Minggu, 25 April 2010

Tags
Kumpulan Ebook RajaKadal...

Alquran
Seputar Ramadhan
Pic Bagus
Tanya jawab aqidah
Sufisme
Tafsir
Zinois israel
Tanya Jawab Aqidah2
Mujahid
ingat Maut
Haji
Dzikir
Taubat
Artikel Harun Yahya
Alam Semesta
Osama Bin Laden
Quran
Posisi Imam
Bulan Pernah Terbelah
Rahasia mendapat anak yg unggul
kisahmembunuhnaga1
kisahmembunuhnaga2
kisahmembunuhnaga3
kisahmembunuhnaga4
kisahmembunuhnaga5
pendalis
kaidah emas
Sejarah Nasional
Dalam Mihrab Cinta
Jakarta undercover
Laskar Pelangi
IPDN Undercover
Dee Super Nova
Haryy potter indonesia
cerpen kompas
Majalah X Code
Sniffing
Sniffing
Internet CDMA Gratis
Cara Merawat HP Baterai
Teknik Melacak Email
Rahasia Mak Erot dengan Gambar 2
Rahasia Mak Erot dengan Gambar
Keluarga Sakinah
Kisah Kisah Nabi
Edisi Lengkap Puasa
Kesehatan
Motivasi
Aku Pilih Islam
Kisah Teladan
Doa
Cerita Terbaru
Mutiara LAutan Gaib
Khusus Wanita
1001 kisah Teladan
Ahmad Deedat
Tanya Jawab Aqidah
Tasauf
Rezeki dan Sedekah
Kisah Syuhada
60 Penyakit Hati
Sholat
Cinta
Perbankan Syariah
Pernikahan Begitu Indah
Manajemen Diri
Hadisth Qudsi
Asal Usul Adzan
Alkisah
Mutiara Hikmah
Dajjal
Kiat SEhat Rasullah
Mukjizat Alquran
10 rahasia Internet
Tutorial Wordpress
Belajar Google Adsense
Kumpulan Doa Dan Sunnah
Konsultasi Seks Dengan Boyke
Andrea Hirata edensor 1-3
Tutorial membuat Blog
Bikin Situs
Memikat Wanita Idaman
Bikin Situs
Sifat Sholat Nabi
Manajemen nurani
Kesyirikan menurut Syafiiyah
Trik dan Tip design Web
Penipu di internet
Pendidikan ANak
Kiat Anti Miskin
Tasyabuh
Sebab Perceraian
Kekeliruan makmum
Larangan Isbal
Tips menusli dimedia Massa
Tidur Nabi Muhammad SAW
Trik dan Trips Windows
Menggunjing
Hukum Istihza
Tip dan Trik Register
TIp Bisnis Internet
Tip Menggunakan Hp
14 Kesalahan Bisnis Internet
Panduan Mesjid
Panduan Imam
Dosa Dosa Yang Dianggap Biasa
Tuntunan Sunah
Harga Parfum Original
Gerakan Zionis Menaklukan Dunia
Tarbiyah
The Secret Indonesia
Al Quran
Sejarah Nabi Muhammad SAW
Siapa Bilang Karyawan Tidak Bisa Kaya
Ayat Ayat Cinta
Haryy Potter
Trik dan Trip SEO
Trik dan Tips SEO lanjutan 


Mario Teguh 13
Mario Teguh 12
Mario Teguh 11
Mario Teguh 10
Mario Teguh 9
Mario Teguh 8
Mario Teguh 7
Mario Teguh 6
Mario Teguh 5
Mario Teguh 4
Mario Teguh 3
Mario Teguh 2
Mario Teguh 1
Seksologi
Tutorial Bahasa Ingrris
Female Orgasme
Sejarah Nasional
UUD 45 Amanden
Belajar Adsense
10 rahasia Internet
Rahasia Mak Erot dengan Gambar 2
Rahasia Mak Erot dengan Gambar
Konsultasi dengan Boyke
Memikat Wanita Idaman
Pendidikan ANak
Kiat Anti Miskin
Tips menusli dimedia Massa
TIp Bisnis Internet
Tip Menggunakan Hp
14 Kesalahan Bisnis Internet
Harga Parfum Original

Minggu, 11 April 2010

Tags

Image Hosted by ImageShack.us

Image 
Hosted by ImageShack.us


About This Game
Soccer ! On the beach ! Kick the ball around on the beach with Pro Beach Soccer, a highly fashionable game which boasts the Official World Wide Beach Soccer licence. Play with Cantona, Olmeta and others !!
Minimum System Requirements
  • OS: Windows 98/ME/2000/XP
  • Processor: Pentium 3 700 MHz or Equivalent
  • Memory: 128 MB
  • Hard Drive: 500 MB Free
  • Video Memory: 32 MB
  • Sound Card: DirectX Compatible
  • DirectX: 8.0
  • Keyboard & Mouse
  • CD/DVD Rom Drive

