Kamis, 27 November 2008

Setting Up A Ftp

Setting Up A Ftp:

Well, since many of us have always wondered this, here it is. Long and drawn out. Also, before attempting this, realize one thing; You will have to give up your time, effort, bandwidth, and security to have a quality ftp server.
That being said, here it goes. First of all, find out if your IP (Internet Protocol) is static (not changing) or dynamic (changes everytime you log on). To do this, first consider the fact if you have a dial up modem. If you do, chances are about 999 999 out of 1 000 000 that your IP is dynamic. To make it static, just go to a place like h*tp://www.myftp.org/ to register for a static ip address.
You'll then need to get your IP. This can be done by doing this:
Going to Start -> Run -> winipcfg or www.ask.com and asking 'What is my IP?'
After doing so, you'll need to download an FTP server client. Personally, I'd recommend G6 FTP Server, Serv-U FTPor Bullitproof v2.15 all three of which are extremely reliable, and the norm of the ftp world.
You can download them on this site: h*tp://www.liaokai.com/softw_en/d_index.htm
First, you'll have to set up your ftp. For this guide, I will use step-by-step instructions for G6. First, you'll have to go into 'Setup -> General'. From here, type in your port # (default is 21). I recommend something unique, or something a bit larger (ex: 3069). If you want to, check the number of max users (this sets the amount of simultaneous maximum users on your server at once performing actions - The more on at once, the slower the connection and vice versa).
The below options are then chooseable:
-Launch with windows
-Activate FTP Server on Start-up
-Put into tray on startup
-Allow multiple instances
-Show "Loading..." status at startup
-Scan drive(s) at startup
-Confirm exit
You can do what you want with these, as they are pretty self explanatory. The scan drive feature is nice, as is the 2nd and the last option. From here, click the 'options' text on the left column.
To protect your server, you should check 'login check' and 'password check', 'Show relative path (a must!)', and any other options you feel you'll need. After doing so, click the 'advanced' text in the left column. You should then leave the buffer size on the default (unless of course you know what you're doing ), and then allow the type of ftp you want.
Uploading and downloading is usually good, but it's up to you if you want to allow uploads and/or downloads. For the server priority, that will determine how much conventional memory will be used and how much 'effort' will go into making your server run smoothly.
Anti-hammering is also good, as it prevents people from slowing down your speed. From here, click 'Log Options' from the left column. If you would like to see and record every single command and clutter up your screen, leave the defaults.
But, if you would like to see what is going on with the lowest possible space taken, click 'Screen' in the top column. You should then check off 'Log successful logins', and all of the options in the client directry, except 'Log directory changes'. After doing so, click 'Ok' in the bottom left corner.
You will then have to go into 'Setup -> User Accounts' (or ctrl & u). From here, you should click on the right most column, and right click. Choose 'Add', and choose the username(s) you would like people to have access to.
After giving a name (ex: themoonlanding), you will have to give them a set password in the bottom column (ex: wasfaked). For the 'Home IP' directory, (if you registered with a static server, check 'All IP Homes'. If your IP is static by default, choose your IP from the list. You will then have to right click in the very center column, and choose 'Add'.
From here, you will have to set the directory you want the people to have access to. After choosing the directory, I suggest you choose the options 'Read', 'List', and 'Subdirs', unless of course you know what you're doing . After doing so, make an 'upload' folder in the directory, and choose to 'add' this folder seperately to the center column. Choose 'write', 'append', 'make', 'list', and 'subdirs'. This will allow them to upload only to specific folders (your upload folder).
Now click on 'Miscellaneous' from the left column. Choose 'enable account', your time-out (how long it takes for people to remain idle before you automatically kick them off), the maximum number of users for this name, the maximum number of connections allowed simultaneously for one ip address, show relative path (a must!), and any other things at the bottom you'd like to have. Now click 'Ok'.
**Requested**
From this main menu, click the little boxing glove icon in the top corner, and right click and unchoose the hit-o-meter for both uploads and downloads (with this you can monitor IP activity). Now click the lightning bolt, and your server is now up and running.

Post your ftp info, like this:

213.10.93.141 (or something else, such as: 'f*p://example.getmyip.com')

User: *** (The username of the client)

Pass: *** (The password)

Port: *** (The port number you chose)

So make a FTP and join the FTP section



Listing The Contents Of A Ftp:

Listing the content of a FTP is very simple.
You will need FTP Content Maker, which can be downloaded from here:
ht*p://www.etplanet.com/download/application/FTP%20Content%20Maker%201.02.zip

1. Put in the IP of the server. Do not put "ftp://" or a "/" because it will not work if you do so.
2. Put in the port. If the port is the default number, 21, you do not have to enter it.
3. Put in the username and password in the appropriate fields. If the login is anonymous, you do not have to enter it.
4. If you want to list a specific directory of the FTP, place it in the directory field. Otherwise, do not enter anything in the directory field.
5. Click "Take the List!"
6. After the list has been taken, click the UBB output tab, and copy and paste to wherever you want it.


If FTP Content Maker is not working, it is probably because the server does not utilize Serv-U Software.

If you get this error message:
StatusCode = 550
LastResponse was : 'Unable to open local file test-ftp'
Error = 550 (Unable to open local file test-ftp)
Error = Unable to open local file test-ftp = 550
Close and restart FTP Content Maker, then try again.




error messages:

110 Restart marker reply. In this case, the text is exact and not left to the particular implementation; it must read: MARK yyyy = mmmm Where yyyy is User-process data stream marker, and mmmm server's equivalent marker (note the spaces between markers and "=").
120 Service ready in nnn minutes.
125 Data connection already open; transfer starting.
150 File status okay; about to open data connection.
200 Command okay.
202 Command not implemented, superfluous at this site.
211 System status, or system help reply.
212 Directory status.
213 File status.
214 Help message. On how to use the server or the meaning of a particular non-standard command. This reply is useful only to the human user.
215 NAME system type. Where NAME is an official system name from the list in the Assigned Numbers document.
220 Service ready for new user.
221 Service closing control connection. Logged out if appropriate.
225 Data connection open; no transfer in progress.
226 Closing data connection. Requested file action successful (for example, file transfer or file abort).
227 Entering Passive Mode (h1,h2,h3,h4,p1,p2).
230 User logged in, proceed.
250 Requested file action okay, completed.
257 "PATHNAME" created.
331 User name okay, need password.
332 Need account for login.
350 Requested file action pending further information.
421 Too many users logged to the same account
425 Can't open data connection.
426 Connection closed; transfer aborted.
450 Requested file action not taken. File unavailable (e.g., file busy).
451 Requested action aborted: local error in processing.
452 Requested action not taken. Insufficient storage space in system.
500 Syntax error, command unrecognized. This may include errors such as command line too long.
501 Syntax error in parameters or arguments.
502 Command not implemented.
503 Bad sequence of commands.
504 Command not implemented for that parameter.
530 Not logged in.
532 Need account for storing files.
550 Requested action not taken. File unavailable (e.g., file not found, no access).
551 Requested action aborted: page type unknown.
552 Requested file action aborted. Exceeded storage allocation (for current directory or dataset).
553 Requested action not taken. File name not allowed.


Active FTP vs. Passive FTP, a Definitive Explanation

Introduction
One of the most commonly seen questions when dealing with firewalls and other Internet connectivity issues is the difference between active and passive FTP and how best to support either or both of them. Hopefully the following text will help to clear up some of the confusion over how to support FTP in a firewalled environment.

This may not be the definitive explanation, as the title claims, however, I've heard enough good feedback and seen this document linked in enough places to know that quite a few people have found it to be useful. I am always looking for ways to improve things though, and if you find something that is not quite clear or needs more explanation, please let me know! Recent additions to this document include the examples of both active and passive command line FTP sessions. These session examples should help make things a bit clearer. They also provide a nice picture into what goes on behind the scenes during an FTP session. Now, on to the information...



The Basics
FTP is a TCP based service exclusively. There is no UDP component to FTP. FTP is an unusual service in that it utilizes two ports, a 'data' port and a 'command' port (also known as the control port). Traditionally these are port 21 for the command port and port 20 for the data port. The confusion begins however, when we find that depending on the mode, the data port is not always on port 20.



Active FTP
In active mode FTP the client connects from a random unprivileged port (N > 1024) to the FTP server's command port, port 21. Then, the client starts listening to port N+1 and sends the FTP command PORT N+1 to the FTP server. The server will then connect back to the client's specified data port from its local data port, which is port 20.

From the server-side firewall's standpoint, to support active mode FTP the following communication channels need to be opened:

FTP server's port 21 from anywhere (Client initiates connection)
FTP server's port 21 to ports > 1024 (Server responds to client's control port)
FTP server's port 20 to ports > 1024 (Server initiates data connection to client's data port)
FTP server's port 20 from ports > 1024 (Client sends ACKs to server's data port)


In step 1, the client's command port contacts the server's command port and sends the command PORT 1027. The server then sends an ACK back to the client's command port in step 2. In step 3 the server initiates a connection on its local data port to the data port the client specified earlier. Finally, the client sends an ACK back as shown in step 4.

The main problem with active mode FTP actually falls on the client side. The FTP client doesn't make the actual connection to the data port of the server--it simply tells the server what port it is listening on and the server connects back to the specified port on the client. From the client side firewall this appears to be an outside system initiating a connection to an internal client--something that is usually blocked.



Active FTP Example
Below is an actual example of an active FTP session. The only things that have been changed are the server names, IP addresses, and user names. In this example an FTP session is initiated from testbox1.slacksite.com (192.168.150.80), a linux box running the standard FTP command line client, to testbox2.slacksite.com (192.168.150.90), a linux box running ProFTPd 1.2.2RC2. The debugging (-d) flag is used with the FTP client to show what is going on behind the scenes. Everything in red is the debugging output which shows the actual FTP commands being sent to the server and the responses generated from those commands. Normal server output is shown in black, and user input is in bold.

