Friday, December 30, 2011

Google Chrome Web Browser Security

0 comment

Since its launch three years ago, google chrome as one of the web browser service has shown a very rapid progress. Comfort, stability and security has become an important factor that makes this browser to be one competitor who won seats on the three highest order for the most widely used browser instead of Internet Explorer and Mozilla Firefox.

Although quite young, but Google chrome seems to be very serious in maintaining and improving the security of the system. Chrome also always give credit to the researchers who discovered the weaknesses in the browser to fix it and then continue on in perfected.

Recently a security researcher Christian Holler system found defects / weaknesses Out-of-bounds Writing in Chrome v8 JavaScript Engine, which means that the system can perform the writing process in place where it should be used to write. This can be exploited by attackers to execute code / program illegally.

This discovery by Christian Holler get from Google's award of $ 1000. Even this weakness in the follow up directly with improvements later in the launch in v8 JavaScript Engine version 3.5.10.24.

If at that 15.0.874.120 stable version of Chrome was released on 10 November, google fix seven flaws in the system, so now Google has released Chrome as well 15.0.874.121 Stable version for the Windows platform, Mac and Linux. This update is an improvement over previous versions of weakness identified as CVE-2011-3900 and includes high-impact defects against unauthorized activity. It is not common in the browser service that directly release the latest version with just a single fix vulnerabilities in JavaScript, but google proved to be very active attention and gave a positive response to weaknesses in browsers.

Since its launch three years ago, google chrome as one of the web browser service has shown a very rapid progress. Comfort, stability and security has become an important factor that makes this browser to be one competitor who won seats on the three highest order for the most widely used browser instead of Internet Explorer and Mozilla Firefox.

Although quite young, but Google chrome seems to be very serious in maintaining and improving the security of the system. Chrome also always give credit to the researchers who discovered the weaknesses in the browser to fix it and then continue on in perfected.

Recently a security researcher Christian Holler system found defects / weaknesses Out-of-bounds Writing in Chrome v8 JavaScript Engine, which means that the system can perform the writing process in place where it should be used to write. This can be exploited by attackers to execute code / program illegally.

This discovery by Christian Holler get from Google's award of $ 1000. Even this weakness in the follow up directly with improvements later in the launch in v8 JavaScript Engine version 3.5.10.24.

If at that 15.0.874.120 stable version of Chrome was released on 10 November, google fix seven flaws in the system, so now Google has released Chrome as well 15.0.874.121 Stable version for the Windows platform, Mac and Linux. This update is an improvement over previous versions of weakness identified as CVE-2011-3900 and includes high-impact defects against unauthorized activity. It is not common in the browser service that directly release the latest version with just a single fix vulnerabilities in JavaScript, but google proved to be very active attention and gave a positive response to weaknesses in browsers.
Read More..

Hitachi Deskstar launches 4TB Hard Drive

0 comment

To meet the increasing demands on storage capacity of desktop computers, Hitachi Global Storage Technologies has launched a new hard drive that is internal 4TB Deskstar 5K4000. Deskstar 5K4000 is a 3.5-inch drive (5400 RPM) with a 32MB cache buffer and CoolSpin technology to be able to reach the level of 2.5 bels idle acoustics. Hard drive is also supported with software that allows large storage on one disc and be able to significantly increase the size of the sector take advantage of features Advanced Format, ie, from 512 bytes to 4096 (4K) bytes.

With CoolSpin Technology ™, Deskstar 5K4000 4TB provides a remarkable blend of power efficiency and performance, making it the ideal solution for power usage about 33 percent lower compared with 3TB drives currently on the market. Besides these new products also meet the standards of the Hitachi EcoTrac ™ classification of halogen-free design and more efficient power both in the field of product design, manufacturing, operation and disposal to minimize environmental impact.

In addition to the internal disk drive, Hitachi is also launching an external version, the Deskstar 5K4000 External 4TB Touro. External version was wrapped with black textured chasing so it looks nice and sturdy, as well as using the interface plug and play USB 3.0 compatible with PC or Mac. In addition to the purchase of each unit of Touro 4TB External Deskstar 5K4000 will get a bonus of free storage in the Cloud platform for 3GB of HitachiBackup.com where users can access their data anytime and anywhere via smartphone or computer web browser. Hitachi external hard drive will be available with a capacity of 4TB, 3TB, 2TB and 1TB.

For those of you who are interested, do not rush first. Due to Both versions of the new Deskstar 5K4000 will be available early next year with each priced at $ 399.99 to $ 419.99 an internal drive and external versions for the capacity of 4TB.
Read More..

Thursday, December 29, 2011

REMnux-3 Linux distribution for Malware analysis

0 comment
A new version is distributed REMnux specifically on Linux has been released. This new tool serves to make reverse-engineering malware, including tools to perform forensic analysis on memory as well as analysis of potentially malicious PDF files.

REMnux first released last year and is the work of Lenny Zeltser, a SANS instructor and malware. Remnux designed to create an independent environment that analyzes and perform reverse-engineering malware and other malicious applications and Web sites. This file can be downloaded separately and on the run via a CD or virtual drive.

There are two new features on the new REMnux in this release of Origami Framework, which can be used to analyze PDF files are dangerous. And the second is a Volatility Framework is to perform forensic analysis on memory. In addition to these features, REMnux version 3 is also equipped with other features.

Some of them are:
- For network analysis: NetworkMiner, ngrep, pdnstool
- Analysis PDF: PDF X-Ray Lite (pdfxray_lite and swf_mastah), peepdf
- Analysis of JavaScript: Chrome JavaScript engine (D8), js-Beautify, and to
- Examining file: Hachoir (hachoir-subfile, hachoir-metadata, hachoir-urwid), pyew, densityscout, findaes.

