Saturday 15 August 2009

Facebook Chat Emoticons

Do you know that Facebook Chat supports emoticons?
The answer is, "yes, it supports emoticons."
I have found what smilies that Facebook Chat actually supports.
There are 24 emoticons that supported by Facebook Chat at the moment.
They are:
  1. smile ══> :-)
  2. frown ══> :-(
  3. tongue ══> :-P
  4. grin ══> :-D
  5. gasp ══> :-O
  6. wink ══> ;-)
  7. glasses ══> 8-)
  8. sunglasses ══> 8-|
  9. grumpy ══> >:(
  10. unsure ══> :/
  11. cry ══> :'(
  12. devil ══> 3:)
  13. angel ══> O:)
  14. kiss ══> :-*
  15. heart ══> <3
  16. kiki ══> ^_^
  17. squint ══> -_-
  18. confused ══> o.O
  19. upset ══> >:O
  20. pacman ══> :v
  21. curly lips ══> :3
  22. robot ══> :|]
  23. shark ══> (^^^)
  24. Chris Putnam ══> :putnam:

Enjoy it.
Share for knowledge.

Monday 27 July 2009

Digsby = IM + Email + Social Networks

Have you ever think to use an application for your PC/laptop that fulfil all your needs? I recommend you should try to use Digsby.
Why Digsby?
Because, Digsby = IM + Email + Social Networks.
"Digsby is a proprietary multiprotocol instant messaging application developed by dotSyntax, LLC. Digsby is written in wxPython and uses WebKit for rendering. It supports most mainstream IM protocols such as AIM, MSN, Yahoo, Google Talk, ICQ, Jabber, and Facebook Chat. Digsby also supports e-mail notifications and alerts from MySpace, Facebook, Twitter and LinkedIn. It is released free under a proprietary license. Development is funded through optional sponsored add-on applications via installer and a distributed computing research function that is turned on by default. It needs registration, which can be done through the program's installer or through a web interface. As of March 20, 2008, Digsby is in public beta, and no longer requires an invitation to set up an account." (source from Wikipedia)

Features of Digsby:
1. Instant Messaging
  • One combined buddy list for all your AIM, MSN, Yahoo, ICQ, Google Talk, Jabber, and Facebook Chat Accounts.
  • Manage multiple conversations with tabbed conversation windows. You can drag tabs out into their own windows for important conversations.
  • Rename contacts with an alias so you don't have to remember buddy names like 'giantsfan123'.
  • If one of your friends has more than one IM account you can combine them into a single merged contact to eliminate duplicate buddies.
  • Send your friends SMS messages right from the IM window.
  • The InfoBox lets you check everyone's status message and profile just by moving your mouse down the list.
  • Changing your status has never been easier. just one click right on the buddy list!
  • Multitask while you chat. Minimize the IM window and you see popups of new IM's. Best of all, you can reply right from the popup and get back to what you were doing.
  • Log conversation history and find the information you need our search-enabled log viewer.
  • And so much more.
2. Email
  • Manage your Hotmail, Gmail, Yahoo Mail, AOL/AIM Mail, IMAP, and POP accounts right from digsby.
  • Get popup notifications when new email arrives. Clicking a popup takes you right to the message with auto-login into webmail accounts.
  • The email InfoBox gives you a snapshot of your unread messages with just one click
  • Perform actions such as "Mark as Read" or "Report Spam" right from the email InfoBox.
  • Send emails to your friends right from the IM window. The email is sent directly from any account digsby is tracking for you.
3. Social Networking
  • Stay up to date with everything happening on your Facebook, Twitter, MySpace and LinkedIn accounts.
  • Receive alerts of events such as new friend requests, messages, group invites, etc.
  • The social network InfoBox gives you a real time NewsFeed of what your friends are up to. Everything from new photos, to status updates, to upcoming birthdays is just a click away.
  • Set your Facebook, Twitter and LinkedIn status right from Digsby.
4. Personalize
  • Customize digsby with application skins to give it a personal look and feel.
  • Change the way your conversations look with themes – everything from simple AIM-style windows to 3D conversation bubbles.
  • Complete control over the layout of buddies on the buddy list. Change everything from buddy icon size to whether or not to show a snippet of their away message.
  • Sort your buddy list how ever you want! You can organize buddies manually, by status, by service, by name or by log size to place those you communicate with most at the top. You can even choose a secondary sorting method.
  • Customizable notification system lets you choose what events you want to be alerted about and how.
5. Other
  • Digsby offers complete synchronization between computers and installations. Everything from the skin you chose to your pre-defined status messages follows you from place to place.
  • You can place a widget on your blog, website, or social network profile so you can chat with visitors right from digsby.
  • Manage multiple simultaneous file transfers from one simple transfer manager.
Notes:
You have to create Digsby account before using Digsby's features.
Click here to create Digsby account.
Here to Download Digsby software (support OS are Mac, Windows, and Linux).

Sunday 26 July 2009

2009 TOP 10 Internet Browser Software at TopTenREVIEWS

An Internet Browser is the way to the web. Today, the Internet is widely used for media, research, communication, shopping, entertainment, etc. The better your browser, the more you will see and experience.

These are the 2009 TOP 10 Internet Browser Software at TopTenREVIEWS.
  1. Firefox
  2. Google Chrome
  3. Internet Explorer
  4. Opera
  5. Safari
  6. Maxthon
  7. Flock
  8. Avant Browser
  9. Deepnet Explorer
  10. PhaseOut

Here to see the 2009 Internet Browser Software Review Product Comparisons at TopTenREVIEWS.


Source from TopTenREVIEWS.