Image 
Hosted by ImageShack.us

Pro Beach Soccer - Direct Link

DOWNLOAD


Tags

Aura 2  The sacred 
Rings
elj-games.blogspot.com
Aura 2 : The sacred Rings
  • Publisher: The Adventure Company
  • Developer: Streko-Graphics
  • Release Date: March 7, 2007
  • Genre: Adventure
About This Game
Since ancient times, a clan of Keepers has guarded a collection of sacred rings that, when united with several hidden artifacts, grant the holder infinite power and immortality. When a rival clan, led by Durad, makes known their intention to obtain this power for an evil purpose, the Keepers send their prized student to uncover the artifacts and deliver them, along with the rings, to Grift, the Old Master. Umang's journey leads to the portal of a world unknown even to the powerful keepers. In this adventure game, the portal transports Umang to Manula Valley where h discovers that this world was once inhabited by the Keepers, hundreds of years ago, until it was taken from them by Durad and his clan. Umang's arrival in Manula Valley is just one more step in a plot manipulated by Durad to bring Umang and the rings one step closer to evil. He must now outwit Durad's powerful forces to complete his quest and return the sacred rings to his clan.
elj-games.blogspot.com
Aura 2 : The sacred Rings – MediaFiles
Tags

2142 battlefield Battlefield 2142
  • Publisher: Electronic Arts
  • Developer: Digital Illusions CE (DICE)
  • Release Date: October 17, 2006
  • Genre: Shooter
About This Game
The year is 2142, and the dawn of a new ice age has thrown the world into a panic. The math is simple and brutal: The soil not covered by ice can only feed a fraction of the Earth's population. Some will live, most will die. Players will choose to fight for one of two military superpowers in an epic battle for survival, the European Union or the newly formed Pan Asian Coalition. Armed with a devastating arsenal of hi-tech assault rifles, cloaking devices and sentry guns, players will also do battle using some of the most imposing vehicles known to man. Massive battle Mechs wage fierce combat on the ground, while futuristic aircraft rule the skies. When facing one of these new behemoths, players will need to use their wits and an arsenal of new countermeasures like EMP grenades to level the playing field.

Battlefield 2142 – Mediafire Links
Tags

Velvet-Assassin
elj-games.blogspot.com
Velvet Assassin
  • Publisher: Gamecock
  • Developer: Replay Studios
  • Release Date: April 28, 2009
  • Genre: Action
About This Game:
Inspired by the fascinating story and unbreakable spirit of British secret agent Violette Szabo, players take control of Violette Summer, a beautiful spy deep behind enemy lines during World War II. Intense stealth-action gameplay with a startling real-time lighting system and surreal visuals combine to produce an incredible gaming experience. Through third-person gameplay, sneak up on enemies and pull the pins from their belted grenades. Infiltrate a Gestapo prison and slip cyanide to your own men before the Germans make them talk. Slink through the shadows to finish off your unsuspecting enemies with a single, silent move. Through Violette's fever dreams, experience what she experienced. Walk where she walked. And kill those she killed.
Minimum System Requirements
  • OS: Windows XP/Vista
  • Processor: Pentium 4 @ 3 GHz
  • Memory: 512 MB
  • Hard Drive: 5+ GB Free
  • Video Memory: 256 MB (nVidia GeForce 6800)
  • Sound Card: DirectX Compatible
  • DirectX: 9.0c
  • Keyboard & Mouse
  • DVD Rom Drive
elj-games.blogspot.com
Velvet Assassin  - mediafire Links
Tags



sMonitor is a network monitoring software that allows you to verify the network connectivity of TCP/IP hosts on the Internet and LAN. The program periodically pings, or checks TCP and UDP ports on user specified computers or other network devices. If the destination host fails to reply to a ping, connection request, or user datagram, sMonitor alerts you using audible alarms, visible notifications, e-mail messages, third-party software, modem and telnet connections. Also, the program generates log files, CSV format files, creates and uploads by FTP the HTML file, which reflects a current status. Based on test results, the program can operate remote systems (power management, reboot, alarm reporting) by modem and telnet using custom scripts. sMonitor can run as standard Windows application or NT service.

sMonitor features:
* Runs as a standard application on Windows 98/ME.
* Runs as a standard application or an NT service on Win NT4/2000/XP/2003/Vista/2008/Windows 7.
* Runs as a system tray application automatically on startup.
* Supports ICMP, TCP and UDP.
* Sends protocol-specific UDP requests to the ports: 67 (DHCP), 123 (NTP),
* 137 (NETBIOS-NS), 161 (SNMP), 389 (LDAP).
* Allows server lists to be saved and opened as user specified files.
* Alerts by audible and visible alarms.
* Allows SMTP mail notifications when a service is down, up, or its state is changed.
* Allows custom e-mail message format to be created.
* Launches third-party applications.
* Creates an HTML status file which mirrors the main sMonitor window.
* Allows the HTML file to be customized and to be uploaded by FTP to a remote web server.
* Contains a built-in script interpreter which interacts with remote systems by modem and telnet.
* Allows customs scripts to be created and debugged.
* Generates plain text log files and CSV format files sorted by servers and services.

