February 2011 - Blog Kabar Berita Nasional dan Internasional

Monday, February 28, 2011

Free Download Screenshot Capture

Screenshot Capture is a free software that serves to make capturing images from a computer easily and quickly.
This software allows you to mencapturing images from a computer with several capture options like capture region, fixed region, selected regions, and full screen caputre.

Here are some interesting features of Screenshot capture you can enjoy:
  1. Having a very efficient way to capture screenshots from your computer.
  2. Screenshots can be saved automatically in a folder
  3. Has 7 screenshot capture mode
  4. Each mode can be accessed via the system tray, configurable hotkeys or menu program.
  5. Has Post Capture Image Dialog
  6. Have the automatic version of the image file
  7. Having a high configurable screenshots
  8. Have a screenshot editing tool
  9. Screenshot capture can be easily linked to other external tools
  10. It has a slimline panel viewing sidebar
  11. Having Deluxe thumbnail maker
  12. Multi-monitor support
  13.  Having MoveTo and SendTo menu
If you're Interested? Please Download Here

Updates.!!Google Reader app for Android

Today i`m excited to announce some updates to the official Google Reader app for Android. Over the last couple of months, we’ve added some of your most-requested features:
  • Unread count widget - choose any feed, label, person, or “all items” and get the unread count on your home screen. Clicking on the widget takes you to straight to that stream.
  • News ticker widget - if you prefer a bit more information, you can add a larger size widget that cycles through items on any stream you want in Reader. Clicking any headline will take you to the article, while clicking the folder will take you to that stream.
    That is a lot of widgets
  • Mark previous as read - if you’ve used the mobile version of Reader before and missed this feature, it’s now back! As you scroll down your reading list, hit “Mark previous as read” at any time to only mark things above the screen as read.
In addition to these new features, thanks to 20%-ers Alexey Retunski and Anton Vayvod’s support, we now have an official Russian translation as well.
We hope you enjoy the updates - give it a try! You can download the app in all countries from the Android Market. The Google Reader app is available for devices running Android 1.6 or higher, with widget functionality available for devices on Android 2.2+.

Lisa Ling P0B79G State of Sex Offenders

Today, by this information schedule you can Watch Our America with Lisa Ling P0B79G Season 1 Episode 3 - State of Sex Offenders online video streaming, TV Shows on your internet, on Tuesday March 01st, 2011 at 10:00 pm.

We are not provide for the tv shows stream. We just give you the latest information about Our America with Lisa Ling P0B79G Season 1 Episode 3 State of Sex Offenders, so all of you did not miss the episode. The Our America with Lisa Ling P0B79G Season 1 Episode 3 State of Sex Offenders channel stream is provided by OWN, which is can you get from your online internet.

Thanks for your trust to us to share you about Our America with Lisa Ling Episode video streaming schedule information. We hope you enjoy this tv shows information and come back again for newest schedule of Our America with Lisa Ling Episode online video streaming and other tv shows episode.

Once again we remind you Our America with Lisa Ling P0B79G Season 1 Episode 3 State of Sex Offenders online video streaming original airdate will be on Tuesday March 01st, 2011 at 10:00 pm by OWN. And we just give all of you schedule information only.

Sunday, February 27, 2011

index




Friday, February 25, 2011

Cleaning Up at the Command Line

Disk Cleanup offers some cool command-line switches that are documented only in a pair of obscure Knowledge Base articles. Through the use of these switches, you can save your preferences and rerun the cleanup process automatically using those settings. To do so, you need to use the following switches with Cleanmgr.exe :


  • /Sageset:n Opens a dialog box that allows you to select Disk Cleanup options, creates a registry key that corresponds to the number you entered, and then saves your settings in that key. Enter a number from 0 through 65535 in place of n.
  • /Sagerun:n Retrieves the saved settings for the number you enter in place of n and then runs Disk Cleanup without requiring any interaction on your part.
 To use these switches, follow these steps:
  • Open a Command Prompt window and type the command cleanmgr /sageset:200. (The number after the colon is completely arbitrary; you can choose any other number from 0 through 65535 if you prefer.) You must supply credentials from a member of the Administrators group to begin this task.
  • In the Disk Cleanup Settings dialog box, shown in Figure 21-11, choose the options you want to apply whenever you use these settings. (Note that the options in this dialog box are not the same as those shown in Figure 21-9.)
    Figure 21-11 When you use the /Sageset switch, you can work with an expanded set of options that are not available interactively.   

  • Click OK to save your changes in the registry.
  • Open Task Scheduler from Control Panel, and start the Create Basic Task wizard. Follow the wizard's prompts to name the task, and schedule it to run at regular intervals. When prompted to select the program you want Windows to run, enter cleanmgr.exe in the Program/Script box and enter /sagerun:200 in the Add Arguments box. 5.
Repeat steps 1-4 for other Disk Cleanup options you want to automate.

Running Disk Defragmenter from a Command Line

The command-line version of Disk Defragmenter allows you to exercise fine-grained control over the defragmentation process and uses the exact same program code as the scheduled version. To use this command for a specific drive, type defrag d: in an elevated Command Prompt window, where d is the drive letter or mount point of an existing volume.To see the full range of the defrag utility's capabilities, type defrag /?.Among the more useful switches are the following:

  • -c Defragments all volumes on the computer; use this switch without specifying a specific drive letter or mount point.
  • -a Analyzes the specified volume and displays a summary of the analysis report.
  • -f Consolidates the free space on the specified volume, reducing the likelihood that large new files will be fragmented.
  • /r Defragments multiple volumes in parallel. If your volumes are on physically separate disks, you might save a bit of time by using this switch.
  • -v Displays complete (verbose) reports. When used in combination with -a, this switch displays only the analysis report. When used alone, it displays both the analysis and defragmentation reports.
  • -w Performs a full defragmentation by consolidating all file fragments, regardless of size
In addition to the documented switches listed, the command-line Defrag utility includes this useful but undocumented switch:
  • -b The -b switch optimizes boot files and applications while leaving the rest of the drive undisturbed.