Wednesday 1 July 2009

Mozilla Firefox 3.5 Final

Mozilla Firefox - faster, more secure, easier to use and sporting a new look, this latest Firefox release sets a new standard for web browser innovation. Mozilla Firefox project (formerly Firebird, which was formerly Phoenix) is a redesign of Mozilla's browser component, written using the XUL user interface language and designed to be cross-platform. It is small, fast and easy to use, and offers many advantages over other web browsers, such as the tabbed browsing and the ability to block pop-up windows. Mozilla Firefox 3 is focused on improved memory handling, performance, and stability, improved XUL, and new core components such as application data stored in SQLite. Firefox 3 is based on the Gecko 1.9 Web rendering platform, which has been under development for the past 34 months. This new platform includes more than 15,000 changes to improve performance, stability, rendering correctness, and code simplification and sustainability. Firefox 3 is been built on top of this new platform resulting in a more secure, easier to use, more personal product with a lot more under the hood to offer website and Firefox add-on developers.
Download: Mozilla Firefox 3.5 Final (English-US Windows version)
Link: Other Languages and Operating System


Sunday 14 June 2009

Shorcuts in Mozilla Firefox

Firefox is one of the most popular web browser in the world and it continues to gain popularity and market share. With this rapid growth many users, especially new users, are not aware of the wide range of Firefox keyboard shortcuts available. These small combinations of keystrokes when used at the right time can be real productivity boosters.
Here are 30 Firefox keyboard shortcuts to help simplify and speed up your daily browsing. Even Firefox veterans may find these helpful.

Many of the shortcuts will be a combination of keystrokes. For example “Ctrl + C” means that you should hold down the Ctrl (control) key and press the letter “C”. Use the lowercase letters not uppercase, if using the shift key is need it will be indicated as “Shift”.

Page Navigation Shortcuts
These shortcuts allow you to navigate quickly around a web page, most with only a single keystroke.
* Spacebar — Page down one full screen at a time
* Shift – Spacebar — Page up one full screen at a time
* Down Arrow – Scroll down
* Page Down — Page down one full screen at a time
* Up Arrow – Scroll Up
* Page Up — Page up one full screen at a time
* End – Go to the Bottom (end) of the page
* Home – Go to the Top of page

Pages, Tabs and Bookmarks
These shortcuts help you quickly perform different common tasks within Firefox, manage Tabs and access bookmarks.
* F5 — Reload the current page
* Alt + Home — Go to home page
* Ctrl + L — Go to the Address bar
* Ctrl + K — Go to the search box
* Ctrl + = — Increase the text size, zoom in
* Ctrl + - — Decrease the text size, zoom out
* Ctrl + P — Print the current page
* Ctrl + H — Opens the Browsing History in a column on the left
* Ctrl + T — Open a new tab
* Ctrl + W — Close current tab
* Ctrl + Tab — rotate forward to the next tab
* Ctrl + Shft + Tab — rotate back to the previous tab
* Ctrl + 1-9 — Choose a number to jump to that specific tab
* Ctrl + B — Open Bookmarks Column on Left
* Ctrl + I — Close Bookmarks Column
* Ctrl + D – Create a bookmark for the current page

Mouse Shortcuts
Here are six mouse-related shortcuts for when you already have your hand on the mouse. These shortcuts include the scroll wheel and utilize the clicking function (middle click) of the scroll wheel.
* Shift – scroll down – Go to the previous page
* Shift – scroll up – Go to the next page
* Ctrl – scroll up — Decrease the text size, zoom out
* Ctrl – scroll down — Increase text size, zoom in
* Middle click on link — Open the link in a new tab
* Middle click on a tab — Close the tab

Keystroke shortcuts have been around for many years and Firefox takes browser shortcuts to a new level. It may take a little adjusting to get used to using shortcuts but once you do they’ll become second nature for speeding up your web browsing.

Saturday 13 June 2009

Mozilla Firefox 3.0.11 Final

Firefox is the award winning next generation browser from Mozilla. Firefox empowers you to browse faster, more safely, and more efficiently than with any other browser. Make the switch today - Firefox imports your Favorites, settings and other information, so you have nothing to lose. Stop annoying popup ads in their tracks with Firefox's built in popup blocker. View more than one web page in a single window with this time saving feature. Open links in the background so that they're ready for viewing when you're ready to read them. Built with your security in mind, Firefox keeps your computer safe from malicious spyware by not loading harmful ActiveX controls. A comprehensive set of privacy tools keep your online activity your business.

Download: Mozilla Firefox 3.0.11 Final (English-US Windows version)
Link: Other Languages and Operating System

Kinds of Girls

"Hard-Disk" Girls
They will always remember everything, FOREVER.

"RAM" Girls

They will forget you, while you un-plug her.

" Windows" Girls

Everyone knows that they can't do anything right, but we can't live without them.

"Screen Saver" Girls

She would be better for fun.

"Internet" Girls

They aren't easy to be accessed, and we will often to be got disconnected.

"Server" Girls

They are always busy whenever we need them.

"Multimedia" Girls

They will make useless stuffs become valuable.

"CD-ROM" Girls

They are always faster.

"E-Mail" Girls

Ten sentences they said, eight of them are deceits.

"Virus" Girls

They will come although we don't want it.
They will install themselves and use all of the available resources.
If we try to uninstall them, we will lose everything.
And if we don't try to uninstall them, we will lose everything too.
They are also known as "wife".


Wednesday 10 June 2009

Mozilla Firefox 3.5 Beta 99 (3.5 Preview)


Firefox is the award winning next generation browser from Mozilla. Firefox empowers you to browse faster, more safely, and more efficiently than with any other browser. Make the switch today - Firefox imports your Favorites, settings and other information, so you have nothing to lose. Stop annoying popup ads in their tracks with Firefox's built in popup blocker. View more than one web page in a single window with this time saving feature. Open links in the background so that they're ready for viewing when you're ready to read them. Built with your security in mind, Firefox keeps your computer safe from malicious spyware by not loading harmful ActiveX controls. A comprehensive set of privacy tools keep your online activity your business.

Download: Mozilla Firefox 3.5 Beta 99 (3.5 Preview)
Link: Other Languages

The new iPhone 3GS

To be honest pretty uninspiring for a new model, however some performance improvements etc.
  • The S stands for speed
  • Looks identical to standard iPhone 3G
  • Camera at 3 Megapixel
  • Autofous / auto white balance
  • Built in compass and Nike+ support
  • 5 Hour talk time battery
  • Voice Control
  • Pricing is set at $199 for 16GB and $299 for 32GB when it goes on sale June 18th Stateside and in 80 more countries in August
  • current 3G will remain on sale for $99, effective immediately.


