g

Wednesday, August 31, 2005

"Bunga-Bunga Cinta"

Hmmm.oh...
Dikalaku kesepian
Dihanyut ombak nan resah
kau mengubati kerinduan

Dikalaku keresahan
Dihanyut malam nan gelap
Kau menerangi hidupku

(1)
Kini Segalanya telah berubah
cintaku hanya memori indah
Ku ditinggalkan kesepian
Pilu hatiku
(2)
Kembalilah kepadaku
Selamilah jiwa ini yang terluka
Ikatan kita berdua
(3)
Sayangilah diri ini
Belailah jiwa nan sepi
Kelayuan...Dedaunan keguguran
Dahan nan kerapuhan
Bunga2 cinta...layu dipusara
Hmmm...hmmm...

Dikalaku kerinduan
Dihembus angin nan pilu
Kutatapi wajah dirimu

Dikalaku keseorangan
Di hanyut asmara cinta
Kau membelai jiwaku ini

(repeat1,2,3)

Hanya satu ku pinta oh darimu
Hargailah cinta kita oh..
Gelora menikam jiwa ini
Melanda di hati ini
Deraian cinta yang suci

Misha Omar

"Fiona"

Fiona terciptalah irama cinta ini
Hanya untukmu
Semoga kau dapat memahami
Perasaan hatiku ini

Fiona
Berikan daku setitis kasihmu
Agar hilang dahaga rindu
Bawalah daku ke alam mu
Fiona gadisku

Suaramu bak buluh perindu
Cukup untuk membuatku resah

Fiona
Cintaku adalah milikmu selama-lamanya

Fiona
Bisikan cinta
Akan ku abadikan
Bersama alunan irama ini
Lukisan warna di dalam memori
Ku simpan mekar di taman hatiku

( RAP )
Agar dikau mengerti perasaan hatiku ini
Aku hanyalah penunggu
Menatikan bisikan cintamu
Renunganmu tawa manjamu
Pengubat rinduku
Hadirmu bagai mimpi yang tak dapat ku lupakan

By 4U2C

Funnies !

In an increasingly complex world,
sometimes old question
require new answers.

Tuesday, August 30, 2005

Return To Innocence

Love - Devotion
Feeling - Emotion
Don't be afraid to be weak
Don't be too proud to be strong
Just look into your heart my friend
That will be the return to yourself
The return to innocence.
If you want, then start to laugh
If you must, then start to cry
Be yourself don't hide
Just believe in destiny.
Don't care what people say
Just follow your own way
Don't give up and use the chance
To return to innocence.
That's not the beginning of the end
That's the return to yourself
The return to innocence.

By Enigma.

hub

A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets.

A passive hub serves simply as a conduit for the data, enabling it to go from one device (or segment) to another. So-called intelligent hubs include additional features that enables an administrator to monitor the traffic passing through the hub and to configure each port in the hub. Intelligent hubs are also called manageable hubs.

A third type of hub, called a switching hub, actually reads the destination address of each packet and then forwards the packet to the correct port.

switch

(1) In networks, a device that filters and forwards packets between LAN segments. Switches operate at the data link layer (layer 2) and sometimes the network layer (layer 3) of the OSI Reference Model and therefore support any packet protocol. LANs that use switches to join segments are called switched LANs or, in the case of Ethernet networks, switched Ethernet LANs.

(2) A small lever or button. The switches on the back of printers and on expansion boards are called DIP switches. A switch that has just two positions is called a toggle switch.

(3) Another word for option or parameter -- a symbol that you add to a command to modify the command's behavior.

Love = Beep # 1 ! Beep # 2 !

Dont pretend 2b some1 u r not.
If u eat meat n shes vegetarian,
fess up 2 ur carnivorous ways.
D truth always out eventually,
sooner is better than later.

NIC Broadcomm

http://doc.lld.dk/wiki/BroadcommBCM5700

full-duplex

(adj.) Refers to the transmission of data in two directions simultaneously. For example, a telephone is a full-duplex device because both parties can talk at once. In contrast, a walkie-talkie is a half-duplex device because only one party can transmit at a time.
Most modems have a switch that lets you choose between full-duplex and half-duplex modes. The choice depends on which communications program you are running.

In full-duplex mode, data you transmit does not appear on your screen until it has been received and sent back by the other party. This enables you to validate that the data has been accurately transmitted. If your display screen shows two of each character, it probably means that your modem is set to half-duplex mode when it should be in full-duplex mode.

simplex

Refers to transmission in only one direction. Note the difference between simplex and half-duplex. Half-duplex refers to two-way communications where only one party can transmit at a time. Simplex refers to one-way communications where one party is the transmitter and the other is the receiver. An example of simplex communications is a simple radio, which you can receive data from stations but can't transmit data.

CPR & Bandage..hehe..

http://www.americanheart.org/presenter.jhtml?identifier=3011764
http://www.smith-nephew.com/

Please Spell your Username & password specific by List of countries !

http://en.wikipedia.org/wiki/List_of_countries#A

Free Browser IE Down Load

Mozilla
http://www.mozilla.org/

World Fastest Browser
http://www.avantbrowser.com/

Spread Love

Spread love everywhere you go:
first of all in your own house.
Give love to your children,
to your wife or husband,
to a next door neighbor . . .

Let no one ever come to you
without leaving better and happier.
Be the living expression of God's kindness;

kindness in your face,
kindness in your eyes,
kindness in your smile,
kindness in your warm greeting.

Mother Teresa

softpub.dll

http://www.auditmypc.com/process/softpub.asp

DLL

1) Short for Dynamic Link Library, a library of executable functions or data that can be used by a Windows application. Typically, a DLL provides one or more particular functions and a program accesses the functions by creating either a static or dynamic link to the DLL. A static link remains constant during program execution while a dynamic link is created by the program as needed. DLLs can also contain just data. DLL files usually end with the extension .dll,.exe., drv, or .fon.

A DLL can be used by several applications at the same time. Some DLLs are provided with the Windows operating system and available for any Windows application. Other DLLs are written for a particular application and are loaded with the application.


2) Short for Delay Locked Loop, Delay-Locked Loop (DLL) supports high-bandwidth data rates between devices. These DLLs are circuits that provide zero propagation delay, low-clock skew between output clock signals throughout a device, and advanced clock domain control. These dedicated DLLs can be used to implement several circuits that improve and simplify system level design.

Website

A site (location) on the World Wide Web. Each Web site contains a home page, which is the first document users see when they enter the site. The site might also contain additional documents and files. Each site is owned and managed by an individual, company or organization.

Security

In the computer industry, refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization. Most security measures involve data encryption and passwords. Data encryption is the translation of data into a form that is unintelligible without a deciphering mechanism. A password is a secret word or phrase that gives a user access to a particular program or system.

Browse

(1) In database systems, browse means to view data. Many database systems support a special browse mode , in which you can flip through fields and records quickly. Usually, you cannot modify data while you are in browse mode.

(2) In object-oriented programming languages, browse means to examine data structures.

(3) To view formatted documents. For example, you look at Web pages with a Web browser. Browse is often used to mean the same as surf.

Cookie

A message given to a Web browser by a Web server. The browser stores the message in a text file. The message is then sent back to the server each time the browser requests a page from the server.
Also see session cookie and persistent cookie.

The main purpose of cookies is to identify users and possibly prepare customized Web pages for them. When you enter a Web site using cookies, you may be asked to fill out a form providing such information as your name and interests. This information is packaged into a cookie and sent to your Web browser which stores it for later use. The next time you go to the same Web site, your browser will send the cookie to the Web server. The server can use this information to present you with custom Web pages. So, for example, instead of seeing just a generic welcome page you might see a welcome page with your name on it.

The name cookie derives from UNIX objects called magic cookies. These are tokens that are attached to a user or program and change depending on the areas entered by the user or program.

SSL

(pronounced as separate letters) Short for Secure Sockets Layer, a protocol developed by Netscape for transmitting private documents via the Internet. SSL uses a cryptographic system that uses two keys to encrypt data − a public key known to everyone and a private or secret key known only to the recipient of the message. Both Netscape Navigator and Internet Explorer support SSL, and many Web sites use the protocol to obtain confidential user information, such as credit card numbers.By convention, URLs that require an SSL connection start with https: instead of http:.
Another protocol for transmitting data securely over the World Wide Web is Secure HTTP (S-HTTP). Whereas SSL creates a secure connection between a client and a server, over which any amount of data can be sent securely, S-HTTP is designed to transmit individual messages securely. SSL and S-HTTP, therefore, can be seen as complementary rather than competing technologies. Both protocols have been approved by the Internet Engineering Task Force (IETF) as a standard.

Encryption.

The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text.

There are two main types of encryption: asymmetric encryption
(also called public-key encryption) and symmetric encryption.

High encryption pack.

http://www.microsoft.com/windows/ie/downloads/recommended/128bit/default.mspx

Latency

(1) In general, the period of time that one component in a system is spinning its wheels waiting for another component. Latency, therefore, is wasted time. For example, in accessing data on a disk, latency is defined as the time it takes to position the proper sector under the read/write head.

(2) In networking, the amount of time it takes a packet to travel from source to destination. Together, latency and bandwidth define the speed and capacity of a network.

Down Load Spyware

http://www.microsoft.com/downloads/details.aspx?FamilyID=321cd7a2-6a57-4c57-a8bd-dbf62eda9671&displaylang=en

Telnet 2

http://www.yuki-onna.co.uk/email/pop.html

Bill Gates

"Information technology and business are becoming inextricably interwoven. I don't think anybody can talk meaningfully about one without the talking about the other."

Telnet

(tel´net) (n.) A terminal emulation program for TCP/IP networks such as the Internet. The Telnet program runs on your computer and connects your PC to a server on the network. You can then enter commands through the Telnet program and they will be executed as if you were entering them directly on the server console. This enables you to control the server and communicate with other servers on the network. To start a Telnet session, you must log in to a server by entering a valid username and password. Telnet is a common way to remotely control Web servers.

IT Think !