Defragmenting Disks for Better Performance

On a relatively new system with a speedy processor and plenty of physical memory, hard disk performance is the single biggest bottleneck in everyday operation. Even with a zippy hard disk, it takes time to load large data files into memory so that you can work with them. The problem is especially noticeable with movies, video clips, DVD-burning projects, databases, ISO image files, and virtual hard disks, which can easily take up multiple gigabytes, sometimes in a single file.


On a freshly formatted disk, files load fairly quickly, but over time, performance can degrade because of disk fragmentation. To understand how fragmentation works, it helps to understand the basic structure of a hard disk. The process of formatting a disk divides it into sectors, each of which contains space for 512 bytes of data. The file system combines groups of sectors into clusters, which are the smallest units of space available for holding a single file or part of a file.

On any NTFS volume greater than 2 GB in size, the cluster size is 4 KB. Thus, when you save a 200-MB video clip, Windows divides the file into roughly 50,000 pieces. When you save this file for the first time on a freshly formatted, completely empty hard disk, Windows writes it in contiguous clusters. Because all the clusters that hold individual pieces of the file are physically adjacent to one another, the mechanical components of the hard disk can work very efficiently, scooping up data in one smooth operation. As a bonus, the hard disk's onboard cache and the Windows disk cache are able to anticipate the need for data and fetch nearby clusters that are likely to contain other parts of the file, which can then be retrieved from fast cached memory rather than from the relatively slow disk.

Unfortunately, hard disks don't stay neatly organized for long. When you add data to an existing file, the file system has to allocate more clusters for storage, typically in a different physical location on the disk. As you delete files, you create gaps in the once-tidy arrangement of contiguously stored files. As you save new files, especially large ones, the file system uses all these bits of free space, scattering the new files over the hard disk in many noncontiguous pieces. The resulting inefficiency in storage is called fragmentation; each time you open or save a file on a badly fragmented disk, disk performance suffers, sometimes dramatically, because the disk heads have to spend extra time moving from cluster to cluster before they can begin reading or writing data.

The Disk Defragmenter in Windows 7 improves on earlier versions in many ways, not the least of which is you shouldn't need to do anything to benefit from it. Disk Defragmenter runs as a low-priority background task that kicks off once a week, in the middle of the night, without requiring any attention from you.

Thursday, February 24, 2011

Eagleheart S01E04 Me Llamo Justice - Feb 24th, 2011

Today, by this information schedule you can Watch Eagleheart S01E04 Season 1 Episode 4 - Me Llamo Justice online video streaming, TV Shows on your internet, on Thursday February 24th, 2011 at 11:59 pm.

We are not provide for the tv shows stream. We just give you the latest information about Eagleheart S01E04 Season 1 Episode 4 Me Llamo Justice, so all of you did not miss the episode. The Eagleheart S01E04 Season 1 Episode 4 Me Llamo Justice channel stream is provided by Adult Swim, which is can you get from your online internet.

Thanks for your trust to us to share you about Eagleheart Episode video streaming schedule information. We hope you enjoy this tv shows information and come back again for newest schedule of Eagleheart Episode online video streaming and other tv shows episode.

Once again we remind you Eagleheart S01E04 Season 1 Episode 4 Me Llamo Justice online video streaming original airdate will be on Thursday February 24th, 2011 at 11:59 pm by Adult Swim. And we just give all of you schedule information only.

Jimmy Kimmel Live S09E34 Owen Wilson, Kelly Ripa, Adele - Feb 24th, 2011

Today, by this information schedule you can Watch Jimmy Kimmel Live S09E34 Season 9 Episode 34 - Owen Wilson, Kelly Ripa, Adele online video streaming, TV Shows on your internet, on Thursday February 24th, 2011 at 12:05 am.

We are not provide for the tv shows stream. We just give you the latest information about Jimmy Kimmel Live S09E34 Season 9 Episode 34 Owen Wilson, Kelly Ripa, Adele, so all of you did not miss the episode. The Jimmy Kimmel Live S09E34 Season 9 Episode 34 Owen Wilson, Kelly Ripa, Adele channel stream is provided by ABC, which is can you get from your online internet.

Thanks for your trust to us to share you about Jimmy Kimmel Live Episode video streaming schedule information. We hope you enjoy this tv shows information and come back again for newest schedule of Jimmy Kimmel Live Episode online video streaming and other tv shows episode.

Once again we remind you Jimmy Kimmel Live S09E34 Season 9 Episode 34 Owen Wilson, Kelly Ripa, Adele online video streaming original airdate will be on Thursday February 24th, 2011 at 12:05 am by ABC. And we just give all of you schedule information only.

The Late Late Show with Craig S07E39 Forest Whitaker - Feb 24th, 2011

Today, by this information schedule you can Watch The Late Late Show with Craig Ferguson S07E39 Season 7 Episode 39 - Forest Whitaker online video streaming, TV Shows on your internet, on Thursday February 24th, 2011 at 12:35 am.

We are not provide for the tv shows stream. We just give you the latest information about The Late Late Show with Craig Ferguson S07E39 Season 7 Episode 39 Forest Whitaker, so all of you did not miss the episode. The The Late Late Show with Craig Ferguson S07E39 Season 7 Episode 39 Forest Whitaker channel stream is provided by CBS, which is can you get from your online internet.

Thanks for your trust to us to share you about The Late Late Show with Craig Ferguson Episode video streaming schedule information. We hope you enjoy this tv shows information and come back again for newest schedule of The Late Late Show with Craig Ferguson Episode online video streaming and other tv shows episode.

Once again we remind you The Late Late Show with Craig Ferguson S07E39 Season 7 Episode 39 Forest Whitaker online video streaming original airdate will be on Thursday February 24th, 2011 at 12:35 am by CBS. And we just give all of you schedule information only.

