Pages

This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Saturday, March 27, 2010

Pendaftaran



Langkah-langkah sebelum membuat pembelian di KEDAI BUKU KAMI


Langkah 1 - Daftar untuk menjadi pelanggan

1. Anda perlu klik pada menu "Daftar Masuk" dan klik 'Sertai Sekarang'.
2. Masukan maklumat anda dengan lengkap dan klik 'hantar'.
3. E-mel pengaktifan akaun akan sampai ke e-mel anda. Jangan lupa semak di "spam box" jika belum menerimanya.
4. Sila klik pada pautan pengaktifan akaun dan anda boleh log-in menggunakan username dan password yang telah diberikan.

***Nota

1. Sila pastikan e-mel yang anda berikan adalah betul dan masih berfungsi.
2. Jika anda sudah mendaftar, anda hanya perlu masukan username dan password pada menu 'Daftar masuk'. Anda tidak perlu mendaftar lagi.
3. Jika anda masih belum dapat e-mel pengaktifan akaun, sila semak pada ruang 'Spam' pada e-mel anda. Kepada pengguna Yahoo!Mail, anda akan mengalami kelewatan untuk e-mel masuk.

Langkah 2 - Buat pilihan produk

1. Selepas anda mendaftar masuk, anda boleh membuat pilihan prdouk.
2. Sila klik 'Beli' pada produk yang anda ingin membeli.(Ia terletak di sebelah harga setiap buku).
3. Selepas anda klik beli, akan keluar paparan Senarai Belian.
4. Anda boleh klik pada ikon pembetulan untuk mengubah kuantiti produk dan selepas itu klik pada ikon 'Right'. Anda juga boleh klik pada ikon 'tong sampah' jika anda mahu mengeluarkan produk tersebut daripada senarai belian.
5. Jika semua produk telah dipilih, anda boleh klik pada ruang 'Beli'.

Langkah 3 - Pilih cara penghantaran

1. Jika anda mahu ambil produk di Ibu Pejabat Stormreaders, anda boleh klik pada ruang 'Ambil Sendiri'.
2. Jika anda mahu produk dihantar ke alamat seperti yang ada pada profil anda, anda boleh klik pada 'Alamat Terkini'. Alamat anda akan dipaparkan.
3. Jika anda mahu produk dihantar ke alamat lain, anda boleh klik pada ruang 'Alamat Surat Menyurat'. Anda perlu masukan alamat penghantaran.
4. Jika pilihan telah dibuat, anda boleh klik pada ruang 'Teruskan untuk semak keluar pembelian'.

Langkah 4 - Pilih cara pembayaran

1. Senarai cara pembayaran akan dipaparkan.
2. Jika anda ingin membayar secara bank transfer atau tunai, sila pilih pada ruang 'Pembayaran Bank'. Maklumat pembayaran akan dipaparkan dan selepas anda membuat pembayaran, sila masukan nombor rujukan pada ruang yang diminta. Anda boleh faks atau e-mel bukti pembayaran kepada syarikat.
3. Jika anda ingin membuat pembayaran secara kad kredit, klik pada ruang 'Kad Kredit'.
4. Klik pada ruang 'Teruskan untuk semak keluar pembelian'.
5. Semak pembelian anda dan klik pada ruang 'Tempahan'.
6. Pastikan keluar paparan untuk cetak resit. Tempahan anda telah berjaya.

Langkah 5 - Periksa status penghantaran produk

1. Selepas anda berjaya membuat tempahan, anda akan menerima e-mel daripada Stormreaders berkenaan dengan status penghantaran produk anda.
2. Anda boleh semak dengan Log-in ke e-Store dan klik pada menu 'Akaun Saya'. Klik pada ruang 'Periksa Status Tempahan'


HARGA POS

Tempoh Penghantaran 3 - 5 hari bekerja.

Semenanjung Malaysia
Harga pos produk adalah mengikut berat : Minimum RM5.00 ( dinasihatkan untuk order hingga 2-3 buku untuk menjimatkan kos pos)

Sabah/Sarawak
Harga pos produk adalah mengikut berat : Minimum RM8.00 ( dinasihatkan untuk order hingga 2-3 buku untuk menjimatkan kos pos)

Sunday, March 21, 2010

How To Hack Facebook !!


The very first thing I should mention is that when it comes to Facebook, there’s really no such thing as “hack codes.” The title of this article is partially tongue-in-cheek, because with Facebook, the rules change so often that one “Facebook hack” code that works today will likely not work tomorrow.
Facebook designers change links and features at whim – and you’re left trying to guess what’s coming next and why your link or plug-in no longer works.

I’ve previously written a couple of articles here about Facebook, such as the controversial method on how to view private Facebook profiles, or how to email mobile photos to your Facebook account. However, in addition to those tips, there are other codes and features that aren’t immediately obvious to most users – so I wanted to provide a list of the top 6 of my favorite Facebook “hack” codes and tips to other Facebook enthusiasts out there.


#1 – The Konami Code Lens Flare Hack
This is a rather silly hack, but if you’re visiting friends who may not be very computer savvy –
this is a very easy way to impress them with your hacking skills. Borrow their computer
(or bring your laptop), log into your Facebook account, and then on the computer keyboard just
type the following key sequence of arrows and letters exactly:
UP-UP-DOWN-DOWN-LEFT-RIGHT-LEFT-RIGHT-B-A-

Then, click around on your Facebook page, or scroll up and down the page
(this seems to work best), and you’ll discover a pretty cool display of lens flare effects.



Oddly, the effect isn’t horribly annoying because it disappears pretty quickly when you
really need it to. It isn’t the most impressive hack though, because it’s probably the most
common one mentioned across the net – but it’s still kind of cool and fun to play around with.

#2 – Aye, Make Yer Profile a Pirate’s Page You Landlubber!
The second profile hack is also one of the easiest to implement. Facebook offers users the
ability to transform their Facebook pages into any language that they like. If you scroll down
to the lower left corner of your profile page, you’ll see your current language setting. Click on this,
and you’ll have a list of all languages available to you. Notice the English Pirate option?



Ahoy matey – yer now a Cap’n! Now as you go through your profile page you’ll notice some
pretty hilarious pirate variations.



Now, the wall is the Plank, your profile is the Cap’n’s Log, and you can now either
click a post as pleasin’ to me eye (like) or blabber t’yer mates (comment).
It certainly removes the “boring” factor from your old standard Facebook pages.

#3 – Upside Down Status Updates
If you’ve been on Facebook long enough, you’ve probably noticed a few people posting upside down
status updates. They sure do think they’re clever don’t they?! Yes, you too can be the envy of all
of your friends and family by posting your updates so that people have to look silly by tilting their
heads upside down so they can read it.

Most of the people you’ve seen doing this have likely installed a Facebook app just to do so.
However, I dislike installing apps because you always have to provide permissions to those
applications to access your profile. A better approach is to use the free online application at
FlipText to generate your upside down status update.



Simply copy the upside down text from the lower text box, paste it into your Facebook status box
and post!

#4 – Download Complete Photo Collections From Your Friends’ Profiles
If you have a lot of friends on Facebook, you may not have the time to keep up with all of the new
family photos they’ve posted – but you are very interested in them and would love to have them stored
in your own private photo collection to review later. Well, thanks to a very cool FireFox plug-in call
ed FacePAD, you can do just that. The add-on is awesome, and I would recommend that anyone with the
resources to do so should send in a contribution to Arthur Sabintsev for his efforts.

After you install the FacePad plug-in, make sure you select Tools->Add-Ons, and configure the
options for FacePad so it has your correct Facebook language. Then, all you have to do is go to
your friend’s photo albums, right-click on the title and select “Download Album With FacePAD.”
That’s right, you’re not downloading a single picture – but an entire album.



Once you do, FacePad downloads every single image within that album into the download folder
you’ve configured in FireFox. Don’t forget to organize all of those photos using JetPhoto, as
recommended earlier by Jeffry.

#5 – Schedule Facebook Status Updates With Sendible
Do you like to keep your Facebook profile active, but you’re coming down with a cold and may be
offline for a few days? Maybe you’re taking a trip and won’t be anywhere near a computer for a week.
Or maybe you’ll be playing hooky from work and traveling, but you want your colleagues and boss to
think you’re stuck at home sick. Accomplish any of these wishes by using Sendible to schedule your
Facebook status updates. This is an application Daniel covered earlier, so check out his article
for more details.

But for Facebook specifically, once you sign up with Sendible, just click on Facebook and provide your
Facebook login details. Sendible connects directly with your Facebook account.
The, under “New Messages” click on “Status Updates“.



On the next page you can schedule out as many updates as you’d like! This service is
awesome – and you can distribute scheduled updates to a number of social networks including MySpace,
Blogger, Twitter and more.

#6 – Hide Your Online Status From Certain People
Look, don’t feel bad about it. When I first joined Facebook I left my online status wide open.
After a couple of weeks of getting inundated with nonstop chat requests, I simply turned off my
online status completely. Problem solved. Except, there really were certain people I wouldn’t mind hearing from – is it really fair for a few chatterbox buddies to ruin your chances for communicating with everyone? Well, there is a way for you to selectively block your online status from certain
people.



All you have to do is open up your chat icon in the lower right corner of your Facebook display,
click on Friend Lists, and create a new list called “BlockList.” Make sure after you create it that it’s configured under
“Display these lists in Chat.”



Now, all you have to do is either click “edit” and add the friends you want to block, or if they’re already online,
just click their name and drag them under this new list. Once you’ve got everyone there who you want to block from
see your online status, hover your mouse over the green dot to the right and click on “Go Offline.” Now, you appear offline to only those certain friends.

Facebook, unlike MySpace, is not really easy to tweak – which is actually a good thing. Gone are the days of those horrid eye-bleeding pages with pink flashing backgrounds and instant music that you can’t turn off. However, the tweaks and plug-ins in the list above offer at least a few ways to customize your Facebook account and usage
to suit your life and your personality.

Saturday, March 20, 2010

Tool Removes the update KB971033 for Windows 7


If you have an inscription on the desktop that your version of windows is not genuine (this can happen even if you have a licensed windows), it means that you have downloaded and installed update Windows KB971033 (can check out the journal for updates.) Do not attempt to roll back to an earlier date, or manually remove this update - it does not help! Just download the program, run it as administrator and click apply!

OS: Windows 7
Language: English
License: Cracked
Size: 8.67 Mb


Places NOT to Use Your Debit Card






Debit cards have different protections and uses. Sometimes they're not the best choice.

Sometimes reaching for your wallet is like a multiple choice test: How do you really want to pay?



While credit cards and debit cards may look almost identical, not all plastic is the same.