Tags


Remote Office Manager is a program for administering and controlling computers remotely in local area networks and wide area networks. It allows you to remotely access the computer desktop in real time. You see the remote computer screen in a resizable window and can control the remote computer with your mouse and keyboard. ROM is compatible with Windows 7. Remote Office Manager (ROM) provides fast, safe and comfortable remote access to computers and supports LAN and WAN (Internet) connections. Besides mouse and keyboard control, ROM offers a number of other tools useful for a system administrator, for example, file transfer, a task manager, remote launch, capturing sound from the remote computer and much more.
Despite its multiple features, Remote Office Manager uses minimum memory, saves CPU resources and can also be configured to run in low bandwidth networks (via EDGE, GPRS) due to its features of running in the so-called saving mode. All data sent over the network are compressed and encrypted.

Main Remote Office Manager advantages:
• Complete compatibility with Windows 7.
• High performance in both local area and low bandwidth networks.
• A lot of features - file transfer, task manager, device manager, Wake On LAN and much more.
• Remote installation. There are several types of remote installation available, including installation in a domain, using a group policy and MSI.
• Multi-monitor system support. If the remote computer has several monitors, ROM allows you to view or control them simultaneously in one window or switch to the necessary monitor.
• Security. All data is encrypted with the help of up-to-date technologies and public key protocols (RSA with a 2048-bit public key and AES with a 256-bit session key).
• Network map. It allows you to arrange computers on the network map showing their actual topological location.
• Configuring the program for running in case of a complicated network topology due to such features as "Connect through" and "Callback connection".
• ROM is deeply integrated with the drag-and-drop mechanism of the system. You can drag and drop files and folders directly onto the remote screen window and from it, which makes working with files as easy as possible. The file transfer mode also completely supports this mechanism.
• Capturing sound from the remote computer.
• Supporting an unlimited number of simultaneous connections.

Tags



Video to Flash Converter Pro is an all-in-one flash conversion software. It can help convert DVD video to flash file in SWF and FLV with video editing functions which allow you to crop video, adjust video effect, edit watermark, add subtitle, clip one video into multiple segments, merge multiple files into one file, and join multiple files into a slideshow. It also allows you to customize SWF flash video by selecting built-in flash player template, applying special effect, adding text, image or URL as watermark, and customizing flash head and tail, etc.

Tags


Create dazzling 3D titles for your videos with BluffTitler DX9. Want to impress your friends and clients with cool 3D titles? But don't want to spend a fortune on professional 3D animation and video titling software? BluffTitler is the easiest way to add spectacular 3D text animations to your photos and videos! Other 3D programs always seemed too hard to learn and too expensive to justify. But thanks to BluffTitler, I can finally create all of the cool animations I only dreamed of before!

Effects that can be created with BluffTitler include:
-golden beveled titles
-blood dripping titles
-JPG textured titles
-MPG textured titles
-slimy titles
-hairy titles
-exploding titles
-reflection mapped titles
-twisted titles
-cartoon shaded titles
-golden glowing titles
-spooky lightened titles
-titles with silver spikes
-jumbling titles
-inverted titles
-bouncing titles
-powerfield emitting titles
-titles with flying hearts
-pumping titles
-plasma backgrounds
-background videos morphing into donuts
-particle effects
-MP3 audio
-morphing JPG pictures
-exploding video backgrounds
-fractal backgrounds

Tags


 Image Resizer 3.0.1.76

VSO Image Resizer is for those digital photos and images exist in the computer and hope to re-adjust the size, compression, conversion, create a backup, or import pictures of the people designing the perfect tool. Do you ever want to send, move, enlarge or reduce a picture or a pile of pictures with VSO Image Resizer, those with a single click to complete the data load.

How to resize images: The VSO free image resize software organizes your photos by changing their resolution or moving them within your hard drive. VSO Image resizer is the perfect tool for those who store their digital pictures and images on their PC and who want to resize , Compress, convert, create copies, create thumbnails, import or organize photos.
With this free resize image software, you can create e-mail friendly versions of your images, load them faster, move them easily from folder to folder, change their format, edit large numbers of image files / batch image resize and thus save space on your hard drive. Using high resolution 1600×1200 for creating wallpaper or file-sharing you can save your memory. VSO Image Resizer can also change file names using a template and you can add your own watermark with transparency support.

VSO Image resizer is integrated into the Windows explorer shell, right click on your pictures and start working on your pictures!

Features:
- Convert between different graphic formats
- Configurable compression / resolution ratio
- Support file formats: Jpeg, gif, bmp, tiff etc
- Support Digital Camera RAW formats: Canon. CR2, Nikon. NEF,. MRW Minolta
- Handle single picture or batch mode
- Customizable templates for renaming files
- You can add your own watermark file
- Reduce size photos perfect for web publishing / share photos by email
- Integrate in windows explorer or works as a stand-alone application
- Fast processing
- Import directly from your memory cards
- Save history of destination folder
- Variable options and settings for advanced users
- Multilingual support
- Optimized for Windows 2000 / XP / Vista


Shadow Defender is an easy-to-use desktop security and privacy protection tool for Windows operating systems. It provides an excellent way to prevent unwanted or malicious changes from being made to a PC. With Shadow Defender you can run system in a virtual environment, called Shadow Mode and all the attacks will happed in the virtual environment, not the real environment. If attacks happened, all you need to do is to reboot your system. After reboot, the system will be restored to the original state, as if nothing happened. And meanwhile you can save the selected files and folders to the real environment.