Late Night with Jimmy Fallon S02E33 Nicole "Snooki" Polizzi, Martin Bashir, Laurie Anderson - Feb 24th, 2011

Today, by this information schedule you can Watch Late Night with Jimmy Fallon S02E33 Season 2 Episode 33 - Nicole "Snooki" Polizzi, Martin Bashir, Laurie Anderson online video streaming, TV Shows on your internet, on Thursday February 24th, 2011 at 12:35 am.

We are not provide for the tv shows stream. We just give you the latest information about Late Night with Jimmy Fallon S02E33 Season 2 Episode 33 Nicole "Snooki" Polizzi, Martin Bashir, Laurie Anderson, so all of you did not miss the episode. The Late Night with Jimmy Fallon S02E33 Season 2 Episode 33 Nicole "Snooki" Polizzi, Martin Bashir, Laurie Anderson channel stream is provided by NBC, which is can you get from your online internet.

Thanks for your trust to us to share you about Late Night with Jimmy Fallon Episode video streaming schedule information. We hope you enjoy this tv shows information and come back again for newest schedule of Late Night with Jimmy Fallon Episode online video streaming and other tv shows episode.

Once again we remind you Late Night with Jimmy Fallon S02E33 Season 2 Episode 33 Nicole "Snooki" Polizzi, Martin Bashir, Laurie Anderson online video streaming original airdate will be on Thursday February 24th, 2011 at 12:35 am by NBC. And we just give all of you schedule information only.

Last Call with Carson Daly S08E230 Fred Armisen, David Seidler, Broken Bells - Feb 24th, 2011

Today, by this information schedule you can Watch Last Call with Carson Daly S08E230 Season 8 Episode 230 - Fred Armisen, David Seidler, Broken Bells online video streaming, TV Shows on your internet, on Thursday February 24th, 2011 at 01:35 am.

We are not provide for the tv shows stream. We just give you the latest information about Last Call with Carson Daly S08E230 Season 8 Episode 230 Fred Armisen, David Seidler, Broken Bells, so all of you did not miss the episode. The Last Call with Carson Daly S08E230 Season 8 Episode 230 Fred Armisen, David Seidler, Broken Bells channel stream is provided by NBC, which is can you get from your online internet.

Thanks for your trust to us to share you about Last Call with Carson Daly Episode video streaming schedule information. We hope you enjoy this tv shows information and come back again for newest schedule of Last Call with Carson Daly Episode online video streaming and other tv shows episode.

Once again we remind you Last Call with Carson Daly S08E230 Season 8 Episode 230 Fred Armisen, David Seidler, Broken Bells online video streaming original airdate will be on Thursday February 24th, 2011 at 01:35 am by NBC. And we just give all of you schedule information only.

Foxreal YouTube FLV Downloader Pro

Foxreal YouTube FLV Downloader Pro 1.0.2.1 + Portable
Foxreal YouTube FLV Downloader Pro 1.0.2.1 + Portable | 37.7 MB
 
Foxreal YouTube FLV Downloader Pro - professional application that allows you to quickly download and Convert any Flash video (FLV/F4V) from sites such as YouTube, Google, Yahoo, Facebook, FOX, CBS, etc. and save video in MP4, 3GP, MPG, DVD, MOV, etc. With this program you can immediately store the video files on the iPad, iPhone 4, Droid X, Galaxy S, PSP, PS3, Apple TV to watch videos in high quality. In addition, the program supports UPnP connection, allowing you to stream music and video devices with UPnP.


Key features:
• Automatically detects and captures the URL of the video is played
• Technology synchronize audio and video
• Step by step instructions that teach the users of any level work with the program
• Download and convert video simultaneously
• Built-in library that allows you to sort out the files in the folder "video" and "music"
• Integrated video player

Homepage - YouTube Downloader - Foxreal YouTube FLV Downloader Pro, download FLV/F4V from YouTube

Download Links:

Hotfile.com: One click file hosting: FoxYTuD0wn1.0.2.1.rar
or
Download FoxYTuD0wn1.0.2.1.rar for free on Filesonic.com

Pamela for Skype Professional Edition 4.7.0.71

Pamela for Skype Professional Edition 4.7.0.71
Pamela for Skype Professional Edition 4.7.0.71 | 10.5 Mb
Pamela is a Skype certified plug-in or add-on software application that runs alongside Skype to enhance Skype with functions that make using Skype even more fun and effective. Features of Pamela Basic: Start Assistant to make configuration of options even more simple. Automatic program update function. Keep up to date with latest releases automatically! Full support of multi-user environments. Integrated crash reporter tool. Help us make Pamela even more stable and reliable! Option to play all Pamela recordings with the default Windows player instead of the built in player of Pamela. Pamela will save the name and time of the person that tried to contact you when you where in a call and Pamela sent auto reply. This so you can easily call them back when you finish your call.

Highlights:
• Intuitive, Skype compatible user interface
• Record any type of Skype call
• Record Skype Video and Chats
• Local Skype answering machine
• Video answering machine
• Supports Skype Voicemail
• Copy Skype Voicemails to local file
• Birthday Notifications
• Rich Mood Editor. Spice up your Skype Mood
• Take notes during a call or add them later
• Use the Emotion Sounds Player to play cool sounds during a call
• Automatic call recording (In- Outbound or both)
• Disable call recording warning
• Automatic Skype chat reply while you are away
• Supports natively MP3, WAV and OGG. Additionally any installed codec too
• Skype Podcasting and Blogging
• Much more...

Home Page - http://www.pamela.biz/

Download links:

Hotfile.com: One click file hosting
or
Download pamela.for.skype.4.7.0.71-MPT.rar for free on Filesonic.com

AI Roboform Enterprise 7.2.2 Final

AI Roboform Enterprise 7.2.2 Final
AI Roboform Enterprise 7.2.2 Final | 5.96 MB
AI Roboform Pro - a program that is a password manager and web form filler that completely automates password entering and zapolnenie forms. With this program, users' personal data entered once and then any form on any site is filled with one click. Program supported by filling out forms in various languages.

RoboForm can read and fill in any form, even the woman he has never seen before. Practically, this program does the same thing that people in completing forms - detects, processes and fills out the form below.