"It's important that consumers understand the difference between a debit card and a credit card," says John Breyault, director of the Fraud Center for the National Consumers League, a Washington, D.C.-based advocacy group. "There's a difference in how the transactions are processed and the protections offered to consumers when they use them."

While debit cards and credit cards each have advantages, each is also better suited to certain situations. And since a debit card is a direct line to your bank account, there are places where it can be wise to avoid handing it over -- if for no other reason than complete peace of mind.

Here are 10 places and situations where it can pay to leave that debit card in your wallet:

1. Online

"You don't use a debit card online," says Susan Tiffany, director of consumer periodicals for the Credit Union National Association. Since the debit card links directly to a checking account, "you have potential vulnerability there," she says.

Her reasoning: If you have problems with a purchase or the card number gets hijacked, a debit card is "vulnerable because it happens to be linked to an account," says Linda Foley, founder of the Identity Theft Resource Center. She also includes phone orders in this category.

The Federal Reserve's Regulation E (commonly dubbed Reg E), covers debit card transfers. It sets a consumer's liability for fraudulent purchases at $50, provided they notify the bank within two days of discovering that their card or card number has been stolen.

Most banks have additional voluntary policies that set their own customers' liability with debit cards at $0, says Nessa Feddis, vice president and senior counsel for the American Bankers Association.

But the protections don't relieve consumers of hassle: The prospect of trying to get money put back into their bank account, and the problems that a lower-than-expected balance can cause in terms of fees and refused checks or payments, make some online shoppers reach first for credit cards.

2. Big-Ticket Items

With a big ticket item, a credit card is safer, says Chi Chi Wu, staff attorney with the National Consumer Law Center. A credit card offers dispute rights if something goes wrong with the merchandise or the purchase, she says.



"With a debit card, you have fewer protections," she says.

In addition, some cards will also offer extended warrantees. And in some situations, such as buying electronics or renting a car, some credit cards also offer additional property insurance to cover the item.

Two caveats, says Wu. Don't carry a balance. Otherwise, you also risk paying some high-ticket interest. And "avoid store cards with deferred interest," Wu advises.

3. Deposit Required

When Peter Garuccio recently rented some home improvement equipment at a big-box store, it required a sizable deposit. "This is where you want to use a credit card instead of a debit," says Garuccio, spokesman for the national trade group American Bankers Association.

That way, the store has its security deposit, and you still have access to all of the money in your bank account. With any luck, you'll never actually have to part with a dollar.

4. Restaurants

"To me, it's dangerous," says Gary Foreman, editor of the frugality minded Web site The Dollar Stretcher. "You have so many people around."

Foreman bases his conclusions on what he hears from readers. "Anecdotally, the cases that I'm hearing of credit or debit information being stolen, as often as not, it's in a restaurant," he says.

The danger: Restaurants are one of the few places where you have to let cards leave your sight when you use them. But others think that avoiding such situations is not workable.

The "conventional advice of 'don't let the card out of your sight' -- that's just not practical," says Tiffany.

The other problem with using a debit card at restaurants: Some establishments will approve the card for more than your purchase amount because, presumably, you intend to leave a tip. So the amount of money frozen for the transaction could be quite a bit more than the amount of your tab. And it could be a few days before you get the cash back in your account.

5. You're a New Customer

Online or in the real world, if you're a first-time customer in a store, skip the debit card the first couple of times you buy, says Breyault.

That way, you get a feel for how the business is run, how you're treated and the quality of the merchandise before you hand over a card that links to your checking account.

6. Buy Now, Take Delivery Later

Buying now but taking delivery days or weeks from now? A credit card offers dispute rights that a debit card typically does not.

"It may be an outfit you're familiar with and trust, but something might go wrong," says Breyault, "and you need protection."

But be aware that some cards will limit the protection to a specific time period, says Feddis. So settle any problems as soon as possible.

7. Recurring Payments

We've all heard the urban legend about the gym that won't stop billing an ex-member's credit card. Now imagine the charges aren't going onto your card, but instead coming right out of your bank account.

Another reason not to use the debit card for recurring charges: your own memory and math skills. Forget to deduct that automatic bill payment from your checkbook one month, and you could either face fees or embarrassment (depending on whether you've opted to allow overdrafting or not). So if you don't keep a cash buffer in your account, "to protect yourself from over-limit fees, you may want to think about using a credit card" for recurring payments, says Breyault.

8. Future Travel

Book your travel with a check card, and "they debit it immediately," says Foley. So if you're buying travel that you won't use for six months or making a reservation for a few weeks from now, you'll be out the money immediately.

Another factor that bothers Foley: Hotels aren't immune to hackers and data breaches, and several name-brand establishments have suffered the problem recently. Do you want your debit card information "to sit in a system for four months, waiting for you to arrive?" she asks. "I would not."

9. Gas Stations and Hotels

This one depends on the individual business. Some gas stations and hotels will place holds to cover customers who may leave without settling the entire bill. That means that even though you only bought $10 in gas, you could have a temporary bank hold for $50 to $100, says Tiffany.

Ditto hotels, where there are sometimes holds or deposits in the hundreds to make sure you don't run up a long distance bill, empty the mini bar or trash the room. The practice is almost unnoticeable if you're using credit, but can be problematic if you're using a debit card and have just enough in the account to cover what you need.

At hotels, ask about deposits and holds before you present your card, says Feddis. At the pump, select the pin-number option, she says, which should debit only the amount you've actually spent.

10. Checkouts or ATMs That Look 'Off'

Criminals are getting better with skimmers and planting them in places you'd never suspect -- like ATM machines on bank property, says Foley.

So take a good look at the machine or card reader the next time you use an ATM or self-check lane, she advises. Does the machine fit together well or does something look off, different or like it doesn't quite belong? Says Foley, "Make sure it doesn't look like it's been tampered with."

Sunday, March 14, 2010

10 reasons why PCs crash U must Know

10 reasons why PCs crash U must Know

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."

You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

1 Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.

If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

* Start-Settings-Control Panel-System-Device Manager.

Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.

Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.

Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).

When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.

To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2 Bad Ram

Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.

But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.

One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.

Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.

EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3 BIOS settings

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.

Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.

A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.

Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).

4 Hard disk drives

After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to

* Start-Programs-Accessories-System Tools-Disk Defragmenter

This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.

The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).

Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to

* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.

Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.

Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to

* Start-Programs-Accessories-System Tools-ScanDisk

Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.

5 Fatal OE exceptions and VXD errors

Fatal OE exception errors and VXD errors are often caused by video card problems.

These can often be resolved easily by reducing the resolution of the video display. Go to

* Start-Settings-Control Panel-Display-Settings

Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.

If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to

* Start-Settings-Control Panel-System-Device Manager

Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.

If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.

The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.

Another useful way to resolve video problems is to go to

* Start-Settings-Control Panel-System-Performance-Graphics

Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).

Look up your video card's manufacturer on the internet and search for the most recent drivers for it.

6 Viruses

Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to

* Start-Settings-Control Panel-Add/Remove Programs

Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.

A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.

An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec ( www.symantec.com).

7 Printers

The action of sending a document to print creates a bigger file, often called a postscript file.

Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.

If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.

8 Software

A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.

The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.

Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org

Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.

Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.

Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.

Remember to restore all the BIOS settings back to their former settings following installation.

9 Overheating

Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.

One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com

CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

10 Power supply problems

With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.

If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.

It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.

Saturday, March 13, 2010

Tips For Buying a Laptop Computer


Tips For Buying a Laptop Computer

Picking a laptop computer will probably be more involved than reviewing five simple steps, but you have to start somewhere! Each of these steps will hopefully guide other decisions and make the process less frustrating, while also leading to the selection of the best laptop possible.




Ergonomics:

If you are going to be spending any significant amount of time working on this laptop computer, you´re going to want to be comfortable. A well-designed interface is essential for comfort, as well as good health. Carpal tunnel syndrome or tendonitis may be some of the more common conditions associated with extended computer usage, and selecting the most comfortable laptop

Connectivity:

Being able to connect to common devices is just as important on laptops as it is on desktops, but being able to add these connections down the road is not as easy on a laptop. Upgrades aren´t as easy on laptops due to the basic design, so make sure what you need is included up front.
may help avoid them all together.

Power Management:

If you are going to use a laptop as it was intended, away from your desk, you´re going to want it to provide as much battery life as possible. The first step is to shop around for a unit that offers the best battery life possible, and then seek out independent reviews to verify this performance. A good laptop should be able to run for four hours or more on a full charge, and as the technology advances, finding units that can double this time isn´t unrealistic.

Size / Weight:

All laptop computers are not created equal, and the size and weight of the various models reflect that. Some may weigh more than others due to the quantity of components included, but it may also be due to the quality of the components. Larger displays, multiple hard drives, and other integrated components will all contribute to the weight of a laptop. The largest single source of weight in a laptop may be the battery, and systems with two batteries as described above, should be expected to be much heavier.


Future Proof:

Basically, purchase as much laptop as you can afford, so that a year or two down the road you may be less likely to need a replacement.

Processors in a laptop are generally not upgradeable, or at least quite difficult to upgrade, so picking something with marginally adequate speed for today´s needs will no doubt be obsolete sooner than you might expect. Desktop computers generally offer the convenience of having their processors (and other components) upgraded, making it less of an issue, but it is important to plan ahead with laptops, or to plan on buying another one in a few years.

How To make your own Radio Station




How To make your own Radio Station ...

::Must HAVE Winamp (Any Version)::

First, things First your speed has to be at least 256/64 kbps (which means Dial-up users, will have alot of latency, just dnt bother)

Second, your going to have to have a domain, an updated one with the current i.p active. (Could be anything e.g. My sig)

Now, Your gonna have to download the Shoutcast Files.

Go to
:
www.shoutcast.com

to get the files.

Ok After downloading these, installing Both of them in any order i dnt care. Go to START>PROGRAM FILES>SHOUTcast DNAS>EDIT SHOUTCAST DNS CONFIG.

Ok your gonna have to Configure it:
Go Down and where it says password: change (that means your gonna have to change it to whatever, make sure u remember)

The Portbase: change it to whatever port you want it
Maxusers: (lets be realistic here, dnt put in 10000, like NXS's radio station) your bandwidth has to be extremely good, if your cable, 50 user max is ok, ADSL should stay below 10 users, and T1 connections should do whatever tickles there fantasy.

EDIT>SAVE.

Open winamp, RIGHT CLICK>OPTIONS>PREFRENCES>DSP EFFECT> and choose the NULLSOFT SHOUTCAST.

Go to OUTPUT, and then click on Connection, Through the ADDRESS, type your address which you have done through
Code:
www.no-ip.com

PORT NUMBER, whatever u did in the EDIT.txt, and your password.