In the latest version of this REMnux also include a user manual that gives some pointers on how to get started and supporting commands to run the operation.
Read More..

HP Releases Firmware Update to Prevent Unauthorized Access

0 comment

After the Columbia University researchers Ang Cui and Salvatore Stolfo found a vulnerability in HP LaserJet printers that can allow a hacker to remotely control to launch cyber attacks, steal information and within a few possibilities can even destroy the device, HP finally released a firmware update as a precautionary measure which is expected to reduce the problem.

In a statement issued by the company, HP said that: "HP has built a firmware update to reduce this problem and establish proactive communication with customers and partners. So far there are no customers who reported unauthorized access to the HP device that is used. "

"HP reaffirms recommendation to perform actions according to the recommended procedure for securing the device by placing printers behind a firewall and, if possible, disable the remote firmware uploads on the printer."

While this all may go well, the problem is demonstrated again by investigators in November has caused much controversy. Some even sued the company for not warning their customers that there is vulnerability, especially since previous reports indicate that the level of security with a high risk exists in the printer.

At a moment of weakness it found a lot of debate that emerged about the circumstances in which attacks can be successfully launched and HP had to face much criticism, even from trusted security experts such as Mikko Hypponen. "First of all, how does HP do not have a signature or a certificate showing that the new firmware is the original firmware from HP?" Hypponen said.

Meanwhile, customers who depend on the model of LaserJet printers that have the vulnerability to attack immediately advised to upgrade the firmware on the device to prevent possible adverse incident.

Although HP does not report attacks that use vulnerabilities, but we never know what might have been designed or prepared by the criminals in cyberspace during this period. Also recommended to follow the instructions given by the company in Secure Printing and Imaging section to ensure you are protected in case of other bugs have also been found as a zero-day.
Read More..

Sunday, December 25, 2011

Healthy Benefits of Sweating seven

0 comment
Although sweating is often associated with something that is dirty, but actually sweating is healthy. Moreover, the sweat itself is basically odorless. He will be a problem if it mixes with bacteria that accumulate in the skin of the armpit. Listen to 7 healthy benefits of these sweat.
1. Cool the body
Sweating is the body's natural mechanism to regulate the temperature increases as we move or heat. "The sweat that comes out will help the body get rid of heat, so we will not be hot," said Adam Friedman, dermatology and cosmetic surgeon from Montefiore Medical Center, USA.

Because of the importance of the function of sweat, so if we can not sweat would endanger lives. "There is a condition called ectodermal dysplasia, which makes a person can not sweat," said Joel Schlessinger, a dermatologist.

People who suffer from ectodermal dysplasia conditions as they will be prohibited from exercising that heat can be bad for the heart and other body functions. So, thanks to sweating.
2. Brighten the face
The sweat streaming down his face, not only cools the body but also have an effect on facial skin clean. According to Schlesinger, the sweat on the face will reduce the dirt that clog pores. It will also prevent acne.

You can also do a "fake sport" to trigger sweating by heating the face. The trick, hold your face to steam for three minutes. "Evaporate the face is one way to clean skin. Afterwards do not forget to clean your face with perspiration that is not removed can cause clogged pores anymore," he said.
3. Healthy circulation
When we sweat, rapid heartbeat and circulation will be increased, especially around the skin. "Basic sweat glands located in the lower layers of skin that are located very close to the small blood vessels," said Kara Rogers, editor of biomedical Encylopaedia Britannica.

He added, when the sweat glands dilate, blood flow to the skin will increase so that the spur of the circulatory system.
4. Against infection
Sweating was very effective against the bacteria Staphylococcus aureus which is resistant to antibiotics. Besides sweating will also be reduced harmful bacteria and fungi on the skin.

According to Friedman, in the sweat fluid contained nitrite, which is converted into nitric acid when it reaches the skin surface, a gas containing antibacterial and antifungal. "Sweat also contains a natural antibiotic called Dermicidin that can kill bacteria," he said.
5. Disposing of poison
Research shows sweat contains various components, including toxic metal in small quantities. Because of that sweating is often referred to as detoksikan. With the number to 5 million sweat glands in human skin, do not be surprised if the sweating is a mechanism for removing toxins from the body.

"Toxins are discharged through sweat is usually a toxin that is far below the skin. They went out through the pores along with dust and oil are trapped. The cleaning process will enhance the immune system and helps the body fight the flu," said Rogers.

6. Cure
Do you know why we sweat during a fever? Sweating is a way to awaken the body's immune system to fight pathogens that make us sick. "Expenditure sweat is a way the body heal itself," said Christian Nix, a traditional Chinese medicine.

The same mechanism occurs when you exercise or in hot places. In addition to stimulating metabolism to maintain body weight, because the body will burn more calories but also this will stimulate the immune system.

7. Reduce asthma
If the sweat out of your body after exercising so much, then you suffer from asthma risk is lower. Thus the conclusion of research by a team from the University of Michigan.

Although not yet completely clear link between sweat and asthma, but researchers said the setting of sweat in the body are also associated with setting the amount of water released through the respiratory tract. In other words, people who rarely sweating generally have drier airways making it more prone to suffer from asthma.
Read More..

Thursday, December 22, 2011

Symantec Reveals Trends in Cyber ​​Security from Crime

0 comment
Goodbye 2011 and welcome 2012. Welcoming the year 2012, Symantec revealed some security trends revealed by the Regional Technical Director, System Engineering Symantec, Raymond Goh.He said the threat of data theft attack intelligence data and data will be increasingly important company data blindly in the year 2012, the hacker is expected to launch an attack to industrial facilities.