Key features:
• Automatic saving of the Internet passwords
• AutoFill passwords to login form
• Pressing the button Login for
• Filling out forms with your personal information
• varying remains classified information and notes
• Generating random passwords
• Encrypt passwords and personal data using AES, Blowfish, RC6, 3-DES or 1-DES
• Storing all the information on your local computer
• Work with USB-drive for ultimate portability
• Sync your passwords and notes to Palm or Pocket PC
• Provide backup and restore, print your passwords
• Using advanced features
• Work on Windows as a supplement to the browser
• Work with browsers Internet Explorer, Netscape, Mozilla, Firefox

Version 7.2.2
* Chrome: speed up on pages with huge forms such as usairways.com.
* Chrome: fix Auto-Submit on pages such as jetblue.com.
* Firefox: if JS toolbar is shown, always show full toolbar on top of it.
* Firefox: remove obsolete icons from browser context menu.
* Fix integrity check of RoboForm, so that corrupted RoboForm DLL is detected.
* RF Everywhere: increase max allowed interval between syncs from 7 days to 30 days.
* IE: show lower toolbar on popup windows, such as login at anz.com.
* ALT + click now forces non-modal AutoSave toolbar, not modal Auto-Save dialog.
* Win32: fix crashes when integrating with SAP application.
* Installer: fix does not automatically close processes when doing silent install.
* Enterprise: make EXE and MSI installers more silent.
* Enterpirse: fix bugs in MSI installer, when installed from group policy.
* Import: add import of passcards from Norton Identity Safe CSV file.
* Editor: allow pulling selection onto Identity summarry fields.
* Editor: fix squares at the end of the lines.
* Editor: fix clicking fingerprint icon shown Cannot load DLL message.

Operating system: Windows ® XP/Vista/Seven
Language: Multilanguage
Released: 2011
Medicine: Yes

Download Links:

cFosSpeed 6.50 Build 1810 Final Multilingual

cFosSpeed 6.50 Build 1810 Final Multilingual
cFosSpeed 6.50 Build 1810 Final Multilingual | 9.0 MB
cFosSpeed is a network driver, which attaches itself to existing Internet connections. It then optimizes data transfer by means of Traffic Shaping. Traffic Shaping is a method for optimizing the Internet traffic. It allows maximum speed while ensuring minimal Ping. You can use cFosSpeed with a router and/or a DSL-modem or cable-modem. You can also use cFosSpeed with other types of Internet access, ie. whenever you already have an existing Internet connection. cFosSpeed supports a wide variety of connections, like DSL, cable, ISDN, UMTS, etc.

Key features of "cFosSpeed":
· Free configurable Prioritization
· self-calibrating
· Layer-7 Analysis
· Firewall
· automatic router detection
· optimal Dial-Up connections
· VPN - WLAN - WiFi - MTU-Optimization
· Multi User Features
· broadband limits

OS: Win XP/2000/Vista/Win 7
Language: Multilingual

Download links:

Data Recovery Tips for Best Result

Anytime your laborious drive crashes otherwise you lose your data, you’ll need to turn to data recovery to properly restore your information. data recovery is something most pc users are at home with, as a majority of us have had to show to data recovery at some point in time. even supposing laborious drives are getting better and better, they are still mechanical and will forever encounter issues.

The first issue to try and do, before any issues happen, is to forever keep a copy your data. If you create backups of your information, you’ll be well prepared within the event of a disaster. This way, albeit your laborious drive can not be repaired and also the data is lost forever, you’ll have the rear ups to continue going as traditional. If you didn’t create back ups, you’ll notice the case terribly traumatic once you discover that your data can not be recovered.




Most laborious drives will last for years before they begin to encounter any style of malfunction or hardware issues. you can facilitate stop data loss by turning off your pc when it isn’t in use, or shutting it down once you hear the laborious drive creating an odd noise. If the laborious drive starts to malfunction, letting it still run will only do additional harm. If you shut it off immediately and take it to a specialist, you’ll have a much better likelihood of getting it repaired.

With natural disasters, hackers, viruses, or alternative issues, you won’t have the time to react. Before you recognize it, your laborious drive will be damaged and your data will be gone. although this may be terribly frustrating, data recovery will normally bring your information back. All you need to try and do is take the laborious drive to an area specialist, then let them work their magic and show you the ability of information recovery.

There are software programs out there that claim to recover lost data, although you must avoid them the least bit costs. Most of time, these software programs will do your laborious drive additional unhealthy than good. even supposing software could price plenty but skilled data recovery services, the skilled services will guarantee their work. If you switch to software and it only makes things worse - your additional or less out of luck, because the software doesn’t guarantee something.

Anytime your laborious drive fails and you appear to own lost your data, you must turn to skilled data recovery services immediately. they will price you plenty of cash, although they do the job right the primary time. When it involves your data, you actually don’t want to take any probabilities - particularly if you had vital documents and files stored on your laborious drive.

Seo And Domain Names

Should you renew your domain name for a protracted amount of time? And if so, how long is long enough? If you wish to stay before your competition, then you would possibly contemplate observing the length of your time your competitors have registered their domain names. If your competitors have typically renewed their domain names for one or 2 years, you would possibly contemplate registering your domain name for 5 or 10 years. whereas pushing aside your domain name's expiration date might help your search engine rankings, keep in mind that this may be only atiny low victory when it involves search engine rankings.

Its good business sense to register a site for at least 10 years. You don’t want to wear down method|the method} annual process of renewing them once a year. It’s best to obtain the domain names that you want to stay for a short while and renew then on a five to 10 year set up.


If your domain name expires, there's a good chance that somebody can register your domain name immediately once it expires. If, for whatever reason, you don't renew your domain name, somebody watching a 'watch list' of expiring domain names can try to maximize the online business that you have designed over the years. They understand that there's potential web site traffic they will have simply by renewing your old domain name. By renewing your domain name for many years, your domain name won't expire for a short while, and it won't be opened to expired domain name buyers.