Then go to Encoder, and choose your quality of your music. Go back to OUTPUT>OUTPUT CONFIG> YELLOW PAGES. this is your advertisemant information. dow hatever you like there.

Now Connect. to check that your Radio os on-line go to http:// (your address that you added in the prefrence)

All About Error Codes


Standard Original IBM POST Error Codes
Code Description

1 short beep System is OK
2 short beeps POST Error - error code shown on screen No beep Power supply or system board problem Continuous beep Power supply, system board, or keyboard problem Repeating short beeps Power supply or system board problem
1 long, 1 short beep System board problem
1 long, 2 short beeps Display adapter problem (MDA, CGA)
1 long, 3 short beeps Display adapter problem (EGA)
3 long beeps 3270 keyboard card
IBM POST Diagnostic Code Descriptions
Code Description
100 - 199 System Board
200 - 299 Memory
300 - 399 Keyboard
400 - 499 Monochrome Display
500 - 599 Colour/Graphics Display
600 - 699 Floppy-disk drive and/or Adapter
700 - 799 Math Coprocessor
900 - 999 Parallel Printer Port
1000 - 1099 Alternate Printer Adapter
1100 - 1299 Asynchronous Communication Device, Adapter, or Port
1300 - 1399 Game Port
1400 - 1499 Colour/Graphics Printer
1500 - 1599 Synchronous Communication Device, Adapter, or Port
1700 - 1799 Hard Drive and/or Adapter
1800 - 1899 Expansion Unit (XT)
2000 - 2199 Bisynchronous Communication Adapter
2400 - 2599 EGA system-board Video (MCA)
3000 - 3199 LAN Adapter
4800 - 4999 Internal Modem
7000 - 7099 Phoenix BIOS Chips
7300 - 7399 3.5" Disk Drive
8900 - 8999 MIDI Adapter
11200 - 11299 SCSI Adapter
21000 - 21099 SCSI Fixed Disk and Controller
21500 - 21599 SCSI CD-ROM System

AMI BIOS Beep Codes
Code Description

1 Short Beep System OK
2 Short Beeps Parity error in the first 64 KB of memory
3 Short Beeps Memory failure in the first 64 KB
4 Short Beeps Memory failure in the first 64 KB Operational of memory
or Timer 1 on the motherboard is not functioning
5 Short Beeps The CPU on the motherboard generated an error
6 Short Beeps The keyboard controller may be bad. The BIOS cannot switch to protected mode
7 Short Beeps The CPU generated an exception interrupt
8 Short Beeps The system video adapter is either missing, or its memory is faulty
9 Short Beeps The ROM checksum value does not match the value encoded in the BIOS
10 Short Beeps The shutdown register for CMOS RAM failed
11 Short Beeps The external cache is faulty
1 Long, 3 Short Beeps Memory Problems
1 Long, 8 Short Beeps Video Card Problems

Phoenix BIOS Beep Codes
Note - Phoenix BIOS emits three sets of beeps, separated by a brief pause.

Code Description
1-1-3 CMOS read/write failure
1-1-4 ROM BIOS checksum error
1-2-1 Programmable interval timer failure
1-2-2 DMA initialisation failure
1-2-3 DMA page register read/write failure
1-3-1 RAM refresh verification failure
1-3-3 First 64k RAM chip or data line failure
1-3-4 First 64k RAM odd/even logic failure
1-4-1 Address line failure first 64k RAM
1-4-2 Parity failure first 64k RAM
2-_-_ Faulty Memory
3-1-_ Faulty Motherboard
3-2-4 Keyboard controller Test failure
3-3-4 Screen initialization failure
3-4-1 Screen retrace test failure
3-4-2 Search for video ROM in progress
4-2-1 Timer tick interrupt in progress or failure
4-2-2 Shutdown test in progress or failure
4-2-3 Gate A20 failure
4-2-4 Unexpected interrupt in protected mode
4-3-1 RAM test in progress or failure>ffffh
4-3-2 Faulty Motherboard
4-3-3 Interval timer channel 2 test or failure
4-3-4 Time of Day clock test failure
4-4-1 Serial port test or failure
4-4-2 Parallel port test or failure
4-4-3 Math coprocessor test or failure

What Do You Know About Beep Code?


Beep Code Manual, Better Than Gold Techies, American Megatrends Int. & Phoenix



BIOS Beep Codes

When a computer is first turned on, or rebooted, its BIOS performs a power-on self test (POST) to test the system's hardware, checking to make sure that all of the system's hardware components are working properly. Under normal circumstances, the POST will display an error message; however, if the BIOS detects an error before it can access the video card, or if there is a problem with the video card, it will produce a series of beeps, and the pattern of the beeps indicates what kind of problem the BIOS has detected.
Because there are many brands of BIOS, there are no standard beep codes for every BIOS.

The two most-used brands are AMI (American Megatrends International) and Phoenix.

Below are listed the beep codes for AMI systems, and here are the beep codes for Phoenix systems.


AMI Beep Codes

Beep Code Meaning
1 beep DRAM refresh failure. There is a problem in the system memory or the motherboard.
2 beeps Memory parity error. The parity circuit is not working properly.
3 beeps Base 64K RAM failure. There is a problem with the first 64K of system memory.
4 beeps System timer not operational. There is problem with the timer(s) that control functions on the motherboard.
5 beeps Processor failure. The system CPU has failed.
6 beeps Gate A20/keyboard controller failure. The keyboard IC controller has failed, preventing gate A20 from switching the processor to protect mode.
7 beeps Virtual mode exception error.
8 beeps Video memory error. The BIOS cannot write to the frame buffer memory on the video card.
9 beeps ROM checksum error. The BIOS ROM chip on the motherboard is likely faulty.
10 beeps CMOS checksum error. Something on the motherboard is causing an error when trying to interact with the CMOS.
11 beeps Bad cache memory. An error in the level 2 cache memory.
1 long beep, 2 short Failure in the video system.
1 long beep, 3 short A failure has been detected in memory above 64K.
1 long beep, 8 short Display test failure.
Continuous beeping A problem with the memory or video.
BIOS Beep Codes


Phoenix Beep Codes

Phoenix uses sequences of beeps to indicate problems. The "-" between each number below indicates a pause between each beep sequence. For example, 1-2-3 indicates one beep, followed by a pause and two beeps, followed by a pause and three beeps. Phoenix version before 4.x use 3-beep codes, while Phoenix versions starting with 4.x use 4-beep codes. Click here for AMI BIOS beep codes.
4-Beep Codes
Beep Code Meaning
1-1-1-3 Faulty CPU/motherboard. Verify real mode.
1-1-2-1 Faulty CPU/motherboard.
1-1-2-3 Faulty motherboard or one of its components.
1-1-3-1 Faulty motherboard or one of its components. Initialize chipset registers with initial POST values.
1-1-3-2 Faulty motherboard or one of its components.
1-1-3-3 Faulty motherboard or one of its components. Initialize CPU registers.
1-1-3-2
1-1-3-3
1-1-3-4 Failure in the first 64K of memory.
1-1-4-1 Level 2 cache error.
1-1-4-3 I/O port error.
1-2-1-1 Power management error.
1-2-1-2
1-2-1-3 Faulty motherboard or one of its components.
1-2-2-1 Keyboard controller failure.
1-2-2-3 BIOS ROM error.
1-2-3-1 System timer error.
1-2-3-3 DMA error.
1-2-4-1 IRQ controller error.
1-3-1-1 DRAM refresh error.
1-3-1-3 A20 gate failure.
1-3-2-1 Faulty motherboard or one of its components.
1-3-3-1 Extended memory error.
1-3-3-3
1-3-4-1
1-3-4-3 Error in first 1MB of system memory.
1-4-1-3
1-4-2-4 CPU error.
1-4-3-1
2-1-4-1 BIOS ROM shadow error.
1-4-3-2
1-4-3-3 Level 2 cache error.
1-4-4-1
1-4-4-2
2-1-1-1 Faulty motherboard or one of its components.
2-1-1-3
2-1-2-1 IRQ failure.
2-1-2-3 BIOS ROM error.
2-1-2-4
2-1-3-2 I/O port failure.
2-1-3-1
2-1-3-3 Video system failure.
2-1-1-3
2-1-2-1 IRQ failure.
2-1-2-3 BIOS ROM error.
2-1-2-4 I/O port failure.
2-1-4-3
2-2-1-1 Video card failure.
2-2-1-3
2-2-2-1
2-2-2-3 Keyboard controller failure.
2-2-3-1 IRQ error.
2-2-4-1 Error in first 1MB of system memory.
2-3-1-1
2-3-3-3 Extended memory failure.
2-3-2-1 Faulty motherboard or one of its components.
2-3-2-3
2-3-3-1 Level 2 cache error.
2-3-4-1
2-3-4-3 Motherboard or video card failure.
2-3-4-1
2-3-4-3
2-4-1-1 Motherboard or video card failure.
2-4-1-3 Faulty motherboard or one of its components.
2-4-2-1 RTC error.
2-4-2-3 Keyboard controller error.
2-4-4-1 IRQ error.
3-1-1-1
3-1-1-3
3-1-2-1
3-1-2-3 I/O port error.
3-1-3-1
3-1-3-3 Faulty motherboard or one of its components.
3-1-4-1
3-2-1-1
3-2-1-2 Floppy drive or hard drive failure.
3-2-1-3 Faulty motherboard or one of its components.
3-2-2-1 Keyboard controller error.
3-2-2-3
3-2-3-1
3-2-4-1 Faulty motherboard or one of its components.
3-2-4-3 IRQ error.
3-3-1-1 RTC error.
3-3-1-3 Key lock error.
3-3-3-3 Faulty motherboard or one of its components.
3-3-3-3
3-3-4-1
3-3-4-3
3-4-1-1
3-4-1-3
3-4-2-1
3-4-2-3
3-4-3-1
3-4-4-1
3-4-4-4 Faulty motherboard or one of its components.
4-1-1-1 Floppy drive or hard drive failure.
4-2-1-1
4-2-1-3
4-2-2-1 IRQ failure.
4-2-2-3
4-2-3-1
4-2-3-3
4-2-4-1 Faulty motherboard or one of its components.
4-2-4-3 Keyboard controller error.
4-3-1-3
4-3-1-4
4-3-2-1
4-3-2-2
4-3-3-1
4-3-4-1
4-3-4-3 Faulty motherboard or one of its components.
4-3-3-2
4-3-3-4 IRQ failure.
4-3-3-3
4-3-4-2 Floppy drive or hard drive failure.
3-Beep Codes
Beep Code Meaning
1-1-2 Faulty CPU/motherboard.
1-1-3 Faulty motherboard/CMOS read-write failure.
1-1-4 Faulty BIOS/BIOS ROM checksum error.
1-2-1 System timer not operational. There is a problem with the timer(s) that control functions on the motherboard.
1-2-2
1-2-3 Faulty motherboard/DMA failure.
1-3-1 Memory refresh failure.
1-3-2
1-3-3
1-3-4 Failure in the first 64K of memory.
1-4-1 Address line failure.
1-4-2 Parity RAM failure.
1-4-3 Timer failure.
1-4-4 NMI port failure.
2-_-_ Any combination of beeps after 2 indicates a failure in the first 64K of memory.
3-1-1 Master DMA failure.
3-1-2 Slave DMA failure.
3-1-3
3-1-4 Interrupt controller failure.
3-2-4 Keyboard controller failure.
3-3-1
3-3-2 CMOS error.
3-3-4 Video card failure.
3-4-1 Video card failure.
4-2-1 Timer failure.
4-2-2 CMOS shutdown failure.
4-2-3 Gate A20 failure.
4-2-4 Unexpected interrupt in protected mode.
4-3-1 RAM test failure.
4-3-3 Timer failure.
4-3-4 Time of day clock failure.
4-4-1 Serial port failure.
4-4-2 Parallel port failure.
4-4-3 Math coprocessor.