He further explained, Devices and Smart Phone Tablet PC will increase the number of users, therefore the security in the use of smartphones and tablet PCs to be tightened.

The number of users of these devices allows cyber criminals to be more focus on peripheral devices such crimes. For example, virus attacks Android Smartphone malware that attack.

Symantec recently discovered a series of attacks by the code name "Nitro" targeting private companies associated with research, development and manufacturing of chemicals and advanced materials. According to Raymond Goh, Corporate companies engaged in chemical materials should be more vigilant against attacks of cyber criminals.

Read More..

Firefox Version 9 Available With Improvements In JavaScript, Memory and Security

0 comment
Seeing his main rival, Internet Explorer (IE) and Google Chrome which has advantages in JavaScript so that the load process so much faster, Firefox re-launched the latest version of Firefox, the Firefox version 9.

Firefox version 9 has passed and now the beta version can be downloaded even though not yet officially announced, the advantages offered by Firefox version 9 is increased so that the JavaScript engine can load up to 30 percent faster than previous versions.

Lainnnya advantage is, if one of the plugins used to crash or freeze, it will not affect the overall performance of the browser. All you need to do is reload the page to restart the plugin and try again. Unlike the previous versions, when a plugin crashes, it should be in close firefox and re-opened.

Another part that has improved on Firefox version 9 is on the memory that claimed far more efficient because the new interface type is a method to decide and set the type of a variable in the JavaScript runtime. In terms of security, Firefox Version 9 has a security that can automatically keep your device from viruses Malware, Trojans and Spyware.

For those of you Mac OS X Lion Users will also get a more beautiful by using a theme that has been refurbished integration and support two-finger swipe. In addition to changes that can directly view your clay, Mozilla also do some repairs in the engine-ons such as support for HTML5, MathML and CSS.

Read More..

Palm WebOS 1.2.1 is Now Available Now With Improved iTunes Media Sync

0 comment
Palm has just announced the availability of an update to version 1.2.1 which will be used for webOS Palm Pre device. The latest operating system is able to repair Exchange mail syncing process experienced by some users.

On the other hand, for many others, the operating system is useful to run a media sync using iTunes 9.0.1 with or without the support of USB-IF as well though.

In fact, Palm has signaled its commitment to the hijackers by improving synchronization approach using photo applications in order to maintain the structure of the album wisely while allowing even the lowest-resolution images that will be synced to the Palm Pre available. Enjoy.


Read More..

Linux Mint 9 Isadora New Ready for the Users

0 comment
None of the most meritorious than Clement Lefebvre has announced the next major version of Linux Mint operating system. Dubbed Isadora, Linux Mint 9 is available starting today and is ready for download. Open source operating system is distributed both to the architecture 32-bit and 64-bit, like a Live CD or Live DVD (with Oracle's Java 6, VLC media player, OpenOffice.org, F-Spot, Samba, extra wallpapers and DejaVu fonts).

The existence of Linux Mint 9 (Isadora) itself is based on the latest release of the operating system Ubuntu 10.04 LTS (Lucid Lynx), and is powered by Linux kernel 2.6.32.11 same. Linux Mint 9 is equipped with more than 30,000 software packages repository, backup / restore the latest tools, which have been repaired Mint Menu, Windows installer, new artwork and many other great improvements.

Operating system Linux Mint 9 has an installer that has been modified and looks similar to the features of Ubuntu 10.0 counterpart. These operating systems include the latest features fairly good. And one feature not found on the popular Ubuntu OS, which is the welcome screen which is very helpful and instructive. The existence of useful applications and desktop improvements, such as Mozilla, Thunderbird 3 Pidgin or Open in Terminal script for Nautilus is also present in this release!

Linux Mint 9 (Isadora) was able to boot faster, with support for 3 years on the desktop and 5 years on the server (LTS release). In the presence of many good and beautiful wallpapers, some of GNOME icon themes are nice and humble GNOME, would have made the operating system is just like eye-catching.

Literally, Linux Mint will still always be the operating system's elegant, easy to use, up-to-date, 100% free and the Linux operating system based on the popularity of the Ubuntu operating system. This operating system offers paid commercial support to both businesses and individuals. Besides ityu, also of course the free community support is available from the forum and IRC channel.

Read More..

Ubuntu 12.04, Linux OS Offering More Efficient Energy Consumption

0 comment

Your laptop has a problem with batteries? Perhaps these problems can be solved using the Ubuntu OS version 12:04.

Ubuntu engineer named Colin King said that he is now working on power management of an OS. The goal, he wants the energy consumption of the Ubuntu 12:04 can be more efficient compared to other OS. OS is reportedly going to be downloaded in April 2012.

In a test conducted King, reduction of power consumption has been fruitless. This OS will arrange for USB, PCI controller, wireless, Bluetooth and other features that consume less power.
Read More..

Sunday, December 11, 2011

Download Modul Fisika BAB 3

0 comment
Download Modul Fisika BAB 3 Magnet





DOWNLOAD


Read More..

Thursday, December 8, 2011

Nine Disease Due to Technological Progress

0 comment

Technology does offer convenience in the activity. But convenience is not necessarily without consequence. Research has found there are some health problems due to the use of technology in everyday life ranging from depression up to narcissism.

The nine diseases caused by technological advances as reported DailyRecord, Friday (11/25/2011), among others:

1. Hypersensitivity to Electromagnetic Waves from Wifi to Signal Phone

From wi-fi signal to a cell phone, people are surrounded by wireless communication. And for some people, exposure to electromagnetic fields can make the illness. Symptoms range from acute headaches and skin-burning up muscle twitching and severe pain.

An estimated 5 percent of Americans believe that they suffer from this condition and some of them have moved away to areas where wireless communication can dikonrtol strictly controlled to avoid problems.