If you actually want to stay before the competition, you would possibly contemplate registering or renewing your domain name for a hundred years. Currently, Network Solutions (www.netsol.com) is the only registrar giving the a hundred year possibility, which prices $999.00. GoDaddy (www.godaddy.com), currently offers to renew or register a site name for 10 years, at a discount of $6.95 per year.

Yes, you'll be able to lose crucial positioning in the search engines if you don’t reregister your domain name in time. you may got to begin the SEO method everywhere again!

McAfee Update Manual

DAT files are universal for all McAfee products and represent the latest virus definition files. Automated updates work well, but sometimes they may not complete properly and McAfee offers a manual update capability if needed.

STEPS using XDAT files
  • Each Thursday - Go to this Internet site:
    Downloads - Updates (SDATs, engine - but labled as 4240)
    http://www.networkassociates.com/us/downloads/updates/

    DAT updates (different languages)
    http://www.networkassociates.com/us/...pdates/dat.asp
    Corporate FTP (these DATs works for home versions also)
    ftp://ftp.nai.com/virusdefs/4.x
  • Find file name: 4225xdat.exe and click on it
    (Next week, look for 4226xdat.exe, then 4227xdat.exe)
  •  Click SAVE
  • Select a folder on your hard drive to save it into
  • Once the download is complete, find this folder on your hard drive and double click on the "globe" icon
  • Click NEXT and the SuperDAT utility program updates everything automatically.
  • Click FINISH (and REBOOT only if prompted but this will not be often).

After these 7 STEPS, you will be completely up-to-date.

Note - if you skip a few weeks, going to latest DAT files catches you up. For example DAT 4225 contains protection for over 61,000+ viruses.

[source: harrywaldron on McAfee forum]

Wednesday, February 23, 2011

Hot MP3 Downloader 3.1.4.2 (+ Portable)

Hot MP3 Downloader 3.1.4.2 (+ Portable)
Hot MP3 Downloader 3.1.4.2 (+ Portable) | 15.3 MB
Meet your favorite mp3 downloader - Hot MP3 Downloader is the best music downloading application for you, which can make over 100 million music available to your PC and any other portable devices such as iPod, iPhone, etc. Only 1-click, get your entire genres of complete hot music now!

Key Features:
* 100 MILLION MP3 Available
   Over 100 million mp3 waiting for your discovery and download.
* Show You the Top 100 HIT SONGS
   Recommend USA AIRPLAY HOT 100 every week.
* 14 Catalogs, Versatile Styles
   Various catalogs for your favorites, such as Jazz, R&B, classical, pop, indie, etc. Quick search supports.
* Shut out Any Malware
   Guaranteed to eliminate any form of malware (viruses, spyware, adware, etc). Only safe and clean files.
* Higher Bitrate, Better Sound Quality
   Provide you better music at a higher bitrate of up to 320kbps.
* Support iPod, iPhone and All Other Digital Players
   Hot MP3 Downloader is compatible with any digital players: iPod, iPhone, PSP, PDA, cell phone, etc.

Homepage - Hot MP3 Downloader - Newest And Hottest Program For Listening And Downloading Songs Fastly And Legally - Free Trial!

Download Links:

Hotfile.com: One click file hosting: Hot.MP3.Dl.3.1.4.2.rar
or
Download Hot.MP3.Dl.3.1.4.2.rar for free on Filesonic.com

Messanger Bomb On Yahoo

Yahoo Messenger Boot



















I do't know if this post will be usefull though. I got this from other site/forum with bahasa indonesia (Download HERE for indonesia Version) (sorry if you don;t get the meaning what I want to say here, just use google translate above), be wise don't use to people who don't really know or just making some funnies around, couse it NOT..!!.

On this post I will show you how making other PC got crash or stop responding using simple Messenger. and yes it's Yahoo Messenger. there is a simple step and expert step but first let begin with simple step.

SiMPLE STEP, follow this just like I said.
  • Click Victim Messenger
  • On the text area, just press SHiFT+CTRL+R
  • Press as long as you can
  • Victim will get Instant message that make overload screen and make computer to stop responding
  • As victim, you can block the attact by pressing SHiFT+CTRL+D.

on expert way, Download and install software Black Cyber newest version also you need a few another messenger account to run as exactly the step above If you too lazy to create the account, I just create it for you. Download it HERE

additional message when you using expert way is, if you use 6 account to bomb the victim make sure each YM account get answer by victim, after that just leave it, and start step by step again on SiMPLE way on step No.#2. so the explaination proses is you use each Yahoo Messenger to bomb victim, after you done with YM account #1, start with account no.#2 until account #6. SHiFT+CTRL+D doesn't work on this metod.

Quickly shut down Windows with a double-click [WinXP]

You can create a shortcut on your desktop that allows,you to quickly shut down Windows with a double-click instead of having to use the Start menu.
When you create a shortcut to shut down Windows,you can have Windows count down a specific number of seconds before shutting down or you can have Windows shut down immediately. If you set Windows to count down before.... shutting down, a warning dialog box appears when you double-click the shortcut.

The warning dialog box counts down the number of seconds left before the computer will shut down, If you set Windows to shut down immediately instead of counting down, the warning dialog box does not appear when you double-click the shortcut and Windows shuts down immediately.
The shortcut you create for shutting down Windows works just like any other shortcut.
You can rename or delete the shortcut the same way you would rename or delete any file.
You must be logged on to Windows as a computer administrator to use a shortcut to shut down Windows.

follow this step by step:

- Right-click a blank area on your desktop
- Click New.
- Click Shortcut to create a shortcut on your desktop.
- The Create Shortcut dialog
- To have Windows shut down immediately when you double-click the shortcut, and type shutdown -s -t 00

NOTE: To have Windows count down for a specific number of seconds before shutting down, type the number of seconds instead of 00 in step 4.