There are a few interesting things to consider about this dialog. Notice that when the PORT command is issued, it specifies a port on the client (192.168.150.80) system, rather than the server. We will see the opposite behavior when we use passive FTP. While we are on the subject, a quick note about the format of the PORT command. As you can see in the example below it is formatted as a series of six numbers separated by commas. The first four octets are the IP address while the second two octets comprise the port that will be used for the data connection. To find the actual port multiply the fifth octet by 256 and then add the sixth octet to the total. Thus in the example below the port number is ( (14*256) + 178), or 3762. A quick check with netstat should confirm this information.

testbox1: {/home/p-t/slacker/public_html} % ftp -d testbox2
Connected to testbox2.slacksite.com.
220 testbox2.slacksite.com FTP server ready.
Name (testbox2:slacker): slacker
---> USER slacker
331 Password required for slacker.
Password: TmpPass
---> PASS XXXX
230 User slacker logged in.
---> SYST
215 UNIX Type: L8
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> ls
ftp: setsockopt (ignored): Permission denied
---> PORT 192,168,150,80,14,178
200 PORT command successful.
---> LIST
150 Opening ASCII mode data connection for file list.
drwx------ 3 slacker users 104 Jul 27 01:45 public_html
226 Transfer complete.
ftp> quit
---> QUIT
221 Goodbye.


Passive FTP
In order to resolve the issue of the server initiating the connection to the client a different method for FTP connections was developed. This was known as passive mode, or PASV, after the command used by the client to tell the server it is in passive mode.

In passive mode FTP the client initiates both connections to the server, solving the problem of firewalls filtering the incoming data port connection to the client from the server. When opening an FTP connection, the client opens two random unprivileged ports locally (N > 1024 and N+1). The first port contacts the server on port 21, but instead of then issuing a PORT command and allowing the server to connect back to its data port, the client will issue the PASV command. The result of this is that the server then opens a random unprivileged port (P > 1024) and sends the PORT P command back to the client. The client then initiates the connection from port N+1 to port P on the server to transfer data.

From the server-side firewall's standpoint, to support passive mode FTP the following communication channels need to be opened:

FTP server's port 21 from anywhere (Client initiates connection)
FTP server's port 21 to ports > 1024 (Server responds to client's control port)
FTP server's ports > 1024 from anywhere (Client initiates data connection to random port specified by server)
FTP server's ports > 1024 to remote ports > 1024 (Server sends ACKs (and data) to client's data port)



In step 1, the client contacts the server on the command port and issues the PASV command. The server then replies in step 2 with PORT 2024, telling the client which port it is listening to for the data connection. In step 3 the client then initiates the data connection from its data port to the specified server data port. Finally, the server sends back an ACK in step 4 to the client's data port.

While passive mode FTP solves many of the problems from the client side, it opens up a whole range of problems on the server side. The biggest issue is the need to allow any remote connection to high numbered ports on the server. Fortunately, many FTP daemons, including the popular WU-FTPD allow the administrator to specify a range of ports which the FTP server will use. See Appendix 1 for more information.

The second issue involves supporting and troubleshooting clients which do (or do not) support passive mode. As an example, the command line FTP utility provided with Solaris does not support passive mode, necessitating a third-party FTP client, such as ncftp.

With the massive popularity of the World Wide Web, many people prefer to use their web browser as an FTP client. Most browsers only support passive mode when accessing ftp:// URLs. This can either be good or bad depending on what the servers and firewalls are configured to support.



Passive FTP Example
Below is an actual example of a passive FTP session. The only things that have been changed are the server names, IP addresses, and user names. In this example an FTP session is initiated from testbox1.slacksite.com (192.168.150.80), a linux box running the standard FTP command line client, to testbox2.slacksite.com (192.168.150.90), a linux box running ProFTPd 1.2.2RC2. The debugging (-d) flag is used with the FTP client to show what is going on behind the scenes. Everything in red is the debugging output which shows the actual FTP commands being sent to the server and the responses generated from those commands. Normal server output is shown in black, and user input is in bold.

Notice the difference in the PORT command in this example as opposed to the active FTP example. Here, we see a port being opened on the server (192.168.150.90) system, rather than the client. See the discussion about the format of the PORT command above, in the Active FTP Example section.

testbox1: {/home/p-t/slacker/public_html} % ftp -d testbox2
Connected to testbox2.slacksite.com.
220 testbox2.slacksite.com FTP server ready.
Name (testbox2:slacker): slacker
---> USER slacker
331 Password required for slacker.
Password: TmpPass
---> PASS XXXX
230 User slacker logged in.
---> SYST
215 UNIX Type: L8
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> passive
Passive mode on.
ftp> ls
ftp: setsockopt (ignored): Permission denied
---> PASV
227 Entering Passive Mode (192,168,150,90,195,149).
---> LIST
150 Opening ASCII mode data connection for file list
drwx------ 3 slacker users 104 Jul 27 01:45 public_html
226 Transfer complete.
ftp> quit
---> QUIT
221 Goodbye.


Summary
The following chart should help admins remember how each FTP mode works:

Active FTP :
command : client >1024 -> server 21
data : client >1024 <- server 20

Passive FTP :
command : client >1024 -> server 21
data : client >1024 -> server >1024

A quick summary of the pros and cons of active vs. passive FTP is also in order:

Active FTP is beneficial to the FTP server admin, but detrimental to the client side admin. The FTP server attempts to make connections to random high ports on the client, which would almost certainly be blocked by a firewall on the client side. Passive FTP is beneficial to the client, but detrimental to the FTP server admin. The client will make both connections to the server, but one of them will be to a random high port, which would almost certainly be blocked by a firewall on the server side.

Luckily, there is somewhat of a compromise. Since admins running FTP servers will need to make their servers accessible to the greatest number of clients, they will almost certainly need to support passive FTP. The exposure of high level ports on the server can be minimized by specifying a limited port range for the FTP server to use. Thus, everything except for this range of ports can be firewalled on the server side. While this doesn't eliminate all risk to the server, it decreases it tremendously.

Senin, 24 November 2008

Hide Drives and Partitions

Hide Drives and Partitions

Do you have data on a partition or hard drive that you don't want tampered with or easily accessible to other users? Well, you can hide any drive/partition in Windows XP, NT, and 2000. That means that they won't show up in Explorer or My Computer.

If you want access to that drive from your user account you should create a desktop shortcut before proceeding. Once hidden, you can still access by typing the drive letter and a colon in Start/Run—for example, "D:" will bring up a folder of the contents on your D drive.

The easiest way with Win XP is to use the TweakUI power toy from Mcft. Go to Start/Run and type in "tweakui" (without the quotes).

Go to My Computer/Drives and uncheck the drive/partition(s) you want hidden. Click "Apply" or "OK" when finished.

If you have XP but not Tweak UI you can download it here...
http://www.Mcft.com/windowsxp/downloads/powertoys/xppowertoys.mspx

For Win NT, 2000, and XP you can use the following Registry edit:

*Be sure to back up the Registry before proceeding
http://www.worldstart.com/tips/tips.php/401

Open the Registry Editor by going to Start/Run and typing in "regedit" (without the quotes). Find your way to...

HKEY_CURRENT_USER\Software\Mcft\Windows\CurrentVersion\Policies

Click on "Explorer".

Double-click the "NoDrives" key in the right column. If you don't find a "NoDrives" registry key, just right-click in the right pane and choose "New/DWORD Value" then name the key "NoDrives".

You'll see a value like "0000 00 00 00 00". This is where the fun starts. The four sets of double zeros (after the "0000") are where you'll enter the values for the drive/partitions. Now, stay with me on this—it's not as complicated as it sounds:

The first column is for drives A-H, the second for I-P, the third for Q-X, and the fourth for Y-Z.


The values for each drive are as follows:

1 - A I Q Y
2 - B J R Z
4 - C K S
8 - D L T
16 - E M U
32 - F N V
64 - G O W
80 - H P X

So, let's say you want to hide drive D. In the first column you would put "08". For drive K you would put "04" in the second column.

But what if you want to hide more than one drive in a column? Simply add the values together: D+E = 8+16 = 24. So in the first column you would put "24".

Still baffled? If you have XP then go get TweakUI and save yourself the math.

Whichever method you use, you can rest easy knowing that the files on that drive or partition are less accessible to other users.

Minggu, 23 November 2008

How to Rename File Extensions

 
A lot of people here may ask how to rename a file extension in windows; well it's very simple and takes little of your time. There are two ways to rename a file extension 'without' a stupid program.
 
Number 1, Folder Options:
 
Go into your Control Panel, in my case I use Windows XP so I would press [Start then Control Panel]. Now that you figured out how to get in Control Panel open "Folder Options" and click the view tab and make sure 'Hide file extensions for know files' is not selected, then press Ok.
 
Now go into a folder and notice you can see your files extensions, rename them to whatever you'd like, for instance:
 
Code:
Dildos.exe to Dildos.Anonymous / Etc,Etc,Etc
 
Number 2, MS-DOS:
 
The difference between renaming files in DOS is that you can rename multiple files rather then one at a time, therefore making time gracious. Here I'll provide you a few examples.
 
Go to your start menu and open run, then type "cmd" without parenthesis. Ok you're in MS-DOS right? Geesh common man I know a 5 year old that can do it. Ok good your in? Excellent… Ok now find out which directory has your files and type:
 
Example
 
Cd C:\Files\
 
In your case "C:\Files\" may not exist, so type in the directory that your have you files in. If everything goes will dos will look kinda like this:
 
Code:
Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
 
C:\Documents and Settings\User>cd C:\Files\
 
If all fails, you perhaps didn't type in the correct folder/name and it will look like this:
 
Code:
C:\Documents and Settings\User> >cd C:\Filse\
The system cannot find the path specified.
 