What is Band Width??

Band Width Explained

Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting? Put simply, bandwidth is the amount of traffic that is allowed to occur between your web site and the rest of the internet. The amount of bandwidth a hosting company can provide is determined by their network connections, both internal to their data center and external to the public internet.


Network Connectivity

The internet, in the most simplest of terms, is a group of millions of computers connected by networks. These connections within the internet can be large or small depending upon the cabling and equipment that is used at a particular internet location. It is the size of each network connection that determines how much bandwidth is available. For example, if you use a DSL connection to connect to the internet, you have 1.54 Mega bits (Mb) of bandwidth. Bandwidth therefore is measured in bits (a single 0 or 1). Bits are grouped in bytes which form words, text, and other information that is transferred between your computer and the internet.

If you have a DSL connection to the internet, you have dedicated bandwidth between your computer and your internet provider. But your internet provider may have thousands of DSL connections to their location. All of these connection aggregate at your internet provider who then has their own dedicated connection to the internet (or multiple connections) which is much larger than your single connection. They must have enough bandwidth to serve your computing needs as well as all of their other customers. So while you have a 1.54Mb connection to your internet provider, your internet provider may have a 255Mb connection to the internet so it can accommodate your needs and up to 166 other users (255/1.54).


Traffic

A very simple analogy to use to understand bandwidth and traffic is to think of highways and cars. Bandwidth is the number of lanes on the highway and traffic is the number of cars on the highway. If you are the only car on a highway, you can travel very quickly. If you are stuck in the middle of rush hour, you may travel very slowly since all of the lanes are being used up.

Traffic is simply the number of bits that are transferred on network connections. It is easiest to understand traffic using examples. One Gigabyte is 2 to the 30th power (1,073,741,824) bytes. One gigabyte is equal to 1,024 megabytes. To put this in perspective, it takes one byte to store one character. Imagine 100 file cabinets in a building, each of these cabinets holds 1000 folders. Each folder has 100 papers. Each paper contains 100 characters - A GB is all the characters in the building. An MP3 song is about 4MB, the same song in wav format is about 40MB, a full length movie can be 800MB to 1000MB (1000MB = 1GB).

If you were to transfer this MP3 song from a web site to your computer, you would create 4MB of traffic between the web site you are downloading from and your computer. Depending upon the network connection between the web site and the internet, the transfer may occur very quickly, or it could take time if other people are also downloading files at the same time. If, for example, the web site you download from has a 10MB connection to the internet, and you are the only person accessing that web site to download your MP3, your 4MB file will be the only traffic on that web site. However, if three people are all downloading that same MP at the same time, 12MB (3 x 4MB) of traffic has been created. Because in this example, the host only has 10MB of bandwidth, someone will have to wait. The network equipment at the hosting company will cycle through each person downloading the file and transfer a small portion at a time so each person's file transfer can take place, but the transfer for everyone downloading the file will be slower. If 100 people all came to the site and downloaded the MP3 at the same time, the transfers would be extremely slow. If the host wanted to decrease the time it took to download files simultaneously, it could increase the bandwidth of their internet connection (at a cost due to upgrading equipment).


Hosting Bandwidth

In the example above, we discussed traffic in terms of downloading an MP3 file. However, each time you visit a web site, you are creating traffic, because in order to view that web page on your computer, the web page is first downloaded to your computer (between the web site and you) which is then displayed using your browser software (Internet Explorer, Netscape, etc.) . The page itself is simply a file that creates traffic just like the MP3 file in the example above (however, a web page is usually much smaller than a music file).

A web page may be very small or large depending upon the amount of text and the number and quality of images integrated within the web page. For example, the home page for CNN.com is about 200KB (200 Kilobytes = 200,000 bytes = 1,600,000 bits). This is typically large for a web page. In comparison, Yahoo's home page is about 70KB.


How Much Bandwidth Is Enough?

It depends (don't you hate that answer). But in truth, it does. Since bandwidth is a significant determinant of hosting plan prices, you should take time to determine just how much is right for you. Almost all hosting plans have bandwidth requirements measured in months, so you need to estimate the amount of bandwidth that will be required by your site on a monthly basis

If you do not intend to provide file download capability from your site, the formula for calculating bandwidth is fairly straightforward:

Average Daily Visitors x Average Page Views x Average Page Size x 31 x Fudge Factor

If you intend to allow people to download files from your site, your bandwidth calculation should be:

[(Average Daily Visitors x Average Page Views x Average Page Size) +
(Average Daily File Downloads x Average File Size)] x 31 x Fudge Factor

Let us examine each item in the formula:

Average Daily Visitors - The number of people you expect to visit your site, on average, each day. Depending upon how you market your site, this number could be from 1 to 1,000,000.

Average Page Views - On average, the number of web pages you expect a person to view. If you have 50 web pages in your web site, an average person may only view 5 of those pages each time they visit.

Average Page Size - The average size of your web pages, in Kilobytes (KB). If you have already designed your site, you can calculate this directly.

Average Daily File Downloads - The number of downloads you expect to occur on your site. This is a function of the numbers of visitors and how many times a visitor downloads a file, on average, each day.

Average File Size - Average file size of files that are downloadable from your site. Similar to your web pages, if you already know which files can be downloaded, you can calculate this directly.

Fudge Factor - A number greater than 1. Using 1.5 would be safe, which assumes that your estimate is off by 50%. However, if you were very unsure, you could use 2 or 3 to ensure that your bandwidth requirements are more than met.

Usually, hosting plans offer bandwidth in terms of Gigabytes (GB) per month. This is why our formula takes daily averages and multiplies them by 31.


Summary

Most personal or small business sites will not need more than 1GB of bandwidth per month. If you have a web site that is composed of static web pages and you expect little traffic to your site on a daily basis, go with a low bandwidth plan. If you go over the amount of bandwidth allocated in your plan, your hosting company could charge you over usage fees, so if you think the traffic to your site will be significant, you may want to go through the calculations above to estimate the amount of bandwidth required in a hosting plan.

All About Spyware


There are a lot of PC users that know little about "Spyware", "Mal-ware", "hijackers", "Dialers" & many more. This will help you avoid pop-ups, spammers and all those baddies.

What is spy-ware?
Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.

Known spywares
There are thousands out there, new ones are added to the list everyday. But here are a few:
Alexa, Aureate/Radiate, BargainBuddy, ClickTillUWin, Conducent Timesink, Cydoor, Comet Cursor, eZula/KaZaa Toptext, Flashpoint/Flashtrack, Flyswat, Gator, GoHip, Hotbar, ISTbar, Lions Pride Enterprises/Blazing Logic/Trek Blue, Lop (C2Media), Mattel Brodcast, Morpheus, NewDotNet, Realplayer, Songspy, Xupiter, Web3000, WebHancer, Windows Messenger Service.

How to check if a program has spyware?
The is this Little site that keeps a database of programs that are known to install spyware.

Check Here: http://www.spywareguide.com/product_search.php

If you would like to block pop-ups (IE Pop-ups).
There tons of different types out there, but these are the 2 best, i think.

Try: Google Toolbar (http://toolbar.google.com/) This program is Free
Try: AdMuncher (http://www.admuncher.com) This program is Shareware

If you want to remove the "spyware" try these.
Try: Lavasoft Ad-Aware (http://www.lavasoftusa.com/) This program is Free
Info: Ad-aware is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support.

Try: Spybot-S&D (http://www.safer-networking.org/) This program is Free
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries. Provides detailed information about found problems.

Try: BPS Spyware and Adware Remover (http://www.bulletproofsoft.com/spyware-remover.html) This program is Shareware
Info: Adware, spyware, trackware and big brotherware removal utility with multi-language support. It scans your memory, registry and drives for known spyware and lets you remove them. Displays a list and lets you select the items you'd like to remove.

Try: Spy Sweeper v2.2 (http://www.webroot.com/wb/products/spysweeper/index.php) This program is Shareware
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer.
The best scanner out there, and updated all the time.

Try: HijackThis 1.97.7 (http://www.spywareinfo.com/~merijn/downloads.html) This program is Freeware
Info: HijackThis is a tool, that lists all installed browser add-on, buttons, startup items and allows you to inspect them, and optionally remove selected items.


If you would like to prevent "spyware" being install.
Try: SpywareBlaster 2.6.1 (http://www.wilderssecurity.net/spywareblaster.html) This program is Free
Info: SpywareBlaster doesn`t scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.

Try: SpywareGuard 2.2 (http://www.wilderssecurity.net/spywareguard.html) This program is Free
Info: SpywareGuard provides a real-time protection solution against so-called spyware. It works similar to an anti-virus program, by scanning EXE and CAB files on access and alerting you if known spyware is detected.

Try: XP-AntiSpy (http://www.xp-antispy.org/) This program is Free
Info: XP-AntiSpy is a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people.

Try: SpySites (http://camtech2000.net/Pages/SpySites_Prog...ml#SpySitesFree) This program is Free
Info: SpySites allows you to manage the Internet Explorer Restricted Zone settings and easily add entries from a database of 1500+ sites that are known to use advertising tracking methods or attempt to install third party software.

If you would like more Information about "spyware".
Check these sites.
http://www.spychecker.com/
http://www.spywareguide.com/
http://www.cexx.org/adware.htm
http://www.theinfomaniac.net/infomaniac/co...rsSpyware.shtml
http://www.thiefware.com/links/
http://simplythebest.net/info/spyware.html

Usefull tools...
Try: Stop Windows Messenger Spam 1.10 (http://www.jester2k.pwp.blueyonder.co.uk/j...r2ksoftware.htm) This program is Free
Info: "Stop Windows Messenger Spam" stops this Service from running and halts the spammers ability to send you these messages.