Source from: MyGreatPhone

Sunday 24 May 2009

The Revision of Pet Society Betting Hack

Note:
Your OS must be intalled with Flash Player v9.x.x.x (or it won't work)
Cheat Engine must be installed at your computer.
With Flash Player v10.x.x.x won't work.
8 Steps to cheat at Betting Race at Pet Society.
This is about Pet Society Betting Hack and it’s still working now.
I’Il share this for you (sorry if I don’t make the video), lol.
Win will get 1,000 coins each time, lose only 5 coins.
In my case I'm using Shiretoko Browser and Cheat Engine v5.4.
Follow my tutorial step by step, Here are the steps:
1st Open Cheat Engine and select your browser and set these values:
  • HEX Value: 840FFF85C12A0FF2
  • Scan Type: "Exact Value"
  • Value Type: "8 bytes"
  • Memory Scan Options: "32 Bit"
  • tick "Also scan read-only memory"
  • tick "Fast scan"
  • tick "Hyper Scan"
Like the Picture below:

2nd At Pet Society, Go to the Stadium and bet 5 coins at the pet which you think will win the race. Any pet will do for this Pet Society Racing Hack to work, then click OK.
Like the picture below:

3rd Go to Cheat Engine. On Cheat Engine window, click "First Scan". You will see an address on the left-hand side menu.
Like the picture below:

4th Still on Cheat Engine window, now click "New Scan", there isn't any addresses now.
Like this picture below:
Then click "First Scan" again, the result You'll see 4 adresses now.
Like the picture below:
Choose the 3rd One, right click on the address and select ”Disassemble this memory region”
Like the picture below:

5th Memory Viewer window will be opened for you, then Look For “add esp, 0c“
Like this picture below:
Select "add esp, 0c" next go to Tools --&gt; Auto Assemble
Like this picture below:

6th Auto assemble window will be opened,
On this window, Template --&gt; Code Injection
Click OK without changing any value.
Like this picture below:
The Auto assemble window after doing code injection contains with this text:

7th Between 16th and 17th line at Auto assemble window, insert this code:
mov [ebp-18], 3E8
Like these pictures below:
Click Execute, Yes, Ok.

8th Next Click start/go at Pet Society.
If the pet you bet win the race you will get 1,000 coins, lost only 5 coins.
If You want to bet again or buy anything from shop, you have to delete/cut the
mov [ebp-18], 3E8 at auto assemble window, before betting or buy/sell something, then click execute, yes, then ok (if you don't do it you will be disconnected from Pet Society).
You have to erase and rewrite the codes each time before You bet on a race or buy something and execute it. Have fun with Pet Society, hopes your Pet become richer, LOL….
Betting Cheat now. Still working. So, don’t wait.

Friday 8 May 2009

Lo♥e Story

Once upon a time,
There was an island where all the felling lived.

Happiness, Sadness, Knowledge, and all of others, include Love.

One day it was announced that the island would sink,
so they all prepared boats and left.
Love was the only one who stayed.

But when Love was almost sinking,
she decided to ask help.

"Help, help...!!!", Love shouted.
Love asked to Richness, "Richness, can you take me with you???"
"No, I can't. There is a lot of gold in balloon, there is no place here for you.", Richness replied to Love.
Then Love asked help from Sadness.
"Sadness, Let me go with you.", Love asked Sadness.
"Oh...Love, I'm so sad that I prefer to go alone.", Sadness answered to Love.
Then Love saw Happiness.
Love also asked help from Happiness.
But Happiness was so happy so he did not listen when Love call him.

When Love was almost give up asking for help,
suddenly there was a voice.
The one who helped Love is an Elder, Love became very happy that she even forgot to ask the Elder his name.

When they arrived on dry land,
the Elder went on his own way.

Then Love asked Knowledge, another Elder,the name of the elder who had helped her.
Knowledge: "His name is "TIME"."
Love: "Time? But why did Time help me??"
Knowledge: "Because only Time is capable of understanding how great Love is..."
Love: " Ohh......"

Take the Time to know what Real Lo♥e is.

Sunday 26 April 2009

PASSWORDS

Introduction
One of the principal characters in The Matrix Reloaded is the Keymaker. The Keymaker is critically important; he is protected by the Matrix and sought by Neo, because he makes and holds the keys to the various parts of the Matrix. The Matrix is a computer generated world; the keys he makes are passwords. Within the movie, he has general passwords, back door passwords and master keys – passwords to everywhere.
Passwords are keys that control access. They let you in and keep others out. They provide information control (passwords on documents); access control (passwords to web pages) and authentication (proving that you are who you say you are).

A. Types of Passwords
There are three main types of passwords:

1. Strings of Characters
At the most basic level, passwords are stings of characters, numbers and symbols. Access to a keyboard or keypad allows entry of these types of passwords. These passwords range from the simplest – such as the three digit codes used on some garage door openers – to the more complicated combinations of characters, numbers and symbols that are recommended for protecting highly confidential information.

2. Strings of Characters plus a token
The next level in passwords is to require a string of characters, numbers and symbols plus a token of some type. An example of this is the ATM, which requires a card - the token - plus a personal identification number or PIN. This is considered more secure, because if you lack either item, you are denied access.

3. Biometric Passwords
The third level in passwords is the biometric password. This is the use of non-reproducible biological features, such as fingerprints or facial features to allow access. An example of this is the retinal scan, in which the retina – which is the interior surface of the back of the eye – is photographed. The retina contains a unique pattern of blood vessels that are easily seen and this pattern is compared to a reference. Biometric passwords are the most sophisticated and are considered 'safer' but in reality a password that you 'carry' in your finger or eye is no safer than a strong password that you carry in your head, provided that the software that uses the password is correctly configured.