2. Depression Facebook

Earlier this year, a group of physicians in the U.S. warned that teenagers can become so obsessed with Facebook and the expense of his health.

American Academy of Pediatrics states that neglected children on social networking sites would be more depressed than ignored in real life.

This organization warned of the risk of mental health of children who are victims of cyber-bullying and confirms that the use of some of the websites in the long run can affect sleep patterns and level of self-esteem.

3. Repeated strain injuries which caused a lot of Typing on Keyboard

Usually factory workers, tailors and musicians who had the most at risk of developing repetitive strain injuries. But today's office workers can suffer similar problems due to spending too much time using the keyboard.

The use of fingers, wrists, arms and shoulders repetitively can cause damage that can not be repaired by the body from time to time. Preventive measures such as regular breaks are recommended.

4. Headaches Due to Mobile Phone

For years, experts engaged in a fierce debate over whether cell phones dangerous or not. But studies have shown no relationship between headache and the use of mobile phones.

Research commissioned by mobile phone manufacturers in 2008 and found that a phone call shortly before bedtime can affect sleep quality can cause headaches the next day.

5. Internet Addiction

Many psychiatrists today that offer treatment for Internet addiction and has been treating patients who say that the online world has taken over his life.

According to U.S. psychiatrist, Jerald Block, the condition must be seen as a clinical disorder to see the ever increasing number of people who are addicted to gaming and pornography on the intenet.

6. Reduced Loss due to musical instruments such as Ipod

Some diseases may be new technology over troubling for 10 to 15 years. But already more than 30 years since it first raised concerns that listening to loud music through speakers may damage hearing.

The iPod has replaced the Walkman, but concerns remain the same. France has banned the gadget manufacturers to manufacture earphones that produce noise exceeds a certain level.

7. Play Nintendo Wii injury time

When the Nintendo Wii was first released, people of all ages are excited to try this game that replaces the 'stick' that ancient. The problem is many people who enjoy playing Wii games to lose track of time, causing muscle spasms.

8. Drunk from Game or Movie 3D

A peneltiian Association of Ophthalmologists released in the United States have found health problems due to television and 3D games. A quarter of users reported experiencing eye strain, blurred vision, dizziness, headache, or nausea after viewing 3D content.

People who experience such symptoms of drunkenness are highly susceptible to visual tricks that are used as a trick of visual technology.

9. Narcissism on Social Networking Sites

A study published earlier this year by two U.S. academics who find students who are getting fatter more selfish than previous generations because of the influence of modern technology.

Students of today are also more likely to display less narcissistic behavior and show empathy seeprti displayed in behavior or habit of constantly updating social networking sites.

In peneltiian, the men found to be more inclined to do this, although they are assumed not to use technology more often than women.a
Read More..

Understanding of Cisco Router

0 comment

On this occasion we will discuss about the definition CISCO Router.

Cisco is the main equipment that is widely used in Wide Area Networks or Wide Area Network (WAN). With Cisco routers, the information can be forwarded to the addresses that are far apart and located on a different computer networks. Which aims to be able to forward data packets from one LAN to another LAN.

Cisco routers use routing tables and protocol that serves to regulate the data traffic. Data packets arrive at the router is checked and forwarded to the addressee. In order for the received data packet to reach the destination quickly, the router must process the data with very precise. To that end, Cisco routers using the Central Processing Unit (CPU) as used in the computer to process data traffic quickly.

Like computers, Cisco routers also have some kind of memory is ROM, RAM, NVRAM and FLASH, which is useful to help work the CPU. In addition it is also equipped with a number of interfaces to connect with the outside world and out of the data.

The operating system used by Cisco routers are the Internetwork Operating System (IOS).

The memory used by Cisco routers each having its own utility as follows:

• ROM is useful for storing bootstrap system that serves to regulate the process of booting and running the Power On Self Test (POST) and the IOS image.

• RAM is useful for storing and running configuration and IOS operating systems are active.

• NVRAM configuration is useful for storing the initial (start-up configuration).

• FLASH useful for storing IOS image. By using FLASH, a new version of IOS can be obtained from the TFTP server without having to replace components in the router.

Thus a review of Understanding CISCO Router.

Read More..

Wednesday, December 7, 2011

The Release List of 25 Password Hacker Prone burglarized by SplashData

0 comment
Password synonymous with privacy. Therefore, the selection of the password must be careful, do not let your passwords easily broken by others. SplashData, a company that created a password management application data recently released a list of 25 passwords that are often used and often become targets of hackers.
CEO of SplashData, Morgan slain advise those who use the list of 25 passwords is to immediately replace it. "The hackers can easily break into many accounts by trying commonly used passwords repeatedly," he told The Telegraph.

Accounts on the Facebook social networking is often the target of hackers. Last month, it was revealed that hundreds of hackers trying to find victims on social networks popular in the world. The goal is to get the photos, messages and other personal information.

Here is a list of passwords that hackers cracked cartilage results from SplashData releases:

1. password

2. 123456

3.12345678

4. qwerty

5. abc123

6. monkey

7. 1234567

8. letmein

9. trustno1

10. dragon

11. baseball

12. 111111

13. iloveyou

14. master

15. sunshine

16. ashley

17. bailey

18. passw0rd

19. shadow

20. 123123

21. 654321

22. superman

23. qazwsx

24. michael

25. football
Read More..

Six Ways to Secure Computer

0 comment
Computer security article!? maybe this is something that is often discussed in various articles about computers in all blogs on the internet. I myself since my computer is connected to the internet has not even faced a serious problem with the name of the virus. Although've occasionally made ​​him dizzy









Well at least until the article was written computer security!