----------------------------------------------------------------------------
All these softwares will help remove and prevent evil spammers and spywares attacking your PC. I myself recommend getting "spyblaster" "s&d spybot" "spy sweeper" & "admuncher" to protect your PC. A weekly scan is also recommended

Free Virus Scan
Scan for spyware, malware and keyloggers in addition to viruses, worms and trojans. New threats and annoyances are created faster than any individual can keep up with.
http://defender.veloz.com// - 15k


Finding . is a Click Away at 2020Search.com
Having trouble finding what you re looking for on: .? 2020Search will instantly provide you with the result you re looking for by drawing on some of the best search engines the Internet has to offer. Your result is a click away!
http://www.2020search.com// - 43k


Download the Browser-village Toolbar.
Customize your Browser! Eliminate Pop-up ads before they start, Quick and easy access to the Web, and much more. Click Here to Install Now!
http://www.browservillage.com/ - 36k

Sunday, February 07, 2010

Valentine Day-14 Febuari Perlukah Kita Meraikannya ?




Assalamualaikum Wbkt...jom kita lihat sejarah Valentines Day



Di dalam sepotong Hadith yang terdapat di dalam Sunan Abi Dawood, Rasulullah SAW telah bersabda,

Barangsiapa yang meniru atau berkumpul meramaikan sesuatu kaum, maka dia adalah dari kalangan mereka

Sabda Nabi sallallaahu ‘alayhi wa sallam Lagi:

Kamu akan mengikuti sunnah umat sebelum kamu sejengkal demi sejengkal, sehasta demi sehasta sehinggakan jika mereka memasuki lubang biawak (dhab) nescaya kamu akan mengikuti mereka. Sahabat bertanya: Adakah mereka itu kaum Yahudi dan Nasrani, wahai Rasulullah? Sabda Baginda SAW: Ya, siapa lagi kalau bukan mereka?” - [Hadis riwayat al-Bukhari dan Muslim]

Manakala di dalam Al-Quran pun ada disebut ..

Para kekasih dan teman akrab, pada hari itu, akan saling menjadi musuh di antara satu sama lain, kecuali mereka yang bertaqwa” [al-Dzukhruf 43: 67]

Sesungguhnya kenyataan-kenyataan para Ulama menjadi amaran kepada diri kita agar tidak sewenang-wenangnya menelan segala yang ditemui dan di dengari. Ada sesetengah kehidupan yang mana terdapat di tengah-tengah manusia yang hidupnya adalah pesta, gembira, joli sana dan joli sini tanpa menunggu hari dan masa yang tertentu. Oleh itu hendaklah kita berusaha memelihara diri dan Iman agar tidak mudah terkesan dengan perang psikologi 24/7 ini.



Jika benar kita mahu membuktikan kasih sayang, maka buktikanlah ia menerusi cara Islam yang halal, indah, penuh barakah dan tiada kesan sampingan. Tanpa perlu menunggu 14 Februari, berkahwin adalah Sunnah Nabi SAW, yang jika kita serius ke arah itu, susunkanlah agenda hidup ke arahnya dengan baik. Usahlah dibazirkan wang untuk membeli bunga ros, kad-kad ucapan, atau candle light dinner di restoran-restoran mahal, kerana semua itu adalah keindahan yang menjadi pagar-pagar kemurkaan dan neraka Allah SWT. Kumpulkan wang dengan baik, beli buku yang mengajar cara hidup rumah tangga Islam dan laluilah 14 Februari ini seperti kita melalui hari-hari yang lain, iaitu dengan mengulangkaji pelajaran, menghadiri majlis-majlis ilmu, beribadah dan berlumba-lumba mengejar kebaikan.


Semoga Allah mengurniakan kebaikan untuk kita semua.
Wallahu A'lam bi As-Sawaab.

Saturday, February 06, 2010

Buku Panduan Kegiatan Ko-Kurikulum


Dapatkan Buku Panduan Kegiatan Ko-Kurikulum disini secara PERCUMA!

Antara isi kandungan buku ini adalah:-

- Badminton
-Bola Baling
-Bola jaring
-Futsal
-Bola sepak
-Hoki
-Kabbadi
-Pingpong
-Olahraga
-Tenis
-Squash
-Dan Banyak Lagi.....

Buku panduan ini sesuai digunakan sebagai panduan dan rujukan untuk guru-guru yang mengajar sukan serta individu-individu yang ingin belajar permainan-permainan yang disenaraikan di atas. Semoga buku ini memberi manfaat kepada anda semua.

Wednesday, February 03, 2010

Mencari Allah Di Istana-Cerpen


Beliau adalah seorang Raja yang hebat yang hidup dalam penuh kemewahan. Istananya megah berhias permata, emas, dan perak. Makanan, minuman, kenderaan dan apa saja kemahuan semua tersedia.

Suatu malam, ketika sedang beradu, beliau terdengar bunyi seperti orang berjalan diatas bumbung istana.

Raja bingkas bangun lalu bersuara, "Siapa kamu diatas bumbung istanaku?"

Ada suara orang dari atas menjawab, "Aku sedang mencari untaku yang hilang?" "

Bodohnya kamu mencari unta kamu di istanaku," ujar si Raja.

"Betapa pula tidak bodohnya kamu mencari Tuhan di dalam istana kamu," jawab suara orang itu penuh ketegasan.

Raja terkejut dan tersentak mendengar jawapan itu.....!

Beliau termenung jauh dan gelisah sepanjang malam........!

MUSAFIR INGIN MENUMPANG DI ISTANA

Beliau adalah Raja negeri Balkan (Bosnia sekarang). Peristiwa semalam sangat menyentuh hati beliau. Dalam beberapa hari kemudiannya beliau dalam kegelisahan....tidak dapat tidur nyenyak dan kurang selera mengahadapi urusan harian. Dalam keadaan termenung itu, tiba-tiba datang pengawal maklumkan ada seseorang ingin berjumpa beliau.

Raja: Siapa kamu? Dan apa hajat kamu?

Tetamu : Saya musafir, ingin berteduh sebentar di rumah tumpangan ini!

Raja : (serta merta merah padam mukanya) Apa kamu kata? Ini adalah istanaku. Bukan rumah tumpangan..kamu buta ke?

Tetamu : Bukan saya yang buta tetapi tuan.

Raja : Apa maksud kamu?

Tetamu : (setelah tengok kiri kanan) Siapa tuan?

Raja: Aku Raja yang bersemayam disinggahsana istana ini.

Tetamu : Sebelum tuan siapa yang duduk di istana ini?

Raja : Bapaku.

Tetamu : Sebelum bapa tuan, siapa pula?

Raja : Tentulah datuk aku.

Tetamu : Ya saya faham....sebelum datuk tuan tentulah moyang tuan. (senyum) Apakah nama bagi suatu tempat yang padanya ada orang datang, singgah dan pergi.?

Raja : Tersentak dan termenung.....!

Dengan hati yang penuh kegelisahan, Raja berangkat menuju ke hutan untuk memburu! Ramai hulubalangnya mengikut daripada belakang. Apabila terjumpa buruannya, beliau terus mengejarnya dengan kuda beliau yang pantas.

Tiba-tiba beliau terdengar suara, "Apakah untuk ini engkau dijadikan"

Beliau hentikan kudanya, menoleh kekiri kanan untuk melihat dari mana datangnya suara! Tetapi tiada seorang pun disitu. Raja teruskan buruannya!

Sekali lagi terdengar suara yang sama, "Apakah untuk ini engkau dijadikan" Keadaannya sama.

Tiada seorang pun disitu. Kali ketiga Raja mendengar suara yang sama. Tetapi masih tidak menemui seorang pun disitu. Akhirnya Raja pulang ke istana dalam keadaan sugul. Hatinya mencari-cari jawapan kepada beberapa peristiwa aneh yang berlaku keatas beliau!

Raja termenung jauh lagi.....

Hatinya gelisah...

Jiwa tidak tenteram.

Selera makan minum makin kurang, mata tak dapat lelap seperti dulu lagi.Dalam kegelisahan Raja duduk ditepi tingkap istananya yang menghadap jalan. Matanya jauh memandang, ke kiri ke kanan. Ditepi jalan ada suatu yang menarik perhatian beliau. Seorang faqir miskin sedang membuka bungkusan makanannya. Sekeping roti kering.

Raja terus memerhatikan kearah faqir miskin itu. Kelihatan wajah faqir itu tenang. Tiada sedikitpun terlihat kebimbangan atau kesedihan. Dia terus menikmati sedikit demi sedikit roti keringnya. Kemudian minum sedikit air sejuk. Selesai makan kelihatan faqir miskin itu terus baring dan tertidur.

Raja terus memerhatikannya, ingin sekali bertemu faqir miskin itu. Raja perintahkan pengawalnya menjemput faqir miskin itu ke istananya setelah dia bangun dari tidurnya. Faqir miskin mengdadap Raja.

Raja: Aku perhatikan kamu dari tadi.

Faqir : Hamba faqir miskin, tiada apa-apa harta.

Raja : Ya...aku perhatikan kamu makan roti kering dan air sejuk. Kamu rasa puas?

Faqir : Alhamdulillah, hamba rasa sangat puas dengan kurnia Allah Ta'ala itu, tuanku!

Raja : Aku perhatikan kamu tidur dengan lena ditepi jalan sana...kamu rasa puas?

Faqir : Alhamdulillah, hamba tertidur sangat lena sehinggalah terjaga lalu dijemput ke sini. Allah Ta'ala telah mengurniakan tempat tidur yang sangat indah untuk hamba!

Raja : Daripada raut wajah kamu tidak sedikitpun kelihatan kesedihan atau kebimbangan. Betul kamu puas hati dengan apa ada pada kamu?

Faqir : Alhamdulillah! Allah Ta'ala telah cukupkan segalanya untuk hamba ini.

Raja musykil dalam hati dengan seribu persoalan. Mengapa hati beliau tidak tenteram. Tinggal di istana kemewahan. Dan dipenuhi makanan yang lazat. Namun jiwanya penuh kegelisahan.....!

Pelayan wanita Istana, sedang menyediakan tempat tidur Raja. Seperti biasa tempat tidurnya diatas tilam empuk yang dihiasi aneka sulaman. Setelah siap mengemas, timbul keinginan dihati wanita itu untuk merasai ni'mat tidur diatas tilam empuk itu.

"Bagaimana rasanya tidur diatas tilam empuk ini. Tentu seronok", fikirnya dalam hati. Sambil duduk ditepi, dia pun cuba letakkan kepalanya ditepi tempat peraduan Raja.