B. History Of Passwords
Trivia in Password History:
In older versions of MS Excel and Word, passwords were stored as plain text in the document header information. View the header and you could read the password. This is valid for all versions older than Office 2000.
Windows once stored passwords as plain text in a hidden file. Forget your password? You could just delete the hidden file, and the password was erased.
Early on, Microsoft and Adobe both used passwords to mean that a file was password protected when opened with their applications. If you opened it with another application, such as Notepad, the password wasn't necessary.
Microsoft Access 2.0 databases could be opened as a text file easily by just renaming them with a “.txt” extension. Doing this allowed you to see the database data.
Adobe PDF files in versions 4.0 and older were printable and often viewable using Linux PDF readers or Ghostview for Windows.
Wireless networks have a problem with encryption as the key for the encryption can be guessed once you collect enough encrypted data out of the air to find the patterns and guess the keys. With todays computing power in the normal home, the key can be cracked almost immediately to find the password.
Bluetooth security is considered very secure, once it is setup. The problem is that bluetooth transmits a unique, freshly generated, password between the devices to establish the connection and the password is sent as plain text. If that password is intercepted, all future transmissions for that session can be easily decoded.

C. Build a Strong Password
The best passwords:
  • cannot be found in a dictionary
  • contain numbers, letters and those odd swear symbols on top of the numbers
  • contain upper and lower case letters
  • the longer the “stronger”
With a 2 letter password, and 26 letters in the alphabet, plus 10 numbers (ignoring symbols), there are 236 possible combinations (687,000,000 possibilities). Increase the password length to 8 characters, and there are 836 combinations (324,000,000,000,000,000,000,000,000,000,000 possibilities).
There are many password generators available on the internet, but these will generate a nearly impossible to remember password.
Try instead to use a seemingly random string of letters or numbers that you can easily recall.
For example:
gandt3b! (goldilocks and the 3 bears!)
JJPL2c1d (john, jill, paul, lucy, 2 cats, 1 d – the members of your household)

D. Password Encryption
People don't usually discuss password encryption, because there seems to be no options to discuss – passwords are, by definition, encrypted. While this is usually true, encryption is not a simple yes or no proposition. The effectiveness of encryption, usually described as its strength, ranges from very weak to extremely robust.
At its weakest, we have passwords that have been simply encoded. This produces a password that is not readable directly, but, given the key, we could easily translate it using a computer, pen and paper, or a plastic decoder ring from a cereal box. An example of this is the ROT13 cypher. ROT13 replaces every letter in a text with the letter that is 13 places away from it in the alphabet. For example 'ABC' becomes 'NOP'.
Even when using algorithms that can more accurately be called encryption, the encryption is weak, if the key used to generate it is weak. Using ROT13 as an example, if you consider the 13 place differential to be the key, then ROT13 has an extremely weak key. ROT13 can be strengthened by using a different key. You could use ROT10, replacing each letter with the one ten places forward, or you could use ROT-2, replacing each letter with the one two places before it. You could strengthen it even more, by varying the differential, such as ROTpi, where the first letter is shifted 3 places; the second, 1 place; the third, 4 places; the fourth, 1 place; and so on, using pi (3.14159265...) to provide a constantly varying differential.
Because of these possible variations, when you are encrypting any type of information, you must be sure that you are using a reliable method of encryption and that the key – your contribution to the encryption – will provide you with a robust result.
You must also remember that a good system of encryption is useless without good passwords, just as good passwords are useless without good encryption.

E. Password Cracking (Password Recovery)
Password cracking for illegal purposes is illegal. But if it is your password, then it's your information. Once you password protect something, and then forget your password, you are stuck. Hence password recovery.
Password cracking consists of a few basic techniques “Looking around”: passwords are often taped to the bottom of keyboards, under mousepads, posted on personal bulletin boards.
Brute force: just keep trying passwords until one works
Automated dictionary attacks: these programs run through a series of possible dictionary words until one works as a password.
There are many programs available on the web to assist with password recovery on documents. However, newer versions of programs are becoming more and more secure, and therefore, more and more difficult to obtain passwords using the techniques above, or using password recovery software.

F. Protection from Password Cracking
Here are some suggestions on how to keep your passwords from being cracked:
  1. Use strong passwords that cannot be determined by a dictionary attack.
  2. Don't post your passwords near your computer.
  3. Limit wrong attempts to three tries, then lock the account. The password must then be reset. (This does not apply to documents or password protected zip files – they do not have lock out options.)
  4. Change passwords regularly.
  5. Use a variety of passwords for different computers. Does this mean that you need to create a unique password for everything? Absolutely not. Maintain a master password for things that don't matter to you (perhaps the account you were required to create for TheSIMS.com or for your account on the local newspaper). But use good passwords for anything that actually needs to be secure.
Source From:
http://www.isecom.org/
http://www.osstmm.org/
http://www.hackerhighschool.org/

All Contents Copyright 2000-2004, The Institute For Security And Open Methodologies (ISECOM). All Rights Reserved.

Further Reading:
http://www.password-crackers.com/pwdcrackfaq.html
http://docs.rinet.ru/LomamVse/ch10/ch10.htm
http://www.ja.net/CERT/Belgers/UNIX-password - deadlink
http://www.crypticide.com/users/alecm/-security.html - deadlink
http://www.securitystats.com/tools/password.php
http://www.openwall.com/john/
http://www.atstake.com/products/lc/
http://geodsoft.com/howto/password/nt_password_hashes.htm

Thursday 23 April 2009

PET SOCIETY BETTING HACK

This is about Pet Society Betting Hack and it’s still working now.
I’Il share this for you (sorry if I don’t make the video), LOL...
Yields 1000 coins each time.
Follow my tutorial step by step, Here are the steps:

1st Open Cheat Engine and select your browser and set these values:
  • HEX Value: 840FFF85C12A0FF2
  • Value Type: 8 bytes
  • Also scan read-only memory























2nd Go to the Stadium and bet 5 coins at any Pet which you think will win the race, then click ok.
Any pet will do for this Pet Society Racing Hack to work.
If You win, You will get 1000 coins, but if you lose you will only lost 5 coins. B-) LOL....



