Shadow Defender's protection concept is very easy to grasp. For the software to do its job properly you have to place the disks installed on your computer into Shadow Mode. By doing this, the application will take a snapshot of the disk and run every file in virtual mode. You will have the same access to the files on the disk but any write action will be virtual.
This means that no matter how many worms and spywares you infect your computer with, they will not affect the real system at all because of the virtualization. Once you snap out of this "parallel dimension" every change to the system and the files on the disk will be discarded.

The conclusion in this sense is that the computer will not be affected by any change and no malicious files will be written to the PC. The greatest thing is that you can choose what can actually get stuck on the disk while in Shadow Mode. More than this, you can decide in advance what files and folders should not benefit from Shadow Mode protection.

Features:
1. Prevent any unknown and future virus.
2. Protect your privacy effectly.
3. Eliminate the system downtime and PC maintenance cost.
4. Surf the internet safely.

Supported OS: Windows 2000 /XP /2003 /Vista/Windows 7

Tags

 


GoodSync is an easy and reliable file backup and file synchronization software. It automatically analyzes, synchronizes, and backs up your emails, precious family photos, contacts, MP3s, financial documents, and other important files locally - between desktops, laptops, servers, external drives, and Windows Mobile devices, as well as remotely through FTP, SFTP, WebDAV, and more. GoodSync file synchronization software combines bulletproof reliability with an extremely easy to use interface to compare, synchronize, and backup your emails, contacts, photos, iTunes, MP3s, and other important files. Automatically synchronize and back up your important files between desktops, laptops, servers, and external drives over a network or the Internet. Using an innovative synchronization algorithm - GoodSync file sync software is years ahead of the pack when it comes to file synchronization.

Main features:
• True Bi-Directional Synchronization Prevents Data Loss
• One-Way Synchronization Provides an Easy Backup Solution
• Lightning Fast Speed, Low Memory Requirement
• Syncs not just Windows folder but also FTP, WebDAV, SFTP, S3
• Syncs with your Windows Mobile Phone and Pocket PC too
• Selective File Synchronization: Exclude and Include Filters
• Automatic Reconnect for Remote Folders
• Flexible and Easy Sync Automation

Other features:
• No File System Monitoring Is Required
• Chained Synchronization for Multiple Devices
• Embedded Jobs Handled
• Time Shifts Are Detected And Fixed
• FTP File Modification Time Sync
• File Mod Time Translation For Non-Preserving File Systems
• Sync Just File Modification Times for Time Shifts
• Real Time Action Monitoring in User Interface
• Visual Comparison of all Files Made Easy
• Slice It and Dice It With Tree Views
• Tab Display for Jobs Allows Better Organization and Matching of Sync Jobs
• Job List Pane as Main Control Panel
• Total Bytes and Counts At All Levels
• Browse Dialog for Easy Folder Selection
• Mini Window for Specialized Applications
• Free Space Required Predicted
• Logs of Actions and Changes Report
• Job Tags Mark Portable Devices
• Online Backups Via Encrypted Channel

Features of PRO version:
• Unlimited Number of Files Synchronized
• Unlimited Number of Jobs Synchronized
• Free Upgrades
• Business and Government Use



 
Tags
 Advanced Host Monitor Enterprise 8.54



Advanced HostMonitor is a network monitor program. You can create a list of jobs and tests in advance on a 'set and forget' basis. Among the many checks it can do, it can monitor any TCP service, ping a host, retrieve an URL, check the available disk space, and more. It checks network servers at regular intervals and takes pre-defined actions if a device does not respond.

It can provide a visual and sound warning, send an E-mail message to a mailbox, pager or mobile phone, execute another program, etc. All this allowing you to respond to a problem before your users start to complain.HostMonitor is a highly scalable network monitoring software suitable for small and enterprise-level networks. Probably you will say "There are dozens of programs like this"? That is right! But please check what HostMonitor offers and compare its power and flexibility to surprisingly low price: using 60 test methods our software can check almost any parameter of your servers; highly flexible action profiles allow you to start actions in predefined order depending on the test results.

Probably you will say "There are dozens of programs like this"? That is right! But please check what HostMonitor offers and compare its power and flexibility to surprisingly low price:


* using 60 test methods our software can check almost any parameter of your servers;

* highly flexible action profiles allow you to start actions in predefined order depending on the test results;

* HostMonitor creates various log files using different detail levels and file formats (Text, HTML, DBF and ODBC);

* built-in Report Manager allows you to create and customize reports to your liking in a variety of ways;

* using Remote Monitoring Agents for Windows, FreeBSD, Linux, NetBSD, OpenBSD and Solaris you may easily monitor remote networks;

* Web Service, Telnet Service and Remote Control Console simplifies remote management;

* and this is not all...


