</div><br />
<h2 class="docChapterTitle" style="text-align: left;"> </h2><br />
<h2 class="docChapterTitle" style="text-align: left;"><br />
</h2><h2 class="docChapterTitle" style="text-align: left;"><br />
</h2>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7220675120796200617.post-85552527863535421732010-10-11T09:03:00.001-07:002010-10-11T09:35:33.683-07:00Cloud Computing<div class="MsoNormal" style="text-align: center;"><span style="font-family: Arial; font-size: 10pt;"><b>CLOCO </b></span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Arial; font-size: 10pt;">Teknologi berkembang sangat pantas. Mungkin sekarang kite rase itu bende baru. Tapi akan datang kite akan rase bende yang baru hari ini akan jadi sejarah atau suatu yang sudah lapok. Aku tertarik dengan perkataan ni " Cloud Computing " ( CLOCO ). Apabila sume application, information dan sebagainye dikongsi dalam satu network(Cloud).</span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Arial; font-size: 10pt;">Macam biase, untuk kite beralih ke satu tempat yang lain atau dari teknologi yang sedia ade kepada teknologi yang bar, banyak perkara yang perlu diambil kira.</span></div><div class="MsoNormal"><span style="font-family: Arial; font-size: 10pt;">Pada saya kite kenalah memahami " What is cloud computing". Ape yang sebenarnye "cloud computing" buat. Kite juga perlu memahami bagaimana "Cloud Computing" beroperasi, dari segi " architecture " terutamanya. Kita jangan "confused" dengan "Autonomic Computing", "Client-Server Model", "Grid Computing", "Mainframe Computer", "Utility Computer","Peer-to-Peer".</span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Arial; font-size: 10pt;">Ape yang menarik nye. Pengguna "Cloud Computing" tak perlu ade infrastructure. Contohnye, sekiranya didalam satu network dimana terdapt banyak" site or brances " , sume branches tidak perlu ade server untuk " access " sistem atau aplikasi. Dengan menggunakan " Cloud Computing " hanya di DC (datacenter) sahaja memerlukan server.</span></div><div class="MsoNormal"><span style="font-family: Arial; font-size: 10pt;">Banyak kelebihannya, diamana kos dari segi infrastructure untuk setiap branches boleh dikurangkan.( server,place,electrical,storage ,dll).</span></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"></div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="font-family: Arial; font-size: 10pt;">Go to this link to know details.... <a href="http://clocom.wordpress.com/">http://clocom.wordpress.com</a> </span></div><div class="MsoNormal"><br />
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7220675120796200617.post-53324307764244090652010-10-01T01:54:00.000-07:002010-10-01T01:55:18.993-07:00Personal PC Audit<div class="separator" style="clear: both; text-align: center;"></div>Get your PC information.<br />
<br />
Ni caranye. Banyak software sebenarnye.Tapi aku guna tools ni. Belarc Advisor .<br />
Pada aku ok laa.sebab ape info yang aku nak boleh dapat dari tools ni.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://www.belarc.com/free_download.html"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-NSDqlYhC6vTwelTek3s3F7WrGm-Obw9vgHL4SAdmFkHIJ19TYiO79jOhDHkBUQRNvwRExvlUjQ_NWHPKoUtSuV9HV2sDoKYeoFyZYl-fESJO2yP3aaav-5rJMN2WYw9xdApK9ECcfcg/s1600/belarc_logo.gif" /></a></div><br />
<br />
<br />