I think there are 6 things that we ought to do so we are not exposed to computer tecinta or contracting a virus. Automatic computer security if we talk we talk about how to prevent computer viruses.

As for computer security affairs from the thief's actions beyond this article: D Here are specializing only weeks to Internet viruses.

Here are 6 Tips Computer Security articles :

1. Use AntiVirus

Of course this is the most important. Would not want anti-virus as a guard that will prevent a variety of viruses. Oh yes! If nggk have money do not use pirated antivirus free antivirus ... use only. Not really a great lost in combating Internet viruses.

2. UPDATE!

Do not forget to always update anything for computer security. Not only is it an updated anti-virus. EVERYTHING! Operating either systemnya, installed software and drivers. No software or software that is perfect .. there must be a security hole. Do not trust a programmer who says "I sepurna Software in computer security"

To close the security hole that we have to update and update. Because the Internet is also always update virus and updates.

3. Be careful when browsing

Most viruses spread of Internet porn sites and warez (mp3 illegal, pirated software, etc.). If you do not want exposed to the virus so do not go there. This is the best way to prevent computer viruses.

But I know you are addicted to such sites. Then than it is if there is a warning from your browser, it's better just ignore those sites. Or during a visit to the website whose content the dialog box appears asking to install something .. just been ignored.

Be wary of such sites typically use puns like he was giving a gift to you. In fact it is an Internet virus that can interfere with computer security.

4. Always scan files downloaded

Any files that you download even if it comes from a trusted website like this blog. It should still use anti-virus scan. For example after you download the free ebook, what you believe it germ-free ebook uh mean virus free. Or when to get free scripts .. is it true that the script was really safe.

Preventing it is always better than cure

5. Beware email

One of the Internet virus is spread through email. Especially if you got an email that contains files such as EXE, VBS, BAT. Plus it was sent by strangers ... may-be Internet virus that shut down the computer and reboot and the message "Welcome to your hard drive capacity increases"

How not to grow, lha wong all the deleted files.

6. Articles read on computer security

The development of a computer that runs like a panther ... fast. Perhaps the computer security article you read a month ago is outdated era consumed. So keep-keep reading various articles as a good computer on this blog: D

Benefits of the computer was indeed a lot. But at the same time also appeared troublesome things that computer security is maintained.
Read More..

Tuesday, December 6, 2011

Scroll Apple Mac OS X 10.6.3 Build (10D538) For The Developer

0 comment

Mac OS X operating system is never relentless in providing the latest innovations. In an existing routine, the company is headquartered at One Infinite Loop, Cupertino, Calif., handed to the developer community to create the latest security updates and maintenance of the Snow Leopard is Mac OS X 10.6.3 Build 10D538. And even, reportedly, Mac OS X 10.6.3 is a bit longer to complete its development cycle.

AppleInsider embrace people who are familiar with the beta Friday and said that the [Mac OS X 10.6.3 Build 10D538] includes updates QuickTime X, which when completed will be increased security and compatibility and also can improve the overall reliability simultaneously. This release will also include tweaks that aim to improve the performance of Apple's 64-bit Logic pro audio suite. Other planned improvements include better compatibility with the existence of the printer and OpenGL-based applications.

Apple also has released Logic Pro 9.1 recently. These reforms provide increased compatibility and a lot of improvements. This application can be obtained at Downloads section by entering the serial number Logic Pro 9 is valid. For release notes, the issues addressed in the update include: support for native 64-bit mode, compatibility with 64-bit Audio Unit plug-ins, support for file names with more than 32 characters, these examples are now mapped correctly when using option "Contiguous Zones" in the EXS editor.

With Build 10D538 available, the developers are now required to directly test their skills against some of the other core system components, such as AirPort, VoiceOver and graphics drivers, according to AppleInsider. An issue related to the photo album being viewed through Front Row media center software is said to be a problem seen only on Mac OS X 10.6.3 so far. People who are familiar with the continuous development of Mac OS X 10.6.3 also believed that the release time will be resolved in the next six weeks, with the capacity of the existing results have exceeded half a gigabyte.
Read More..

Launch the Joomla CMS Joomla 1.7.3 Latest With Improved Security System

0 comment


Joomla
has just launched a content management system (CMS) new, namely Joomla 1.7.3. This latest update comes with a variety of improvements, especially in the security system.

Here are some features that are owned by the Joomla 1.7.3:

- Users can save a copy of the template style
- Fix redirect problem at login
- Improvements on the code end of line
- Page breaks can now function correctly when the 'table of contents' gives a chance to hide
- Improvements in Jdatabasequery
- Problem when installing a foreign language has been corrected
- Changes in the back-end language now only works when set to default
- Problems preg_quote on utf8_ireplace function has been improved.

In addition to the features above, there are many other features that have been repaired by the Joomla. Total there are 77 fixes and two security issues. For more details, can be seen on the official Joomla website.
Read More..

Saturday, December 3, 2011

Download 'flow Program' Buat Flowchart

0 comment
'flow Program' Buat Flowchart



Program untuk membuat flowchart, yang mau pakai install terlebih dahulu Visual Basic, agar program bisa di jalankan

Terimakasih atas kunjungannya..

Read More..

Modul Praktikum 'PTI' STMIK EL RAHMA

0 comment
Modul Praktikum 'PTI' STMIK EL RAHMA



DOWNLOAD
Read More..

Various Benefits of Vitamin B-rich

0 comment

You have probably heard of vitamin B. Uniquely of vitamin B is there are many types of B vitamins that are beneficial to the body.Vitamin B1, vitamin B2, vitamin B6 or vitamin B12 may be often heard. Actually, there are 8 types of vitamin B which have differentfunctions. What type of vitamin B? How much is needed? What are the benefits for the body? And what food sources that contain the type of vitamin B?