Fixed The following issues were resolved

* HostMonitor: in some cases "Limit number of RCC connections for the account" option could work incorrectly. Fixed

* In some cases WatchDog application could start inactive (unmarked) actions. Fixed

* Web Service could report "Transmission error" instead of "Unauthorized" or "Unacceptable IP address" error. Affected Web Service version 3.56 only. Fixed in this version

* WMI Explorer could display "List index out of bounds" error while processing query like "select * from CIM_LogicalDevice" due to inconsistent list of properties provided by various objects. Fixed


Sabtu, 10 April 2010

Tags
Plato Photo Booth 11.02.01,



Features of Plato Photo Booth :
  • Include kinds of background like ocean,flowers.
  • Add single frames by yourself
  • Edit the photos on your pc in the image editor
  • Shooting and print out photos
  • Friendly interface to operate
  • Combine the photos as you like
  • Add decorations to the photos
  • Add base pictures to the photos
Requirements :
  • Processor 1GHz Intel/AMD processor or above
  • RAM 256MB RAM (512MB or above recommended)
  • Free Hard Disk 10MB space for installation, 300 MB space for output video
  • Graphic Card Super VGA (800+600) resolution, 16-bit graphics card or higher

Senin, 05 April 2010

Windows Vista SP2 Genuine Keys

Tags


Windows Vista SP2 Genuine Keys

Ultimate:
6F2D7-2PCG6-YQQTB-FWK9V-932CC

Business:
72PFD-BCBK8-R7X4H-6F2XJ-VVMP9

THE COVE

Tags
THE COVE
Film Dokumenter Kontroversial Mengenai Pembantaian Lumba-Lumba


Film dokumenter yang disutradarai Louie Psihoyos ini melakukan pengambilan gambar di Taiji, sebuah kota pesisir di Perfektur Wakayama, Jepang, lapor The Asahi Shimbun.
Sebuah Film Dokumenter Kontroversial yang bertemakan perburuan lumba-lumba. Pembuat film itu menggunakan kamera tersembunyi dan mikropon karena koperasi nelayan setempat tidak mengizinkan kameramen pergi ke teluk tempat lumba-lumba dibantai.

Download Link :

A Vampire Romance Paris Stories v1.131-TE

Tags

 A Vampire Romance Paris Stories v1.131-TE


  • HdO Adventure A Vampire Romance Paris Stories v1.131-TE

    HdO.Adventure.A.Vampire.Romance.Paris.Stories.v1.131-TE
    Year: 2010 | Language: English | Platform: PC | Size: 46.91 Mb
    Genre: Adventure


    Leila Saraostre, a young foreigner, moves to the famous Parisian neighborhood, Montmartre, to study at the art school of the Louvre. There she meets the enigmatic Uriel Ruthven, and quickly falls in love. Uriel takes Leila on a whirlwind tour of Paris, but then disappears mysteriously.

    Leila is determined to find Uriel, even if it means venturing into the darkness of the catacombs; the secret they hide turns out to be more than merely dangerous... Play as both Leila and Uriel, and discover Uriel's strange secret in AVampire Romance: Paris Stories!


    Download Links:
    HotFile | RapidShare
Tags
     Jaws Unleashed

Tags

Minggu, 04 April 2010

Tags
Link Donlot E-Book :


Mengenal Komputer
Kiat sukses Promosi Blog
Cara membuat Blog dengan Blogger.com
Trik Seputar Komputer
Tentang Trojan Horse
Tips Membuat Web
Sistem Komputer
Pembakuan Istilah Komputer
Panduan Membuat Rekening E-Gold
Keyboard Arab PDF
Sejarah Komputer
Munculin Lagi File yang Kehiden
Menjebol Password PC Security Tanpa Ketahuan
Jadi Master Kode HTML
Membuat Web CMS dengan Joomla
Kamus Istilah Komputer dan Teknologi Informatika
Keamanan Jaringan Komputer
Istilah-istilah dalam Internet
Jaringan dan Internet
Hacker, Mengenal Dunia Mereka dan Seluk-Beluknya
Devinisi dan karakteristik Software
Devinisi dan karakteristik Hardware
Cara Menjadi Hacker
Cara Membuat website dengan Tangan Anda Sendiri
Cara Membuat Website dengan HTML
Cara Bikin Virus
Cara Membuat Website dengan FrontPage
Belajar Keyboard Arab
Belajar Menjadi Hacker
Cara Mem-verified AlertpayTehnik Dasar Optimasi Web
Panduan Mendapatkan Dollar Gratis
Memiliki Blog Canggih dengan Modal Nol
Kaligrafi menjadi Lebih Menarik dengan Photoshop
Mendapatkan Akses Internet Gratis dengan Antena kaleng
Panduan Dollar Gratis Bux.to
Optimalisasi Kinerja PC Anda
Cara Membuat E-Book
Ebook Sepintas Penggunaan SalafidB
Ebook Blogspot Custom Domain
Bagaimana Memasarkan Blog?
Dapat Dollar hanya dengan Online di Internet
Blog untuk Dollar
e-book tentang antivirus
25 Blog Sukses
Panduan Google Adsense
10 Tahap Membuat Blog
22 Metode Blog Marketing untuk Blogger Pemula
E-Book Klik Rupiah
Trik Adsense
Membuat Antena Kaleng Full Detail
Kiat Sukses promosi Blog