Did you get in the directory yet????? If not I recommend you stick with the first step and hang yourself. Oh your in? OK COOL, type: dir and you will be provided with what files are in your folder, including their extensions. In my case:
 
Code:
C:\Files>dir
 Volume in drive C has no dildo.
 Volume Serial Number is CXXX-XXXX
 
 Directory of C:\Files
 
02/01/2005  07:22 PM    <DIR>          .
02/01/2005  07:22 PM    <DIR>          ..
01/31/2005  06:40 PM            14,336 stf.bmp
01/31/2005  06:40 PM            14,336 stf02.bmp
               2 File(S)         28,672 bytes
               2 Dir(S)  39,024,766,976 bytes free
 
C:\Files>
 
Did you notice how I had two files named stf. Since both of these files have the same extension, *.bmp they can be renamed all together. If there are other files in there witht he same extension and you don't want to rename them, move them to another folder and / or directory.
 
Last but not least, after listening to my horrific grammar type:
 
Code:
C:\Files>ren *.bmp *.rar
 
And your results are:
Code:
 
C:\Files>dir
 Volume in drive C has no penis.
 Volume Serial Number is CXXX-XXXX
 
 Directory of C:\Files
 
02/01/2005  07:37 PM    <DIR>          .
02/01/2005  07:37 PM    <DIR>          ..
01/31/2005  06:40 PM            14,336 stf.rar
01/31/2005  06:40 PM            14,336 stf02.rar
               2 File(S)         28,672 bytes
               2 Dir(S)  39,024,676,864 bytes free
 
C:\Files>]
 
FREE Animations for your email - by IncrediMail! Click Here!

HOW TO GET ANY WINDOWS PASSWORD

 
Ok..... Here are the full details.....
This works whether its windows 2000 or windows xp or windows xp SP1 or SP2 or windows server 2003....
This works even if syskey encryption is employed...
If it is FAT filesystem...
Just copy the Sam file like stated in the first post to an empty floppy disk and take it home. I'll tell U what to do with it later... DON'T DELETE THE ORIGINAL SAM FILE. Just remove its attributes. The Sam file is a file called SAM with no extension. YOU MUST ALSO GET.... A file called SYSTEM which is in the same folder as SAM. Both files have no extensions...
If it is NTFS....
U have to download a program called NTFSPro.... It allows U to read from ntfs drives... The demo version allows read only. The full version is read-write.... You use the program to create an unbootable disk (so U will still need another bootable disk and an empty disk) that has the required files to access NTFS.
Use the boot disk to get into dos, then use the disks created with ntfspro to be able to access the filesystem, then copy the SAM and SYSTEM files to another empty disk to take home....
AT HOME: U have to get a program called SAMInside. It doesn't matter if it is demo version. SAMInside will open the SAM file and extract all the user account information and their passwords, including administrator. SAMInside will ask for the SYSTEM file too if the computer you took the SAM file from has syskey enabled. Syskey encrypts the SAM file. SAMInside uses SYSTEM file to decrypt the SAM file. After SAMInside finishes, U still see user accounts and hashes beside them. The hashes are the encoded passwords. Use SAMInside to export the accounts and their hashes as a pwdump file into another program, called LophtCrack. It is currently in version 5, it is named LC5. The previous version, LC4 is just as good. U need the full or cracked version of the program. LC5 uses a brute force method by trying all possible combinations of letters numbers, and unprintable characters to find the correct password from the hashes in the pwdump file imported into it from SAMInside. This process of trying all passwords might take 5 minutes if the password is easy, up to a year if the password is long and hard (really really hard). LC5 howver, unlike LC4, is almost 100 times faster. Both can be configured to try dictionary and common words before using all possible combinations of everything. Once the correct password is found, it will display the passwords in clear beside each account, including administrator.
 
I use this method so many times. I've compromised the whole school computer infrastructure. LC4 usually took between 1 second and 10 minutes to find the passwords because they were common words found in any English dictionary. I haven't used LC5 yet.
 
If there is anything unclear, anything I overlooked, plz tell me so that I can turn this into a very easy to follow tutorial to help anybody crack any windowz pass.
 
Programs needed: SAMInside (doesn't matter which version or if demo)
LC4 or LC5 (lophtcrack)( must be full version)
NTFSPro (doesn't matter if demo)
Any bootdisk maker
 
Cracked or full version software can be found on any warez site. If U don"t know what that is or where to get the programs, post a message and I'll tell U or give them to U.
 
P.S: I might not keep track of this forum, because I'm going to create a new topic and post tutorial there. If U want to post, plz post there.
FREE Animations for your email - by IncrediMail! Click Here!

Rabu, 19 November 2008

Pecinta sepertiga malam

 
Pecinta sepertiga malam

Surat Cinta Dari Manusia-Manusia Yang Malamnya Penuh Cinta

Wahai orang-orang yang terpejam matanya, perkenankanlah kami
Manusia-manusia malam menuliskan sebuah surat cinta kepadamu. Seperti
Halnya cinta kami pada waktu malam-malam yang kami rajut di sepertiga
Terakhir. Atau seperti cinta kami pada keagungan Dan rahasiaNya yang
Penuh pesona. Kami tahu dirimu bersusah payah lepas tengah Hari
Berharap intan Dan mutiara dunia. Namun kami tak perlu bersusah payah.
Sebab malam-malam kami berhiaskan intan Dan mutiara dari surga.

Wahai orang-orang yang terlelap, sungguh nikmat malam-malammu,
Gelapnya yang pekat membuat matamu tak mampu melihat energi cahaya
Yang tersembunyi di baliknya. Sunyi senyapnya membuat dirimu hanyut
Tak menghiraukan seruan cinta. Dinginnya yang merasuk semakin membuat
Dirimu terlena, menikmati tidurmu diatas pembaringan yang empuk,
Bermesraan dengan bantal Dan gulingmu, bergeliat manja di balik
Selimutmu yang demikian hangatnya.

Wahai orang-orang yang terlena, ketahuilah, kami tidak seperti dirimu!
Yang setiap malam terpejam matanya, yang terlelap pulas tak terkira.
Atau yang terlena oleh suasananya yang begitu menggoda. Kami tidak
Sepeti dirimu!! Kami adalah para perindu kamar di surga. Tak pernahkah
Kau dengar Sang Insan Kamil, Rasulullah SAW bersabda: "sesungguhnya di
Surga itu Ada kamar yang sisi luarnya terlihat dari dalam Dan sisi
Dalamnya terlihat dari luar. Disediakan untuk mereka yang memberi
Makan orang-orang yang memerlukan, menyebarkan salam serta mendirikan
Sholat pada saat manusia terlelap dalam tidur malam." itulah sebuah
Kamar yang menakjubkan bagi kami Dan orang-orang yang mendirikan
Sholat pada saat manusia-manusia yang lain tertutup Mata Dan hatinya.

Wahai orang-orang yang keluarganya hampa cinta, kau pasti pernah
Mendengar namaku disebut. Aku Abu Khurairah , Periwayat Hadits.
Kerinduanku akan sepertiga malam adalah hal yang tidak terperi.
Penghujung malam adalah kenikmatanku terbesar. Tapi tahukah kau?
Kenikmatan itu tidak serat merta kukecap sendiri, Ku bagi
Malam-malamku yang penuh syahdu itu menjadi tiga. Satu untukku, satu
Untuk istriku tercinta Dan satu lagi untuk pelayan yang aku kasihi.
Jika salah satu dari kami telah selesai mendirikan sholat, maka kami
Bersegera membangunkan yang lain untuk menikmati bagiannya.
Subhanallah, tak tergerakkah dirimu? Pedulikah kau pada keluargamu?
Adakah kebaikan yang kau inginkan dari mereka? Sekedar untuk
Membangunkan orang-orang yang paling dekat denganmu, keluargamu?

Lain lagi dengan aku, Nuruddin Mahmud Zanki. Sejarah mencatatku
Sebagai sang Penakluk Kesombongan pasukan salib, suatu kali seorang
Ulama tersohor Ibnu Katsir mengomentari diriku, katanya, "Nuruddin itu
Kecanduan sholat malam, banyak berpuasa Dan berjihad dengan akidah
Yang benar. "Kemenangan demi kemenangan aku raih bersama pasukanku.
Bahkan pasukan musuh itu terlibat dalam sebuah perbincangan seru. Kata
Mereka, "Nuruddin Mahmud Zanki menang bukan karena pasukannya yang
Banyak. Tetapi lebih karena dia mempunyai rahasia bersama Tuhan". Aku
Tersenyum, mereka memang benar, kemenangan yang kuraih adalah karena
Do'a Dan sholat-sholat malamku yang penuh kekhusyu'an. Tahukah kau
Dengan orang yang selalu setia mendampingiku? Dialah Istriku tercinta,
Khotum binti Atabik. Dia adalah istri sholehah di mataku, terlebih di
Mata Allah, malam-malam kami adalah malam penuh kemesraan dalam
Bingkai Tuhan.

Gemersikan dedaunan Dan desahan angin seakan menjadi pernak-pernik
Kami saat mendung di Mata kami jatuh berderai dalam sujud kami yang
Panjang. Kuceritakan padamu suatu Hari Ada kejadian yang membuat
Belahan jiwaku itu tampak murung. Kutanyakan padanya apa gerangan yang
Membuatnya resah. Ya Allah, ternyata dia tertidur, tidak bangun pada
Malam itu, sehingga kehilangan kesempatan untuk beribadah.
Astaghfirullah, aku menyesal telah membuat dia kecewa. Segera setelah
Peristiwa itu kubayar saja penyesalanku dengan mengangkat seorang
Pegawai khusus untuknya, pegawai yang kuperintahkan untuk menabuh
Genderang agar kami terbangun di sepertiga malamnya.