Sume info pasal laptop/pc .Leh dapat info serial number software yang kite install. security info laptop/pc kite.<br />
sume jenis software yang ade dalam pc/laptop kite pun leh tau gak.dan byk lagi laa..leh tgk kat sini or try je download n install. <a href="http://www.belarc.com/free_download.html">BELARC </a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7220675120796200617.post-1591542389783320352010-09-27T10:34:00.000-07:002010-09-27T10:34:41.775-07:00Pakej Baru Menara Petronas.Dalam utusan ade kuar pasal pakej baru yang mantap utk ke menara petronas.<br />
<br />
Ape yang menarik dan pakej baru tu...<br />
<br />
" Petronas dalam satu kenyataan hari ini berkata, pakej-pakej yang akan diperkenalkan sebagai tambahan kepada lawatan sedia ada ke Skybridge di tingkat 41 itu akan turut merangkumi lawatan ke dek pemerhatian di aras teratas Menara 2, serta jamuan di Kelab Petroleum Malaysia (MPC) di bangunan yang sama. "<br />
<br />
dipetik dari Utusan : <a href="http://utusan.com.my/utusan/info.asp?y=2010&dt=0927&pub=Utusan_Malaysia&sec=Terkini&pg=bt_28.htm">nah ambik ni</a><br />
<br />
Sejajar dengan kesungguhan untuk menjadikan menara berkembar petronas sebagai tumpuan utama pelancong dlam dan luar negara. Pi la try nanti. Aku pun tak penah melawat lebih2 petronas tu. pi isetan tu je..ekeke.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7220675120796200617.post-27528777134277178772010-09-27T10:29:00.000-07:002010-09-27T10:29:06.626-07:00MCTF10Hallu sume.<br />
<br />
Kembali lagi Malaysia Career & Training Fair<br />
<br />
Nah ambik link ni. byk company ade. pilih je nak mane satu.<br />
<br />
Career yang di cari ade disini. jom jom..... <a href="http://www.jobstreet.com.my/announcement/2010/m/mctf10_oct_js/co_listing.htm">MCTF10</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7220675120796200617.post-48506175948157990932010-09-27T10:25:00.000-07:002010-09-27T10:25:24.151-07:00UltraSurfWhat is ultrasurf......= ini software leh lepaskan korang dari cengkaman web filtering. Ape2 yang kene blok kat tempat koje lee.<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://www.ultrareach.com/"><img border="0" height="96" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhG_3P17y2Of0OSgDJ2yGBPWpaDQc1jbIGxOTcJK98PrHRcVS71og-FtXXo9LDoT-nrNs4ntOSTBHr2s8TdnVeuLhBqo_bo3D2hObW2Je3SmRuJzMFO8AwM7LWa45ChET_Nh0K7L5bT1nw/s320/downloadBTN_BG.gif" width="320" />nak download kat sini</a></div><br />
<br />
Nak tau lebih2 bace la kat sini. aku pun ambik kat sini...<a href="http://www.ultrareach.com/"> UltraSurf</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7220675120796200617.post-60906199373693146332010-09-26T05:18:00.000-07:002010-09-26T05:18:31.874-07:00Apa itu " Kuasa Melayu "Bak kate Tuah ( Laksamana Hang Tuah pada zaman Kesultanan Melaka)<strong> "Takkan Melayu Hilang di Dunia"</strong><br />
<br />
Kata-kata negarawan terulung kita Tun Dr Mahathir<strong> " Melayu mudah lupe "</strong><br />
<br />
Tertarik aku dgn Utusan Malaysia<strong> </strong>keluaran 26 september 2010. " Kuasa melayu ". dengan panjang lebar dalam utusan. ( nak bace silakan <a href="http://utusan.com.my/utusan/info.asp?y=2010&dt=0926&pub=Utusan_Malaysia&sec=Rencana&pg=re_02.htm">Utusan Malaysia</a> ).<br />
<br />
<br />