Tentang Segitiga Bermuda 01
Tentang Segitiga Bermuda 02
Misteri Naskah Laut Mati
Misteri2 yang Tidak Terungkap
Nama Negara dan Mata Uangnya
Kumpulan Resep masakan
Menyibak Tabir Evolusi
Runtuhnya Teori Evolusi dalam 20 Pertanyaan
Menjelajahi Dunia Semut
Selamat Datang di Dunia Semut
Mengapa Darwinisme Bertentangan dengan Al-Qur’an
Keruntuhan Teori Evolusi Darwin
Memahami Allah Melalui Akal
Manusia dan Alam Semesta
Kesempurnaan Seni Warna Ilahi
Kumpulan Artikel HarunYahya
Menjawab Tuntas Polemik Evolusi
Ada Apa dengan Flu Babi?
Jejak Bangsa2 Terdahulu
Keajaiban Hormon
Keajaiban Desain di Alam
Berpikirlah Sejak Anda Bangun Tidur
Bencana Kemanusiaan Akibat Darwinisme
Dracula –Fakta yang Menjadi Fiksi-
Manfaat Kegiatan Intelektual dan Budaya
Beberapa Kritikan Terthadap Jama’ah Tabligh
Akankah Bumi Kiamat Karena Planet X?
Ratusan Link Penting
Rahasia di Balik Kehidupan
Membangun Sistem Pengelola Keuangan Pribadi
Tentang Billgates
2012 Kiamat, benarkah?
Matematika Alam Semesta
Tentang Ahmadiyah
Koleksi Buku Indraganie
Ilmu Tasawuf
DVD Ubuntu ME
Peta Surabaya
Strategi Belajar Mengajar
Cara Baca Cepat
Kumpulan Soal CPNS
Nama-nama Hewan dan Tumbuhan Berikut Nama2 latinnya

Perpustakaan Digital

Tips menulis di Dunia Massa
Proses Penyusunan Karangan Ilmiah
Menjadi Penulis Buku Profesional
Software Untuk Memeriksa Kata
Perkataan Mudah Bhsa Arab Harian
Kemahiran Mengajar Bahasa Arab
Kitab Arab Tatabahasa
Kamus Arab Indonesia
Kamus Arab
Buku Bahasa Arab Lengkap

Bagaimana Cara Untuk Mempelajari Suatu Bahasa? (Teks: Ingg)
Toefl Practice Paper Based
Novel Bidadari Untuk Ikhwan
Sang Al Kemis

 Siapa Bilang Jadi Karyawan Gak Bisa Kaya?
Pribadi yang Bermanfaat
Kata-kata Inspiratif Mario Teguh

 Menjadi Pendengar yang Baik
Menjaga Lisan
Laa Tahzan “Jangan Bersedih”
Kunci kebahagiaan
Melihat Kebaikan di Segala Hal
Kekuatan Cinta
Mutiara Hati

Lindungi Mata dari Radiasi Komputer
Diet Ala Rasulullah Saw
Agar Tetap Awet Muda
Rahasia Perawatan Kulit Kering
Mempesona Memasuki Usia Paruh Baya
Jurus Atasi Kulit Keriput
Jurus Ampuh Tumpas Jerawat/ Komedo
15 Cara Redakan Stress
3 Langkah Cantik di Segala Usia
Kumpulan Fakta Unik
Fakta Unik
Fakta Mengenai Plastik
The Best Pictures
Fakta Tentang Kopi

Komunikasi Kita dengan Pendidikan Anak
Hak Ibu
E-Book tiga Tahun Pertama yang Menentukan Bagi Anak
 

 
 
 
P 3 K -- PERTOLONGAN PERTAMA PADA KOMPUTER   

Sedia payung sebelum hujan, begitu kata pepatah. Bila kita artikan dalam hubungan nya dengan konteks Artikel ini, maka istilah itu berarti : BERSIAP-SIAPLAH SEDINI MUNGKIN DARI SERANGAN PROGRAM-PROGRAM JAHAT, SEBELUM DATA PADA KOMPUTER ANDA HILANG.   Yah memang ada baiknya bagi kita untuk selalu memperhatikan serta merawat peralatan yang kita gunakan, tidak hanya memakai nya saja tanpa adanya perawatan. Merawat komputer sebenarnya tidaklah terlalu sulit, hanya membutuhkan waktu, kemauan dan tentunya pengetahuan dasar mengenai komputer, sebab bila tanpa adanya pengetahuan dasar kemungkinan Anda akan bingung sendiri harus diapakan komputer itu. Disini saya akan menjabarkan dasar-dasar perawatan komputer untuk mencegah sedini mungkin dari kerusakan-kerusakan komputer terutama kerusakan data akibat dari serangan program-program jahat.

Sebenarnya banyak cara yang dilakukan orang untuk merawat komputer terutama data-data penting yang ada pada komputer, dan masing-masing orang pun punya cara tersendiri untuk melindungi data dari kerusakan yang parah akibat serangan-serangan program jahat. Dibawah ini saya berikan beberapa TIP'S dan TRICK yang mungkin berguna bagi Anda.