Baru letakkan kepala, dia pun terus tertidur lena. Raja pulang dari perjalanan. Masuk ke tempat peraduan ingin beristirehat. Sebaik saja masuk bilik, alangkah marahnya melihat pelayan sedang tidur diatas tempat peraduannya.

Hatinya menggelegak....berani pelayan ini tidur di kamarku? Raja terus mencapai cemeti lalu dipukulnya wanita malang itu dengan sekuat hatinya dengan penuh kemarahan. Pelayan wanita itu terjaga, menjerit kesakitan. Dia sedar kesilapannya lalu memohon ampun.

"Ampuan tuanku, patik cuma ingin meletak kepala patik saja...tetapi terus tertidur. Ampunkanlah patik tuanku"

Permohonan pelayan wanita itu tidak dilayan. Kemarahan Raja tak dapat dikawal lagi. Pukulan demi pukulan cemeti terus singgah dibadan wanita itu, mengoyak kulitnya yang lembut. Wanita malang itu terus menangis, meraung dan menjerit kesakitan. Darah mula memancut keluar daripada tubuh halusnya. Kesakitan tak tertahan lagi. Dia terus merayu agar di ampunkan tetapi Raja tiada belas kasihan malah disambung pukulannya.

Tiba-tiba satu diluar dugaan berlaku! Pelayan wanita yang menangis dan menjerit kesakitan itu tiba-tiba ketawa! Sehingga ketawanya memenuhi ruang istana! Ketawanya memenuhi ruang hati Raja! Sehingga tangan Raja terhenti dari memukulnya.

Allahu Akbar!

Suasana jeritan wanita itu bertukar rupa!

Raja kehairanan! Mengapa tiba-tiba pelayan wanita itu ketawa....!

Raja : Apa yang menyebabkan kamu ketawa?

Pelayan wanita: (Tubuhnya berlumuhan darah.....sambil menahan kesakitan dia bersuara perlahan) Tuanku! Sewaktu Tuanku memukul tadi, terasa amat sakit.....tak dapat patik tahan. Tetapi tiba-tiba patik teringatkan hukuman Allah Ta'ala diakhirat nanti.

Raja : Apa yang kamu ingat? Kamu mengaku salah?

Pelayan wanita: Ya! Tuanku! Patik menerima hukuman tadi kerana terlelap sebentar diatas tilam empuk ini. Jadi patik terfikir kalaulah begini hukumannya kerana terlelap sebentar diatas tilam ini, bagaimana pula hukuman yang akan diterima oleh orang yang tidur diatas tilam ini tiap-tiap hari selama hidupnya!

Raja tergamam, mulut terkunci, tangan dan kaki menjadi kaku...tubuhnya berpeluh ketakutan...!

"Benar kata wanita itu. Aku telah sekian lama menderhaka kepada Allah Ta'ala. Aku telah lalai dalam kemewahan dan keseronokan dunia. Aku telah lupa kepada Allah Ta'ala"

Tanpa sepatah kata beliau melangkah keluar dari istana beliau, membawa diri sehelai sepinggang. Kerajaan, harta kekayaan, kemewahan istana semuanya ditinggalkan.!

Tiada bekal makanan, tiada wang dalam saku.! Beliau menuju ke suatu destinasi yang beliau sendiri tak pasti! Berapa lama berjalan, beliau tak pasti, badan mula terasa letih, rasa lapar menggigit perutnya! Dahulu, sewaktu bertahta di istana, apa yang dihajat segera sampai. Makanan, minuman, buah-buahan yang lazat-lazat. Perutnya sentiasa dapat di isi. Kini Raja jauh dari istananya, jauh dari manusia lain....dimanakah dapat beliau mencari sesuap makanan bagi mententeramkan perutnya?.

Raja terlihat sebuah kebun anggur di hujung belantara. Beliau menghampiri pagar kebun. Tak ada orang kelihatan....beliau petik sebiji anggur dan makan. Alangkah ni'matnya memakan sebiji buah anggur ketika didalam kelaparan! Malangnya belum sempat beralih, tiba-tiba datang pemilik kebun itu dan kemudian mula memukul beliau.

"Kamu pencuri!" Bentaknya kuat-kuat.

Si miskin (Raja) bersuara lemah, " Pukullah lagi! .....Aku, Ibrahim bin Adham telah sekian lama derhaka kepada Allah!"

"Ibrahim bin Adham? Raja yang memerintah!", tuan punya kebun macam tak percaya! Bagaimana? Kenapa? Tuan punya kebun menangis minta maaf.

Ya....Ibrahim Ibnu Adham, pemerintah negeri Balkan yang hebat meninggalkan istana dan singgahsana kemegahannya mencari Tuhannya yang abadi! Akhirnya diangkat oleh Allah Ta'ala menjadi kekasihNya!

Sama-samalah kita memberi peringatan, kerana peringatan itu bermanfaat bagi orang beriman. Cuma kita perlu pastikan apabila memberi peringatan wajib kita mengikut Al-Qur'an, Hadis Nabi dan panduan Ulama' Mu'tabar.

Jika tidak mahir dan belum menguasai Al-Qur'an dan Hadis Nabi maka memadailah dengan merujuk kepada Ulama-ulama Mu'tabar kerana mereka adalah manusia-manusia terpilih yang di zahirkan oleh Allah Ta'ala untuk memimpin manusia kepada kebenaran Ilahi. Mereka telah mengkaji Al-Qur'an dan Hadis-hadis Nabi serta melalui Mukhatabah dengan Allah Ta'ala dan Mushafahah dengan Rasulullah Salla-Allahu 'Alaihi WaSallam untuk mengijtihadkan segala hukum sebelum menghimpun dan menjadikannya Ilmu-ilmu Islam yang ada dihadapan kita.

Banyak pengajaran dapat dinukil daripda kisah Shaikh Ibrahim ibnu Adham!

PENGAJARAN PERTAMA:

Allah Ta'ala sangat kasih kepada hamba-hambaNya yang sentiasa berusaha mencari jalan ketuhanannya. Ibrahim Adham cuba mencari Tuhan di istananya, dalam keadaan tenggelam dengan kemewahan dan kesedapan nafsu! Tetapi akhirnya beliau dikejutkan oleh Allah Ta'ala bahwa tidak mungkin seseorang menemui Tuhannya jika jiwa dan perasaannya dikuasai nafsu keduniaan, kemegahan dan kesedapan nafsu.!

Di sini mungkin ada yang bertanya, " Adakah seseorang perlu membuang seluruh kehidupan dunianya untuk mencari Tuhan."

Jawapan kepada pertanyaan ini bergantung kepada kekuatan seruan dan panggilan yang datang daripada Ilahi.

Jika Allah Ta'ala bermaksud mengangkat seseorang itu ke HadratNya kepada maqam yang tinggi maka disitu tiada siapa yang dapat menghalang seperti halnya yang berlaku keatas Ibrahim Ibnu Adham.

Bagi kita sebagai orang awam, langkah paling bijak ialah mengambil sikap sederhana. Tidak terlalu terkejar-kejar mencari keuntungan dunia sehingga segala kewajipan sebagai hamba Allah terjejas. Tidak pula terlalu miskin sehingga tidak dapat menyara diri dan keluarga Kerana membiarkan diri dalam kemiskinan adalah ditegah oleh Nabi Salla-Allahu 'Alaihi Wasallam.

Inilah kedaaan sebaik-baiknya seperti yang dinasihatkan oleh Imam Al-Ghazali Radhiallahu 'Anhu dan para ulama lain.

PENGAJARAN KEDUA:

Apabila Allah Ta'ala berkehendak memberi kebaikan kepada seseorang hambaNya, maka sentiasa diperingatkannya dengan berbagai cubaan, ujian dan peringatan. Peringatan-peringatan ini seringkali didatangkan tanpa diduga yang tanpa disangka bahwa itu adalah peringatan Allah Ta'ala keatas dirinya. Kecuali orang yang sentiasa ingat bahawa dia sentiasa di awasi oleh Allah Ta'ala.

Hartanya, kekayaannya, keluarganya, dunianya menjadi pinjaman dan amanah yang akan ditanya di hari perhitungan nanti. Jika hati kita suci dan sentiasa mengharapkan yang terbaik daripada Kurnia Allah Ta'ala ke atas agama kita, maka di situ akan terlihat segala bentuk peringatan, baik peringatan itu daripada dalam diri kita atau peringatan daripada makhluk Allah yang lain sebagai muhasabah diri.

Sebaliknya jika seseorang menganggap dirinya sudah baik dan cemerlang, maka segala peringatan Allah akan dilihat sebagai perkara biasa dalam hidup insan atau pun dia akan mencari kesalahan orang, bahawa orang lain menyebabkan kecelakaan pada dirinya.

Dipersimpangan ini memang sukar untuk mempastikan apakah ianya seruan Allah Ta'ala atau gangguan makhluk Allah yang lain.

Ibrahim Ibnu Adham tidak menyangka bahwa peristiwa-peristiwa awal yang dialaminya itu adalah peringatan Allah keatas dirinya. Dan apa yang patut dibuatnya. Tetapi timbul dalam diri beliau, beberapa kemusykilan apakah maksud daripada kejadian-kejadian tersebut. Beliau terus mencari jawapan.

PENGAJARAN KETIGA

Manusia yang diberi oleh Allah Ta'ala dengan kelebihan harta dan kekayaan duniawi ; samada mereka bergelar Raja atau Sultan atau Orang kenamaan yang kaya-raya jangan sesekali menganggap bahawa dia telah berada dalam kebaikan dan kemuliaan di sisi Allah Ta'ala.

Sebaliknya dia hendaklah sentiasa bimbangkan diri dengan keadaan demikian. Sifat kebanyakan manusia awam akan merasa selesa, tenteram dan berpuas hati dengan agamanya apabila dia telah berada dalam keadaan kemewahan dan kesenangan.

Pada anggapannya dia telah mendapat Rahmat Allah dan keredhaanNya. Kesenangan dan kemewahan yang menyelubunginya menyebabkan dia lupa diri, lalai dan tenggelam didalam kemewahan tersebut. Bahkan berdasarkan sejarah kemanusiaan, kebanyakan manusia yang diberi kekayaan oleh Allah Ta'ala menjadi sombong, takabbur membesarkan diri dan seringkali menghina orang miskin. Mereka selalu mendabik dada mengangkat diri sendiri bahwa mereka mendapat kekayaan itu dengan usaha mereka sendiri. Tidak kurang pula yang menjadi kejam dan zalim dan kafir.