3rd On Cheat Engine, click FIRST SCAN. You will see an address on the left-hand side menu. (If there’s more than one address, always use the first address), right click on the address and select ”dissemble this memory region

















4th look for “add esp, 0c










5th Select add esp, 0c, go to TOOLS -> Auto Assemble















6th On the new window, Template -> Code Injection
Click OK without changing any value!










 




7th Between 16 and 17th line, insert this code:
mov [ebp-18], 3E8
Click EXECUTE, OK, OK.















 






8th Click start/go at Pet Society.
If You want to bet again, You have to delete mov [ebp-18], 3E8 at auto assemble window, then click execute ok then ok before You bet (or you will be disconnected from Pet Society)
You have to erase and rewrite the codes each time before You bet on a race and execute it (at auto assemble window). Have fun with Pet Society, hopes your Pet become richer, LOL….
Betting Cheat now. Still working. So, don’t wait.

Note:
Your OS must be intalled with Flash Player v9.0 (or it wont work).
With Flash Player v10.0 wont work.
Internet Browser, Mozilla Firefox v2.0.0.3 or IE v7 or IE v6.

There’s the video at YouTube.

Sunday 15 February 2009

Cek Tingkat Kualitas Keaslian Telepon Seluler Nokia melalui No.IMEI
















Nokia adalah salah satu perusahaan telepon seluler yang memiliki tingkat penjualan terbesar saat ini.
Kebanyakan dari kita yang memiliki telepon seluler buatan Nokia kurang perduli dengan tingkat kualitas keasliannya.
Apakah kamu merasa cukup peka dengan kualitas keaslian telepon seluler Nokia yang kamu miliki?
Nomor IMEI (International Mobile Equipment Identity) menunjukkan keaslian dari telepon seluler kamu.

Untuk melihat nomor IMEI pada telepon seluler Nokia dial nomor *#06#
Phone serial no. "x x x x x x ? ? x x x x x x x"
  • Jika angka digit ke-tujuh dan ke-delapan dari telepon selulermu adalah 02 atau 20 ini berarti telepon selulermu dirakit di Emirates berarti memiliki "kualitas yang sangat buruk".
  • Jika angka digit ke-tujuh dan ke-delapan dari telepon selulermu adalah 08 atau 80 ini berarti telepon selulermu dibuat di Jerman berarti memiliki "kualitas yang cukup baik".
  • Jika angka digit ke-tujuh dan ke-delapan dari telepon selulermu adalah 01 atau 10 ini berarti telepon selulermu dibuat di Finland berarti memiliki "kualitas yang sangat baik".
  • Jika angka digit ke-tujuh dan ke-delapan dari telepon selulermu adalah 00 ini berarti telepon selulermu dibuat pada pabrik asli Nokia berarti memiliki "kualitas yang terbaik".
  • Jika angka digit ke-tujuh dan ke-delapan dari telepon selulermu adalah 13 ini berarti telepon selulermu dirakit di Azerbaijan berarti memiliki "kualitas yang sangat buruk" dan juga berbahaya bagi kesehatan.

Tuesday 10 February 2009

Fakta Singkat Tentang Google

Lebih dari 10 tahun sudah Google menemani para peselancar dunia internet dalam mencari segala informasi yang dibutuhkan.
Google sendiri secara resmi dibuka pada bulan September tahun 1998.
Untuk tanggal perayaannya sendiri tidak jelas tanggal berapa, karena selalu berubah-ubah setiap tahunnya, seperti yang dipaparkan pada alamat http://tinyurl.com/5qdouc.
Tetapi, sebenarnya nama domain google.com didaftarkan secara resmi oleh Larry Page dan Sergey Brin pada tahun 1997. (guardian.co.uk)

Friday 6 February 2009

Tips for improving Camera Shots

Contents


Light Your Subject Well

The better lit your subject is the clearer your image is likely to be. If possible shoot outside or turn on lights when shooting inside. If you’re turning on lights in a room to add extra light to your shot be aware that artificial light impacts the color cast in your shots and you might want to experiment with white balance to fix it (see below).

Some cameras come with a built in flash or light - this can really lift a shot and add clarity to it, even if you’re shooting outside (in a sense it becomes a fill flash). If your camera doesn’t have a flash or light you should avoid shooting into bright lights as you’ll end up with subjects that are silhouetted.


Get Close to Your Subject

One of the most common mistakes with camera phone images is that their subject ends up being a tiny, unrecognizable object in the distance. Camera phone images tend to be small due to low resolution (although this is changing) - so fill up your view finder with your subject to save having to zoom in on the subject in editing it later (which decreases quality even more).

Having said this, getting too close on some model camera phones creates distortion and focusing issues (particularly if the camera phone doesn’t have a macro or close focusing mode).


Keep Still

As with all digital photography, the more steady your camera phone is when taking your shot the clearer your image will be.

This is especially important in low light situations where the camera will select longer shutter speeds to compensate for the lack of light. One trick is to lean your camera phone (or the hand holding it) against a solid object (like a tree, wall, ledge) when taking shots.

Keep in mind that many camera phones also suffer from ’shutter lag’ (ie the time between when you press the shutter and when the camera takes the shot can be a second or so). This means you need to hold the camera still a little longer to ensure it doesn’t take a shot as you’re lowering it away from the subject.


Edit Images Later

Whilst it can be fun to use your camera phone’s inbuilt editing and effects, editing pictures later on your computer produces much better quality images. Take your shots in color at high resolution to keep your options open on how to treat it later.

You can always make it black and white on your computer, but you can’t make it color if you take it in Black and White mode. Camera-Phone-TipsPhoto by Bram and Vera.


Don’t Throw Away ‘mistakes’

Remember that on many phones the quality of the screen will not be as good as your computer’s. So if possible hang onto your shots until you can get them on your PC. You might just find that they come alive on a quality monitor. You’ll also find that even ‘mistakes’ and blurred shots can actually be quite usable (in an abstract kind of way).