- Click Next to continue
- Type the name you want the shortcut to display on your desktop.
- Click Finish to create the shortcut

TRY THIS..!! You can create shortcuts on your desktop that allow you to log off Windows or restart your computer. Perform the steps below, except in step 4, type “shutdown -l -t 00” to have the shortcut log you off Windows or type “shutdown -r -t 00” to have the shortcut restart your computer.

Stop windows from reporting errors

If you encounter a problem in Windows, such as when a program malfunctions, a message will usually appear
that asks if you want Windows to send an error report to Microsoft. If you never want to send error reports,you can prevent Windows from displaying this message.

An error report provides Microsoft with about information the problem that occurred on your computer,which can help them make improvements to Windows.
However, you may not want to send a report if you are concerned about security or if it is inconvenient for you.



For example, if you do not have a constant connection to the Internet, you may not want to connect each time.you need to send an error report. Instead of having to
choose not to send the error report each time you are asked, it is more efficient to prevent Windows from asking you at all.

After you stop Windows from sending error reports to Microsoft, you can choose whether you want Windows to notify you when a critical error occurs on your computer.

You must be using a computer administrator account to change the error reporting settings.

all you have to do is follow this instruction below :

- Click start.
- Click Control Panel.
- Click Performance and Maintenance
- Click System to view the settings for your computer system.
- Click the Advanced tab.
- Click Error Reporting
- Click Disable error reporting to no longer report any errors to Microsoft
- Click OK to save your changes.

Keywords :laptops ,printers ,monitors ,software ,notebooks ,notebook ,netbooks ,memory ,laptop computers ,video games ,storage ,shopping ,reviews ,refurbished computers ,desktops ,networking ,computer components

Speed up your internet browsing

When you connect to a web site your computer sends information back and forth. Some of this information deals with resolving the site name to an IP address, the stuff that TCP/IP really deals with, not words. This is DNS information and is used so that you will not need to ask for the site... location each and every time you visit the site. Although Windows XP and Windows XP have a pretty efficient DNS cache, you can increase its overall performance by increasing its size. You can do this with the registry entries below:

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\
Dnscache\Parameters]

"CacheHashTableBucketSize"=dword:00000001
"CacheHashTableSize"=dword:00000180
"MaxCacheEntryTtlLimit"=dword:0000fa00
"MaxSOACacheEntryTtlLimit"=dword:0000012d

Make a new text file and rename it to dnscache.reg. Then copy and paste the above into it and save it. Merge it into the registry.

Move Firefox Bookmark To Another Computer

Still curios about move your Bookmark to another PC or Notebook so you don't have to visit each page again and make bookmark, AGAIN.....!!! just like the picture in above, it will spend more time to visit one by one again..... ,here how to make happen.

open your Firefox browser and then go to Bookmark > Organize Bookmark [click] it will open new windows.Import & Backup



and then in new window you can do what exactly, Import, Export, Backup or even Restore your bookmark, but in this case we want to move our bookmark to another PC or Notebook. You just need save it first on your old computer and save it in storage device like USB Flass drive, HDD external or even floopy disk [i think this one doesn't exist anymore]

after you click Organize Bookmark, then click import and Backup [this in Firefox Version 3.0]. and choose Export HTML and save with name you wanted, I recommended in your removable device that already mention in above. After that in your new computer or Notebook do like exactly what you do before but in this time choose Import HTML[open new windows] > From an HTML File > Next > Find the files that you have save it in your Removable storage and click OPEN.. That it your done,

To make more suitable view you can delete unwanted bookmark that include on Firefox Bookmark default

Tuesday, February 22, 2011

Creating PDF Files with PDFCreator

Product: PDFCreator
Class: Utility, pdf creation softwae
License: Free, open-source, GPL license.
Operating Systems: Windows
Version Reviewed: v0.9.8
I’ve written a number of times that I often Click2PDF, a PDF creation program, to create .pdf files to document the purchases I make on the Internet. Since Click2PDF is a commercial program (it’s $19.95, and is well worth it), I often look for an alternative that can do the same things — since I don’t want to buy a copy for the computers on which I will seldomly use it.


Tech Tip
What’s a PDF file? That’s the file extension of that is used for Adobe Reader files. By the way, there are other reader files besides Adobe Reader — and which are not as slow or intrusive.
This time, I’ve found PDFCreator, which is a free, open-source program for Windows. PDFCreator sets up as a printer driver do that it is recognized by your computer as a printer. Any program that prints from Windows can print to PDFCreator.
Most pdf creation programs will create a pdf file when you "print" to its "printer." The feature missing in them is the ability to combine multiple diferent print tasks into one file, e.g., saving the description web page of something you’re going to buy, the invoice page as you buy the item, and the receipt / purchase acknowledgment, all in the same file. Most programs make you save each in a separate file.
PDFCreator, though, is a free program that solves that problem, too.
In the next two articles, I’ll show how to create single "print" PDF files and how to create PDF files that include multiple prints. But, first, let’s look at one of the other aspects of PDFCreator, from pdfForge.
The left image below shows the initial setup screen of PDFCreator — there’s nothing surprising on it.
The image on the right, though, is about halfway through the license document and is NOT the license for PDFCreator (that was the first license shown). This license is for the toolbar that PDFCreator wants to install in Firefox and in Internet Explorer. I suggest that you read it very carefully and decide if you want the pdfForge Toolbar to be installed (I didn’t want it).

(click on the image for a larger version)

(click on the image for a larger version)
The next screen defaults to Standard Installation, and unless you’re installing the program on a server to be accessed by other computers, that’s the selection you need.
The image on the right shows a very important screen. Pay close attention to it — I did not on my first installation of PDFCreator.
On it, you can pick whether you wat Yahoo to be your default search engine — I don’t and unchecked this box. That’s how I learned that PDFCreator sets up uninstall options in Windows Add/Remove Programs for both PDFCreator and pdfForge Toolbar.
Initially, I thought that unchecking the Use Yahoo… checkbox would also prevent the pdfForge Toolbar from being installed — it does not. Notice the line that I have circled in red — the PDFCreator Browser AddOn is the pdfForge Toolbar.