Sejarah Fir'aun, Qarun, para sultan dan para raja yang memerintah di zaman lampau sudah cukup menjadi pengajaran kepada manusia. Menyedari hal yang demikian, sebaik-baik orang yang diberi kekayaan oleh Allah Ta'ala adalah orang yang tetap dalam keimanannya dan takut dan taqwanya kepada Allah Ta'ala dengan mencontohi Nabi Sulaiman Alaihis-Salam atau mencontohi Sahabat Nabi Abdur-Rahman bin 'Auf dan lain-lain yang telah menjadi contoh gemilang bagi kita.

Kesimpulannya, kita seharusnya:

1) Sentiasa menginsafi diri bahwa segala pemberian Allah Ta'ala itu adalah amanah Allah Ta'ala keatasnya bukan untuk menghabiskan masanya dan hartanya berfoya-foya.

2) Banyak mendirikan Ibadah malam mensyukuri ni'mat Allah Ta'ala ke atasnya. Pada hakikatnya walaubagaimana banyak pun dia beribadat tidak akan dapat membalas segala pemberian Allah Ta'ala. Tetapi ini wajib dilakukan sebagai perhambaan dirinya kepada Allah Ta'ala.

3) Banyak bersedekah kepada Faqir miskin dan menjamu mereka. Jangan jadi seperti kebanyakan orang-orang kenamaan dan kaya-raya mengadakan jamuan besar-besaran, tetapi tetamunya orang-orang kaya juga. Faqir miskin dipinggirkan kononnya tiada 'standard'.

4) Banyak membuat amal jariah seperti mendirikan masjid dan tempat istirehat orang-orang faqir miskin.

Dengan cara ini mudah-mudahan akan tertebus dirinya dengan segala pemberian Allah Ta'ala itu kerana dia telah melakukan yang terbaik bagi dirinya dan agamanya.

Sumber: iLuvislam

Jadual Penjagaan Komputer


Cadangan Jadual Penjagaan Komputer

HARIAN

1. Update Antivirus

2. Update Windows
Start--> Control Panel--Security--Windows Update--Install Update/Automatic Update

3. Imbasan cakera segera

4. Kemaskan Folder

MINGGUAN

1. Backup
2. Disk Defragmentar
3. Bersihkan Pc

BULANAN

1. System Restore
2. Disk Cleanup
3. RUN msconfig

TAHUNAN

1. bACKUP pENUH
2. Boot Floppies/CD/DVD

LANGKAH-LANGKAH MELINDUNGI KOMPUTER



1.PASANGKAN FIREWALL DAN PASTIKAN IA HIDUP

2.PASTIKAN SISTEM OPERASI ANDA DIKEMASKINI.

3. PASTIKAN PERISIAN ANTIVIRUS ANDA DIKEMASKINI.

4. PASTIKAN TEKNOLOGI ANTISPYWARE ANDA YANG TERKINI.

LANGKAH2 MENGELAK DARI KENA VIRUS

1.GUNA INTERNET FIREWALL

2.Lawati MICROSOFTUPDATE Untuk mengecam tetapan anda dan dapatkan kemaskini.

3.Langgan perisian Antivirus dan pastikan ia terkini.

4.Jangan buka pautan email pada orang yang tidak dikenali.

5.Elak buka kandungan email yang tidak pasti kandungan atau yang kelihatan agak ganjil daripada email yang anda kenali.

6.Gunakan akaun biasa jangan guna akaun pentadbir(admin)

Saturday, January 30, 2010

Dunia Akhir Zaman!!


KOTA BHARU: Akibat tidak tahan godaan syaitan, seorang ustaz didakwa tergamak menggoda seorang gadis bawah umur dengan tayangan video lucah melalui komputer riba miliknya.

Rangsangan video lucah terbabit menyebabkan ‘kekasihnya’ itu berahi sebelum mereka meneruskan adegan ‘panas’ dalam sebuah kereta di tempat sunyi.


Namun, adegan asmara itu hanya mampu bertahan beberapa minit apabila pasangan terbabit dicekup sepasukan ahli Skim Rondaan Sukarela (SRS).


Pasangan itu dicekup berkhalwat dalam sebuah kereta Kancil di Lebuhraya Kota Bharu-Pasir Mas, Tendong, dekat sini, petang kelmarin, Dalam serbuan kira-kira jam 3 petang itu, ustaz berusia lingkungan 30-an serta tidak diketahui status perkahwinan itu dikatakan cuba melarikan diri sebaik menyedari kehadiran beberapa kereta di belakang kenderaannya.


Namun, tindakannya untuk meloloskan diri gagal apabila kenderaannya berjaya dihalang kenderaan dinaiki ahli SRS itu menyebabkan dia ditahan bersama pelajar perempuan berusia 16 tahun.


Paling mengejutkan, ketika serbuan, ustaz terbabit yang dipercayai mengajar di sebuah sekolah menengah agama di sebuah daerah di negeri ini dikatakan dalam keadaan separuh bogel manakala pasangannya pula dalam keadaan kain terlondeh ke paras kaki.


Difahamkan sebelum kejadian, ustaz itu dikatakan baru menjemput pelajar berkenaan dari sekolahnya di Tumpat sebelum dibawa bersiar-siar dan singgah di kawasan sunyi berhampiran rumah usang tidak bernombor di tepi lebuh raya itu.


Difahamkan, kawasan itu sering dijadikan ‘markas maksiat’ beberapa pasangan kekasih. Sebaik memperkenalkan diri sebagai ahli SRS, ustaz terbabit merayu supaya dilepaskan memandangkan dirinya seorang guru, namun tidak diendahkan, sebaliknya terus dibawa ke pejabat agama negeri bersama pasangannya.


Sementara itu, seorang ahli SRS berkata, sebelum tangkapan dilakukan, dia berada di rumah dan terdengar siren jentera bomba menyebabkannya bergegas mengejar kenderaan pasukan penyelamat itu.


Namun hasratnya untuk mengetahui kejadian lanjut terbantut apabila tidak dapat mengejar jentera bomba yang dipandu agak laju sebelum terpandang sebuah kereta jenis Kancil menghala masuk ke kawasan sunyi yang terletak berhampiran Kada Tanjung Puri itu.


“Saya menghampiri kawasan itu sebelum mendapati kenderaan terbabit berada dalam keadaan mencurigakan dan terus menghubungi rakan-rakan lain.


Menurutnya, sebaik dihampiri, mereka terkejut apabila mendapati, sepasang kekasih berada dalam keadaan memalukan apabila lelaki separuh bogel manakala gadis itu pula cuba menutup pahanya dengan komputer. “Pasangan itu kemudian dibawa ke Jabatan Hal Ehwal Agama Islam Kelantan (JAHEAIK),” katanya.


Sementara itu, Ketua Penolong Pengarah Penguatkuasa JAHEAIK, Mohd Ab Aziz Mohd Noor, ketika dihubungi mengesahkan mengenai penahanan dilakukan SRS terhadap pasangan terbabit.


Bagaimanapun butiran lanjut identiti sebenar individu yang ditangkap dalam kejadian itu belum diketahui dan siasatan lanjut akan dijalankan terhadap pasangan berkenaan.

sumber: harian metro

P/s: Astagfirullah!!...

Thursday, January 28, 2010

Rahsia Usaha terancang Zionis


Usaha terancang Zionis untuk roboh al-Aqsa

MENGIKUT sejarah, Masjid al-Aqsa bermaksud 'Masjid Paling Jauh', terletak di Baitulmaqdis atau 'Jerusalem' bagi orang Yahudi.

Masjid itu terbina di kawasan Haram al-Sharif atau ‘Temple Mount’ yang juga dituntut Yahudi kononnya menempatkan kuil yang pernah dibina di Baitulmaqdis.

Tidak jauh dari Masjidil Aqsa ialah Kubah Batu atau ‘Qubbat As-Sakhrah’ yang asalnya batu besar tempat Nabi Muhammad berdiri naik ke langit ketika peristiwa Israk Mikraj.

‘Qubbat As-Sakhrah’ yang kini dipanggil Masjid Kubah Batu juga dikenali sebagai Masjid Umar, tempat Saidina Umar al-Khatab bersolat ketika tiba di Baitulmaqdis.

Masjid al-Aqsa adalah tempat suci kepada umat Islam, begitu juga dengan ‘Qubbat As-Sakhrah’ dan kawasan sekitarnya kerana terletak dalam Haram al-Sharif. Keseluruhan kawasan ini dimaksudkan sebagai Masjidil Aqsa, bukannya al-Aqsa saja kerana al-Aqsa dibina selepas penaklukan Baitulmaqdis oleh tentera Islam. Nama masjid itu diambil sempena nama Masjidil Aqsa dalam al-Quran.

Masjid al-Aqsa ialah tanah suci ketiga selepas Makkah dan Madinah. Umat Islam percaya Nabi Muhammad SAW dibawa dari kota suci Makkah ke al-Aqsa pada malam Israk Mikraj. Masjid terbesar di Baitulmaqdis itu boleh memuatkan kira-kira 5,000 jemaah di dalam dan kawasan sekitarnya.

Ia pernah menjadi kiblat pertama umat Islam sebelum dipindahkan ke Baitullah al-Haram di Makkah dan menjadi masjid yang kedua dibina selepas Kaabah. Jarak masa pembinaan antara Kaabah dan al-Aqsa ialah 40 tahun.

Masjid itu pada awalnya sebuah rumah ibadat kecil dibina oleh Khalifah kedua Islam, Umar al-Khattab di kawasan seluas 25 hektar pada 638 Masihi (M), namun dibina semula dan diperluaskan oleh Khalifah Abdul Malik ibni Marwan dan disiapkan anak lelakinya Al Walid ibni Abdul Malik pada 705M.

Gempa bumi pada 746M memusnahkannya sebelum dibina semula oleh Khalifah Abbasiyah, Al-Mansur pada 754M dan diteruskan penggantinya, al-Mahdi pada 780M. Satu lagi gempa memusnahkan sebahagian besar al-Aqsa pada 1,033M, namun dua tahun kemudian Khalifah Ali az-Zahir membinanya semula yang kekal sehingga hari ini.

Ketika tempoh pengubahsuaian dijalankan, pelbagai dinasti pemerintahan Khalifah Islam membina ruang tambahan selain kubah, bahagian hadapan, mimbar, menara dan struktur dalaman.

Apabila Tentera Salib menawan Baitulmaqdis pada 1,099M, mereka menggunakan masjid itu sebagai istana dan gereja, namun fungsinya sebagai masjid dikembalikan selepas ia dirampas panglima Islam, Sallahuddin al-Ayyubi. Kini kota lama itu berada di bawah kawalan Israel, namun Masjid al-Aqsa ditadbir wakaf Islam Pihak Berkuasa Palestin.