Restart PC now or later ?
http://www.norton.com/
http://info.ahnlab.com/english/
http://reviews.zdnet.co.uk/software/internet/0,39024165,39163977,00.htm
http://www.astrixsoftware.com/company.asp?sitesec=services

Corp Firewall !
http://www.pandasecurity.com/platinuminfo.htm

Exam !CCSA VPN Certification !
http://www.mmu.edu.my/v4/
http://www.checkpoint.com/services/education/certification/exams/156-210.html
http://www.vpndynamics.com/vpn/certificatetraining/checkpoint/ccsa.asp
http://as.wiley.com/WileyCDA/WileyTitle/productCd-0782141153.html
http://compufield.com/ccsa.html
http://www.htinstitute.com/boot_view.asp?cid=36
http://www.training-classes.com/course_hierarchy/courses/7006_CCSA_-_Checkpoint_Certified_Security_Admin_NG_.php
http://www.simulationexams.com/practice-test/ccsa-ng.htm
http://www.microsoft.com/presspass/newsroom/winxp/08-10winxpstarterfs.mspx
http://msdn.microsoft.com/library/default.asp?url=/library/en-us/qos/qos/basic_qos_operations.asp

The Road Not Taken

The Road Not Taken Two roads diverged in a yellow wood,
And sorry I could not travel both And be one traveller,

long I stood And looked down one as far as I could.
To where it bent in the undergrowth,

Then took the other, as just as fair,
And having perhaps the better claim,

Because it was grassy and wanted wear,
Though as for that,

the passing there Had worn them really about the same,
And both that morning equally lay In leaves no step had trodden black.

Oh,
I kept the first for another day!
Yet knowing how way leads on to way I doubted if I should ever come back.

I shall be telling this with a sigh Somewhere ages and ages hence:
Two roads diverged in a wood,

and I-I took the one less travelled by,
And that has made all the difference.

by Robert Frost.

Robert Orben

If you can laugh together, you can work together.

MTU

Short for Maximum Transmission Unit, the largest physical packet size, measured in bytes, that a network can transmit. Any messages larger than the MTU are divided into smaller packets before being sent.
Every network has a different MTU, which is set by the network administrator. On Windows 95, you can also set the MTU of your machine. This defines the maximum size of the packets sent from your computer onto the network. Ideally, you want the MTU to be the same as the smallest MTU of all the networks between your machine and a message's final destination. Otherwise, if your messages are larger than one of the intervening MTUs, they will get broken up (fragmented), which slows down transmission speeds.

Trial and error is the only sure way of finding the optimal MTU, but there are some guidelines that can help. For example, the MTU of many PPP connections is 576, so if you connect to the Internet via PPP, you might want to set your machine's MTU to 576 too. Most Ethernet networks, on the other hand, have an MTU of 1500, which is the default MTU setting for Windows 95.

Patanjali

"When a gifted team dedicates itself to unselfish trust and combines instinct with boldness and effort, it is ready to climb."

Michael Winner

"A team effort is a lot of people doing what I say."

QoS

Short for Quality of Service, a networking term that specifies a guaranteed throughput level. One of the biggest advantages of ATM over competing technologies such as Frame Relay and Fast Ethernet, is that it supports QoS levels. This allows ATM providers to guarantee to their customers that end-to-end latency will not exceed a specified level.

Bill Gates

"You've got to give great tools to small teams. Pick good people, use small teams, give them excellent tools...so that they are very productive in terms of what they are doing. Make it very clear what they can do to change the spec. Make them feel lik"

Subnet mask

A mask used to determine what subnet an IP address belongs to. An IP address has two components, the network address and the host address. For example, consider the IP address 150.215.017.009. Assuming this is part of a Class B network, the first two numbers (150.215) represent the Class B network address, and the second two numbers (017.009) identify a particular host on this network.
Subnetting enables the network administrator to further divide the host part of the address into two or more subnets. In this case, a part of the host address is reserved to identify the particular subnet. This is easier to see if we show the IP address in binary format. The full address is:

10010110.11010111.00010001.00001001

The Class B network part is:

10010110.11010111

and the host address is

00010001.00001001

If this network is divided into 14 subnets, however, then the first 4 bits of the host address (0001) are reserved for identifying the subnet.

The subnet mask is the network address plus the bits reserved for identifying the subnetwork. (By convention, the bits for the network address are all set to 1, though it would also work if the bits were set exactly as in the network address.) In this case, therefore, the subnet mask would be 11111111.11111111.11110000.00000000. It's called a mask because it can be used to identify the subnet to which an IP address belongs by performing a bitwise AND operation on the mask and the IP address. The result is the subnetwork address: Subnet Mask 255.255.240.000 11111111.11111111.11110000.00000000
IP Address 150.215.017.009 10010110.11010111.00010001.00001001
Subnet Address 150.215.016.000 10010110.11010111.00010000.00000000


The subnet address, therefore, is 150.215.016.000.

Brian Tracy

"Teamwork is so important that it is virtually impossible for you to reach the heights of your capabilities or make the money that you want without becoming very good at it."

NAT

Short for Network Address Translation, an Internet standard that enables a local-area network (LAN) to use one set of IP addresses for internal traffic and a second set of addresses for external traffic. A NAT box located where the LAN meets the Internet makes all necessary IP address translations.
NAT serves three main purposes:

Provides a type of firewall by hiding internal IP addresses
Enables a company to use more internal IP addresses. Since they're used internally only, there's no possibility of conflict with IP addresses used by other companies and organizations.
Allows a company to combine multiple ISDN connections into a single Internet connection.

User Datagram Protocol

Abbreviated UDP, a connectionless protocol that, like TCP, runs on top of IP networks. Unlike TCP/IP, UDP/IP provides very few error recovery services, offering instead a direct way to send and receive datagrams over an IP network. It's used primarily for broadcasting messages over a network.

Robert Orben

"If you can laugh together, you can work together"

Access

(1) To use. For example, programs can access memory , which means they read data from or write data to main memory. A user can access files, directories, computers, or peripheral devices.

(2) More specifically, access often means to read data from or write data to a mass storage device. The time it takes to locate a single byte of information on a mass-storage device is called the access time.

(3) To visit a Web site.

(1) The act of reading data from or writing data to a storage device.

(2) A privilege to use computer information in some manner. For example, a user might be granted read access to a file, meaning that the user can read the file but cannot modify or delete it. Most operating systems have several different types of access privileges that can be granted or denied to specific users or groups of users.

Michael Jordan

"Talent wins games, but teamwork and intelligence wins championships."

intranet

A network based on TCP/IP protocols (an internet) belonging to an organization, usually a corporation, accessible only by the organization's members, employees, or others with authorization. An intranet's Web sites look and act just like any other Web sites, but the firewall surrounding an intranet fends off unauthorized access.
Like the Internet itself, intranets are used to share information. Secure intranets are now the fastest-growing segment of the Internet because they are much less expensive to build and manage than private networks based on proprietary protocols.

Robert Frost

"By working faithfully eight hours a day, you may eventually get to be a boss and work twelve hours a day"

Extranet

A buzzword that refers to an intranet that is partially accessible to authorized outsiders. Whereas an intranet resides behind a firewall and is accessible only to people who are members of the same company or organization, an extranet provides various levels of accessibility to outsiders. You can access an extranet only if you have a valid username and password, and your identity determines which parts of the extranet you can view.
Extranets are becoming a very popular means for business partners to exchange information.

Joe Paterno

"When a team outgrows individual performance and learns team confidence, excellence becomes a reality."

NAT

Short for Network Address Translation, an Internet standard that enables a local-area network (LAN) to use one set of IP addresses for internal traffic and a second set of addresses for external traffic. A NAT box located where the LAN meets the Internet makes all necessary IP address translations.
NAT serves three main purposes:

Provides a type of firewall by hiding internal IP addresses
Enables a company to use more internal IP addresses. Since they're used internally only, there's no possibility of conflict with IP addresses used by other companies and organizations.
Allows a company to combine multiple ISDN connections into a single Internet connection.

Vince Lombardi

"Build for your team a feeling of oneness, of dependence on one another and of strength to be derived by unity."

PPTP

Short for Point-to-Point Tunneling Protocol, a new technology for creating Virtual Private Networks (VPNs) , developed jointly by Microsoft Corporation, U.S. Robotics, and several remote access vendor companies, known collectively as the PPTP Forum. A VPN is a private network of computers that uses the public Internet to connect some nodes. Because the Internet is essentially an open network, the Point-to-Point Tunneling Protocol (PPTP) is used to ensure that messages transmitted from one VPN node to another are secure. With PPTP, users can dial in to their corporate network via the Internet.

Henry Ford

"If everyone is moving forward together, then success takes care of itself."

Peering

A relationship between two or more small- or medium-sized ISPs in which the ISPs create a direct link between each other and agree to forward each other's packets directly across this link instead of using the standard Internet backbone. For example, suppose a client of ISP X wants to access a web site hosted by ISP Y. If X and Y have a peering relationship, the HTTP packets will travel directly between the two ISPs. In general, this results in faster access since there are fewer hops. And for the ISPs, it's more economical because they don't need to pay fees to a third-party Network Service Provider (NSP).

Bill Bradley

"Respect your fellow human being, treat them fairly, disagree with them honestly, enjoy their friendship, explore your thoughts about one another candidly, work together for a common goal and help one another achieve it."

RJ-45

Short for Registered Jack-45, an eight-wire connector used commonly
to connect computers onto a local-area networks (LAN), especially
Ethernets. RJ-45 connectors look similar to the ubiquitous RJ-11
connectors used for connecting telephone equipment, but they are
somewhat wider.

Mahatma Gandhi

"I offer you peace. I offer you love. I offer you friendship. I see your beauty. I hear your need. I feel your feelings. My wisdom flows from the Highest Source. I salute that Source in you. Let us work together for unity and love."

USB

Short for Universal Serial Bus, an external bus standard that supports
data transfer rates of 12 Mbps. A single USB port can be used to
connect up to 127 peripheral devices, such as mice, modems, and keyboards.
USB also supports Plug-and-Play installation and hot plugging.
Starting in 1996, a few computer manufacturers started including
USB support in their new machines. It wasn't until the release of
the best-selling iMac in 1998 that USB became widespread.
It is expected to completely replace serial and parallel ports.