(click on the image for a larger version)

(click on the image for a larger version)
If you do not want the pdfForge Toolbar, you must check it on the Select Components screen. I also unchecked the "COM Samples" item, as it seemed to make no sense.
For now, let’s follow through my first installation and see what happens when pdfForge Toolbar is installed.
The image on the right (Select Additional Tasks) has defaults that were fine for me, so I didn’t change anything. I clicked Next and finished the installation process.

(click on the image for a larger version)

(click on the image for a larger version)
At that point, WinPatrol immediately gave me three program alerts warning me of system-level changes. That’s how I realized that I had accidentally installed the pdfForge Toolbar.
The first image warned me that there was a new program SearchSettings.exe that would start up every time I started my computer. I like to minimize the number of things that run automatically, so this was a great warning.
Tech Tip
When WinPatrol warns me of a new auto-starting program, I usually tell it "Yes" to allow the program to auto-start. Then, I open WinPatrol and use its Startup Programs tab to Disable the item.
I could remove it from the list, but Disable is a safer choice — if I make a mistake, I can Enable the item again.
On the right, we see the warning from WinPatrol telling me that the Widgi Toolbar from the pdfforge Toolbar has been installed as a toolbar for Internet Explorer.

(click on the image for a larger version)

(click on the image for a larger version)
In the image on the left below, we see another warning from WinPatrol telling me that same thing as the last message.
However, as we can see in the WinPatrol image on the right, there were two warninngs because the WidgiToolbarIE.dll was set up twice — once as a Browser Helper Object (BHO) and once as a toolbar. We also see that SearchSettings.dll was set up as a BHO.
Notice WinPatrol’s Remove button. All I had to do was to select an item and click Remove, then the second one and then the third.

(click on the image for a larger version)

(click on the image for a larger version)
In the image below, you can see that WinPatrol shows me that the SearchSettings program is set to start automatically when I start (or restart) Windows.

(click on the image for a larger version)
At this point, I uninstalled pdfForge Toolbar and PDFCreator, using the Windows Add/Remove Programs dialog box. Since I intended to install them again, and to skip the toolbar this time, I rebooted.
Tech Tip
If you ininstall and plan to reinstall, always reboot between those two steps. Sometimes Windows has added some of those files to the operating system that’s running, and can’t delete those files. It marks them to be deleted when the computer reboots.
In the two related articles, we’ll look at using PDFCreator to save individual print tasks as individual PDF files and to save multiple print jobs as a single PDF file. 

source :http://www.terryscomputertips.com/computers/creating-pdf-files-with-pdfcreator

Shortcut in Mozilla browser

If you like the mozilla browser, then you must know the shortcuts contained. With the shortcut, you can shorten your keyboard beats.
Here is a list of shortcuts:



CTRL + A Select all text on a webpage
CTRL + B Open the Bookmarks sidebar
CTRL + C Copy the selected text to the Windows clipboard
CTRL + D Bookmark the current webpage
CTRL + F Find text Within the current webpage
CTRL + G Find more text Within the Same webpage
CTRL + H opens the webpage History sidebar
CTRL + I Open the Bookmarks sidebar
CTRL + J opens the Download Dialogue Box
CTRL + K Places the cursor in the Web Search box ready to type your search
CTRL + L Places the cursor into the URL box ready to type a website address
CTRL + F opens your mail program (if you have one) to create a new email message
CTRL + N opens a new Firefox window
CTRL + O Open a local file
CTRL + P Print the current webpage
CTRL + R reloads the current webpage
CTRL + S Save the current webpage on your PC
CTRL + T opens a new Firefox Tab
CTRL + U View the page source of the current webpage
CTRL + V Paste the contents of the Windows clipboard
CTRL + W Closes the current Firefox Tab or Window (More Than if one tab is open)
CTRL + X Cut the selected text
CTRL + Z Undo the last action

Unique Applications Google strip the Human Body

Google has just released its new product called Google Browser Body .By visiting the site, users would be given freedom to 'expose' the whole human body down to the internal organs.

It certainly would be very helpful at all for medical purposes. In these sites, Google provides 3 dimensional version of the human body that can be touched up to the inside. For example, if visitors want to see part of the lung, brain, or other.


Want to pamper its visitors, Google take advantage of the sophistication of the HTML 5, which combined with WebGL. WebGL itself is an Application Programming Interface (API) 3D ground level that can be used in cross-platform. This API will make any browser can display the 3D origin has support HTML5.

It certainly would be very helpful at all for medical purposes.In these sites, Google provides 3 dimensional version of the human body that can be touched up to the inside. For example, if visitors want to see part of the lung, brain, or other.
Want to pamper its visitors, Google take advantage of the sophistication of the HTML 5, which combined with WebGL. WebGL itself is an Application Programming Interface (API) 3D ground level that can be used in cross-platform. This API will make any browser can display the 3D origin has support HTML5.

Smallest Mp3 Player


Audio player 1by1 is a small, fast and practical that it takes up too much memory space as other player-palyer.


1by1 provides a smart and versatile environment to handle your file collection and listen to your tracks - with no need for playlists or databases.
The sound quality is also nice and clean and most important very light in use.
For buddies who are interested please download the application at the Download
The size about 140 kb

Features:
  • Directory Player: directly plays your folder contents
  • Full Resume play: remembers last track and position Full Resume play: remember the last track and position
  • Supported decoders: ACM (mp3), mpglib (mp2, mp3) Supported decoders: ACM (mp3), mpglib (mp2, mp3)
  • Winamp 2.x input plugin support (ogg, wav, cd ..) Winamp 2.x input plugin support (ogg, wav, cd ..)
  • Gapless play · simple crossfading Audio enhancer ·Gapless play simple crossfading Audio · enhancer ·
  • Folder tree file navigation · Directory finder: plays a whole drive file folder tree navigation · Directory finder: plays a whole drive
  • File utils: copy, move, rename while play, delete, date change File utils: copy, move, rename while play, delete, change the date
  • Cue sheet support Playlist support · · Favorites Cue sheet · Support Playlists · Support Favorites
  • Folder compare utility · Rename tool · Big title display the Folder compare utility Change the name of the tool displays the title of Great ·
  • Audio scrobbling support · Unicode support Audio scrobbling · Support Unicode support
  • Very small size Low resource usage · · portable · Size Small Very low use of resources · portable