Pada pemikiran aku yang biase2 je ni. Melayu memang takkan hilang didunia, tapi melayu mungkin akan hilang ape yang ade pada hari ini. Ape yang melayu ade pada hari ini adalah hanya ada KUASA. KUASA memerintah negara tercinta Malaysia. KUASA dalam menentukan hala tuju negara tercinta MALAYSIA.<br />
<br />
Tapi tanpa disedari.Melayu mudah lupe dengan ape yang ade pada hari ini.Ape yang Melayu miliki pada hari ini. Apa yang Pemimpin melayu yang benar-benar jujur dalam memeperjuangkan KUASA dan HAK melayu.( Tak kesah la mane2 kumpulan pun)<br />
Pada aku, PEMIMPIN Melayu skrg kene paham. Melayu tidak ade ape-ape selain KUASA. MELAYU tidak handal dalam ekonomi. Oleh itu perkasa kan Ekonomi melayu. Jagalah KUASA melayu yang ade sekarang ni, supaya tak di rampas oleh orang yang tak sepatutnye...Ade Paham. :)<br />
<br />
Jangan bile dah terkena baru nak menyesal..... ni laa pendapat aku yang telah aku rumuskan.<br />
<br />
Melayu takkan hilang,tapi kuase mungkin boleh hilang. <br />
<br />
<strong> </strong>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7220675120796200617.post-91306385856446665722010-09-25T09:52:00.001-07:002010-09-25T10:28:40.813-07:00iphone 4G = Digi<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxsrpFOl9f94rfR4moHSZsemu2DUjxlahoBIyw2y01cucITe4nn1bU4ppCc_ZAFv7P9r2Sqv2gWUwBH1Cb2b4IGX0prIIVzptd10MlbevdXvdXxvCabaElv0keWyeJzT6WfRf4B7h_gC4/s1600/img_compareus_iphone4.gif" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><br />
</a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8vz4MYJ2864UbaZv9ds-dLtP1zm9UlZAu2790f7peCOQihYMOdflUo6FPZNRoiODN2_u631Sah_AaCQoqQm7aqvmoTC9GB8mjd9mBbEW4Zabt8ALgEvFVcPmiZM2LgEYiXqjcxTuo4sU/s1600/img_compareus_iphone4.gif" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><br />
</a><br />
<a href="http://www.digi.com.my/iphone/index.html" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5520895203916273890" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJuhBWXShTrIk7fqCAgQBR15UfhLOfsdA2Wc-X0OYykwccylIzPR_MUOsN74pg7KE24Fkve5tM2X37yjT7-VM_SxKCJaJI2_kET-ffe_p7iNFjvX00B3YlYZFPnV20G_RwUJdnkVdDuz8/s320/digi.JPG" style="cursor: pointer; display: block; height: 192px; margin: 0px auto 10px; text-align: center; width: 376px;" /></a><br />
iphone 4G is coming to town......<br />
<br />
Harga mcm gempak.. tapi tak tau laa gempak ke tak. kalu digi ade 3 plan. idigi88. idigi138. idigi238.<br />
<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxsrpFOl9f94rfR4moHSZsemu2DUjxlahoBIyw2y01cucITe4nn1bU4ppCc_ZAFv7P9r2Sqv2gWUwBH1Cb2b4IGX0prIIVzptd10MlbevdXvdXxvCabaElv0keWyeJzT6WfRf4B7h_gC4/s1600/img_compareus_iphone4.gif"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5520898330880152162" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxsrpFOl9f94rfR4moHSZsemu2DUjxlahoBIyw2y01cucITe4nn1bU4ppCc_ZAFv7P9r2Sqv2gWUwBH1Cb2b4IGX0prIIVzptd10MlbevdXvdXxvCabaElv0keWyeJzT6WfRf4B7h_gC4/s400/img_compareus_iphone4.gif" style="cursor: pointer; display: block; height: 347px; margin: 0px auto 10px; text-align: center; width: 400px;" /></a><br />
<br />
nak lebih2 tgk la kat website digi.<a href="http://www.digi.com.my/iphone/index.html"> iphone4G dari Digi</a><br />
<br />
nah tgk ni cun ke tak. terbaik de..<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhasm7AsPRmVBkgAIdPMpDwMgL5dnTE-1lGzBTe-56UD5UWZyuxtB39lIaJwM6fq_o3akO0eNV01-FX5Z_QPayk7U_oj1EnDBdqN0YDA5a-HfAUR4pu6KW3Ug7oi_MsPuJ36-zkW1fH59w/s1600/iphone-4g-concept.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhasm7AsPRmVBkgAIdPMpDwMgL5dnTE-1lGzBTe-56UD5UWZyuxtB39lIaJwM6fq_o3akO0eNV01-FX5Z_QPayk7U_oj1EnDBdqN0YDA5a-HfAUR4pu6KW3Ug7oi_MsPuJ36-zkW1fH59w/s400/iphone-4g-concept.jpg" width="400" /></a></div><br />