Avoid Using the Digital Zoom

As tempting as it might be to zoom in on your subject when taking your picture (if you have a zoom feature on your camera phone), if the zoom is a ‘digital zoom’ it will decrease the quality of your shot to use it (you’ll end up with a more pixelated shot)..

Plus you can always edit your shot later using photo editing software on your computer.

Of course some camera phones are beginning to hit the market with ‘optical zooms’ - these are fine to use as they don’t enlarge your subject by enlarging pixels.


Experiment with White Balance

An increasing number of camera phones come with adjustable white balance which allows you to modify color balance in your images based on shooting conditions. Experiment with this feature to get a good feel for the impact that it has on your shots. I find that it impacts different camera phones differently. Read your manual to find out how it works on your phone. Cameraphone-TipPhoto by markresch.


Take loads of Shots and Experiment

The beauty of all forms of digital photography (including that of camera phones) is the ability to shoot off many shots quickly and without cost. This means you can experiment with different modes and composition and discard those that you don’t want to keep.

Camera phones are particularly good for experimenting with new angles and perspectives - shoot from down low, up high, close up etc and you’ll end up with interesting and fun shots.


Follow Rules of Composition (and then Break them)

Learn some basic composition ‘rules’. (for example - the rule of thirds - ie don’t place your subject squarely in the middle of your frame but a third of the way in). Simple tips like this can bring life toyour photos.

But then also remember that the beauty of a camera phone is its ability to break all conventions - some of the best shots around break all the rules. So shoot from the hip, the floor, up high, up close - anything goes.


Keep Your Lens Clean

One of the challenges with many camera phones is keeping them maintained and clean. Phones spend a lot of time in pockets, in bags and being used in all manner of weather and conditions. As a result they get dirty and can easily become damaged - fingerprints are a common problem on camera lenses - especially if your phone doesn’t have a lens cover. From time to time clean the lens of your camera using a soft cloth (sunglasses cleaning cloths are great). CameraphonePhoto by phil h.


Observe Camera Phone Etiquette

While there is no formal set of rules for using camera phones - it is worth considering how you use it and what impact it might have upon others. There are many cases of camera phones being abused to take sneaky or voyeuristic photos. Ask permission to photograph strangers, consider restrictions on the use of cameras in places like theaters and concerts etc.


Use the highest resolution possible on your camera phone

Some phones allow you to choose what resolution you want to take photos at. It almost goes without saying (but we like to state the bleeding obvious) that the higher your resolution the clearer your shot will be. This is especially true for camera phones which often have sensors of under 1 megapixel in them. Keep in mind however that the higher the resolution the larger the file size of the images you take - this means if you want to send images they can end up taking a long time to send.


Friday 9 January 2009

Withdraw Uang dari AlertPay ke Rekening Lokal



Bagi para netter yang kebingungan menarik dana AlertPay-nya, sebagai informasi bahwa pada saat ini rekening AlertPay telah besahabat dengan bank-bank yang ada di Indonesia, sehingga kita tidak perlu bingung bagaimana caranya untuk menarik uang di rekening AlertPay ke rekening bank lokal milik kita pribadi. Hal ini tidak terlepas dari maraknya pelaku bisnis termasuk pelaku bisnis PTC di Indonesia yang menggunakan rekening AlertPay sebagai metode pembayarannya, dengan demikian mari kita sambut kabar gembira ini dengan saling menjaga kepercayaan.
Cara withdraw uang ke rekening lokal dari AlertPay sangat mudah yang terpenting anda telah memiliki rekening lokal seperti BNI, BCA,MANDIRI, atau Bank yang lainnya.

!!!!!!Ingat!!!!!!
Nama anda pada akun bank lokal harus sesuai dengan nama anda yang didaftarkan di AlertPay maka pada saat mendaftar di AlertPay jangan pernah menggunakan nama samaran atau bukan nama anda yang sebenarnya. Bukankah anda ingin mendapatkan uang sampingan???

Login ke account AlertPay anda
Setelah login klik tab "withdraw"
Ikuti tahapan-tahapan yang ada
Ingat nama telah tersedia sesuai dengan nama saat anda mendaftar di AlertPay jadi anda tidak di perkenankan untuk merubahnya.