Vitamin B has 8 type, namely vitamins B1, B2, B3, B5, B6, B7, B9, and B12. Lack of this vitamin can cause various diseases. That's why there are many many multivitamins that include variations of several types of vitamin B, called B-complex vitamins. Here is an explanation of types of vitamin B.
* Vitamin B1 (Thiamine)
Function: Change the carbohydrates in foods into energy.
Needs: Women 1.1 mg; Men 1.2 mg; Pregnant and nursing women 1.4 mg.
Sources: Rice, bread, cereals, flour, seafood such as shrimp, crab or shellfish.
* Vitamin B2 (Riboflavin)
Function: Maintain healthy eyes and skin.
Needs: Women 1.1 mg; Men 1.3 mg 1.6 mg for lactating women.
Sources: Milk, cheese, chicken, broccoli, spinach, mushrooms.
* Vitamin B3 (Niacin)
Function: For healthy skin, increase appetite, improve digestion and help convert food into energy.
Needs: Women 14 mg; Men 16 mg Pregnant women 18 mg 17 mg for lactating women.
Sources: Grains, beans, beef, mushrooms.
* Vitamin B5 (Pantothenic Acid)
Function: Together with other types of B vitamins, vitamin B5 is useful in the process of the breakdown of fat, protein, carbohydrates into energy. Another benefit is to the formation of red blood cells and make vitamin D.
Needs: Women 4 mg; Men 6 mg, 5 mg Pregnant women: Women breast-feeding 6 mg.
Sources: Chicken, fish, sardines, avocado, watermelon.
* Vitamin B6 (pyridoxine)
Function: Required in the process of amino acids and fats.
Needs: Women 1.3 mg; Men 1.3 mg Pregnant women are 1.9 mg 2 mg for lactating women. Most of the consumption of vitamin B6 with the consumption of more than 50 mg per day can cause permanent nerve damage.
Sources: Meat, poultry, fish, beef, potatoes, tomatoes, bananas, fruit purple and green vegetables.
* Vitamin B7 (Biotin)
Function: Helps in the breakdown of fat, protein into energy that will be used by the body.
Needs: Women 25 meg; Men 30 mg: 30 mg Pregnant women: 35 mg for lactating women.
Sources: Meat salmon, eggs, milk, cereal, bananas and peanuts.
* Vitamin B9 (Folate)
Function: Charge to the cells in the body develop properly, forming red blood cells and prevent nerve damage in the fetus.
Needs: Women's 400 meg; Men 400 mg: 600 mg Pregnant women: 500 mg Lactating women. Excessive vitamin B12 will cause vitamin B12 deficiency.
Sources: Milk and dairy products, beets, liver, melons and green leafy vegetables.
* Vitamin B12 (Cobalamin)
Function: Change the carbohydrates, proteins and fats into energy, maintain healthy red blood cells, protects nerve cells, preventing heart disease, and prevent shrinkage of the brain that can lead to memory decline.
Needs: Women's 2.4 meg; Men 2.4 meg; 2.6 mg Pregnant women: 2.8 mg for lactating women.
Sources: Beef, fish meat, liver, eggs, milk, soy and seaweed.

Yes, a lot of vitamin B benefits. Especially for pregnant and lactating women, should always keep enough vitamin B are met in the daily diet. For all people, vitamin B strongly support the fulfillment of good nutrition.
Read More..

Saturday, November 26, 2011

Ways of Protecting Heart at age 20 and 30 Years

0 comment
Heart disease affects many people are now more productive age. Yet in fact the disease can be prevented. Here are some steps you can do to maintain heart health.

At Age 20 Years

- Reduce calories

Change your habits to consume a high sugar yield like soft drinks, juice or sports drinks with water. Research shows people who obtained calorie intake of added sugars typically consume less fiber, calcium, iron, and vitamins from their food. Food and drinks that contain too much sugar will cause us so much at risk of obesity in high blood pressure and diabetes.

- Quitting smoking

Quitting smoking is a major step to protect the heart. In his teens, smoking is considered a cool thing, but at the age of 20, many people who smoke to relieve stress. According to Malissa Wood, of the American Heart Association to stop smoking at the age of 20 years is much easier in the appeal at the next age.

- Learn about family history

When his father suffered a heart attack before age 55 years and mother before 65 years, or any family member who died young from heart disease, your risk will be high.

At Age 30 Years

- Keep your weight

At the age of 30 years usually someone starts a well-established economic level. Make sure you do not forget to fall asleep with health. Do exercise regularly and keep your calorie intake.

- Manage stress

Do activities that you like at least 15-20 minutes every day. For example, meditation, reading books, or playing with pets. Activities that make you more relaxed strongly advised to relieve stress.

- Health Tests

Perform blood tests to determine whether the levels of cholesterol and your blood sugar to normal standards. Besides blood pressure and also measure weight on a regular basis. Consult with your doctor the necessary steps when the results of your examination outside normal limits.
Read More..

Friday, November 25, 2011

Enjoying Fast Food by Better Health

0 comment

Fast food or fast food and favorite food is easily found when we are out of the house. The downside is the food is not healthy foods, less nutrition, and many contain chemicals, and even earned the nickname as junk food or junk food. How do I create food that is still healthy to eat?

Fast Food

A variety of fast food outlets or fast-food restaurant offers American fried chicken, nuggets, burgers, sausage, or meatballs. And the food has become a preferred food of children and even adults. Savory flavors of the food makes us happy to eat it. No wonder if at the mall, a restaurant that sells food is crowded.