<br />
<br />
<br />
<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrewidyvsxup3X4SjlPwCID4lvNvWbVpCF86eekbR__vac9apQz7b_YpLhMegHr14eNNONumCg3-X4JQ3c8QVqt-tQjFQVe4JpwKxguZmHpbYsgV18s3ZWl3VLCkOrmEibTw1AJW_XYBg/s1600/img_compareus_iphone4.gif"><br />
</a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8vz4MYJ2864UbaZv9ds-dLtP1zm9UlZAu2790f7peCOQihYMOdflUo6FPZNRoiODN2_u631Sah_AaCQoqQm7aqvmoTC9GB8mjd9mBbEW4Zabt8ALgEvFVcPmiZM2LgEYiXqjcxTuo4sU/s1600/img_compareus_iphone4.gif"><br />
</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7220675120796200617.post-65398559749771756342010-09-22T04:41:00.000-07:002010-09-22T04:47:11.413-07:00Rumah=House<h3>Kadar pembiayaan rumah kekal 90% bak kate PM.</h3><br />Bagus2. Ni memang la patut, sebab dgn ini boleh laa golongan mude yang baru2 koje ke, yang berpendapatan ok ok je boleh beli rumah.<br /><br />Saya memang le bersetuju sgt2 le dgn pendekatan ni.OK laa kan untuk rumah pertama or kedua.<br /><br />Kalu rumah ke3 nak wat 80% buatlee..<br /><br />aku nak beli umah satu je.ehehehehehe<br /><br /><br />ehsan dari utusan online. <a href="http://utusan.com.my/utusan/info.asp?y=2010&dt=0922&pub=Utusan_Malaysia&sec=Muka_Hadapan&pg=mh_01.htm">Utusan Malaysia</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7220675120796200617.post-27991853595253005972010-09-22T03:55:00.000-07:002010-09-22T04:30:56.746-07:00SourcefireThis is IPS security appliance. Analyze network traffic and prevent critical threats from damaging your network.<br /><br />Sourcefire provide defense from all this threat : -<br /><br /><table class="no-border"><tbody><tr><td valign="top" width="30%"><ul><li>Worms</li><li>Trojans</li><li>Backdoor attacks</li><li>Spyware</li><li>Port scans</li><li>VoIP attacks</li></ul> </td> <td valign="top" width="32%"> <ul><li>DoS attacks</li><li>Buffer overflows</li><li>P2P attacks</li><li>Statistical anomalies</li><li>Protocol anomalies</li><li>Application anomalies</li></ul> </td> <td valign="top"> <ul><li>Invalid headers</li><li>Blended threats</li><li>Rate-based attacks</li><li>Zero-day threats</li><li>TCP segmentation & IP fragmentation attacks</li><li>IPv6 attack</li></ul></td></tr></tbody></table><br /><br />Can protect your physical and virtual environment.<br />Defense you network before bad things happen.<br /><br />Details.go this link.<br /><br /><a href="http://www.sourcefire.com/">http://www.sourcefire.com</a>/Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7220675120796200617.post-75734704893490294832010-09-19T09:11:00.012-07:002010-09-19T17:23:47.161-07:00Nama DomainHalluu...<br /><br /><br />Jom register nama domain. Sape2 yang rase2 nak register name domain baru ke,nak tambah domain baru ke silalah ke sini. Aku rase macam ni je yang harge yang murah dan ok lee..<br /><br /><a href="http://www.webserver.com.my/solutions/simply-irresistible-domain/"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 320px; height: 83px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOULko_rfIouwNAA_c1JyVIM56g4OtTHCEtriuKNx6txzWxwCXwRedEN2vJq7mUyj6uCqoz1zjL2Tu_artgKjxnwkquQ_cKrddJqlQI-Z5tg-XqFJF6FPVrgE7UUbB0FZiqDoczhK-iHk/s320/webserver.com.my.gif" alt="" id="BLOGGER_PHOTO_ID_5518778339458427250" border="0" /></a><br />Yang ni harge tengah promosi. RM35 setahun murah tu.