Thomas Alva Edison.

"Genius is one percent inspiration and ninety-nine percent perspiration."

Port

(1) An interface on a computer to which you can connect a device.
Personal computers have various types of ports. Internally,
there are several ports for connecting disk drives, display screens,
and keyboards. Externally, personal computers have ports for connecting
modems, printers, mice, and other peripheral devices.

Almost all personal computers come with a serial RS-232C port or
RS-422 port for connecting a modem or mouse and a parallel port
for connecting a printer. On PCs, the parallel port is a Centronics
interface that uses a 25-pin connector.

SCSI (Small Computer System Interface) ports support higher
transmission speeds than do conventional ports and enable
you to attach up to seven devices to the same port.

(2) In TCP/IP and UDP networks, an endpoint to a logical connection.
The port number identifies what type of port it is. For example,
port 80 is used for HTTP traffic. Also see Well-Known
TCP Port Numbers in the Quick Reference section of Webopedia.

(v.) To move a program from one type of computer to another.
To port an application, you need to rewrite sections that are
machine dependent, and then recompile the program on the new computer.
Programs that can be ported easily are said to be portable.

Team work

"Teamwork is the ability to work together toward a common vision. The ability to direct individual accomplishments toward organizational objectives. It is the fuel that allows common people to attain uncommon results."

Spam

Electronic junk mail or junk newsgroup postings. Some people define
spam even more generally as any unsolicited e-mail. However, if a
long-lost brother finds your e-mail address and sends you a message,
this could hardly be called spam, even though it's unsolicited.
Real spam is generally e-mail advertising for some product sent
to a mailing list or newsgroup.
In addition to wasting people's time with unwanted e-mail, spam
also eats up a lot of network bandwidth. Consequently, there are
many organizations, as well as individuals, who have taken it upon
themselves to fight spam with a variety of techniques. But because
the Internet is public, there is really little that can be done
to prevent spam, just as it is impossible to prevent junk mail.
However, some online services have instituted policies to prevent
spammers from spamming their subscribers.

There is some debate about the source of the term, but the generally
accepted version is that it comes from the Monty Python song,
"Spam spam spam spam, spam spam spam spam, lovely spam, wonderful spam…"
Like the song, spam is an endless repetition of worthless text.
Another school of thought maintains that it comes from the
computer group lab at the University of Southern California
who gave it the name because it has many of the same characteristics
as the lunchmeat Spam:

Nobody wants it or ever asks for it.
No one ever eats it; it is the first item to be pushed to the
side when eating the entree.

Sometimes it is actually tasty, like 1% of junk mail that is
really useful to some people.

Henry Ford

"Coming together is a beginning. Keeping together is progress. Working together is success."

MP3

The name of the file extension and also the name of the type of
file for MPEG, audio layer 3. Layer 3 is one of three coding
schemes (layer 1, layer 2 and layer 3) for the compression of
audio signals. Layer 3 uses perceptual audio coding and
psychoacoustic compression to remove all superfluous
information (more specifically, the redundant and
irrelevant parts of a sound signal. The stuff the
human ear doesn't hear anyway). It also adds a MDCT
(Modified Discrete Cosine Transform) that implements
a filter bank, increasing the frequency resolution
18 times higher than that of layer 2.

The result in real terms is layer 3 shrinks the original
sound data from a CD (with a bit rate of 1411.2 kilobits
per one second of stereo music) by a factor of 12
(down to 112-128kbps) without sacrificing sound quality.

Because MP3 files are small, they can easily be transferred
across the Internet.

Margaret Thatcher

"Disciplining yourself to do what you know is right and importance, although difficult, is the highroad to pride, self-esteem, and personal satisfaction."

IRC

Short for Internet Relay Chat, a chat system developed by
Jarkko Oikarinen in Finland in the late 1980s. IRC has become
very popular as more people get connected to the Internet
because it enables people connected anywhere on the Internet
to join in live discussions. Unlike older chat systems,
IRC is not limited to just two participants.
To join an IRC discussion, you need an IRC client and Internet access.
The IRC client is a program that runs on your computer and sends
and receives messages to and from an IRC server. The IRC server,
in turn, is responsible for making sure that all messages are
broadcast to everyone participating in a discussion.
There can be many discussions going on at once;
each one is assigned a unique channel.

Simone Weil

"The intelligent man who is proud of his intelligence is like the condemned man who is proud of his large cell"

peer-to-peer architecture

Often referred to simply as peer-to-peer, or abbreviated P2P,
a type of network in which each workstation has equivalent
capabilities and responsibilities. This differs from client/server
architectures, in which some computers are dedicated to serving
the others.

Peer-to-peer networks are generally simpler,
but they usually do not offer the same
performance under heavy loads.

Charleszetta Waddles

"You can't give people pride, but you can provide the kind of understanding that makes people look to their inner strengths and find their own sense of pride"

proxy server

A server that sits between a client application, such as a Web browser,
and a real server. It intercepts all requests to the real server to see
if it can fulfill the requests itself. If not, it forwards the request
to the real server.

Proxy servers have two main purposes:

Improve Performance: Proxy servers can dramatically improve performance
for groups of users. This is because it saves the results of
all requests for a certain amount of time. Consider the case
where both user X and user Y access the World Wide Web through
a proxy server. First user X requests a certain Web page,
which we'll call Page 1. Sometime later, user Y requests the same page.
Instead of forwarding the request to the Web server where Page 1
resides, which can be a time-consuming operation, the proxy server
simply returns the Page 1 that it already fetched for user X.
Since the proxy server is often on the same network as the user,
this is a much faster operation.

Real proxy servers support hundreds or thousands of users.
The major online services such as Compuserve and America Online,
for example, employ an array of proxy servers.

Filter Requests: Proxy servers can also be used to filter requests.
For example, a company might use a proxy server to prevent its
employees from accessing a specific set of Web sites.

Gary Ryan Blair

Discipline is based on pride, on meticulous attention to details,
and on mutual respect and confidence. Discipline must be a habit so
ingrained that it is stronger than the excitement of the goal
or the fear of failure

CPU

Abbreviation of central processing unit, and pronounced as separate
letters. The CPU is the brains of the computer. Sometimes referred
to simply as the processor or central processor, the CPU is where
most calculations take place. In terms of computing power, the CPU
is the most important element of a computer system.

On large machines, CPUs require one or more printed circuit boards.
On personal computers and small workstations, the CPU is housed
in a single chip called a microprocessor.

Two typical components of a CPU are:

The arithmetic logic unit (ALU), which performs arithmetic and
logical operations.

The control unit, which extracts instructions from memory and decodes
and executes them, calling on the ALU when necessary.

Paul Bryant

"Show class, have pride, and display character. If you do, winning takes care of itself."

Trojan horse

A destructive program that masquerades as a benign application.
Unlike viruses, Trojan horses do not replicate themselves but
they can be just as destructive. One of the most insidious types
of Trojan horse is a program that claims to rid your computer
of viruses but instead introduces viruses onto your computer.

The term comes from the a Greek story of the Trojan War,
in which the Greeks give a giant wooden horse to their foes,
the Trojans, ostensibly as a peace offering. But after the Trojans
drag the horse inside their city walls, Greek soldiers sneak out
of the horse's hollow belly and open the city gates, allowing their
compatriots to pour in and capture Troy.

Walter Winchell

"A real friend is one who walks in when the rest of the world walks out."

Benjamin Franklin

He that falls in love with himself will have no rivals."

hybrid routing protocol

Hybrid Routing, commonly referred to as balanced-hybrid routing,
is a combination of distance-vector routing, which works by sharing
its knowledge of the entire network with its neighbors and
link-state routing which works by having the routers tell
every router on the network about its closest neighbors.

Hybrid Routing is a third classification of routing algorithm.
Hybrid routing protocols use distance-vectors for more accurate
metrics to determine the best paths to destination networks,
and report routing information only when there is a change in
the topology of the network. Hybrid routing allows for rapid
convergence but requires less processing power and memory as
compared to link-state routing.

A perfect example of a hybrid routing protocol is the Enhanced
Interior Gateway Routing Protocol (EIGRP), developed by Cisco.

Carl Jung

Through pride we are ever deceiving ourselves.
But deep down below the surface of the average
conscience a still, small voice says to us,
something is out of tune."

spyware

Any software that covertly gathers user information through
the user's Internet connection without his or her knowledge,
usually for advertising purposes. Spyware applications are typically
bundled as a hidden component of freeware or shareware programs
that can be downloaded from the Internet; however, it should be
noted that the majority of shareware and freeware applications
do not come with spyware. Once installed, the spyware monitors
user activity on the Internet and transmits that information
in the background to someone else. Spyware can also gather
information about e-mail addresses and even passwords and
credit card numbers.

Spyware is similar to a Trojan horse in that users unwittingly
install the product when they install something else.
A common way to become a victim of spyware is to download
certain peer-to-peer file swapping products that are available today.

Aside from the questions of ethics and privacy, spyware steals
from the user by using the computer's memory resources and also
by eating bandwidth as it sends information back to
the spyware's home base via the user's Internet connection.
Because spyware is using memory and system resources,
the applications running in the background can lead to
system crashes or general system instability.

Because spyware exists as independent executable programs,
they have the ability to monitor keystrokes, scan files on
the hard drive, snoop other applications, such as chat programs
or word processors, install other spyware programs, read cookies,
change the default home page on the Web browser, consistently
relaying this information back to the spyware author who will
either use it for advertising/marketing purposes or sell
the information to another party.

Licensing agreements that accompany software downloads sometimes
warn the user that a spyware program will be installed along with
the requested software, but the licensing agreements may not
always be read completely because the notice of a spyware
installation is often couched in obtuse,
hard-to-read legal disclaimers.