Unfortunately, these foods are not healthy foods. Fat content that makes a person suffering from high cholesterol and obesity, additional ingredients that can damage the body, and very few fibers are a few things that make these foods are not recommended for health. If you have or may in the mood to enjoy the food at fast food restaurants or fast food, in some ways, you can make these foods are healthier for the body. Here is some important information before you decide to enjoy the food.

American Fried Chicken

American fried chicken or often known as the fried chicken is one of the fast food of the most popular. A variety of restaurants both from within and outside the country have been peddling this fried chicken. Why is it less healthy fried chicken? And how the trick is to eat fried chicken in a safe manner?
The reason the American fried chicken (fried chicken) is less healthy:

* Regular use chicken that is usually given an injection of hormones in breeding.
* Chickens of this type have a lot of fat content.
* Use cooking oil that has a high boiling point. Such oils contain cholesterol.
* In order to get the chicken skin is dry but the inside still delicious, fried chicken with deep frying at high temperatures. This technique makes oil more and more absorbed into the chicken meat, can reach 65%.

Tricks enjoy American fried chicken (fried chicken) to make it healthier:

* Set aside chicken skin. In the skin, the fat contained in it quite a lot. If possible, the skin does not have to eat even though the piece is indeed the most delicious.
* Select the chest, because the fat content in this section is less than the chicken thighs.
* Eat healthy foods. With a little mayonnaise or salad vegetables is that you can eat menu so you still get fiber to the body.


Sausage and Nugget

Sausage and nuget is also one of the favorite foods. For example, for a burger or hot dog. Sausage and nuget not only available at fast food restaurants, but is also available and sold in various supermarkets. Why do you also need to look when eating sausage or nuget? And how the tricks to stay healthy while enjoying the sausage and nuget?
Reasons nuget sausage and less healthy:

* Sausage and nuggets have passed the various stages of processing which has the addition of various preservatives or dyes that make the kidneys work to be heavy.
* Using a meat that is not clear. Having been through the process of processing, the material used to not be known with certainty. Section viscera, skin or cartilage may even be used for production costs can be minimized.

Enjoy sausage and nuget tricks to make it healthier:

* Eat smaller portions or share so that the amount eaten is not too much.
* Add the vegetable menu in your menu such as salads or fruit intake at subsequent meals.


Meatball / Bakso

Meatballs are the best foods available. Everywhere, with easy to find sellers meatballs, from malls to residential areas. Meatballs with various grain is so delicious. But it turns out meatballs are also less healthy if eaten in vain. Here's why and tricks to enjoy your favorite meatballs in a healthy way.
Reasons are less healthy meatballs:

* Normally using high-fat meat that can cause cholesterol.
* There are meatballs that contain borax or formaldehyde that is very harmful to the body.

Tricks to make it more healthy to enjoy meatballs:

* Do not use MSG. A tasty meatball sauce obtained as usual while concocting added MSG. To avoid this, you can order not to use MSG.
* Sauce is the raw material is clear and contains no preservatives. Meatball vendor usually use sauce or chili sauce in a large bottle that cost is not expensive. Tomato sauce or chili sauce contain questionable material and dyes that can be harmful.
* Ask for more vegetables. Usually equipped with a mustard meatballs or sprouts. So in order to get the fiber your body, you can request that added more vegetables in the bowl of your meatballs.

Reasonable time Enjoying Fast Food

Because you may not completely avoid fast food or fast food, then you can use the trick mentioned above to minimize the negative effects of fast food. You can also make your own at home so that the materials are used more secure and more healthful.

For example, you can use when making chicken fried chicken, using natural dyes when making sausages, and replace with spices instead of MSG is safe with manufacturing techniques that are not harmful.

Do not forget to add the vegetables and fruit as the fiber so that the food is not very long stay in the intestine and absorbed by the body. Enjoy your fast food or fast food you.

Read More..

Indonesian Traditional Massage Oil Benefits

0 comment
The use of ointment has become a common thing for the people of Indonesia. Warm feeling or a particular scent will be obtained when rubbed. From infancy to old, its presence is used to accompany a person's life. What are the commonly used ointment and the benefits it provides?

Warmth when topical ointment because ointments can dilate blood vessels in the skin surface. Because of this dilation, the blood that flowed on the surface of the skin will be more and creates a feeling of warmth that can ease the pain. Ointment also may relieve itching due to insect bites.

You may be one of Indonesian traditional ointments fan, and usually carry in your purse or your pocket. Here are some commonly used ointment, of what made and the composition of the material contained therein:

Kayu Putih Oil
Origin: Ambon
Benefits: Eliminates flatulence, abdominal pain, warms the body. Remedy: Derived from the leaves and twigs of eucalyptus plants. ontainingeukaliptol,acetate esters, pinene and limonene.

Tawon Oil
Origin: Napier
Benefits: Eliminate itching due to mosquito or other insect bites, wounds, bruises from the impact or for massage.Remedy: Made from coconut oil is added eucalyptus oil, pepper leaf, onion, ginger and turmeric.

Lawang Oil
Origin: Ambon and Papua
Benefits: Useful as body warmers. The resulting warm feeling warmer than oil or eucalyptus oil wasps. Usually used for patients with rheumatoid arthritis or for massage. Remedy: Not known for sure potion maker.

Telon Oil
Origin: Central Java
Benefits: Usually used in infants. Useful to warm the baby's body, preventing the flu and can provide a sense of calm in infants. Remedy: Made from 3 types of oils are eucalyptus oil, fennel oil and coconut oil. Some manufacturers replace coconut oil with olive oil or lavender oil.