Wahai orang-orang yang terbuai, kau pasti mengenalku dalam kisah
Pembebasan Al-Aqso, rumah Allah yang diberkati. Akulah pengukir tinta
Emas itu, seorang Panglima Perang, sholahuddin Al-Ayyubi, orang-orang
Yang hidup di zamanku mengenalku tak lebih dari seorang panglima yang
Selalu menjaga sholat berjamaah. Kesenanganku adalah mendengarkan
Bacaan Al-Quran yang indah Dan syahdu. Malam-malamku adalah saat yang
Paling kutunggu. Saat-saat dimana aku bercengkerama dengan Tuhanku,
Sedangkan siang hariku adalah perjuangan-perjuang an nyata.

Wahai orang-orang yang masih terlelap, Pernahkah kau mendengar
Penaklukan Konstantinopel? Akulah orang di balik penaklukan itu,
Sultan Muhammad Al Fatih. Aku sangat lihai dalam memimpin bala
Tentaraku, namun tahukah kau bahwa sehari sebelum penaklukan itu, aku
Telah memerintahkan kepada para pasukanku untuk berpuasa pada siang
Hari Dan pada saat malam tiba kami melaksanakan sholat malam Dan
Munajat penuh pertolongan padaNya, jika Allah memberikan kematian
Kepada kami pada siang Hari di saat kami berjuang, maka kesyahidan,
Itulah harapan kami terbesar. Biarlah siang Hari kami berada di ujung
Kematian, namun sebelum itu di ujung malamnya Allah temukan kami
Berada dalam kehidupan, kehidupan dengan menghidupkan malam kami.

Wahai orang-orang yang tergoda, begitu kuatkah syetan mengikat tengkuk
Lehermu saat kau tidur? Ya sangat kuat, tiga ikatan kuat di tengkuk
lehermu, dia lalu menepuk setiap ikatan sambil berkata "Hai manusia
sadarlah, engkau masih punya malam panjang, maka tidurlah!!" "Hei
sadarlah, sadarlah jangan kau dengarkan dia, itu tipu muslihatnya,
syetan itu berbohong kepadamu, maka bangunlah! bangkitlah kerahkan
kekutaanmu untuk menangkal godaannya. Sebutlah nama Allah, maka akan
lepas ikatan yang pertama, kemudian berwudhulah maka akan lepas ikatan
yang kedua, dan terakhir sholatlah, sholat seperti kami maka akan
lepaslah semua ikatan-ikatan itu.

Wahai orang-orang yang masih terlena, masihkah kau menikmati
malam-malammu dengan kepulasan? masihkah? adakah tergerak hatimu untuk
bangkit, bersegera mendekat kepadaNya, memohon ampunanNya walaupun
hanya dengan dua rakaat? tidakkah kau tahu, bahwa Dia berkata. "Akulah
Raja, Akulah Raja, siapa yang memohon kepada-Ku akan Kukabulkan, siapa
yang memohon ampun kepada-Ku akan Ku ampuni," Dia terus berkata
demikian hingga fajar merekah.

Wahai orang-orang yang terbujuk rayu dunia, bagi kami manusia-manusia
malam, dunia ini sungguh tak ada artinya. Malamlah yang memberi kami
kehidupan sesungguhnya, sebab malam bagi kami adalah malam-malam yang
penuh cinta, sarat makna. Masihkah kau terlelap? Apakah kau
menginginkan kehidupan sesungguhnya? maka ikutilah jejak kami,
manusia-manusia malam, kelak kau akan temukan cahaya di sana, di waktu
sepertiga malam. Namun jika kau masih ingin terlelap, nikmatilah
tidurmu diatas pembaringan yang empuk, bermesraan dengan bantal
gulingmu, bergeliat manja di balik selimutmu yang demikian hangatnya,
maka surat cinta kami ini sungguh tak berarti apa-apa bagimu.

Semoga Allah mempertemukan kita di sana, di surgaNya, mendapati dirimu
dan diri kami dalam kamar-kamar yang sisi luarnya terlihat dari dalam
dan sisi dalamnya terlihat dari luar.

Amin........ .


FREE Animations for your email - by IncrediMail! Click Here!

Joint with Us

Let's Join With us

Selasa, 18 November 2008

Create One-Click Shutdown and Reboot Shortcuts

 
Create One-Click Shutdown and Reboot Shortcuts:
 
First, create a shortcut on your desktop by right-clicking on the desktop, choosing New, and then choosing Shortcut. The Create Shortcut Wizard appears. In the box asking for the location of the shortcut, type shutdown. After you create the shortcut, double-clicking on it will shut down your PC.
 
But you can do much more with a shutdown shortcut than merely shut down your PC. You can add any combination of several switches to do extra duty, like this:
 
Shutdown -R -t 01 -c "Rebooting your PC"
Double-clicking on that shortcut will reboot your PC after a one-second delay and display the message "Rebooting your PC." The shutdown command includes a variety of switches you can use to customize it. Table 1-3 lists all of them and describes their use.
I use this technique to create two shutdown shortcuts on my desktop—one for turning off my PC, and one for rebooting. Here are the ones I use:
Shutdown -S -t 03 -c "Bye Bye m8!"
Shutdown -R -t 03 -c "Ill be back m8 ;)!"
Switch
What it does
-S
Shuts down the PC.
-l
Logs off the current user.
-t nn
Indicates the duration of delay, in seconds, before performing the action.
-c "messagetext"
Displays a message in the System Shutdown window. A maximum of 127 characters can be used. The message must be enclosed in quotation marks.
-f
Forces any running applications to shut down.
-R
Reboots the PC.
FREE Animations for your email - by IncrediMail! Click Here!

Perintah-perintah di mIRC

 
All mIRC Commands
 
/ Recalls the previous command entered in the current window.
/! Recalls the last command typed in any window.
/action {action text} Sends the specifed action to the active channel or query window.
/add [-apuce] {filename.ini} Loads aliases, popups, users, commands, and events.
/ame {action text} Sends the specifed action to all channels which you are currently on.
/amsg {text} Sends the specifed message to all channels which you are currently on.
/auser {level} {nick|address} Adds a user with the specified access level to the remote users
List.
/auto [on|off|nickname|address] Toggles auto-opping of a nick or address or sets it on or off
Totally.
/away {away message} Sets you away leave a message explaining that you are not currently paying
Attention to IRC.
/away Sets you being back.
/ban [#channel] {nickname} [type] Bans the specified nick from the curent or given channel.
/beep {number} {delay} Locally beeps 'number' times with 'delay' in between the beeps. /channel
Pops up the channel central window (only works in a channel).
/clear Clears the entire scrollback buffer of the current window.
/ctcp {nickname} {ping|finger|version|time|userinfo|clientinfo} Does the given ctcp request on
Nickname.
/closemsg {nickname} Closes the query window you have open to the specified nick.
/creq [ask | auto | ignore] Sets your DCC 'On Chat request' settings in DCC/Options.
/dcc send {nickname} {file1} {file2} {file3} ... {fileN} Sends the specified files to nick.
/dcc chat {nickname} Opens a dcc window and sends a dcc chat request to nickname.
/describe {#channel} {action text} Sends the specifed action to the specified channel window.
/dde [-R] {service} {topic} {item} [data] Allows DDE control between mIRC and other
Applications.
/ddeserver [on [service name] | off] To turn on the DDE server mode, eventually with a given
Service name.
/disable {#groupname} De-activates a group of commands or events.
/disconnect Forces a hard and immediate disconnect from your IRC server. Use it with care.
/dlevel {level} Changes the default user level in the remote section.
/dns {nickname | IP address | IP name} Uses your providers DNS to resolve an IP address.
/echo [nickname|#channel|status] {text} Displays the given text only to YOU on the given place
In color N.
/enable {#groupname} Activates a group of commands or events.
/events [on|off] Shows the remote events status or sets it to listening or not.
/exit Forces mIRC to closedown and exit.
/finger Does a finger on a users address.
/flood [{numberoflines} {seconds} {pausetime}] Sets a crude flood control method.
/fsend [on|off] Shows fsends status and allows you to turn dcc fast send on or off.
/fserve {nickname} {maxgets} {homedirectory} [welcome text file] Opens a fileserver.
/guser {level} {nick} [type] Adds the user to the user list with the specified level and
Address type.
/help {keyword} Brings up the Basic IRC Commands section in the mIRC help file.
/ignore [on|off|nickname|address] Toggles ignoring of a nick or address or sets it on or off
Totally.
/invite {nickname} {#channel} Invites another user to a channel.
/join {#channel} Makes you join the specified channel.
/kick {#channel} {nickname} Kicks nickname off a given channel.
/list [#string] [-min #] [-max #] Lists all currently available channels, evt. Filtering for
Parameters.
/log [on|off] Shows the logging status or sets it on or off for the current window.
/me {action text} Sends the specifed action to the active channel or query window.
/mode {#channel|nickname} [[+|-]modechars [parameters]] Sets channel or user modes.
/MSG {nickname} {message} Send a private message to this user without opening a query window.
/names {#channel} Shows the nicks of all people on the given channel.
/nick {new nickname} Changes your nickname to whatever you like.
/notice {nick} {message} Send the specified notice message to the nick.
/notify [on|off|nickname] Toggles notifying you of a nick on IRC or sets it on or off totally.
/onotice [#channel] {message} Send the specified notice message to all channel ops.
/omsg [#channel] {message} Send the specified message to all ops on a channel.
/part {#channel} Makes you leave the specified channel.
/partall Makes you leave all channels you are on.
/ping {server address} Pings the given server. NOT a nickname.
/play [-c] {filename} [delay] Allows you to send text files to a window.
/pop {delay} [#channel] {nickname} Performs a randomly delayed +o on a not already opped nick.
/protect [on|off|nickname|address] Toggles protection of a nick or address or sets it on or off
totally.
/query {nickname} {message} Open a query window to this user and send them the private message.
/quit [reason] Disconnect you from IRC with the optional byebye message.
/raw {raw command} Sends any raw command you supply directly to the server. Use it with care!!
/remote [on|off] Shows the remote commands status or sets it to listening or not.
/rlevel {access level} Removes all users from the remote users list with the specified access
level.
/run {c:\path\program.exe} [parameters] Runs the specified program, evt. with parameters.
/ruser {nick[!]|address} [type] Removes the user from the remote users list.
/save {filename.ini} Saves remote sections into a specified INI file.
/say {text} Says whatever you want to the active window.
/server [server address [port] [password]] Reconnects to the previous server or a newly
specified one.
/sound [nickname|#channel] {filename.wav} {action text} Sends an action and a fitting sound.
/speak {text} Uses the external text to speech program Monologue to speak up the text.
/sreq [ask | auto | ignore] Sets your DCC 'On Send request' settings in DCC/Options.
/time Tells you the time on the server you use.
/timer[N] {repetitions} {interval in seconds} {command} [| {more commands}] Activates a timer.
/topic {#channel} {newtopic} Changes the topic for the specified channel.
/ulist [{|}]{level} Lists all users in the remote list with the specified access levels.
/url [-d] Opens the URL windows that allows you to surf the www parallel to IRC.
/uwho [nick] Pops up the user central with information about the specified user.
/who {#channel} Shows the nicks of all people on the given channel.
/who {*address.string*} Shows all people on IRC with a matching address.
/whois {nickname} Shows information about someone in the status window.
/whowas {nickname} Shows information about someone who -just- left IRC.
/wavplay {c:\path\sound.wav} Locally plays the specified wave file.
/write [-cidl] {filename} [text] To write the specified text to a .txt file.
 