SURATAN TAKDIR

Kesukaran melafazkan
Pengucapan perpisahan
Kepada yang setia

Tapi terpaksa ku lakukan
Kerana ku tidak mahu
Terus berpura-pura

*Chorus
Usahlah ku disalahkan
Terjadinya perpisahan ini
Itu suratan takdir

Tak terlintas dihati ini
Untuk aku jatuh cinta lagi
Tapi takdir yang menentukan

Memang pernah ku berjanji
Kau yang pertama dan terakhir
Tetapi aku memungkiri
Tidak dapat ku terima
Dua cinta di dalam hati
Maafkanlah ku sayang
(solo) ulang*

By Gersang

Funniest !

I recommend a balanced portfolio: 50 % invested on my advice and 50 % invested
on the advice of any idiot on the street.

Monday, August 29, 2005

OSI

(1) (pronounced as separate letters) Short for Open System Interconnection, an ISO standard for worldwide communications that defines a networking framework for implementing protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one station, proceeding to the bottom layer, over the channel to the next station and back up the hierarchy.

At one time, most vendors agreed to support OSI in one form or another, but OSI was too loosely defined and proprietary standards were too entrenched. Except for the OSI-compliant X.400 and X.500 e-mail and directory standards, which are widely used, what was once thought to become the universal communications standard now serves as the teaching model for all other protocols.

Most of the functionality in the OSI model exists in all communications systems, although two or three OSI layers may be incorporated into one.

OSI is also referred to as the OSI Reference Model or just the OSI Model.

Do not be fool by the title!

http://www.wown.com/j%5Fhelmig/

RAD network for beginner..

http://www2.rad.com/

Reports !

http://www.dslreports.com/

Joseph kallinger

"Oh, what ecstasy setting fires brings to my body!
What power I feel at the thought of fire!
...Oh, what pleasure, what heavenly pleasure!"

MCMC !

http://www.cmc.gov.my/

redtone ISP

http://redtone.com/index.php

check on spamhaus ?

http://www.dnsstuff.com/

spamhaus

http://www.spamhaus.org/

spamililator

http://www.spamihilator.com/

antivir

http://www.antivir.de/

AVG

http://free.grisoft.com/doc/1

sygate firewall

http://www.sygate.com/

Zone - alarm fire wall..

http://www.download.com/3000-2092-10039884.html

Edgar Watson Howe

"Don't abuse your friends and expect them to consider it criticism."

Scan,clean & secure !

http://www.lavasoft.com/

Stopping by Woods on a Snowy Evening.

Whose woods these are I think I know;
His house is in the village, though.
He will not see me stopping here
To watch his woods fill up with snow.

My little horse must think it queer
To stop without a farmhouse near
Between the woods and frozen lake
The darkest evening of the year.

He gives his harness bells a shake
To ask if there is some mistake.
The only other sound's the sweep
Of easy wind and downy flake.

The woods are lovely, dark and deep
But I have promises to keep
And miles to go before I sleep,
And miles to go before I sleep.

by Robert Frost

ISP in IT Glossary

Short for Internet Service Provider, a company that provides access to the Internet. For a monthly fee, the service provider gives you a software package, username, password and access phone number. Equipped with a modem, you can then log on to the Internet and browse the World Wide Web and USENET, and send and receive e-mail.
In addition to serving individuals, ISPs also serve large companies, providing a direct connection from the company's networks to the Internet. ISPs themselves are connected to one another through Network Access Points (NAPs).

search engine 2

http://www.killerinfo.co.uk/

Ask

http://www.ask.com/

search engine..

http://www.altavista.com/

Apple...

http://www.apple.com/

Albert Eistein

"Imagination is more important than knowledge."

MS VPN

http://search.microsoft.com/search/results.aspx?st=b&na=88&View=en-us&qu=unable+to+setup+VPN

VPN

http://support.uchicago.edu/docs/network/vpn/vpn.html

http

Short for HyperText Transfer Protocol, the underlying protocol used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. For example, when you enter a URL in your browser, this actually sends an HTTP command to the Web server directing it to fetch and transmit the requested Web page.
The other main standard that controls how the World Wide Web works is HTML, which covers how Web pages are formatted and displayed.

HTTP is called a stateless protocol because each command is executed independently, without any knowledge of the commands that came before it. This is the main reason that it is difficult to implement Web sites that react intelligently to user input. This shortcoming of HTTP is being addressed in a number of new technologies, including ActiveX, Java, JavaScript and cookies

Funnies!

Ask uncle louie to do that trick where he pulls a
silver dollar out of your ear.get him to repeat
it 60,000 times and you can go to college!

Sunday, August 28, 2005

The Scent Of The Rose

Let Fate do her worst;
there are relics of joy,
Bright dreams of the past,
which she cannot destroy;
Which come in the night-time
of sorrow and care,
And bring back the features
that joy used to wear.
Long, long be my heart
with such memories filled,
Like the vase in which roses
have once ben distilled.
You may break,
you may shatter the vase
if you will,
But the scent of the roses
will hang round it still.
Thomas Moore

PC in IT Glossary

(1) Short for personal computer or IBM PC. The first personal computer
produced by IBM was called the PC, and increasingly the term PC came
to mean IBM or IBM-compatible personal computers, to the exclusion of
other types of personal computers, such as Macintoshes.
In recent years, the term PC has become more and more difficult
to pin down. In general, though, it applies to any personal computer
based on an Intel microprocessor, or on an Intel-compatible
microprocessor. For nearly every other component, including
the operating system, there are several options, all of which
fall under the rubric of PC

(2) PC can stand for printed circuit, so a PC board is a printed
circuit board.

Edmund Spenser

Gather the rose of love whilst yet is time.

Reboot in IT Glossary

To restart a computer. In DOS, you can reboot by pressing the Alt,
Control and Delete keys simultaneously. This is called a warm boot.
You can also perform a cold boot by turning the computer off and
then on again.

On Macs, you reboot by selecting the "Restart" option from the
Special menu.

William Butler Yeats

I cast my heart into my rhymes,
That you, in the dim coming times,
May know how my heart went with them
After the red-rose-bordered hem.

Prompt in IT Glossary

A symbol on a display screen indicating that the computer is waiting
for input. Once the computer has displayed a prompt, it waits for you
to enter some information. Generally, it will wait forever, but some
programs have built-in time-outs that cause the program to continue
execution after it has waited a specified amount of time.

Ernest Dowson

They are not long,
the weeping and the laughter,
Love and desire and hate:
I think they
have no portion in us after
We pass the gate.
They are not long,
the days of wine and roses:
Out of a misty dream
Our path emerges for a while,
then closes
Within a dream.

Command in IT Glossary

An instruction to a computer or device to perform a specific task.
Commands come in different forms. They can be:
special words (keywords) that a program understands.
function keys choices in a menu buttons or other graphical
objects on your screen Every program that interacts with people
responds to a specific set of commands.
The set of commands and the syntax for entering them is
called the user interface and varies from one program to another.

The DOS operating system makes a distinction between internal
and external commands. Internal commands are commands,
such as COPY and DIR, that can be handled by
the COMMAND.COM program. External commands
include the names of all other COM files,
as well as EXE and BAT files.

Another word for command is directive.

icon in IT Glossary

A small picture that represents an object or program.
Icons are very useful in applications that use windows,
because with the click of a mouse button you can shrink
an entire window into a small icon.
(This is sometimes called minimizing.)
To redisplay the window, you merely move
the pointer to the icon and click
(or double click) a mouse button.
(This is sometimes called restoring or maximizing)
Icons are a principal feature of graphical user interfaces.

Robert Burns

Oh, my luve’s like a red, red rose,
That ’s newly sprung in June;
Oh, my luve’s like the melodie
That’s sweetly played in tune.

Event in IT Glossary

(n.) An action or occurrence detected by a program. Events can be user
actions, such as clicking a mouse button or pressing a key, or system
occurrences, such as running out of memory. Most modern applications,
particularly those that run in Macintosh and Windows environments,
are said to be event-driven, because they are designed to respond
to events.

Edmund Spenser

Roses red and violets blew, And all the sweetest flowres that in the forrest grew.

Benchmark in IT Glossary

A test used to compare performance of hardware and/or software.
Many trade magazines have developed their own benchmark tests,
which they use when reviewing a class of products. When comparing
benchmark results, it is important to know exactly what
the benchmarks are designed to test. A benchmark that
tests graphics speed, for example, may be irrelevant
to you if the type of graphical applications you
use are different from those used in the test.

John Boyle O’Reilly

The red rose whispers of passion,
And the white rose breathes of love;
O, the red rose is a falcon,
And the white rose is a dove.

IT in IT Glossary

Short for Information Technology, and pronounced as separate letters,
the broad subject concerned with all aspects of managing and
processing information, especially within a large organization
or company. Because computers are central to information management,
computer departments within companies and universities
are often called IT departments. Some companies refer
to this department as IS (Information Services) or MIS
(Management Information Services).

wizard
(1) A utility within an application that helps you use the application
to perform a particular task. For example, a "letter wizard" within a
word processing application would lead you through the steps of
producing different types of correspondence.

(2) An outstanding programmer. Also called a super- programmer.
Common wisdom holds that one wizard is worth ten average programmers.

(3) The system administrator for a chat room or MUD.

Christopher Marlowe

And I will make thee beds of roses
And a thousand fragrant posies.

Website used to hmm..visit See! 15..

Ahawsks!Music by Burn CD ..Doll!Yeah!
http://www.lyricsdownload.com/

New PC & Modem ? Gosh! Fantastic !
http://www.benq.com.my/
http://www.bluedot.com.my/

ICQ in IT Grossary

An easy-to-use online instant messaging program developed
by Mirabilis LTD. Prounounced as separate letters, so that
it sounds like "I-Seek-You," ICQ is similar to America OnLine's
popular Buddy List and Instant Messenger programs. It is used as
a conferencing tool by individuals on the Net to chat, e-mail,
perform file transfers, play computer games, and more.

Once you have downloaded and installed ICQ onto your PC,
you can create a list of friends, family, business associates,
etc. (who also have ICQ on their PC's). ICQ uses this list to
find your friends for you, and notifies you once they have
signed onto the Net. You can then send messages, chat in real time,
play games, etc.