<br /><br />Beli kat sini dapat free ni :<br /><br />30 days web hosting<br />pre-installed WordPress<br />One email address<br />Dns hosting<br />Transfer of domain ownership<br /><br /><br />Ape lagi jangan sampai domain yang anda mimpi malam tadi terlepas...<br /><br />details go to <a href="http://www.webserver.com.my/"><span style="text-decoration: underline;">Webserver</span></a><br /><br /><br />Ni satu lagi....<br /><br /><a href="http://www.sempoihosting.com/domain.html"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 212px; height: 65px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfDuhh5gTQoXQMFlEluJtsAux8lBrs05Mu5Btk30HgkgMjblPrv2CtWyFTsB6DuniutexKeDSa3I2XZm-ygXoUP1p_AcLkSGo4V3PscLOjZVNG3rNfDJVS-TP2KS4hQIsDG4rvP1kXdak/s320/sempoihosting.gif" alt="" id="BLOGGER_PHOTO_ID_5518778442214487314" border="0" /></a><br />Memang sempoi..sesempoi namanya.<br /><br />Ni pun kire murah gak. RM 38 Setahun.Daftar kat sini dapat free ni :<br /><br />Url forwarding<br />Email<br />Whois guard(Maklumat anda disembunyikan)free setahun je .<br /><br /><a href="http://www.sempoihosting.com/domain.html"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 313px; height: 248px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYHTBoOPibsM0Fpw5wja8xVkmSGsM1zvoViy804_yfHD_H-pRFcu-4M1-kO_lN8AAWnmyN4yAYREFKY3RqzzOZgh8JlFF0ugCrVMEY87IcRkJjZR1Srldz5CQ-egq829aVezEU5jn3RIo/s320/sempoihostingdomain.gif" alt="" id="BLOGGER_PHOTO_ID_5518778510041062386" border="0" /></a><br /><br />Nak detail2 pi la kat sini. <a href="http://www.sempoihosting.com/">Sempoi</a><br /><br />Lambat register terlepas lee domain korang.<br /><br /><div style="text-align: center;">jom cepat2.Ni kalu lambat tak selamat.<br /></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7220675120796200617.post-1030434784637946832010-09-19T08:53:00.000-07:002010-09-19T09:09:04.117-07:00Palo Alto<div style="text-align: center; font-weight: bold;"><span style="font-size:100%;">Palo Alto Networks' Next-Generation Firewalls</span><br /></div><br /><br />Sejauh mane keberkesanan Palo Alto ?<br /><br />Ni definasi Palo Alto.<br /><br />Palo Alto Networks’ next-generation firewalls provide network security by enabling enterprises to see and control applications, users, and content – not just ports, IP addresses, and packets – using three unique identification technologies: <a href="http://www.paloaltonetworks.com/technology/app-id.html">App-ID</a>, <a href="http://www.paloaltonetworks.com/technology/user-id.html">User-ID</a>, and <a href="http://www.paloaltonetworks.com/technology/content-id.html">Content-ID</a>. These identification technologies, found in Palo Alto Networks' enterprise firewalls, enable enterprises to create business-relevant security policies – safely enabling organizations to adopt new applications, instead of the traditional “all-or-nothing” approach offered by traditional port-blocking firewalls used in many security infrastructures. ( http://www.paloaltonetworks.com/products/index.html )<br /><br />Aku pernah pakai Palo Alto. Pada aku boleh diakatakakn user friendly laa...Senang gak nak kuar report. Tapi yang tak berkenan plak, bile masuk dalam environment network aku ade masalah lak.Box Palo Alto tu leh plak hang. Sape2 yang penah gune Palo Alto ni share2 skit. ok ke tak .Berkesan tak sebagai Firewall dalam network korang.