1.  PASTIKAN KOMPUTER ANDA SEHAT -- Bagaimana cara mengetahui komputer Anda sehat-walafiat, ikutilah langkah-langkah berikut untuk memastikan bahwa komputer yang Anda gunakan sehat wal-afiat.
  • Matikan komputer Anda dan periksa semua perlengkapan hardware pada komputer Anda, mulai dari Keyboard, CPU, Printer, Mouse dan Monitor. Pastikan tidak ada benda-benda yang mencurigakan yang mungkin tidak ada sebelumnya atau Anda merasa bahwa benda tersebut bukan Anda yang memasangnya. Perhatikan KONEKTOR KEYBOARD yang menancap pada CPU, apakah ada benda asing yang melekat atau tidak. Sebagai informasi untuk Anda, Ada sebuah alat KEYLOGER yang berbentuk KONEKTOR KEYBOARD. Alat ini dapat merekam semua karakter yang Anda tekan di keyboard dari awal sampai akhir, bentuknya mirip dengan KONEKTOR KEYBOARD, bila Anda menemukannya lepas lah konektor itu.
    Keylogger
    KEYLOGGER CHAIN TRANSMITTER
  • Lepas alat-alat yang belum atau yang tidak sedang Anda gunakan seperti : USB FLASHDISK, USB CAMERA, CARD READER, INFRA RED, BLUETOOTH, DISKET DI FLOPPY DISK, MODEM EXTERNAL dan lainnya yang saat ini tidak Anda pergunakan. Alat-alat tersebut kemungkinan dapat dijadikan jalan masuk Program Jahat yang tidak Anda inginkan. Bila Komputer Anda terhubung ke JARINGAN LAN, Lepaslah konektor RJ45 yang terpasang di LAN CARD, cabut juga LINE TELEPHONE yang terhubung ke MODEM.
  • Hidupkan Komputer Anda seperti biasa, perhatikan proses STARTUP pastikan tidak ada kelainan pada proses startup, kemudian lihatlah ICON-ICON yang ada di QUICK LUNCH dan SYSTEM TRAY ICON, perhatikan satu persatu apakah ada program startup yang mencurigakan atau tidak. Icon-icon yang ada di SYSTEM TRAY biasanya adalah program yang auto startup seperti, PROGRAM ANTI VIRUS, VOLUME CONTROL (MMSYS), MASSENGER dan lain-lain. Perhatikan apa ada icon yang mencurigakan atau tidak bila ada, KLIK KANAN icon tersebut dan lihatlah properties nya apakah icon tersebut memang bagian dari software yang anda install atau bukan, bila bukan berarti Anda harus meneliti lebih jauh lagi.
  • Non Aktifkan WINDOWS MESENGGERS, caranya klik icon messengger yang ada di SYSTEM TRAY setelah MESSENGGER dibuka Klik TOOLS lalu pilih OPTION, setelah menu OPTION keluar klik tab PREFERENCES, lalu hilangkan tanda CONTENG yang ada didepan kata :
    • Run this programs when windows starts.
    • Allow this program to run in the Background
    Setelah itu klik OK. Program messengger memang berguna tetapi seringkali mengganggu kelancaran proses program, selain itu messengger juga dapat dijadikan jalan masuk program jahat yang tidak kita inginkan. Microsoft mengetahui hal ini, sehingga pada Windows Vista program messengger tidak ditempatkan pada startup.
  • Lihat semua file-file system dan file-file yang hidden, caranya ; jalankan windows explorer, klik TOOLS kemudian pilih FOLDER OPTION setelah itu pilih tab VIEW lalu pilih SHOW HIDDEN FILES AND FOLDERS serta hilangkan semua tanda conteng yang ada dibawahnya. Perhatikan satu persatu file-file yang telah dinonaktifkan atribut hidden nya. Bila file-file hidden dan system tidak tampil setelah anda lakukan langkah tersebut, kemungkinan komputer Anda sudah terinfeksi oleh Virus, bila ini terjadi maka Anda harus mengaktifkan nya melalui REGISTRY EDITOR (REGEDIT) yang akan dibahas di bab selanjutnya.
  • Lihat TASK MANAGER dan SERVICES yang dijalankan, caranya ; Klik START -- RUN -- lalu Ketik MSCONFIG kemudian klik OK. Setelah MSCONFIG aktif Klik satu persatu TAB yang ada dan perhatikan dengan seksama. Klik TAB SERVICE, perhatikan semua SERVICE yang RUNNING, pastikan tidak ada SERVICES yang mencurigakan, bila ada hilangkan tanda conteng yang ada didepan SERVICES tersebut. Setelah itu KLIK TAB STARTUP, Perhatikan juga program-program yang STARTUP, bila ada program STARTUP yang mencurigakan hilangkan tanda contengnya, Bila Anda yakin akan perubahan tersebut klik OK, bila tidak Yakin klik CANCEL.
Bila semua langkah-langkah diatas tidak ada masalah, berarti Komputer Anda 80% SEHAT WAL'AFIAT, Bila terdapat masalah berarti Sebaliknya.