Langit Ke 7

dulu kau pernah berkata
andai kata kita bercinta
akan kau bina
mahligai yang terapung
di langit ketujuh
sememangnya seakan
khayalan belaka
aku tak percaya

kata katamu hanya mimpi
di siang hari
kemarau panjang
berpanas jua
berteduh tidak

hati kecil tak memahami
mahligai itu
ada disyurga
terangilah mata hati
agar dapat ku mengerti

Sharifah Zarina

Franklin P. Adams

"I find that a great part of the information I have was acquired
by looking up something and finding something else on the way."

SDSL in IT Glossary

Short for symmetric digital subscriber line, a technology that allows
more data to be sent over existing copper telephone lines (POTS).
SDSL supports data rates up to 3 Mbps.
SDSL works by sending digital pulses in the high-frequency area of
telephone wires and can not operate simultaneously with voice
connections over the same wires.

SDSL requires a special SDSL modem. SDSL is called symmetric
because it supports the same data rates for upstream and
downstream traffic. A similar technology that supports
different data rates for upstream and downstream data
is called asymmetric digital subscriber line (ADSL).
ADSL is more popular in North America, whereas SDSL is
being developed primarily in Europe.

symmetric
having similarity in size, shape,
and relative position of corresponding parts.

Cesare Pavese

"No woman marries for money; they are all clever enough,
before marrying a millionaire, to fall in love with him first."

ADSL in IT Glossary

Short for asymmetric digital subscriber line, a new technology
that allows more data to be sent over existing copper telephone lines
(POTS). ADSL supports data rates of from 1.5 to 9 Mbps when receiving
data (known as the downstream rate) and from 16 to 640 Kbps when
sending data (known as the upstream rate).

ADSL requires a special ADSL modem.

ADSL is growing in popularity as more areas around the
world gain access.

Naguib Mahfouz

"You can tell whether a man is clever by his answers. You can tell
whether a man is wise by his questions."

xDSL in IT Glossary

Refers collectively to all types of digital subscriber lines,
the two main categories being ADSL and SDSL. Two other types
of xDSL technologies are High-data-rate DSL (HDSL) and Very
high DSL (VDSL).
DSL technologies use sophisticated modulation schemes to pack
data onto copper wires. They are sometimes referred to as
last-mile technologies because they are used only for connections
from a telephone switching station to a home or office, not between
switching stations.

xDSL is similar to ISDN inasmuch as both operate over existing
copper telephone lines (POTS) and both require the short runs
to a central telephone office (usually less than 20,000 feet).
However, xDSL offers much higher speeds - up to 32 Mbps for
upstream traffic, and from 32 Kbps to over 1 Mbps for downstream
traffic.

Johann Wolfgang von Goethe

"First and last, what is demanded of genius is love of truth."

operating system in IT Glossary

The most important program that runs on a computer. Every
general-purpose computer must have an operating system to
run other programs. Operating systems perform basic tasks,
such as recognizing input from the keyboard, sending output
to the display screen, keeping track of files and directories
on the disk, and controlling peripheral devices such as disk drives
and printers.
For large systems, the operating system has even greater
responsibilities and powers. It is like a traffic cop --
it makes sure that different programs and users running
at the same time do not interfere with each other.
The operating system is also responsible for security,
ensuring that unauthorized users do not access the system.

Operating systems can be classified as follows:

multi-user : Allows two or more users to run programs at the same time.
Some operating systems permit hundreds or even thousands of concurrent
users.
multiprocessing : Supports running a program on more than one CPU.
multitasking : Allows more than one program to run concurrently.
multithreading : Allows different parts of a single program to run
concurrently.
real time: Responds to input instantly. General-purpose
operating systems, such as DOS and UNIX, are not real-time.
Operating systems provide a software platform on top of which
other programs, called application programs, can run.
The application programs must be written to run on top
of a particular operating system. Your choice of operating system,
therefore, determines to a great extent the applications you can run.
For PCs, the most popular operating systems are DOS, OS/2, and Windows,
but others are available, such as Linux.

As a user, you normally interact with the operating system through a
set of commands. For example, the DOS operating system contains
commands such as COPY and RENAME for copying files and changing
the names of files, respectively. The commands are accepted and
executed by a part of the operating system called the command
processor or command line interpreter. Graphical user interfaces
allow you to enter commands by pointing and clicking at objects
that appear on the screen.

Jane Ellice Hopkins

"Gift, like genius, I often think only means
an infinite capacity for taking pains"

client in IT Glossary

(klī´&nt) (n.) The client part of a client-server architecture.
Typically, a client is an application that runs on a personal
computer or workstation and relies on a server to perform some
operations. For example, an e-mail client is an application
that enables you to send and receive e-mail.

Lord Byron quotes

"Talent may be in time forgiven, but genius never"

network interface card in IT Glossary

Often abbreviated as NIC, an expansion board you insert into
a computer so the computer can be connected to a network.
Most NICs are designed for a particular type of network,
protocol, and media, although some can serve multiple networks.

Ralph Waldo Emerson

"Common sense is as rare as genius, - is the basis of genius"

open in IT Glossary

(v) To make an object accessible. Whenever you access a file
(that is, you edit a text file or run a program file),
the operating system opens the file. Opening a file can
be simple or complex depending on the operating system.
For example, in a multiprocessing operating system,
in which different users can share the same resources,
the operating system must decide whether the file can
be accessed simultaneously by more than one user, and if so,
it must ensure that different users do not try to modify
the file's contents at the same time.

(adj) Accessible. When used to describe designs or architectures,
open means public. See under open architecture.

William James

"The essence of genius is to know what to overlook."

OEM in IT Glossary

(pronounced as separate letters) Short for original equipment
manufacturer, which is a misleading term for a company that has
a special relationship with computer producers. OEMs buy computers
in bulk and customize them for a particular application.
They then sell the customized computer under their own name.
The term is really a misnomer because OEMs are not the original
manufacturers -- they are the customizers.
Contrast with IHV.

William Crashaw

"When human power becomes so great and original that we can account
for it only as a kind of divine imagination, we call it genius"

IP in IT Glossary

(pronounced as separate letters) Short for Internet Protocol.
IP specifies the format of packets, also called datagrams,
and the addressing scheme. Most networks combine IP with a
higher-level protocol called Transmission Control Protocol (TCP),
which establishes a virtual connection between a destination and
a source.

IP by itself is something like the postal system. It allows you
to address a package and drop it in the system, but there's no direct
link between you and the recipient. TCP/IP, on the other hand,
establishes a connection between two hosts so that they can
send messages back and forth for a period of time.

The current version of IP is IPv4. A new version, called IPv6 or IPng,
is under development.

Henri Frederic Amiel

"Women wish to be loved without a why or a wherefore;
not because they are pretty, or good, or well-bred,
or graceful, or intelligent,but because they are themselves."

TCP in IT Glossary

Abbreviation of Transmission Control Protocol, and pronounced as
separate letters. TCP is one of the main protocols in TCP/IP networks.
Whereas the IP protocol deals only with packets, TCP enables two hosts
to establish a connection and exchange streams of data. TCP guarantees
delivery of data and also guarantees that packets will be delivered
in the same order in which they were sent.

Famous quotes with intelligent

"Nobody loves a woman because she is handsome or ugly,
stupid or intelligent. We love because we love."

Anonymous

PPPoE in IT Glossary

Acronym for Point-to-Point Protocol over Ethernet.
PPPoE relies on two widely accepted standards:
PPP and Ethernet. PPPoE is a specification for
connecting the users on an Ethernet to the
Internet through a common broadband medium,
such as a single DSL line, wireless device or cable modem.
All the users over the Ethernet share a common connection,
so the Ethernet principles supporting multiple users in a LAN
combine with the principles of PPP,
which apply to serial connections.

Ralph Waldo Emerson

"To laugh often and much; to win the respect of intelligent people
and the affection of children...to leave the world a better place
...to know even one life has breathed easier because you have lived.
This is to have succeeded."

G.lite in IT Glossary

G.lite (also known as Universal ADSL, and referred to as G.992.2
by the ITU ), allows for high-speed "always on" digital communications
over standard copper phone lines.

While it is based on the same underlying technology as standard ADSL,
G.lite doesn't require a splitter to be installed at the customer
location. The customer simply connects the G.Lite modem --
the same way he'd hook-up an analog modem --
after he signs up for the service.


Unlike standard ADSL, G.lite works with DLC
(Digital Loop Carrier - the local loop
infrastructure that connects customers
located more than 18,000 feet from the central office),
which opens the technology to a much wider audience.
The tradeoff for the increased availability
of G.lite is lower speed. While standard or full-rate
ADSL provides downstream speeds of up to 8-Mbps and
upstream speeds of 1.5-Mbps, G.lite is limited to

1.5-Mbps downstream and 512-Kbps upstream.

VPI in IT Glossary

Short for virtual path identifier, an eight-bit field in an ATM
cell’s header that identifies the virtual path
(a bundle of virtual channels that have the same endpoint)
to which the cell belongs as it travels through an ATM network.

Also see VCI. An ATM switch uses either the VPI, the VCI, or a
combination of both to route the cell to its destination.

Marya Mannes

"The sign of an intelligent people is their ability to
control their emotions by the application of reason"

VCI in IT Glossary

Short for virtual channel identifier, a 16-bit field in an ATM
cell’s header that identifies the cell’s next destination as
it travels through an ATM network (similar to Frame Relay’s DLCI).
A virtual channel is a logical connection between two end devices
on an ATM network.

Also see VPI. An ATM switch uses either the VPI, the VCI or
a combination of both to route the cell.

Zig Ziglar

Put all excuses aside and remember this: YOU are capable.

VPN in IT Glossary

(pronounced as separate letters) Short for virtual private network,
a network that is constructed by using public wires to connect nodes.
For example, there are a number of systems that enable you to create
networks using the Internet as the medium for transporting data.
These systems use encryption and other security mechanisms to
ensure that only authorized users can access the network and
that the data cannot be intercepted.

Albert Einstein

"The most important human endeavor is the
striving for morality in our actions. Our inner
balance and even our very existence depend on it.
Only morality in our actions can give
beauty and dignity to life."