Kasturi or Gondopuro Oil

Origin: Various regions in Indonesia.
Benefits: Useful for treating sprains, reduces aches pains and itching due to insect bites. Remedy: Made from oil gondopuro.
*

Cendana oil

Origin: Java, NTT, and Timor.
Benefits: Regular use as aromatherapy and keep smooth skin.Remedy: Containing santalol, santalen, santenon, santalal, santalon and isovaleriladehida.

Kemiri Oil
Origin: Various regions in Indonesia.
Benefits: The benefits to nourish hair, skin fasteners, and help address respiratory diseases. This oil can also counteract ultraviolet rays from the sun. Remedy: The content contained in it are vitamin B6, vitamin E, thiamin, and phenolic antioxidants.

Cengkeh Oil
Origin: Various areas in Eastern Indonesia.
Benefits: Helpful to warm the body and can be used fatherly relieve mild toothache. Remedy: Made from clove oil which contains eugenol to kill bacteria and fungi that cause pain.

Ointment made from the distillation of a variety of plant materials that are added by the author solvent. Various plants penghasilnya issued a special smell, so the smell can be distinguished by its type.

Indonesia is rich in a variety of plants that can cope with the disease. One is the different types of oils that are familiar in the community. In order to avoid negative effects, use products that have been registered in the BPOM. When oil is traditionally made and not registered, you can test by rubbing on a small portion of skin on the hands. If the skin is reddened or allergy, discontinue use of the ointment.
Read More..

Saturday, November 19, 2011

Mobile-phone collection Future

0 comment
People had probably never imagined that communications technology can be developed soon. Ten or fifteen years ago cell phone technology is still considered expensive and not very important but only for those with deep pockets or the intelligentsia alone. But now mobile phones are considered public goods, and almost everyone has it. Besides desainnyapun very diverse, all kinds of advanced technology crammed into it. I do not know, whether the phone with strange designs and unique following will be true as well.

1. Nature Cell Phone
This phone is made ​​of dry grass hay alias. Not until two years going to fall out leaving only the display and buttons. Although the concept of "recycling" or can be updated fine, it seems this phone is not practical.


Designer: Je-Hyun Kim

2. Window Mobile Phone
Want to have the weather feature on your phone? Well, the phone this one in predictive able to predict the weather on the go even in locations that can not be predicted (?) Maybe this model phone going to come someday.


Designer: Seunghan Song

3. Chinese Mobile Phone Scrolls
Display roll-out and cool buttons are placed on the roll is really hot. But it does not really bother if using that for day-to-day? It's nothing because the screen display systems that have pulled it ...
designer: Yun Liang

4. Tiles by phone Tzu-Fu Wang
When in the course of ordinary people are already playing the applications and games on mobile. How about this one phone? What is clear of applications can be dismantled and the tide is around the phone and easily upgradable.



5. Radia - Phone Rings by Michael Sea
Who says cell phones should be a box or square shape? With a circle of glittering


Most mobile form of the strangest:

By Tao Ma bracelet cell phone. Combine the two and would like handcuffs!



Another is the weirdest contestant phones O2 "Molecular Cell Phone"



Here is a phone with the strangest material:

Maple phones by Hyun Jin Yoon & Eun Lee Right


Mobile phones with display strangest:

Trou Hologram Mobile Phone by Mac Funamizu:


Mobile phones with user interfaces strangest:

The idea of ​​the touch of a finger by Sunman Kwon:



Blessed are you because in the not too distant future will be many types of phones on the market that might fit the form and function with your personal. Oh, yes do not forget to be thankful to the designers because the longer you will more easily communicate and also more stylish.

Read More..

Saturday, October 15, 2011

What You Need To Know About Salt Consumption

0 comment

Salt is an important vegetable which can not be separated from our daily lives. Imagine, almost all the food we eat every day contain salt as a flavor enhancer. Because of its importance, the ideal consumption of vegetable that can help support healthy nerve and muscle function is a separate issue in the medical world. Why? Because the consumption of salt is too much or too little it can result in deadly to the health of our bodies. Well, the danger, right?

In general, orangn indeed consume salt in excess. But not infrequently due to lack of precisely the wrong diet (too much to drink or avoid total salts) or the influence of certain drugs such as antidepressants, diuretics, and some pain medications. Well, according to Dr. Susan Jebb, Head of Nutrition and Health Research at the MRC Cambridge office, as quoted by TimesOnline, the recommended salt intake for adults is 6 grams or the equivalent of one teaspoon per day. Or more details, the ideal salt intake by age can be seen in the following table:
0-6 months 1 gram
7-12 months 1 gram
1-3 years 2 grams
4-6 years 3 grams (half a teaspoon)
7-10 years 5 grams
11-14 years 6 grams
Adult 6 grams (one teaspoon).

Then what kind of danger does enjoy the salt in an amount not fit? It turns out that excessive consumption can cause high blood pressure diseases such as stroke, cancer, and heart attacks as well as increasing the risk of atherosclerosis. In contrast, consumption of too little can cause goiter, mental disorders, inability to concentrate, and in extreme cases can result in deadly experienced hyponatremia.

Hyponatremia itself is an electrolyte imbalance that occurs due to blood sodium levels below 135 mEq / L. This disease can cause drowsiness, fatigue and confusion. This condition can also slow the mind and cause problems with memory that people often forget. In extreme scenarios, conditions that deplete the amount of sodium in the body can also cause symptoms of severe vomiting, diarrhea, kidney failure, heart failure, hypothyroidism, Addison's disease and liver cirrhosis.

But if you often forget, you should not try to treat it yourself by increasing your intake of salt. Memory loss and forgetfulness can be derived from various causes, so need to get an accurate diagnosis before using any home remedies to treat it.
Read More..

 
Copyright 2011 @ MORE ADVANCED!