Berikut ini adalah daftar "SWIFT CODE" Bank-Bank yang ada di Indonesia:
* ABN AMRO Bank : ABNAIDJA
* Bank Artha Graha : ARTGIDJA
* Bank Bumiputera Indonesia : BUMIIDJA
* Bank Buana Indonesia : BBIJIDJA
* Bank Danamon : BDINIDJA
* Bank Niaga : BNIAIDJA
* Bank Negara Indonesia (BNI) : BNINIDJA
* Bank Rakyat Indonesia (BRI) : BRINIDJA
* Bank Bukopin : BBUKIDJA
* Bank Central Asia (BCA) : CENAIDJA
* Hongkong and Shanghai Banking (HSBC) : HSBCIDJA
* Bank Internasional Indonesia (BII) : IBBKIDJA
* Bank Indonesia : INDOIDJA
* Lippobank : LIPBIDJA
* Bank Permata : BBBAIDJA
* Bank Commonwealth : BICNIDJA
* Bank Mandiri : BEIIIDJA
* ABN AMRO Bank : ABNAIDJA
* Hagabank : HAGAIDJA
* Bank Artha Graha : ARTGIDJA
* Bank Bumiputera Indonesia : BUMIIDJA
* Bank Bumi Arta Indonesia : BBAIIDJA
* Bank Buana Indonesia : BBIJIDJA
* Bank Danamon : BDINIDJA
* Bank Mandiri (not Bank Syariah Mandiri) : BEIIIDJA
* Bangkok Bank : BKKBIDJA
* Bank Niaga : BNIAIDJA
* Bank Negara Indonesia (BNI) : BNINIDJA
* Bank BNP Paribas Indonesia : BNPAIDJA
* Bank Resona Perdania : BPIAIDJA
* Bank Rakyat Indonesia (BRI) : BRINIDJA
* Bank Bukopin : BBUKIDJA
* Bank Central Asia (BCA) : CENAIDJA
* Deutsche Bank AG : DEUTIDJA
* Bank Mizuho Indonesia : MHCCIDJA
* Hongkong and Shanghai Banking (HSBC) : HSBCIDJA
* Bank NISP : NISPIDJA
* Pan Indonesia Bank : PINBIDJA
* Bank Rabobank International Indonesia : RABOIDJA
* Bank UFJ Indonesia (formerly Bank Sanwa Indonesia) : SAINIDJA
* Bank Swadesi : SWBAIDJA
* Bank Tabungan Negara (BTN) : BTANIDJA
* Bank UOB Indonesia : UOBBIDJA
* Bank Permata : BBBAIDJA
* Bank Maybank Indocorp : MBBEIDJA
* Bank Chinatrust Indonesia : CTCBIDJA
* Woori Bank Indonesia : HVBKIDJA
* Bank Sumitomo Mitsui Indonesia : SUNIIDJA
* Bank Finconesia : FINBIDJA
* Bank OCBC Indonesia : OCBCIDJA
* Bank Kesawan : AWANIDJA
* Bank Commonwealth : BICNIDJA
* Bank Ekonomi Raharja : EKONIDJA
* Bank DBS Indonesia : DBSBIDJA
* Bank CIC International (formerly Bank Century Intervest Corp) : CICTIDJA
* Bank Ekspor Indonesia : BEXIIDJA
* Bank Mega : MEGAIDJA
* Bank of China, Jakarta Branch : BKCHIDJA
* Bank Syariah Mandiri (not Bank Mandiri) : BSMDIDJA

Berikut ini adalah daftar "BANK CODE" (kode Bank) Bank-Bank yang ada di Indonesia:
1. BCA - BANK CENTRAL ASIA = 014
2. BANK MANDIRI = 008
3. BANK SYARIAH MANDIRI = 451
4. ANZ PANIN BANK = 061
5. CITIBANK = 031
6. ABN AMRO BANK = 052
7. BANK BUKOPIN = 441
8. BANK DANAMON = 011
9. LIPPO BANK = 026
10. BNI - BANK NEGARA INDONESIA = 009
11. BANK MEGA = 426
12. BANK SYARIAH MEGA = 506
13. BANK HSBC - THE HONGKONG & SHANGHAI B.C. = 041
14. STANDARD CHARTERED BANK = 050
15. BTN - BANK TABUNGAN NEGARA = 200
16. BRI - BANK RAKYAT INDONESIA = 002
17. BANK NIAGA = 022
18. NISP - BANK NILAI INTI SARI PENYIMPAN = 028
19. AMERICAN EXPRESS BANK LTD. = 030
20. BANK OF AMERICA, N.A = 033
21. BANK OF CHINA LIMITED = 069
22. DEUTSCHE BANK AG. = 067
23. JP. MORGAN CHASE BANK = 032
24. ANGLOMAS INTERNASIONAL BANK = 531
25. BANK AGRONIAGA, Tbk. = 494
26. BANK AKITA = 525
27. BANK ALFINDO = 503
28. BANK ANTARDAERAH = 088
29. BANK ARTA NIAGA KENCANA. = 020
30. BANK ARTHA GRAHA INTERNASIONAL = 037
31. BANK ARTOS INDONESIA = 542
32. BANK BINTANG MANUNGGAL = 484
33. BANK BISNIS INTERNASIONAL = 459
34. BANK BNP PARIBAS INDONESIA = 057
35. BANK BUMI ARTA = 076
36. BANK BUMIPUTERA INDONESIA = 485
37. BANK CAPITAL INDONESIA = 054
38. BANK CENTURY = 095
39. BANK CHINA TRUST INDONESIA = 949
40. BANK COMMONWEALTH = 950
41. BANK CREDIT AGRICOLE INDOSUEZ = 039
42. BANK DBS INDONESIA = 046
43. BANK DIPO INTERNATIONAL = 523
44. BANK EKONOMI RAHARJA = 087
45. BANK EKSEKUTIF INTERNASIONAL = 558
46. BANK EKSPOR INDONESIA = 003
47. BANK FAMA INTERNASIONAL = 562
48. BANK FINCONESIA = 945
49. BANK GANESHA = 161
50. BANK HAGA = 089
51. BANK HAGAKITA = 159
52. BANK HARDA INTERNASIONAL = 567
53. BANK HARFA = 517
54. BANK HARMONI INTERNATIONAL = 166
55. BANK HIMPUNAN SAUDARA 1906, Tbk. = 212
56. BANK IFI = 093
57. BANK INA PERDANA = 513
58. BANK INDEX SELINDO = 555
59. BANK INDOMONEX = 498
60. BANK INTERNASIONAL INDONESIA Tbk. = 016
61. BANK JASA ARTA = 422
62. BANK JASA JAKARTA = 472
63. BANK KEPPEL TATLEE BUANA = 053
64. BANK KESAWAN. = 167
65. BANK KESEJAHTERAAN EKONOMI = 535
66. BANK MASPION INDONESIA = 157
67. BANK MAYAPADA INTERNATIONAL Tbk. = 097
68. BANK MAYBANK INDOCORP = 947
69. BANK MAYORA = 553
70. BANK MERINCORP = 946
71. BANK MESTIKA DHARMA = 151
72. BANK METRO EXPRESS = 152
73. BANK MITRANIAGA = 491
74. BANK MIZUHO INDONESIA = 048
75. BANK MUAMALAT INDONESIA = 147
76. BANK MULTI ARTA SENTOSA = 548
77. BANK MULTICOR = 036
78. BANK NUSANTARA PARAHYANGAN 145
79. BANK OCBC = 948
80. BANK PERMATA Tbk. = 013
81. BANK PERSYARIKATAN INDONESIA = 521
82. BANK PURBA DANARTA = 547
83. BANK RABOBANK INTERNASIONAL = 060
84. BANK RESONA PERDANIA = 047
85. BANK ROYAL = 501
86. BANK SHINTA = 153
87. BANK SINAR HARAPAN BALI = 564
88. BANK SRI PARTHA = 466
89. BANK SUMITOMO MITSUI = 045
90. BANK SWADESI. = 146
91. BANK SWAGUNA = 405
92. BANK TABUNGAN PENSIUNAN NASIONAL = 213
93. BANK UIB = 536
94. BANK UOB BUANA = 023
95. BANK UOB INDONESIA = 058
96. BANK VICTORIA INTERNATIONAL = 566
97. BANK WINDU KENTJANA = 162
98. BANK WOORI INDONESIA= 068
99. BANK YUDHA BHAKTI = 490
100. CENTRATAMA NASIONAL BANK = 559
102. HALIM INDONESIA BANK = 164
103. ING INDONESIA BANK = 034
104. KOREA EXCHANGE BANK = 059
105. LIMAN INTERNATIONAL BANK = 526
106. PAN INDONESIA BANK = 019
107. PRIMA MASTER BANK = 520
108. THE BANGKOK BANK. = 040
109. THE BANK OF TOKYO MITSUBISHI UFJ = 042
110. BANK DKI = 111
111. BPD ACEH = 116
112. BPD BALI = 129
113. BPD BENGKULU = 133
114. BPD JAMBI = 115
115. BPD JAWA BARAT DAN BANTEN = 110
116. BPD JAWA TENGAH = 113
117. BPD JAWA TIMUR = 114
118. BPD KALIMANTAN BARAT = 123
119. BPD KALIMANTAN SELATAN = 122
120. BPD KALIMANTAN TENGAH = 125
121. BPD KALIMANTAN TIMUR = 124
122. BPD LAMPUNG = 121
123. BPD MALUKU = 131
124. BPD NUSA TENGGARA BARAT = 128
125. BPD NUSA TENGGARA TIMUR = 130
126. BPD PAPUA (DAHULU BPD IRIAN JAYA) = 132
127. BPD RIAU = 119
128. BPD SULAWESI SELATAN = 126
129. BPD SULAWESI TENGAH = 134
130. BPD SULAWESI TENGGARA = 135
131. BPD SULAWESI UTARA = 127
132. BPD SUMATERA BARAT (BANK NAGARI) = 118
133. BPD SUMATERA SELATAN = 120
134. BPD SUMATERA UTARA = 117
135. BPD YOGYAKARTA = 112