MoViEBoT #xdcc-help /server irc.atomic-irc.net
 
We strive to make IRC easier for you!
FREE Animations for your email - by IncrediMail! Click Here!

Minggu, 16 November 2008

Cara membuat Kotak Komentar Berada dibawah Postingan (diambil dari http://trik-tips.blogspot.Com)

 
Trik ini diambil dari Postingan Mas Kendhin di blog http://trik-tips.blogspot.com,
 
Cara membuat Kotak Komentar Berada dibawah Postingan :
 
1. Login ke http://draft.blogger.com, Ingat yang http://draft.blogger.com bukan blogger.Com.
2. Trus ke menu Setting-->Comments. Kemudian ganti "Comment Form Placement" menjadi "Embedded below post"
3. Kemudian klik "Save Setting"
 
Sekarang coba kamu lihat blogmu Dan coba di klik salah satu postinganmu kemudian lihat hasilnya, apakah sudah Ada kotak komentarnya yg dibawah postingan atau belum. Kalau sudah berarti langkahnya cukup disini. Kalau belum ikuti langkah berikut ini.
(ini karena kode HTML tiap2 template itu berbeda. Untuk template default dari blogger yang baru, kode HTMLnya sudah berubah, sedangkan template yg lama atau ambil dari luar Ada yg belum Dan Ada juga yg sudah).
 
4. Selanjutnya pergi ke menu "Layout-->Edit HTML"
5. Beri tanda centang kotak "Expand widget templates".
6. Trus cari kode berikut ini :
 
<p class='comment-footer'>
<a expr:href='data:post.addCommentUrl' expr:onclick='data:post.addCommentOnclick'>
<data:postCommentMsg/></a>
</p>
</B:if>
 
 
7. Kemudian ganti kode tersebut dengan kode dibawah ini:
 
<p class='comment-footer'>
<B:if cond='data:post.embedCommentForm'>
<B:include data='post' name='comment-form'/>
<B:else/> <B:if cond='data:post.allowComments'>
<a expr:href='data:post.addCommentUrl' expr:onclick='data:post.addCommentOnclick'>
<data:postCommentMsg/></a>
</B:if> </B:if> </p> </B:if>
 
 
8. Lalu simpan template kamu.
 
Semoga Berhasil
FREE Animations for your email - by IncrediMail! Click Here!

Arisan Bulan November 2008

Dear All,

=====================================================
Laporan Hasil Arisan
Hari/Tanggal : Sabtu, 15 November 2008
Waktu : 16.00 WIB
Tempat : Dunkin Dunats Bekasi Cyber Park (BCP)
=====================================================

1. Peserta yang Hadir
Andi Syarifudin (Andi)
Yustina Paghopaty (Tina)
Parmin
Eka Lestari
Maman Lukman
Guest
2. Kegiatan
Arisan Bulanan
Persentasi Andi tentang Software Linux Live CD
Bahas masalah Blog
Bahas Bisnis Sampingan
Bahas Lowongan Kerja
Ngerumpie....
3. The winner of Arisan this Week
Pemenang Arisan Minggu ini Tina sebesar Rp.150.000,000 Rupiah

4. Keuangan

Pemasukan :
Saldo Awal per 14 Nov 2008 Rp. 290.000,-
Kas per 15 Nov 2008 Rp. 100.000,-
===================================
Total Rp. 390.000,-
Pengeluaran :
Green Tea 1 Pcs Rp. 22.000,-
Makan (Padang) Rp. 49.000,-
Dokumentasi (Photo) Rp. 47.000,-
=============================
Total Rp. 118.000,-
Saldo Akhir per 15 Nov 2008 : Rp.390.000 - Rp. 118.000 = Rp. 272.000,-

NB : Untuk yang makan di Dunckin Dunats Green tea, Capucino, Cake, bakery, Dunats
Sebesar Rp. 195.000,- ditraktir Mas Parmin (Moga Usahanya tambah lancar Amin....)

5. Planning Bulan Depan
Workshop membuat jaringan (praktek memotong kabel LAN model straigh Dan Cross (Tina's Request)
6. Dokumentasi
Mohon maaf berhubung filenya guede banget +/- 59 MB, jadi gw Edit ya konsekwensi gambar not good tapi gak jelek2 amat sih..so yang mau cetak cd nya Ada di gw ( 14 photo).
download full disini Dokumentasi Arisan_Full


Thank's

Regards
Share on M@men
E-mail : maman@pt-investa.com ; maluqi82@gmail.com
Blog : http://dunianya-it.blogspot.com




Selasa, 11 November 2008

KODE BABI PADA MAKANAN BERKEMAS

KODE BABI PADA MAKANAN BERKEMAS

Assalamu'alaikum
Oleh Dr.M. Anjad Khan
Salah seorang rekan saya bernama Shaikh Sahib, bekerja sebagai pegawai di
Badan Pengawasan Obat & Makanan (POM) di Pegal, Perancis. Tugasnya,
mencatat semua merk barang, makanan & obat-obatan

Produk apapun yang akan disajikan suatu perusahaan ke pasaran,
bahan-bahan produk tesebut harus terlebih dulu mendapat ijin dari BPOM
Prancis dan Shaikh Sahib bekerja di bagian QC. Tak heran jika ia
mengetahui berbagai macam bahan makanan yang dipasarkan. Banyak dari bahan-bahan tersebut dituliskan dengan istilah ilmiah, namun ada juga beberapa yang dituliskan dalam bentuk matematis seperti E-904, E-141.

Awalnya, saat Shaikh Sahib menemukan bentuk matematis, dia penasaran
lalu menanyakan kode matematis tersebut kepada orang Prancis yang
berwenang dalam bidang itu. Orang Prancis menjawab, Kerjakan saja tugasmu, dan jangan banyak tanya ...!
Jawaban itu, semakin menimbulkan kecurigaan Sahib, lalu ia pun mulai
mencari tahu kode matematis dalam dokumen yang ada. Ternyata, apa yang
dia temukan cukup mengagetkan kaum muslimin dunia. Hampir di seluruh
negara bagian barat, termasuk Eropa pilihan utama untuk daging adalah
daging babi.

Peternakan babi sangat banyak terdapat di negara- negara tersebut. Di
Perancis sendiri jumlah peternakan babi mencapai lebih dari 42.000 unit.
Jumlah kandungan lemak dalam tubuh babi sangat tinggi dibandingkan
dengan hwan lainnya. Namun, orang Eropa & Amerika berusaha menghindari
lemak-lemak itu. Yang menjadi pertanyaan dikemanakan lemak-lemak babi
tersebut ? Babi-babi dipotong di rumah jagal yang diawasi BPOM, tapi
yang bikin pusing POM adalah membuang lemak yang sudah dipisahkan dari daging babi.Dahulu sekitar 60 tahun lalu, lemak-lemak babi itu dibakar. Kini merekapun berpikir untuk memanfaatkan lemak-lemak tersebut. Sebagai awal uji cobanya, mereka membuat sabun dengan bahan lemak babi, dan ternyata
berhasil.

Lemak-lemak itu diproses secara kimiawi, dikemas rapi dan dipasarkan.
Negara di Eropa memberlakukan aturan yang mewajibkan bahan setiap
produk makanan, obat-obatan harus dicantumkan pada kemasan. Karena
itu, bahan
dari lemak babi dicantumkan dengan nama Pig Fat (lemak babi) pada
kemasan produknya. Agar mudah dipasarkan, penulisan lemak babi dalam
kemasan
diganti dengan lemak hewan. Ketika produsen ditanya pihak berwenang
dari negara Islam,
maka dijawab lemak tersebut adalah lemak sapi & domba. Meskipun begitu
lemak-lemak itu haram bagi muslim, karena penyembelihannya tidak sesuai
syariat IslamLabel baru itu dilarang keras masuk negara Islam, akibatnya
produsen menghadapi masalah keuangan sangat serius, karena 75%
penghasilan
mereka diperoleh dengan menjual produk ke negara Islam, mengingat
laba yang
dicapai bisa mencapai miliaran dollar.