2.  BACKUP DATA SEDINI MUNGKIN -- Backup data penting Anda pada media yang lain selagi komputer Anda sehat, bila Anda melakukan backup setelah komputer Anda terhinggapi program Jahat hal itu tidak ada gunanya sebab kemungkinan program tersebut akan ikut ter-Backup. Media yang aman untuk membackup data penting Anda menurut saya adalah di CDR/DVDR tetapi bukan CDRW/DVDRW, CDR/DVDR hanya bisa ditulis oleh program PEMBAKAR seperti NERO BURNING TOOLS atau Windows Backup, jadi boleh dikatakan program-program pengganggu tidak bisa berbuat apa-apa terhadap file yang disimpan di Media CDR/DVDR. Sebelum Anda melakukan pem-Backup-an data ada baiknya Anda meng-CONVERT-nya menjadi file IMAGES. Anda dapat menggunakan software WINISO atau NERO IMAGES untuk mengubahnya.   Mengapa saya menyarankan untuk mengconvert data Anda menjadi file IMAGES, selain dapat menghemat kapasitas FILE, file IMAGES juga membackup data Anda seperti ASLI nya bila di ekstract lagi, dan factor kerusakan data tidak besar selain itu dapat membackup data yang berukuran besar. Berbeda bila Anda meng-CONVERT-nya menjadi file ZIP atau RAR, Faktor kerusakan file tersebut cukup tinggi. Terkadang file ZIP atau RAR tidak mampu menampung data yang besar, seringkali ERROR bila kita meng-Ekstrak file yang berukuran besar.

3.  PASANG PROGRAM PENDUKUNG -- Bila Komputer Anda belum terpasang Program-program pendukung Anti program Jahat, pasanglah program tersebut. Walaupun tidak 100% Aman dari serangan program jahat, program pendukung seperti ANTI VIRUS, ANTI SPYWARE dan FOLDER PROTECTION tetap harus Anda pasang agar mengurangi resiko pekerjaan Anda untuk mengecek secara manual keamanan Data-data Anda.   Anda juga jangan terlalu mengandalkan program tersebut, untuk mengamankan Data penting Anda sebab Para Pembuat Program-program Jahat tentunya telah lebih tahu untuk melindungi program yang dibuatnya agar tidak terdeteksi oleh Program Anti virus tersebut. Itulah sebabnya mengapa setiap program ANTI VIRUS meminta Anda untuk meng-update terus program tersebut.

4.  PERIKSA FILE DARI LUAR -- Bila Anda mengcopy file-file yang berasal dari luar lingkungan Komputer Anda, jangan langsung Anda copy ke dokumen di Komputer Anda. DIbawah ini saya berikan tips untuk meyakinkan bahwa file yang Anda dapatkan dari luar lingkungan Komputer terbebas dari Program jahat yang tidak Anda inginkan.
  1. Aktifkan dahulu SYSTEM RESTORE yang ada di WINDOWS, caranya ; Klik START -- CONTROL PANEL -- Double Klik ICON System -- Klik TAB SYSTEM RESTORE, Bila tanda conteng pada kata "TURN OFF SYSTEM RESTORE ON ALL DRIVES" ada, hilangkan tanda conteng itu lalu klik OK. Bila tidak Ada tanda conteng berarti SYSTEM RESTORE SUDAH AKTIF, Klik saja CANCEL untuk keluar dari Window itu.
  2. Scan dengan Program Antivirus yang telah Anda Pasang. 
Semoga bermanfaat ,,,

Sumber : http://ballz.ababa.net


Portable Quake III Arena Size: 405Mb

Quake III Arena or Quake 3, abbreviated as Q3A or Q3, is a multiplayer first-person shooter computer and video game released on December 2, 1999.
The game was developed by id Software and featured music composed by Sonic Mayhem and Front Line Assembly. Quake III Arena is the third title in the series and differs from the previous games in the Quake series in that it excludes the normal single-player element, instead focusing on multiplayer action. The solo experience in Q3 is arena combat versus AI opponents, in a similar style to Unreal Tournament.
As with most multiplayer first-person shooters, the aim of Q3A is to move throughout the arena fragging (killing) enemy players and scoring points based on the objective of the game mode. When a player’s health points reach zero, the avatar of that player is fragged; soon after the player can then respawn and continue playing with health points restored, but without any weapons or power-ups previously gathered. The game ends when a player or team reaches a specified score, or when the time limit has been reached. The single player mode of the game consists of the same thing against computer controlled bots. The game modes are deathmatch, Team deathmatch, Capture the flag, and tournament, in which players test their skills against each other in one-on-one battles, and an elimination ladder.

System requirements:
Windows 98/ME/2000/XP/Doesn't work on Se7en
DirectX 7
800 MHz
256 MB RAM

Screenshots: #1 #2 #3

Rapidshare 1
Rapidshare 2
Rapidshare 3
Easy-share 1
Easy-share 2
Easy-share 3
MediaFire 1
MediaFire 2
MediaFire 3
RGhost 1
RGhost 2
RGhost 3