"BRANCH CODE" adalah kode Bank Cabang tempat dimana kita menabung.

catatan:
(hubungi bagian Customer Service pada tempat dimana anda menabung untuk memastikan BANK CODE, BRANCH CODE, dan SWIFT CODE sebelum melakukan kliring lewat AlertPay ke rekening pribadi anda)

Sebagai Contoh Bank BNI;
BANK Code: 099 (semua Bank BNI memiliki BANK Code yang sama)
Branch Code: 0998988 (mungkin bisa berbeda sesuai dengan bank cabang yang anda tuju)
SWIFT Code: BNINIDJA (semua Bank BNI memiliki SWIFT Code yang sama)

Semoga membantu.

Tuesday 6 January 2009

Fakta menarik seputar NOKIA


  1. NOKIA masuk ke dalam jajaran 20 perusahaan yang paling dikagumi di seluruh dunia di Fortune List 2006 (pertama untuk perusahaan komunikasi, keempat untuk perusahaan non-US).
  2. Tulisan NOKIA Co. adalah "Agfa-Monotype-Nokia-Sans font", yang didesain oleh AgfaMonotype Nokia Sans font. Kebanyakan panduan pemakaian ponsel NOKIA menggunakan Agfa-Rotis-Sans font.
  3. Di Asia, angka 4 tidak pernah digunakan pada setiap tipe ponsel NOKIA, karena angka "4 " merupakan angka ketidakberuntungan di Asia.
  4. NOKIA kadang-kadang dipanggil AIKON (Nokia dibaca terbalik) oleh pemakai ponsel non-NOKIA dan oleh pengembang mobile software, karena “AIKON” dipakai di berbagai bungkus mobile software SDK, termasuk Nokia’s Symbian S60SDK.
  5. Nama kota NOKIA berasal dari sungai yang mengalir melalui kota.
Sungai tersebut, Nokianvirta, dinamai seperti kata lama Finlandia yang berarti cerpelai. Spesies binatang pemangsa yang kecil dan berbulu hitam ini pernah ditemukan di daerah tersebut, tetapi sekarang telah punah.
  6. Tidak seperti produk modern yang lain, ponsel NOKIA tidak secara otomatis memulai call timer saat dihubungkan, tetapi saat percakapan dimulai (kecuali ponsel seri 60 seperti nokia 6600,dll).
  7. Kartu GSM komersial pertama dibuat pada tahun 1991 di Helsinki melalui jaringan suplai NOKIA, oleh PM Finlandia, Harri Holkeri, menggunakan ponsel NOKIA.
  8. Ringtone “Nokia Tune” sebenarnya berasal dari seorang gitaris Spanyol, Francisco T Rega, pada abad ke-19 yang berjudul “Grande
Valse”.
  9. “Grande Valse” kemudian diubah NOKIA menjadi “Nokia Tune” pada tahun 1998, hingga semua orang mengetahuinya dan dikenal sekarang sebagai “Lagu Nokia”.
  10. Dering “Special” yang tersedia bagi pengguna ponsel NOKIA ketika menerima SMS (Short Messaging Services), sebenarnya adalah kode morse untuk “SMS”.
  11. Dering “Standar” pada menu message tone adalah kode morse
untuk “M” (Message).
  12. NOKIA merupakan pembuat kamera ponsel yang populasinya terbesar didunia. Pembuatan kamera ponselnya unik, lain dengan cara yang biasa digunakan oleh pembuat kamera.