Akhirnya, mereka membuat kodifikasi bahasa yang hanya dimengerti BPOM,
sementara orang lain tak ada yang tahu. Kode diawali dengan E ? CODES,
E-INGREDIENTS, ini terdapat dalam produk perusahaan mutinasional,
antara lain :
pasta gigi, pemen karet, cokelat, gula2, biskuit, makanan kaleng,
buah2an kaleng, dan beberapa multivitamin serta masih banyak lagi
jenis makanan
& obat2an lainnya.
Karena itu, saya mohon kepada sesama muslim dimana pun, untuk
memeriksa secara seksama bahan2 produk yang akan kita konsumsi dan
mencocokannya
dengan daftar kode E-CODES, berikut ini karena produk dengan kode-kode
di bawah ini, positif mengandung lemak babi :
E100, E110, E120, E-140, E141, E153, E210, E213, E214, E216, E234,
E252,E270, E280, E325, E326, E327, E337, E422, E430, E431, E432,
E433, E434, E435, E436, E440, E470, E471, E472, E473, E474, E475,
E476, E477, E478, E481, E482,E483, E491, E492, E493, E494, E495,
E542, E570, E572, E631, E635, E904.

Adalah tanggungjawab kita bersama untuk mengikuti syari'at Islam dan
juga memberitahukan informasi ini kepada sesama muslim lainnya
Semoga manfaat,
M. Anjad Khan
Medical Research Institute United States
************ ****
Kalo mo hang out di Starbucks or Coffebean, pikir2 ulang deh
... karena, ternyata semua minuman mengandung elmusifier yang berasal
dari babi. Kalo membeli makanan kita juga gampang mengetahui halal or
haram,
caranya dg melihat ada tidaknya kode E ? trus tiga digit angka
dibelakangnya,
dan itu artinya bahan2 berasal dari lemak babi...
************ ****
Dear all ..
Jika memang emulsifier yang dipake starbuck adalah kode E471 (tidak ada
embel2 lain, misal : lecithin de sojaatau soy lecithin), maka saya
yakni bahwa "origin"nya adalah pork or varken (babi)
Sebenarnya tak hanya E471 tapi juga E472, para keluarga muslim
Groningen the Netherlands & ikatan kel muslim Eropa memperingatkan
kami utk
mengecek content / ingredient emulsifier ini pd setiap produk makanan
yg akan
dibeli. Kami pun sempat kaget, karena emulsifier juga digunakan pada roti
tawar. Karena itu, kami sarankan kpd kel muslim utk pilih roti tawar dg
istilah biological bread (non-chemical additive), tentu saja resikonya
harga
lebih mahal (1/2 blok roti tawar jenis ini hampir 3 X harga roti tawar dg
emulsifier), yang pentingkan halal.
************ ********* *******
FYI ....
E471 biasa dikenal dg sebutan lecithin è originnya merupakan ekstrak
dari tulang babi.
E472 (saya tak ingat nama dagangnya) è originnya adalah ekstrak
tulang babi.
Kedua additive ini merupakan senyawa turunan dr asam lemak (fatty
acid). Biasanya kedua additive ini sangat sering ditemukan pada produk2
berikut :
Produk makanan mengandung cokelat è roti, ice cream, biskuit, dll
Produk makanan yg perlu elmusifier è coklat bar, ice cream, or bulk,
coffee cream, marshmallo, jelly, dsb.
Demikian sekilas info, semoga manfaat
Wallahu'alam bi shawab





Senin, 10 November 2008

Setelah Makan Jangan

7dont's after a meal
7 Larangan setelah makan.

* Don't smoke- Experiment from experts proves that smoking a cigarette after meal is comparable to smoking 10 cigarettes (chances of cancer is higher).
Jangan Merokok - Penelitian dari para ahli membuktikan bahwa merokok sebatang rokok setelah makan sama dengan merokok 10 rokok (kemungkinan terserang kanker lebih besar)

* Don't eat fruits immediately - Immediately eating fruits after meals will cause stomach to be bloated with air.. Therefore take fruit 1-2 hr after meal or 1hr before meal.
Jangan langsung makan buah-buahan - Langsung makan buah-buahan setelah makan akan menyebabkan perut dipenuhi dengan udara. Untuk itu makanlah buah-buahan 1-2 jam setelah makan atau 1 jam sebelum makan

* Don't drink tea - Because tea leaves contain a high content of acid. This substance will cause the Protein content in the food we consume to be hardened thus difficult to digest.
Jangan minum Teh - karena daun teh mengandung kandungan asam yang tinggi. kandungan ini akan menyebabkan kandungan protein pada makanan yang telah kita konsumsi sulit untuk dicerna.

* Don't loosen your belt - Loosening the belt after a meal will easily cause the intestine to be twisted & blocked.
Jangan mengendorkan ikat pinggangmu - Mengendorkan ikat pinggang setelah makan akan menyebabkan usus terbelit dan terblokir.

* Don't bathe - Bathing will cause the increase of blood flow to the hands, legs & body thus the amount of blood around the stomach will therefore decrease. This will weaken the digestive system in our stomach.
Jangan Mandi - Mandi akan menaikan aliran darah ke tangan, kaki dan badan yang menyebabkan jumlah darah sekitar perut akan terus berkurang. Hal ini akan melemahkan system pencernaan di dalam perut kita.

* Don't walk about - People always say that after a meal walk a hundred steps and you will live till 99. In actual fact this is not true. Walking will cause the digestive system to be unable to absorb the nutrition from the food we intake.
Jangan Berjalan-jalan - Orang-orang sering mengatakan bahwa berjalan beberapa langkah setelah makan akan memperpanjang umur. Pada kenyataannya hal ini tidaklah benar. Berjalan akan menyebabkan system pencernaan tidak mampu menyerab nutrisi dari makanan yang telah kita makan.

* Don't sleep immediately - The food we intake will not be able to digest properly. Thus will lead to gastric & infection in our intestine.
Jangan langsung tidur - Makanan yang kita makan tidak dapat dicerna secara baik. Hal ini akan menyebabkan usus mengalami kembung dan peradangan.





Jumat, 07 November 2008

Banyak Personilnya Yang Bunuh Diri, Militer AS Minta Bantuan Pihak Luar

10/30/2008 02:11:00 PM by Cakra
Angkatan darat AS, pada Rabu (29/10) mengumumkan rencana kerjasama dengan Lembaga Kesehatan Mental untuk mengidentifikasi penyebab dan faktor resiko bunuh diri yang terus meningkat dikalangan tentara AS dalam beberapa tahun terakhir.

Dalam keterangannya, Angkatan Darat AS akan mensurvey ribuan tentara untuk dijadikan objek penelitian. Mereka akan diwawancarai untuk memberikan akses data base, termasuk para medis, personil dan sejarah. Objek penelitian nantinya akan meliputi para prajurit yang telah bergabung dalam pelatihan perang dan mereka yang telah kembali dari medan peperangan. Kerjasama identifikasi itu diperlukan guna mengungkap penyebab terus meningkatnya jumlah tentara AS yang melakukan bunuh diri.

Data yang dikeluarkan oleh militer AS, menyebutkan, bunuh diri di kalangan tentara dalam Angkatan Darat terus meningkat sejak invasi Irak tahun 2003. Pada tahun 2007, 115 tentara dilaporkan tewas bunuh diri atau mencapai tingkat 18,1 per 100.000 orang, atau 1 persen lebih rendah dari tingkat bunuh dikalangan penduduk sipil.

Dari 115 tentara, 36 tentara tewas bunuh diri ketika bertugas di luar negeri, 50 tentara telah ditugaskan di beberapa daerah dan dipulangkan, dan 29 belum pernah ditugaskan. Hanya sebagian kecil yang sebelum diagnosa tekanan post trauma kekacauan.

Angka bunuh diri dikalangan militer AS pada tahun 2008 ini diperkirakan akan melebihi jumlahnya pada tahun lalu. Hingga Agustus 2008, sudah terjadi 62 kasus yang telah dikonfirmasi ke Angkatan Darat AS. Sementara,masih ada sekitar 31 kematian lagi yang masih diinvestigasi apakah tewas karena bunuh diri atau tidak.

Menurut Dr S. Ward Cassells, Asisten Sekretaris Pertahanan untuk urusan kesehatan, diantara penyebab utama yang memicu bunuh diri antara lain, masalah perkawinan atau hubungan, pekerjaan miskin kinerja, perasaan kegagalan di medan perang dan alkohol atau penyalahgunaan narkoba.

Sumber: Suara Islam

Deteksi Dini Kanker Usus Besar

Selasa, 3 Oktober, 2006 oleh: eman
Deteksi Dini Kanker Usus Besar
Gizi.net - Sakit perut. Itulah keluhan yang kerap dirasakan Prasetyo, 45 tahun, selama tiga tahun sebelum akhirnya divonis menderita kanker kolorektal (usus besar).

Awalnya, dia dinyatakan dokter menderita radang usus, sehingga hanya diberi obat antiradang, penghilang rasa sakit, dan antibiotik. Namun, obat-obatan itu tak pernah mampu menghilangkan keluhannya secara tuntas. Alhasil, sakit perut itu berulang, dan selalu berulang. Sampai suatu ketika, ia merasakan sakit yang hebat di perutnya.

Prasetyo pun kembali ke dokter. Kali ini, dokter mengatakan, ada perlengketan di usus besarnya sehingga harus dilakukan pembedahan. Sebagian usus besarnya pun dipotong. Selesai masalah? Ternyata tidak. Prasetyo yang perokok berat ini masih sering merasakan sakit di perut. Tubuhnya pun makin kurus, dan kerap mengalami diare. Penyebab dari sakit perut itu akhirnya diketahui lewat pemeriksaan di sebuah rumah sakit besar di Bandung. Kanker dipastikan telah bersarang di usus besar Prasetyo, dan telah mencapai stadium IV. Empat bulan setelah mendengar vonis ini, Prasetyo berpulang untuk selama-lamanya.