<br /><br /><br />Ni keluarga Palo Alto.<br /><br /><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2ZWck1PkT7faSjMaWmqScsSSZ3z4HdIqlVadKh3YzfTMtT2MTzz044Nt2jD6YRda1OUT31oT1spumRpl9gvV4MF40qj1iCXUea4yMyMBvlF0lylAjVw063s4ALdsxZfGums6tmkrbJfE/s1600/product-family-0609.jpg"><img style="display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 320px; height: 195px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2ZWck1PkT7faSjMaWmqScsSSZ3z4HdIqlVadKh3YzfTMtT2MTzz044Nt2jD6YRda1OUT31oT1spumRpl9gvV4MF40qj1iCXUea4yMyMBvlF0lylAjVw063s4ALdsxZfGums6tmkrbJfE/s320/product-family-0609.jpg" alt="" id="BLOGGER_PHOTO_ID_5518656689199977874" border="0" /></a><br /><br />Selanjut nye bace2 la kat website Palo Alto (http://www.paloaltonetworks.com/)Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7220675120796200617.post-55187240264184190932010-09-18T05:39:00.000-07:002010-09-18T05:42:33.446-07:00PGEF 2010yihaaaa...<br /><br /><br />Malaysia's Largest Post Graduate Education Fair is Back.<br /><br /><br />Pot event ni kat Mid Valley Exhibition Centre.<br />Tarikh 8 - 10 October 2010.<br /><br /><br />Sesiape rajin atau tido je...pi la tgk.ekekekUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-7220675120796200617.post-63385946653871517822010-09-18T05:25:00.000-07:002010-09-18T05:39:22.063-07:00BROCADEuit...<br /><br />Ceritera bermula dgn huruf B<br /><br /><span style="font-size:180%;"><span style="font-weight: bold;">B</span></span>rocade picks Malaysia as regional centre for storage area network (SAN)<br /><br /><br />Ceritera bermula dgn huruf T<br /><br /><span style="font-size:180%;"><span style="font-weight: bold;">T</span></span>an Sri Muhammad Ali : I made the decision to quit JCORP<br /><br />Ceritera bermula dgn huruf M<br /><br /><span style="font-size:180%;"><span style="font-weight: bold;">M</span></span>AS Set to Receive 35 New Boeing 737-800<br /><br /><br />Ceritera bermula dgn huruf S<br /><br /><span style="font-size:180%;"><span style="font-weight: bold;">S</span></span>eagate the first 3 Tetrabyte external desktop drive.<br /><br /><br />Ehsan dari SME & Entrepreneurship Magazine.....Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7220675120796200617.post-35232464601804669352010-09-18T04:54:00.000-07:002010-09-18T05:20:24.551-07:00Business ContinuitySelamat bertemu lagi..<br /><br />Ape tu "Business Continuity" ?<br /><br />Pada saya ia adalah suatu bende atau future plan yang perlu ade untuk mane2 organisasi di dunia ini.Ini adalah untuk memastikan kejayaan sesebuah organisasi tersebut.<br /><br />Semua organisasi mempunyai data yang sangat penting.lebih-lebih lagi dalam bidang " Banking","Healthcare" dan sewaktun dgnnya.<br /><br />Semua organisasi didunia ini terdedah pada risiko.Sekiranya bekalan elektrik terputus,Files corrup,disaster (disaster disebabkan manusia "human-made disaster" ) (Bencana alam "Natural Disaster") dan sewaktu dgnnye.<br /><br />Oleh sebab itu penting gile business continuity ni.<br /><br />IT people main peranan untuk setandby dgn langkah2 sekiranya berlaku sebarang kemungkinan.<br /><br />ayat lebih mudah lagi... ape2 hal pun kene buat backup. Maksudnye, kite kene identify atau kenal pasti mane data yang penting. Banyak care nak buat backup.........Unknownnoreply@blogger.com0