DNS in IT Glossary

(1) Short for Domain Name System (or Service or Server),
an Internet service that translates domain names into
IP addresses. Because domain names are alphabetic,
they're easier to remember. The Internet however,
is really based on IP addresses. Every time you
use a domain name, therefore, a DNS service must
translate the name into the corresponding IP address.
For example, the domain name www.example.com might
translate to 198.105.232.4.
The DNS system is, in fact, its own network.
If one DNS server doesn't know how to translate
a particular domain name, it asks another one,
and so on, until the correct IP address is returned.

(2) Short for digital nervous system, a term coined by
Bill Gates to describe a network of personal computers
that make it easier to obtain and understand information.

James Allen

Whether you be man or woman you will never
do anything in this world without courage.
It is the greatest quality of
the mind next to honor.

Belaian Jiwa

Seindah tiada lagi kau ku ingatkan
Sayang kau hilang
Menanti biar sampai akhir hayat ku di dunia ini
Kau tahu betapa ku sayang padamu
Hanya bidadari sebagai ganti
Hanya takdir menentukan ia
Oh belaian jiwa
Oh angin, sampaikan lagu ku padanya
yang sedih pilu
Terimalah lagu ku jadi teman hidup mu
Untuk selamanya
Kau tahu betapa ku sayang padamu
Hanya bidadari sebagai ganti
Hanya takdir
Menentukan ia
Oh belaian jiwa

Innuendo

Reaction from Microsoft

"I was given your page address from a friend who happens to work at
Microsoft and does interviews. He has told me that Microsoft has told
all its interviewing employees to keep an eye on your page for ideas
and thoughts."

anonymous

DSLAM in IT Glossary

Short for Digital Subscriber Line Access Multiplexer,
a mechanism at a phone company's central location that
links many customer DSL connections to a single high-speed ATM line.

When the phone company receives a DSL signal,
an ADSL modem with a POTS splitter detects voice calls and data.
Voice calls are sent to the PSTN, and data are sent to the DSLAM,
where it passes through the ATM to the Internet,
then back through the DSLAM and ADSL modem before
returning to the customer's PC.

More DSLAMs a phone company has, the more customers it can support.

Funnies!

Please be assured that we are still the same
friendly neighborhood bank we've always been,
but now the neighborhood is located in india.

Saturday, August 27, 2005

We Belong Together

I didn't mean it
When I said I didn't love you so
I should have held on tight
I never should've let you go
I did nothing
I was stupid
I was foolish
I was lying to myself
I could not fathom that I would ever
Be without your love
Never imagined I'd be
Sitting here beside myself

Cause I didn't know you
Cause I didn't know me
But I thought I knew everything
I never felt
The feeling that I'm feeling now
Now that I don't
Hear your voice
Or have your touch and kiss your lips
Cause I don't have a choice
Oh what I wouldn't give
To have you lying by my side
Right here
Cause baby..

(We belong together)
When you left
I lost a part of me
It's still so hard to believe
(Come back, come back)
Come back baby please
Cause we belong together

Who else am I gonna lean on
When times get rough
Who's gonna talk to me
On the phone
Till the sun comes up
Who's gonna take your place
Baby nobody else
We belong together

I can't sleep at night
When you're all on my mind
Bobby Womack's on the radio
Singing to me
'If you think you're lonely now'
Wait a minute
This is too deep
(Too deep)
I gotta change the station
So I turn the dial
Trying to catch a break
And then I hear Babyface

I only think of you
And it's breaking my heart
I'm trying to keep it together
But I'm falling apart
I'm feeling all out of my element
I'm throwing things
Crying
Trying to figure out
Where the hell I went wrong
The pain reflected in this song
Ain't even half of what
I'm feeling inside
I need you
Need you back in my life baby..
(My life, my life)

(We belong together)
When you left
I lost a part of me
It's still so hard to believe
(Come back, come back)
Come back baby please
We belong together

Who else am I gonna lean on
When times get rough
Who's gonna talk to me
On the phone
Till the sun comes up
Who's gonna take your place
There ain't nobody else
We belong together

(We belong together)
When you left
I lost a part of me
It's still so hard to believe
(Come back, come back)
Come back baby please
We belong together

Who else am I gonna lean on
When times get rough
Who's gonna talk to me
On the phone
Till the sun comes up
Who's gonna take your place
There ain't nobody else
We belong together

Mariah Carey

Leo Buscaglia

Life is a paradise for those who love many things with a passion.

Rainer Maria Rilke

This is the miracle that happens every time to those who really love;
the more they give, the more they possess.

Lao-Tzu

To love someone deeply gives you strength.
Being loved by someone deeply gives you courage.

Website used to hmm..visit See! 14..

My new reading pleasure...
http://www.fortune.com/fortune/
http://money.cnn.com/

home mortgage?
http://www.hlib.com.my/
http://info.maybank2u.com.sg/personal/loans/hl_homeloan.htm

Next Nest?hmmm...
http://www.damansaraperdana.com.my/
http://www.ikea.com.my/content/index.asp

IT Think!
http://www.microsoft.com/

My Love Affair with Access.

I…bought [Access] off the shelf the first day it was released.
I opened the box and read the large manual cover to cover.

Ken Getz.

Strength in IT Glossary

Also spelled analogue, describes a device or system that represents
changing values as continuously variable physical quantities.
A typical analog device is a clock in which the hands move
continuously around the face.

Cathe

"Before I sleep and after I wake up and all the hours in between
... you occupy my mind. So, practically every moment of the day
you are in my thoughts. I miss you."

Stimulate in IT Glossary

Short for the Small Business Technology Transfer program, a federal
program that awards research and development funds to small businesses
that partner with non-profit research institutions to encourage them
to jointly explore their technological potential and innovate
new technologies that will be made commercially available to the public.

Sophocles

One word frees us of all the weight and pain of life: that word is love.

Color Printers in IT Glossary

Laser and solid ink printers will print faster than an inkjet
and you can print double-sided documents without the ink showing
through the paper as it often will with ink-jets. If you expect
to print documents, manuals or business cards and brochures in
larger quantities you really don't want to do this on an inkjet.
For a business looking to print a larger quantity of color documents,
including manuals or brochures then you're going to want to look at
laser printers, and if you need to print color, at a faster rate on
a variety of media types, then a solid ink printer may be worth
further investigation.

Vita Sackville

What is beautiful is good, and who is good will soon be beautiful.

Bus in IT Glossary

(1) A collection of wires through which data is transmitted from one
part of a computer to another. You can think of a bus as a highway
on which data travels within a computer. When used in reference to
personal computers, the term bus usually refers to internal bus.
This is a bus that connects all the internal computer components
to the CPU and main memory. There's also an expansion bus that
enables expansion boards to access the CPU and memory.
All buses consist of two parts -- an address bus and a data bus.
The data bus transfers actual data whereas the address bus transfers
information about where the data should go.

The size of a bus, known as its width, is important because it
determines how much data can be transmitted at one time.
For example, a 16-bit bus can transmit 16 bits of data,
whereas a 32-bit bus can transmit 32 bits of data.

Every bus has a clock speed measured in MHz. A fast bus
allows data to be transferred faster, which makes applications
run faster. On PCs, the old ISA bus is being replaced by faster
buses such as PCI.

Nearly all PCs made today include a local bus for data that requires
especially fast transfer speeds, such as video data. The local bus is
a high-speed pathway that connects directly to the processor.

Several different types of buses are used on Apple Macintosh computers.
Older Macs use a bus called NuBus, but newer ones use PCI.

(2) In networking, a bus is a central cable that connects all
devices on a local-area network (LAN). It is also called the backbone.

RAS in IT Glossary
is a management protocol between endpoints (terminals and gateways)
and gatekeepers. The RAS is used to perform registration, admission
control, bandwidth changes, status, and disengage procedures between
endpoints and gatekeepers.

Streaming in IT Glossary
A technique for transferring data such that it can be processed
as a steady and continuous stream. Streaming technologies are becoming
increasingly important with the growth of the because most users do
not have fast enough access to download large files quickly.

robotics in IT Glossary
The field of computer science and engineering concerned with creating
robots, devices that can move and react to sensory input. Robotics is
one branch of artificial intelligence.

Robots are now widely used in factories to perform high-precision
jobs such as welding and riveting. They are also used in special
situations that would be dangerous for humans -- for example,
in cleaning toxic wastes or defusing bombs.

Although great advances have been made in the field of robotics
during the last decade, robots are still not very useful in
everyday life, as they are too clumsy to perform ordinary
household chores.

Robot was coined by Czech playwright Karl Capek in his
play R.U.R (Rossum's Universal Robots), which opened in
Prague in 1921. Robota is the Czech word for forced labor.

The term robotics was introduced by writer Isaac Asimov.
In his science fiction book I, Robot, published in 1950,
he presented three laws of robotics:

1. A robot may not injure a human being, or,
through inaction, allow a human being to come to harm.

2. A robot must obey the orders given it by human beings
except where such orders would conflict with the First Law.

3. A robot must protect its own existence as long as such
protection does not conflict with the First or Second Law.

Helen Rowland

"The woman who appeals to a man's vanity may stimulate him,
the woman who appeals to his heart may attract him, but it
is the woman who appeals to his imagination who gets him"

Digital in IT Glossary

Describes any system based on discontinuous data or events.
Computers are digital machines because at their most basic
level they can distinguish between just two values, 0 and 1,
or off and on. There is no simple way to represent all the
values in between, such as 0.25. All data that a computer
processes must be encoded digitally, as a series of zeroes and ones.
The opposite of digital is analog. A typical analog device
is a clock in which the hands move continuously around the face.
Such a clock is capable of indicating every possible time of day.
In contrast, a digital clock is capable of representing only a
finite number of times (every tenth of a second, for example).

In general, humans experience the world analogically. Vision,
for example, is an analog experience because we perceive infinitely
smooth gradations of shapes and colors. Most analog events, however,
can be simulated digitally. Photographs in newspapers, for instance,
consist of an array of dots that are either black or white. From afar,
the viewer does not see the dots (the digital form), but only lines
and shading, which appear to be continuous. Although digital
representations are approximations of analog events,
they are useful because they are relatively easy to store
and manipulate electronically. The trick is in converting
from analog to digital, and back again.