Kanker usus besar adalah salah satu jenis kanker yang cukup sering ditemui, utamanya pada pria dan wanita berusia 50 tahun atau lebih. Pada pria, kanker usus besar menempati urutan ketiga sebagai kanker tersering yang ditemui setelah kanker prostat dan paru-paru. Sementara pada wanita, kanker ini pun menempati urutan ketiga setelah kanker payudara dan paru-paru. "Dari berbagai laporan, di Indonesia terdapat kenaikan jumlah kasus (kanker usus besar), meskipun belum ada data yang pasti. Data di Departemen Kesehatan didapati angka 1,8 per 100 ribu penduduk," tutur dokter Adil S Pasaribu, SpB KBD, spesialis bedah dari Rumah Sakit Kanker Dharmais, Jakarta.

Kanker usus besar adalah tumbuhnya sel kanker yang ganas di dalam permukaan usus besar atau rektum. Kebanyakan kanker usus besar berawal dari pertumbuhan sel yang tidak ganas atau adenoma, yang dalam stadium awal membentuk polip (sel yang tumbuh sangat cepat).



Pada stadium awal, adenoma dapat diangkat dengan mudah. Hanya saja pada stdium awal ini, seringkali adenoma tidak menampakkan gejala apapun, sehingga tidak terdeteksi dalam waktu yang relatif lama. Padahal, adenoma yang awalnya tak menimbulkan keluhan apapun ini, pada suatu saat bisa berkembang menjadi kanker yang menggerogoti semua bagian dari usus besar.

Gejala awal yang tidak khas ini membuat banyak penderita kanker usus besar datang ke rumah sakit ketika perjalanan penyakit sudah demikian lanjut. Upaya pengobatan pun menjadi sulit. Padahal, seperti dikatakan Ketua Perhimpunan Spesialis Penyakit Dalam Indonesia, dokter Aru Sudoyo SpPD KHOM, kunci utama keberhasilan penanganan kanker usus besar adalah ditemukannya kanker dalam stadium dini, sehingga terapi dapat dilaksanakan secara bedah kuratif. Sayangnya, hal seperti ini sangat jarang. Yang kerap terjadi adalah kasus seperti dialami Prasetyo, yakni kanker ditemukan pada stadium lanjut, sehingga harapan penderita untuk bertahan hidup menjadi sangat kecil.

Jika kanker usus besar ditemukan pada stadium I, peluang penderita untuk hidup hingga lima tahun mencapai 85-95 persen. Sementara bila ditemukan pada stadium II, peluang itu mencapai 60-80 persen, pada stadium III sekitar 30-60 persen, dan stadium IV sekitar 25 persen. "Ini artinya, bila ada 100 penderita kanker usus besar stadium IV, maka yang masih hidup sampai lima tahun hanya lima orang," ucap Aru.

Deteksi dini
Untuk menghindari kemungkinan terburuk, seperti dialami Prasetyo, deteksi dini merupakan hal yang sangat penting. "Deteksi dini atau skrining terhadap kanker ini, dapat menyelamatkan hidup," tegas Adil.

Dengan deteksi dini dapat ditemukan adanya polip prakanker, yaitu suatu pertumbuan abnormal pada usus besar atau rektum yang dapat segera dibuang sebelum berubah menjadi kanker. "Jika semua orang yang berumur 50 tahun atau lebih melakukan skrining secara teratur, maka sebanyak 60 persen kematian akibat kanker kolorektal dapat dihindari," tuturnya.

Deteksi dini adalah investigasi pada individu asimtomatik (tanpa gejala) yang bertujuan untuk mendeteksi adanya penyakit pada stadium dini sehingga dapat dilakukan terapi kuratif. Secara umum, urai Adil, deteksi dini dapat dilakukan pada dua kelompok, yaitu populasi umum dan kelompok risiko tinggi. Deteksi dini pada kelompok populasi umum dilakukan kepada individu yang berusia di atas 40 tahun. Sedangkan mereka yang tergolong kelompok berisiko tinggi, antara lain adalah mereka yang pernah menjalani polipektomi untuk adenoma di usus besar, dan orang-orang yang berasal dari keluarga dengan riwayat penyakit ini.

Terkait dengan riwayat keluarga, Anda tak perlu khawatir berlebihan jika berasal dari keluarga yang memiliki riwayat kanker usus besar. Menurut Adil, faktor genetik memang bisa menjadi penyebab munculnya penyakit ini, tapi faktor tersebut bisa dipersempit. Caranya, ubahlah pola makan Anda dan lakukan deteksi dini.

Penyebab dan gejala
Sejauh ini, penyebab kanker usus besar memang belum diketahui secara pasti. Hanya saja, ada beberapa hal yang diduga kuat berpotensi memunculkan penyakit ganas ini, yaitu: cara diet yang salah (terlalu banyak mengkonsumsi makanan tinggi lemak dan protein, serta rendah serat), obesitas (kegemukan), pernah terkena kanker usus besar, berasal dari keluarga yang memiliki riwayat kanker usus besar, pernah memiliki polip di usus, umur (risiko meningkat pada usia di atas 50 tahun), jarang melakukan aktivitas fisik, sering terpapar bahan pengawet makanan maupun pewarna yang bukan untuk makanan, dan merokok.

Dalam buku Panduan Pengelolaan Adenokarsinoma Kolorektal disebutkan bahwa meskipun penelitian awal tidak menunjukkan hubungan merokok dengan kejadian kanker usus besar, namun penelitian terbaru menunjukkan, perokok jangka lama (30-40 tahun) mempunyai risiko berkisar 1,5-3 kali. Diperkirakan, satu dari lima kasus kanker usus besar di Amerika Serikat bisa diatributkan kepada perokok. Penelitian kohort dan kasus-kontrol dengan desain yang baik menunjukkan, merokok berhubungan dengan kenaikan risiko terbentuknya adenoma dan juga kenaikan risiko perubahan adenoma menjadi kanker usus besar. "Karena itu untuk mencegah kejadian kejadian kanker usus besar dianjurkan untuk tidak merokok," kata Aru. Mengenai gejala kanker usus besar, Aru menyebut beberapa hal yang kerap dikeluhkan para penderita, yaitu:

* Perdarahan pada usus besar yang ditandai dengan ditemukannya darah pada feses saat buang air besar.
* Perubahan pada fungsi usus (diare atau sembelit) tanpa sebab yang jelas, lebih dari enam minggu.
* Penurunan berat badan tanpa sebab yang jelas.
* Rasa sakit di perut atau bagian belakang.
* Perut masih terasa penuh meskipun sudah buang air besar.
* Rasa lelah yang terus-menerus
* Kadang-kadang kanker dapat menjadi penghalang dalam usus besar yang tampak pada beberapa gejala seperti sembelit, rasa sakit, dan rasa kembung di perut.

Untuk menangani kanker usus besar, menurut Aru, terapi bedah merupakan cara yang paling efektif, utamanya bila dilakukan pada penyakit yang masih terlokalisir. Namun, bila sudah terjadi metastasis (penyebaran), penanganan menjadi lebih sulit. Tetapi, dengan berkembangnya kemoterapi dan radioterapi pada saat ini, memungkinkan penderita stadium lanjut atau pada kasus kekambuhan untuk menjalani terapi adjuvan. Terapi adjuvan adalah kemoterapi yang diberikan setelah tindakan operasi pada pasien kanker stadium III guna membunuh sisa-sisa sel kanker.

Saat ini, terapi adjuvan bisa dilakukan tanpa suntik (infus), melainkan dengan oral/tablet (Capacitabine). Ketersediaan capacitabine tablet memungkinkan pasien untuk menjalani kemoterapi di rumah yang tentu saja efektivitasnya lebih baik. "Capacitabine juga merupakan kemoterapi oral yang aman dan bekerja sampai ke sel kanker," kata Aru yang juga menjabat sebagai ketua Komisi Terapi Adjuvan, Kelompok Kerja Adenokarsinoma Kolorektal Indonesia.

Jurus Menangkal Kanker Usus Besar

Mencegah jauh lebih baik ketimbang mengobati. Hal itu juga berlaku pada kanker usus besar. Agar tak sampai terjamah penyakit mematikan ini, lakukan upaya pencegahan. Simak tips pencegahan dari dokter Adil S Pasaribu SpB KBD berikut ini:
* Hindari makanan tinggi lemak, protein, kalori, serta daging merah. Jangan lupakan konsumsi kalsium dan asam folat.
* Setelah menjalani polipektomi adenoma disarankan pemberian suplemen kalsium.
* Disarankan pula suplementasi vitamin E, dan D.
* Makan buah dan sayuran setiap hari.
* Pertahankan Indeks Massa Tubuh antara 18,5 - 25,0 kg/m2 sepanjang hidup.
* Lakukan aktivitas fisik, semisal jalan cepat paling tidak 30 menit dalam sehari.
* Hindari kebiasaan merokok.
* Segera lakukan kolonoskopi dan polipektomi pada pasien yang ditemukan adanya polip.
* Lakukan deteksi dini dengan tes darah samar sejak usia 40 tahun.
(nri/bur)

Sumber: http://www.republika.co.id/ - Minggu, 01 Oktober 2006

Rabu, 05 November 2008

Arisan Bulan November


Salam Kompak Semua....
Sehubungan dengan banyaknya permintaan, untuk lanjutan arisan, dengan ini saya mau usul neeh mengenai waktu dan tempatnya :
Waktu : Sore setelah ashar
Tanggal : 15 November 2008
Tempat : Bekasi Cyber Park

So, Yang lain juga boleh usul, please comment on tag board or here
(Batas Akhir Kamis, 13 November 2008) Putusannya hari Jum'at 14 Nov 2008



Selasa, 04 November 2008

Hard drive gone bad

The most common problems originate
From corruption of the master boot record, FAT, or directory.
Those are soft problems which can usually be taken care of
With a combination of tools like Fdisk /mbr to refresh the
Master boot record followed by a reboot and Norton disk doctor
Or Spinneret.
The most common hardware problems are a bad controller, a bad
Drive motor, or a bad head mechanism.
1. Can the BIOS see and identify the hard drive correctly? If
It can't, then the hard drives onboard controller is bad.
2. Does the drive spin and maintain a constant velocity? If it
Does, that's good news. The motor is functioning.
3. If the drive surges and dies, the most likely cause is a
Bad controller (assuming the drive is cool). A gate allowing
The current to drive the motor may not be staying open. The
Drive needs a new controller.
4. Do you hear a lot of head clatter when the machine is
Turned on and initialized (but before the system attempts to
Access the hard drive). Head clatter would indicate that the
Spindle bearings are sloppy or worn badly. Maybe even lose and
Flopping around inside.
5. There is always the possibility that the controller you are
Using in the machine has gone south.
 