Laporan terbaru menyatakan, Masjid al-Aqsa terancam dan boleh roboh kerana kegiatan menggali oleh Pihak Berkuasa Antikuiti Israel. Kerja penggalian itu berlaku sejak sepanjang 1970-an lagi. Pada masa itu, Israel memperhebat penggalian di bahagian bawah masjid termasuk di selatan dan baratnya.

Pada 1977, penggalian itu diteruskan dan sebuah terowong besar dibuka di bawah kawasan solat wanita. Satu terowong baru digali pula di bawah masjid, dari timur ke barat pada 1979. Sebagai tambahan, Jabatan Arkeologi Kementerian Hal Ehwal Agama Israel menggali sebuah terowong berhampiran bahagian barat masjid pada 1984.

Ketika memulakan projek penggalian terbabit, Israel mendakwa mereka mencari tempat ibadat Nabi Sulaiman. Mereka gagal menemui lokasinya, sebaliknya menemui terowong Raja Jehoiachin (Raja Baitulmaqdis).

Israel mendakwa, penggalian itu satu kejayaan kerana menemui runtuhan terowong Raja Jehoiachin, yang tidak berkaitan langsung dengan tempat ibadat Nabi Sulaiman. Terowong itu tidak dianggap penting dari segi agama tetapi sejarah. Pintu masuk terowong kemudian ditutup dan pada hari ini ia dibuka semula tanpa sebarang justifikasi.

Kepentingan berhubung isu penggalian terbabit ke atas umat Islam tidak perlu dijelaskan. Mereka umumnya bimbang Masjid al-Aqsa dan asasnya akan rosak dek kerja penggalian itu.

Malah, apakah manfaatnya penggalian itu kepada penduduk Yahudi tidak difahami kerana hakikatnya tiada kepentingan langsung dari segi agama.

Pada Februari 2007, jabatan arkeologi terbabit mula menggali di lokasi bagi membina semula laluan jalan kaki yang runtuh. Tapak itu terletak 60 meter dari Masjid al-Aqsa, mencetuskan kemarahan umat Islam dan Israel dituduh cuba memusnahkan asas masjid.

Pemimpin Hamas, Ismail Haniya menggesa rakyat Palestin bersatu bagi membantah penggalian itu, sementara pemimpin Fatah mengancam menamatkan gencatan senjata dengan Israel.

Dalam laporan Pusat Media Antarabangsa Asia Barat (IMEMC) Februari 2008, sekumpulan pembuat dasar Hamas yang ditahan Israel menggesa rakyat Palestin menyekat rancangan baru Yahudi menggali terowong baru di bawah Masjid al-Aqsa.

Pembuat dasar Palestin yang ditahan di penjara Ayalon itu, percaya apa yang berlaku adalah satu lagi cubaan Israel untuk menghapuskan sejarah Arab dan Palestin di Baitulmaqdis.

Mereka menggesa dunia Arab dan Islam membantu mereka melindungi Baitulmaqdis dan kawasan suci Islam. Mereka juga berkata, perpecahan di kalangan penduduk Palestin menggalakkan Israel melakukan sesuka hati di Baitulmaqdis dan Masjid al-Aqsa.

Akhbar Haaretz pada 31 Januari 2008 mengesahkan laporan bahawa Israel mengambil keputusan memulakan penggalian sebuah terowong baru di kawasan yang disebut.

Pada Ogos 2008, sumber Israel melaporkan, Menteri Luar Jordan, Salah Bashir, bertemu duta Israel di Jordan untuk membantah penggalian berhampiran Masjid al-Aqsa. Jordan berkata penggalian itu akan mencetuskan gelombang keganasan baru di Asia Barat dan Baitulmaqdis adalah Garisan Merah bagi semua penduduk Arab dan Islam.

Mohammad Abu Hdeib, ketua jawatankuasa Parlimen Jordan berhubung hal ehwal antarabangsa, menyatakan bahawa Bashir memaklumkan duta Israel bahawa Jordan membantah langkah dijalankan Israel dan menambah bahawa penggalian berhampiran Pagar Mughrabi yang menghala ke Masjid al-Aqsa melanggar perjanjian damai 1994 di antara Jordan dan Israel.

Abu Hdeib berkata, penggalian oleh Israel dan rancangan keseluruhannya mengancam asas Masjid al-Aqsa.

Dalam laporan lain pada November 2009, Yayasan Wakaf dan Warisan al-Aqsa mendedahkan, Israel mula menjalankan kerja penggalian di laluan Al-Sharif, berpuluh meter dari bahagian barat Masjid al-Aqsa, dalam persediaan membina dua terowong dan dua lif bagi menghubungkan antara laluan itu termasuk Al Buraq dan Pagar Mugharabi.

Yayasan itu berkata, tujuan membina terowong dan membina lif ialah ‘membawa penduduk Yahudi ke barat dan pintu Masjid al-Aqsa, terutama di pagar Mugharabi, lokasi pelancong asing dan Yahudi menyerbu masuk Masjid al-Aqsa.” Yayasan menganggapnya projek ‘mengyahudikan’ Masjid al-Aqsa.” Malah, pihaknya mendapati kerja penggalian dijalankan Pihak Berkuasa Antikuiti Israel, termasuk di lorong Al-Sharif.

Yayasan itu mendedahkan dalam satu laporan 3 Mac 2009, hasrat Israel dan sayap eksekutifnya menggali dua terowong baru, satu daripadanya sepanjang 56 meter dan satu lagi 22 meter bagi menghubungkan lorong Al-Sharif Palestin di Kota Lama ke Baitulmaqdis. Kawasan yang dimaksudkan terletak di dalam sempadan Kota Lama seluas lebih 133 meter persegi yang diduduki Israel pada 1967.

Ia juga mendedahkan keinginan Israel memasang lif elektrik dalam terowong menegak dan koridor elektrik di terowong memanjang. Lokasi dua terowong itu menjadi titik pertemuan beberapa tapak arkeologi, bagi Israel membangunkan satu sejarah ilusi Yahudi.

Ia menjelaskan bahawa projek mengyahudikan itu menelan belanja 10 juta shekel (RM8.35 juta) dan akan dilaksanakan dengan kerjasama antara perbandaran jajahan Baitulmaqdis, syarikat pembangunan dan pemuliharaan penempatan Yahudi, Pihak Berkuasa Monumen dan Institut Insurans Nasional. Projek itu akan dibiayai menerusi sumbangan Baruch Klein, seorang ahli perniagaan Israel-Amerika Syarikat.

Penggalian terowong itu sampai ke kemuncaknya apabila yayasan terbabit mendedahkan penggalian skala besar dijalankan Israel di kawasan bersambungan ke dinding selatan Masjid al-Aqsa, juga dikenali sebagai Istana Umayyad.

Sesetengah kerja penggalian dikatakan dilakukan pada waktu malam terutama dalam tangki air terletak di kawasan menghala ke kawasan bawah tanah masjid berkenaan. Yayasan memberi amaran mengenai risiko dan kesan penggalian itu ke atas masjid suci umat Islam selain ‘usaha segera mengyahudikan’ kawasan itu oleh kerana ia bersambung ke dewan solat Marwani di dalam masjid.

Kawasan penggalian berselerak dilakukan di kawasan barat daya berhampiran tapak yang mengelilingi kawasan asal masjid, yang digelar ruangan Al-Khanthaniyya, dan di kawasan tengah serta timur ke barat.

Yayasan memberi amaran bahawa penggalian itu bertujuan melemahkan struktur asas Masjid al-Aqsa kerana pada masa lalu, kerja penggalian sama menyebabkan rekahan dan retakan di bahagian selatan dinding masjid, sekali gus berisiko merobohkan mercu tanda umat Islam.

Amaran itu sekali lagi dinyatakan Ketua Hakim Pihak Berkuasa Palestin (PPA), Sheikh Tayseer Tamimi kepada IMEMC yang bimbang Masjid al-Aqsa, yang kini terjejas akibat rekahan dan retakan pada dindingnya, memberi tanda akan roboh pada bila-bila masa, akibat penggalian skala besar dilakukan Israel di bawahnya.

Ia berikutan kakitangan Pihak Berkuasa Antikuiti Israel yang bekerja pada waktu malam membawa keluar berpuluh-puluh beg berisi batu dari kawasan selatan masjid.

“Israel perlu bertanggungjawab atas sebarang kerosakan atau runtuhan yang berlaku di Masjid al-Aqsa dan kawasan sekitar yang membabitkan kawasan penganut Kristian,” kata Tayseer yang dipetik agensi berita Maan.

Ulasannya berikutan runtuhan kawasan penduduk di Silwan, timur Baitulmaqdis pada 11 Januari lalu, meninggalkan lubang sedalam 12 meter persegi di tengah jalan Wadi Hilwah.

Pada masa sama, beliau merujuk peningkatan kehadiran pelampau Yahudi, selain pencerobohan tentera di al-Aqsa, dan terbaru kemasukan 50 pelajar daripada pelbagai jabatan arkeologi universiti Israel untuk menjalankan penyelidikan dan pendatang Yahudi ketika wanita Islam bersolat.

Jawad Siyam, Ketua Pusat Penerangan Wad Hilwa memberitahu agensi Maan bahawa runtuhan baru itu sedalam 10 meter, dan terletak hanya beberapa meter dari satu lagi runtuhan minggu lalu akibat kerja penggalian berterusan Israel.

Juga air hujan mula membanjiri Al Ein, kawasan masjid berhampiran di mana penggalian bertumpu.

Pusat Hak Sosial dan Ekonomi Baitulmaqdis (JCSER) melaporkan kejadian Isnin lalu hanya satu daripada beberapa siri runtuhan sama yang berlaku pada 2009. Runtuhan terbaru berlaku di sebuah sekolah tempatan untuk perempuan, di mana 17 pelajarnya cedera.

JCSER mengakui penggalian Israel itu menyebabkan kerosakan struktur kepada beberapa premis di kawasan itu terutama di masjid Al Ein.

Pusat itu juga memberi amaran beberapa siri runtuhan bakal berulang di Silwan dan Kota Lama ketika Israel menjalankan kerja mengorek bagi membina satu rangkaian terowong di kawasan itu. Penggalian itu sudah sedia menyebabkan kerosakan struktur ke atas berpuluh bangunan di kawasan terbabit.

Memetik kata-kata pengarah Wakaf Palestin Adnan Husseini pada 2002; “Pihak berkuasa Israel perlu bertanggungjawab ke atas kehilangan nyawa akibat runtuhan dinding masjid.”

Adakah umat Islam di seluruh dunia hanya mampu melihat Masjid al-Aqsa runtuh begitu saja? Atau mampukah kita melihat Masjid al-Aqsa diyahudikan? Inikah petanda akhir zaman? Itulah antara persoalannya.

Sumber: Bharian

Related Posts Plugin for WordPress, Blogger...