This is the principle behind compact discs (CDs). The music itself
exists in an analog form, as waves in the air, but these sounds are
then translated into a digital form that is encoded onto the disk.
When you play a compact disc, the CD player reads the digital data,
translates it back into its original analog form, and sends it to
the amplifier and eventually the speakers.

Internally, computers are digital because they consist of discrete
units called bits that are either on or off. But by combining many
bits in complex ways, computers simulate analog events. In one sense,
this is what computer science is all about.

Security in IT Glossary
In the computer industry, refers to techniques for ensuring that
data stored in a computer cannot be read or compromised by any
individuals without authorization. Most security measures involve
data encryption and passwords. Data encryption is the translation
of data into a form that is unintelligible without a deciphering
mechanism. A password is a secret word or phrase that gives a user
access to a particular program or system.

Dr. Karl Augustus Menninger

Love cures people, both the ones who give it and the ones who receive it.

Spyware in IT Glossary

Any software that covertly gathers user information through the user's
Internet connection without his or her knowledge, usually for
advertising purposes. Spyware applications are typically bundled
as a hidden component of freeware or shareware programs that can
be downloaded from the Internet; however, it should be noted that
the majority of shareware and freeware applications do not come
with spyware. Once installed, the spyware monitors user activity
on the Internet and transmits that information in the background
to someone else. Spyware can also gather information about e-mail
addresses and even passwords and credit card numbers.

Spyware is similar to a Trojan horse in that users unwittingly
install the product when they install something else. A common
way to become a victim of spyware is to download certain peer-to-peer
file swapping products that are available today.

Aside from the questions of ethics and privacy, spyware steals from the
user by using the computer's memory resources and also by eating
bandwidth as it sends information back to the spyware's home base
via the user's Internet connection. Because spyware is using memory
and system resources, the applications running in the background can
lead to system crashes or general system instability.

Because spyware exists as independent executable programs,
they have the ability to monitor keystrokes, scan files
on the hard drive, snoop other applications, such as chat
programs or word processors, install other spyware programs,
read cookies, change the default home page on the Web browser,
consistently relaying this information back to the spyware
author who will either use it for advertising/marketing purposes
or sell the information to another party.

Licensing agreements that accompany software downloads sometimes
warn the user that a spyware program will be installed along with
the requested software, but the licensing agreements may not
always be read completely because the notice of a spyware
installation is often couched in obtuse, hard-to-read legal
disclaimers.

My Love Affair with Access.

Show someone a many - to - many join,and you were their hero

Ken Getz.

Funnies!

As an alternative to the traditional 30 - year mortgage,
we also offer an interest - only mortgage, ballon mortgage, reverse
mortgage, upside down mortgage,inside out mortgage, loop - de - loop
mortgage,and the spinning double axel mortgage with a triple lutz.

Friday, August 26, 2005

Let me be your hero

Would you dance,
If I asked you to dance?
Would you run,
And never look back?
Would you cry,
If you saw me crying?
And would you save my soul, tonight?

Would you tremble,
If I touched your lips?
Would you laugh?
Oh please tell me this.
Now would you die,
For the one you love?
Hold me in your arms, tonight.

I can be your hero, baby.
I can kiss away the pain.
I will stand by you forever.
You can take my breath away.

Would you swear,
That you’ll always be mine?
Or would you lie?
Would you run and hide?
Am I in too deep?
Have I lost my mind?
I don’t care...
You’re here, tonight.

I can be your hero, baby.
I can kiss away the pain.
I will stand by you forever.
You can take my breath away.

Oh, I just wanna to hold you.
I just wanna to hold you.
Oh yeah.
Am I in too deep?
Have I lost my mind?
Well I don’t care...
You’re here, tonight.

I can be your hero, baby.
I can kiss away the pain.
I will stand by your forever.
You can take my breath away.

I can be your hero.
I can kiss away the pain.
And I will stand by you, forever.
You can take my breath away.
You can take my breath away.

I can be your hero.

Enrique Iglesias

Love = Beep # 1,Beep # 2!

When the bathroom mirror is fogged from shower,
write I luv u on mirror.when fog clears it wont
b seen til next time ur loved1
gets out of shower n suprise!

Device Tree in IT Glossary

a hierachical tree that contains the devices configured on the computer.

Che Guevara

Many will call me an adventurer - and that I am, only one of a different sort: one of those who risks his skin to prove his platitudes.

Sub tree in IT Glossary

any node within a tree ,along with any selection of connected
descendent nodes.

Eldridge Cleaver

And we had thought that our hard climb out of that cruel valley led to some cool,
green, and peaceful, sunlit place but it's all jungle here, a wild and savage wilderness that's overrun with ruins.

Trust in IT Glossary

a forest that is connected to another forest by explicit or
transitive trust.

Mary Ritter Beard

Woman's success in lifting men out of their way of life nearly resembling that of the beasts -- who merely hunted and fished for food, who found shelter where they could in jungles, in trees,and caves -- was a civilizing triumph.

Proverb 24:3-4

By the wisdom a house is built ,and through understanding it is
establish : though knowledge its rooms are filled with rare and
filled with rare and beautiful treasures.

Rules in IT Glossary

an IPsec policy mechanism that governs how and when an IPsec
policy protects communication based on the source,destination,and type of IP
traffic.Each rule contains a list of IP filters and a collection of
security actions that take place upon a match with that filter lists.

Nathan Eldon Tanner

Sevice is the rent we pay for living in this world of ours.

Track in IT Glossary

a thin concentric band that stores data on hard disk.
A hard disk containts multiple platters,and each platter contains
many tracks.Each track is divided into units of storages called sectors.
Track numbers start at 0 and progress in order with track 0
at the outer track of a hard disk.

Robert Frost

Two roads diverged in a wood,and I-I took the one less travel by,
and that has made all the difference.

Normal back up in IT Glossary

a back up that copies all selected files and marks each files as
having been back up (in other word,the archive attribute).with normal
backups,you need only the most recent copy file or tape back up file
or tape to restore all of the files.you usually perform a normal
back up the frist time you create a back up set.

John D.Rockefeller.jr.

I believe that the rendering of useful sevice is the common duty of
mandkind and that only in the purifying fire of sacrifice is
the dross of selfishness consumed and the human soul set free.

Firewall in IT Glossary

a combination of hardware and software that provides a security system,
unsually to prevent unauthorized access from outside to an internal
nextwork or intranet.a firewall prevents direct communication between
nextwork and external computer by routing communication though
a proxy server outside of the nextwork.The proxy server determines
whether it is save to let a file pass though to the nextwork.The proxy server
determines wether it is save to let a file pass though to the nextwork.
A firewall is also called mines whether it is safe to let a file
pass though to the nextwork.A firewall also called a security - edge gateway.

Geoge Macdonald

It is a greater compliment to be trust than to be loved.

Protocol in IT Glossary

a set of rules and conventions for sending information over
a nextwork.These rules govern the content.Format,
timing,sequencing,and error control of messages
exchanged among nextwork devices.

Warren Bennis

Leader do not avoid,repress or deny conflict,but rather see it as an
opportunity.

Intergrity in IT Glossary

a basic security function of cryptography.Integrity provides
verification that the original contents of information have
not been altered or corrupted.without integrity,someone might
alter information or the information might become corrupted,
but the alteration can go undetected.For example,an internet
protocol security property that protect data from unauthorized
modification in transit,ensuring that the data received is exactly
the same as the data sent.Hashfunctions sign each packet with a
crytographic checksum,which the receiving computer checks
before opening the packet.If the packet-and therefore
signature-has changed,the packet is discarded.

Margeret Thatcher.

Being powerful is live being a lady,If you have to tell people you are,
you aren't.

Trust relationship in IT Glossary

a logical relationship establish between domains to allow pass - though
authentication,in which a trusting domain honour the logon authentications
of a trusted domain.user accounts and global groups defined in a trust
domain can be given right and be given right and permissions in a
trusting domain's,even though the user accounts or groups dont's
exist in the trusting domain's dictionary.

Victor Hugo

There is nothing so powerful as an idea whose time has come.

Monday, August 22, 2005

Famous Quotes - Business

Too often we underestimate the power of a touch, a smile, a kind word, a listening ear, an honest compliment, or the smallest act of caring, all of which have the potential to turn a life around.

Leo Buscaglia.

Website used to hmm..visit See! 13..

Fun ! Kidz !
http://www.petrosains.com.my/
http://www2.warnerbros.com/main/homepage/homepage.html

Wow ! Cool Boss!
http://www2.acnielsen.com/site/index.shtml
http://www.singaporeair.com/saa/en_UK/?SelectedCountry=MY

Gordon B.Hinkley

No system can long command the loyalties of man and women
which does not expect of them certain measures of discipline,
and particulary self - displine.The cost in comfort may be great.
The sacrifice may be real.But this very demanding reality
is the substance of which come character and strength and
nobelity.Permissiveness never produced greatness.
Integrity,loyalty and strength are virtues whose sinews
are developed though the stuggles that go on within as well
practice self - discipline under the
demands of divinely spoken truth.1

Funnies!

"Thank you for holding.Your waiting time approximately..Well,
let's say this might be a good time to cancel any vacation plans"

Dag Hamarskhold

Forgiveness breaks the chain of casuality,because he who "forgive" you
- out of love - take upon himself the consequences of what you have done.
Forgiveness,therefore,always entails a sacrifice.4.

Saturday, August 20, 2005

Quote About Money

We have profoundly forgotten everywhere that cash-
payment is not the sole relation of human beings.

Thomas Carlyle

Website used to hmm..visit See! 12..

I still wonder how to play this game sab ?
http://www.darkthrone.com/recruit.dt?
uid=V30379B30362B30294W30328O30226X30277

Fun & Scarey..erks..
http://www.necroticobsession.com/

My X PAX !
http://www.celcom.com.my/

CT..emmm!
http://www.hotlink.com.my/

IT Think!
http://www.msc.com.my/
http://www.ubs-software.com/

Others new reading pleasure!
http://www.oictoday.com/

Whattt Chaaaa!!!!
http://www.blackbeltmag.com/

Need to fix that linking pipe!
http://www.mybosch.com.my/content/language1/html/index.htm

wow!fine bathtab!
http://www.johnsonsuisse.com.my/

1.8 if you're IT Literated!
http://www.apiit.edu.my/

Cartoon,Check this out...Dude !
http://www.thesimpsons.com/index.html

Low On Fuel..hmm...
http://honda.net.my/index.php

Funnies!