1. If the drive spins, try booting to the A> prompt, run Fdisk
And check to see if Fdisk can see a partition on the hard
Drive. If Fdisk can see the partition, that means that it can
Access the drive and that the controller electronics are
Functioning correctly. If there is no head clatter, it may be
Just a matter of disk corruption which commonly occurs when a
Surge hits you machine and overwhelms the power supply voltage
Regulator. It commonly over whelms the system electronics
Allowing an EM pulse to wipe out the master boot record, file
Allocations table, and primary directory. Fdisk can fix the
Master boot record and Norton Disk Doctor can restore the FAT
And Directory from the secondaries.
2. The drive spins but Fdisk can't see it. Try the drive in
Another system and repeat the test to confirm that Fdisk can't
Read through the drives onboard controller. If it sees it in
Another system, then your machines hard drive interface is
Bad. You can try an upgraded or replacement controller card
Like a Promise or CMD Technologies (there are others) in you
Machine after disabling the integrated controller in the BIOS,
But if the integrated controller went south, it may just be
Symptomatic of further failures and you'd be wise to replace
The motherboard. Trying the drive in another machine also
Eliminates the variable that your machines 12 volt power
Output being bad
 
3. If you get head clatter but a constant velocity on the
Drive motor (no surging), you might try sticking the hard
Drive in the freezer for about 12 hours. This is an old trick
From back in the days of the MFM/ESDI driver era. This can
Cause the drive components to shrink enough to make the track
Marker align with the tracks. We don't see that kind of
Platter spindle wear much anymore, but back in the old days,
The balancing and bearings weren't as good. Still, under the
Right circumstances, it might help. It would depend on how old
The drive is and how many hours of wear have occurred. You
Have to be quick to get your info off the drive when it works.
Back then, the drives were much smaller, so there wasn't so
Much to copy. So, go after the important data first.
 
4. The drive doesn't spin. Either the onboard controller is
Bad or the motor is bad (assuming you did try the drive in
Another machine). It's time to hit the net and local
Independent shops to see if you can locate another drive of
The same make and model that's good. Since the drive is
Probably an older drive and no longer in distribution, your
Best bet is to find an identical used drive. If you know
Someone with the same make and model, you might be wise to try
And persuade them to sell you their drive with an offer of
Providing them with a free upgraded drive. If you can locate
An identical drive, start with the controller replacement ...
This is the simplest and least invasive. If swapping the
Controller doesn't produce the desire result, you can tear
Into the drive and swap the motors. While you have both drive
Opened up to accomplish this, scrutinize the platters, heads
And armatures. You might even hook the drive up and power it
From a system with both drives attached. This way, you could
See anything that deviates between the actions of both drives
When they are initialized. Swapping patters is unlikely to
Produce any positive result. They are a balanced system like
The tires on your car and I suspect that the balance will be
different for each drive as will other variables.
 
5. There's always Ontrack Corp. who will attempt to recoup
your info starting at $500 and going up from there. They don't
fix and return the drive either.
 
If the info is all that important to you, I would seek some
professional and experience technician in your locality who
makes his living from servicing and building computer systems
... not just selling them. If you have had much experience
salvaging information from bad hard drives, your likelihood of
success is low. In the case of soft corruption, all utilities
have their eccentricities. Often times, Norton Disk Doctor
will go too far (if you let it). It's wise to just let those
utilities small steps and then have a look at the drive and
see if you can copy it off. Norton will go so far as to rename
directories and files, and even delete them or break them up
into fragments which are useless.
FREE Animations for your email - by IncrediMail! Click Here!

Utilizing search engines

 
So much information is on the web, its mind boggling. Thankfully we have search
Engines to sift through them and catagorize them for us. Unfortunatly, there is still so
Much info that even with these search engines, its often a painstakingly slow process
(something comparable to death for a hacker) to find exactly what you're looking for.
Lets get right into it.
I use google.Com as my primary search engine because it presently tops the charts as far as
The sites that it indexes which means more pertinent info per search.
1. Page translation.
Just because someone speaks another language doesn't mean they don't have anything useful to say. I use translation tools like the ones found at
http://world.altavista.com
To translate a few key words I am searching for. Be specific and creative because these tools arent the most accurate things on the planet.
2. Directories.
These days everything is about $$$. We have to deal/w SEO (search engine optimization) which seems like a good idea on paper until you do a search for toys and get 5 pornsites in the first 10 results. Using a sites directory will eliminate that. You can narrow your search down easily by looking for the info in specific catagories. (PS google DOES have directories, they're at: directory.google.Com)
3. Here are some tips that google refers to as "advanced"
A. "xxxx" / will look for the exact phrase. (google isnt case sensitive)
B. -x / will search for something excluding a certain term
C. Filetype:xxx / searches for a particular file extention (exe, mp3, etc)
D. -filetype:xxx / excludes a particular file extention
E. Allinurl:x / term in the URL
F. Allintext:x / terms in the text of the page
G. Allintitle:x / terms in the HTML title of that page
H. Allinanchor:x / terms in the links
4. OR
Self explanatory, one or the other... (I.e.: binder OR joiner)
5. ~X
Synonyms/similar terms (in case you can't think of any yourself)
6. Numbers in a range.
Lets say you're looking for an mp3 player but only want to spend up to $90. Why swim through all the others? MP3 player $0..$90 The 2 periods will set a numeric range to search between. This also works with dates, weights, etc
7. +
Ever type in a search and see something like this:
"The following words are very common and were not included in your search:"
Well, what if those common words are important in your search? You can force google to search through even the common terms by putting a + in front of the denied word.
8. Preferences
It amazes me when I use other peoples PCs that they don't have their google search preferences saved. When you use google as much as I do, who can afford to not have preferences? They're located on the right of the search box, and have several options, though I only find 2 applicable for myself...
A. Open results in new browser
B. Display 10-100 results per page. (I currently use 50 per page, but that's a resolution preference, and 5X's the default)
9. *
Wildcard searches. Great when applied to a previously mentioned method. If you only know the name of a prog, or are looking for ALL of a particular file (I.e.. You're DLing tunes) something like *.mp3 would list every mp3.
10. Ever see this?
"In order to show you the most relevant results, we have omitted some entries very similar to the X already displayed. If you like, you can repeat the search with the omitted results included." The answer is YES. Yes yes yes. Did I mention yes? I meant to.
11. Search EVERYWHERE
Use the engine to its fullest. If you don't find your answer in the web section, try the group section. Hell, try a whole different search engine. Don't limit yourself, because sometimes engines seem to intentionally leave results out.
Ex. Use google, yahoo, and altavista. Search the same terms... Pretty close, right? Now search for Disney death. Funny, altavista has plenty of Disney, but no death...hmmm.
If you've read this far into this tutorial without saying, "Great, a guy that copied a few google help pages and thinks its useful info" then I will show you WHY (besides accuracy, speed, and consistancy finding info on ANYTHING) its nice to know how a search engine works. You combine it/w your knowledge of other protocol.
Example:
Want free music? Free games? Free software? Free movies? God bless FTP! Try this search:
intitle:"Index of music" "rolling stones" mp3
Substitute rolling stones/w your favorite band. No? Try the song name, or another file format. Play with it. Assuming SOMEONE made an FTP and uploaded it, you'll find it.
For example....I wanted to find some Sepultura. If you never heard them before, they're a Brazilian heavy metal band that kicks ass. I started with this:
intitle:"Index of music" "Sepultura" mp3 <-- nothing
intitle:"Index of música" "Sepultura" mp3 <-- nothing
intitle:"Index of musica" "Sepultura" mp3 <-- not good enough
intitle:"Index of music" "Sepultura" * <-- found great stuff, but not enough Sepultura
At this point it occurs to me that I may be missing something, so I try:
intitle:"index of *" "sepultura" mp3 <-- BANG!
(and thats without searching for spelling errors)
Also try inurl:ftp
I find that * works better for me than trying to guess other peoples mis-spellings.
The same method applies for ebooks, games, movies, SW, anything that may be on an FTP site.
I hope you enjoyed this tutorial, and I saw that recently a book and an article was written on the very same topic. I havn't read them as of yet, but check em out, and get back to me if you feel I missed something important and should include anything else.
Intitle:"index of" "google hacks" ebook
Ps. I've said it before, I'll say it again... BE CREATIVE.
You'll be surprised what you can find.
FREE Animations for your email - by IncrediMail! Click Here!

My Baby



Telah Lahir Putra Pertama Kami, Pada :
Hari : sabtu,11 Oktober 2008
Pukul : 18.18 WIB
Berat : 3,1 Kg
Panjang : 47 cm

dan Telah diberi nama M.Royyan Fitra Ramadhan