"If you're losing patience with our endless automated system
& need to run outside & scream.press 44.If you're feeling better now
& wish to continue,press 45.."

Ha!ha!ha!
http://www.glasbergen.com/

Friday, August 19, 2005

Website used to hmm..visit See! 11..

My favourate mineral water..
http://www.evian.com/
http://www.perrier.com/EN/index2.asp

Just nice to see it!
http://www.volvo.com/group/malaysia/ms-my
http://www.audi.com.my/
http://www.citroen.co.uk/

Value Flight..
http://www.airasia.com/index.htm
http://www.aeroflot.co.uk/index.asp

By The Sea!
http://www.starcruises.com/

Mac Gyver!
http://www.victorinox.com/

Boss Training!
http://www.juran.com/
http://www.mim.edu/
http://www.mtc.com.my/news/pr26.htm

Nite Cool places..
http://www.twelvesi.com.my/
http://www.zoukclub.com.my/unveil/enter.asp
http://www.flams.com/

Jazz Queen..hmmm..
http://www.sheilamajid.com/Albums/one.html

Music update!
http://www.billboard.com/bb/index.jsp

Everning Cool places..
http://www.starbucks.com/default.asp?cookie%5Ftest=1
http://www.delifrance.com/
http://www.coffeebean.com/

Eat Fast..food..
http://www.mcdonalds.com/
http://www.bk.com/
http://www.kfc.com/

Shop of kitchen monthly..
http://www.carrefour.com/

Website used to hmm..visit See! 10..

Greens USD !
http://www10.americanexpress.com/sif/cda/page/0,1641,13927,00.asp
http://www.acesynergy.com.my/english/index.htm

Find out more info from overheard chatting.
http://www.pwcglobal.com/
http://www.jpmorgan.com/cm/
cs?pagename=Templates/Page/JPMorgan_CacheHome&cid=8010369

Some Frenz used to say go 2 this website..
http://www.roche.com/home.html
http://www.gsk.com/index.htm
http://www.ti.com/
http://www.dlp.com/Default.asp?bhcp=1
http://www.wdc.com/en/products/
http://www.amdac.com.my/
http://www.scania.com/

IT Think!
http://www.i-digital.com.my/features.asp?page=20030630-1
http://www.smart.com.my/
http://opensource.mimos.my/?main=tech_wshop/17Dec
http://digiscan.com.my/
http://www.culminis.com/

Reading pleasure again..
http://mystar.com.my/mystartour/

Alfred North Whitehead

In the sense,knowledge shrinks as wisdom grows,for details
are swallowed up in principles.The details for knowledge,which
are important,will be pick up ad hoc in each avocation of life,
but the habit of active utilization of well - understood
principles is the final possesion of wisdom.

Money = Beep # 1 ! Beep # 2 !

Many people who lead simple - living lifestyles are millionaires.
Their wealth is the result of hard work,perseverance,
planning and self discipline.

Thursday, August 18, 2005

Website used to hmm..visit See! 9..

home sweet home,Residental Area that I crush..hmmm...
http://www.ytl.com.my/property.asp
http://www.i-putra.com.my/city/main.cfm

My crush Cho Cho Train!hehehe!
http://www.orient-express.com/web/eoe/eoe_c5b_privilege.jsp

Wow!Jumbo Jet..
http://www.boeing.com/flash.html

Used to See Sunset here as well!
http://www.avillion.com.my/
http://www.tanjongjararesort.com/privacy_policy.htm

My Favourate drinks!
http://www.100plus.com.my/flash_content/frame.php
https://www.coke.com.my/main.asp

Others Reading Pleasure..hmm..
http://www.forbes.com/
http://online.wsj.com/public/us
http://www.crn.com/sections/special/champs/champs.jhtml?articleId=18808884

Fall in love Of course in others U!
http://www.harvard.edu/
http://www1.hbs.edu/
http://www.cambridge.org/

World Best Mining !
http://www.bhpbilliton.com/bb/home/home.jsp

Gosh!pluck off Green pear,
apple & grape part time jobs
before all goes in here.
http://www.ubs.com/

Website used to hmm..visit See! 8..

Life time investments ?
http://www.publicmutual.com.my/index.aspx

Life time savings ?
http://www.rhb.com.my/default.htm
http://www.hlb.com.my/
http://www.ocbc.com.my/
http://www.fmb.org.my/
http://www.hsbc.com.my/my/personal/
http://www.bankrakyat.com.my/

My next education advance !
http://www.informatics.edu.my/index.html

IT Think !
http://www.lenovo.com/think/my/en/
http://thinkcenter.com/

Team Effort

The team on the top of the mountain did'nt fall there.

Money = Beep # 1! Beep # 2!

With money saved and invested,u can live for years without earning money,
or u can at least afford yourself the luxury of working part - time.

Sunday, August 14, 2005

Website used to hmm..visit See! 7..

My Crush Cartoon!hehehe!
http://disney.go.com/disneytheatrical/beautyandthebeast/
http://disney.go.com/disneyvideos/animatedfilms/findingnemo/index2.html
http://www.garfield.com/

Fine Dine Chinaware!
http://www.royaldoulton.com/website/landing/index.jsp?bmLocale=en_GB
http://www.noritakechina.com/

Fine Kithcen Stove..
http://www.elba.com.my/

My Favourate Ice Cream! Yummies !
http://www.unilever.com.my/walls/default.asp

I Juz Find Local Nikon for Next digital camera!Yeah!
http://www.nikonmalaysia.com.my/

Had this tough to apply AMEX + MayBank!
http://www.maybank2u.com.my/

Money = Beep # 1! Beep # 2!

Millionaires are described as living well below their means.
they allocate their time,energy and money efficiently,
in ways conductive to building wealth.

Website used to hmm..visit See! 6..

Crush On Sony TV!
http://www.axn.com/
http://www.cbs.com/primetime/csi/

Music by walking?
http://www.sony.com/
http://www.walkman.ca/main.html

On Mountain Tracking!Feel Tirsty?
http://www.sigg.ch/

Lets Dress to Kill!hehehe!
http://www.versace.com/flash.html
http://www.hugoboss.com/select.html
http://www.guess.com/
http://www.levi.com/

Money = Beep # 1! Beep # 2!

Dont turn your investments over to a broker without
yourself keeping abreast of what is being done with your money.
get involved in investment desicions.

Saturday, August 13, 2005

Website used to hmm..visit See! 5..

Yo!Cyclo!Check this out!hehe!Mountain Bike!

Tuesday, August 09, 2005

Nur Kasih ( in team )

Bagaikan permata dicelahan kaca
Kerdipnya sukar tuk dibezakan
Kepada Mu Tuhan ku pasrah harapan
Moga tak tersalah pilihan

Nur kasih Mu mendamaikan kalbu
Jernih setulus tadahan doaku
Rahmati daku & permintaan ku

C/O
Kurniakan daku serikandi
Penyejuk dimata penawar dihati
Didunia dialah penyeri

Di syurga menanti dia bidadari
Kekasih sejati teman berbudi
Kasihnya bukan keterpaksaan
Bukan jua kerana keduniaan

( doa )
Ya Allah kurniakan kami isteri
Dan zuriat yang soleh
Sebagai penyejuk mata

Ulang C/O
Di tangan Mu Tuhan ku sandarkan impian
Penentu jodoh pertemuan
Seandainya dirinya tercipta untukku
Rela ku menjadi miliknya
Kurniakan daku serikandi
Penyejuk dimata penawar dihati

Di dunia dialah penyeri
Di syurga menanti dia bidadari
Kekasih sejati teman berbudi
Kasihnya bukan keterpaksaan
Bukan jua kerana keduniaan
Mekar hidup disiram Nur kasih
……disiram Nur kasih.

Razi & ayu
Wedding Ceremony at Putrajaya
6/8/2005

Monday, August 08, 2005

Website used to hmm..visit See! 4..

Ultra light protection for my eyes!

http://www.rayban.com/

I used to compile all of this item for Mountain Climbing leasure!
http://www.petzl.com/petzl/Accueil
href="http://www.buckknives.com/">http://www.buckknives.com/
http://www.deuter.com/cms/front_content.php?
sid=a189f5429accbd8cccf98825612dd032
http://www.maglite.com/index_flash.asp
http://www.zippo.com/main.aspx?referral=&referralURL=
http://www.magellangps.com/en/
http://www.leatherman.com/

Website used to hmm..visit See! 3..

Website used to hmm..visit See!2..

Website used to hmm..visit See!

For My Body Cover!
http://men.style.com/gq
http://www.cohiba-cuban-cigars.com/
http://www.bulgari.com/index.asp
http://www.tommy.com/
http://www.timberland.com/home/index.jsp
http://www.rolex.com/
http://www.nike.com/nikegolf/select.jhtml

For My Reading Pleasure!
http://www.nationalgeographic.com/
http://www.bloomberg.com/apps/news?pid=10000087&sid=asC2oZAGbhZE&refer=top_world_news
http://www.nyse.com/http://www.londonstockexchange.com/en-gb/

Things that used to feel, the life freedom!
http://www.mercedes-benz.com/content/mbcom/international/international_website/en/com.html
http://www.jaguar.com/global/default.htm
http://www22.porsche.com/
http://www.hummer.com/http://www.landrover.com/global/default.htm
http://www.rsyc.com.my/http://www.agustawestland.com/
http://www.cessna.com/

Just for Sport!
http://www.gunsandammomag.com/
http://www.berettausa.com/warranty/service_warranty_basic.cfm
http://smith-wesson.com/page/orl2/Home.html
http://www.glock.com/

For my fitness !
http://www.ufl.com.my/

At The Sea! Cheers!
http://www.rsfc.com.my/index1024.html

My viewing photography pleasure!
http://nikonimaging.com/global/