Monday, February 21, 2011

How to shutdown a website

This is Top 10 Legal Oversights That Can Shut Down Your Website

Although there are many legal problems that can shut down a website, these are some of the more likely culprits:

 
  1. No Formal PoliciesLiability: Many companies float along without any specific written policies regarding website use and appropriate procedures for intellectual property protection. They prefer to keep their heads in the sand until a problem arises. Unfortunately, once a problem does arise, it is often too late to correct it. Furthermore, the lack of existing procedures not only may expose a company to vast amounts of liability, but time wasted determining the appropriate procedures may lead to an irreversible loss of intellectual property or expose a company to punitive damages associated with willful infringement.

    Solution: Companies need detailed written policies and procedures before a problem arises. Although appropriate policies will vary from company to company, the foregoing nine issues are a good place to start when constructing a general policy outline. From the outline, a company can incorporate strategies and key provisions, detailing proper reporting and administrative procedures. The company must treat the resulting policy as a living document. The company should periodically review and update the policy to address changes in the corporate information technology structure, as well as changes in the intellectual property portfolio. Enlisting the assistance of a qualified information technology attorney can be invaluable in adapting a policy framework to a particular business and website. A qualified attorney can also assist in continually modifying the policies and procedures to limit loss, increase efficiency and avoid unnecessary litigation.

    and the last one, but not least this is my favorite. You can Hack the website, for how you do don't ask me there is alot tutorial on the web, e.g: using Perl programming to flood that can make a website crash. I "CAN NOT" show you a tutorial video, start searching from now....Ok Dude
  2. Losing the Farm
    Liability: For many companies, especially information technology companies, intellectual property can be the principal corporate asset. A single patent or trademark may be the difference between a company’s success or failure in the marketplace. A company can lose its intellectual property through inadvisable contracts or simple administrative mistakes. Taking the appropriate steps to protect and maintain a company’s intellectual property is critical. A single misstep could lead to the inadvertent abandonment of a multi-million dollar asset.

    Solution: Intellectual property portfolios are as varied as the companies that own them. As such, there is simply no “one size fits all” portfolio protection strategy. To determine the appropriate strategy a company must develop specific plans and policies geared toward its own intellectual property and strategic initiative. In any company, a well conceived portfolio protection plan, developed prior to the acquisition of new intellectual property, reduces the costs, delays and potential hardships associated with attempts at remedial efforts to regain lost assets. A coordinated intellectual property portfolio protection plan is essential. The plan should include, as appropriate, patent protection, copyright and trademark registration, trade secret security and trade dress monitoring. Having a plan in place not only provides for a more streamlined intellectual property acquisition process, but prevents the loss of invaluable corporate assets and provides a significant in terrorem aspect to deter would-be infringers.
  3. Bad Contracts
    Liability: Given the time and expense involved with executing appropriate contracts, many companies attempt to cobble together parts from existing contracts or forego written contracts entirely. Most of the time, both parties perform their obligations and bad drafting never comes into play. In the instances where a problem arises, however, the lack of an appropriate contract can bring a company’s operations to a grinding halt. In these situations, inartfully drafted contracts can actually be worse that having no contract at all. Improper assessment of a company’s existing intellectual property portfolio, information technology procedures and existing security policies can have catastrophic consequences. A company can be gutted of its intellectual property and racked with lawsuits relating to its actions or failures to act. Even if an appropriate contract is in place, failure to inform key personnel of important contractual provisions may lead to inadvertent breaches which, in turn, could lead to large liabilities for the company.

    Solution: It is critical to coordinate with outside legal counsel to develop comprehensive contractual strategies to prevent any intellectual property from slipping through the cracks. Rigorous review of third party contracts is also essential to ensure the availability of an exit strategy and to prevent overreaching contract provisions from crippling the company. The time and cost associated with drafting appropriate contracts and bringing key personnel into the fold initially may seem burdensome. Over time, however, as templates for particular strategies emerge, the time and costs decrease, and the preparation actually increases, rather than decreases, efficiencies. Compared to the time and costs associated with litigating over misdrafted or absent contract points, proper contract preparation translates into a very minimal expenditure.
  4. No Coordination
    Liability: Costly litigation often arises as the result of everyone in the company thinking someone else is handling the problem. Failure of key personnel to coordinate with one another can lead to numerous types of liability. Nowhere is this more of a concern than in the area of online activities. Not only may the company be liable for these failures, but officers and directors may be held personally liable if they were made aware of the problem, but failed to take appropriate action.

    Solution: Companies must develop a coordinated chain of command. Written reporting procedures and protocols for addressing IT issues on a timely basis are imperative. Designating a Chief Information Officer (“CIO“) to coordinate directly with the Board of Directors can reduce critical delays and failures associated with online and other information technology issues.
  5. Breaking the Law
    Liability: Hundreds of laws govern websites and it is often difficult to navigate the maze of regulation with any precision. Many of these laws are industry specific and companies falling under their purview must follow them to the letter. Failure to comply with federal legislation, such as COPPA, Graham-Leach-Bliley, HIPAA, or international conventions such as the EU Directive, could lead to drastic penalties. Fines and injunctions associated with failure to comply with federal and/or international law are indeed costly. The costs associated with litigating and defending liabilities associated with breaking these laws, however, are often even more costly and burdensome.

    Solution: For any company that relies on its online presence for business should have an internal regulatory compliance committee. The committee is responsible for following statutory regulations governing the company and its website. Outlining policies to comport with such regulations far in advance of their implementation deadline dates is critical. Ambiguities inherent in legislation often make strict compliance difficult. It is, therefore, often necessary to enlist the assistance of outside legal counsel to coordinate compliance efforts and respond to government agencies regarding specific laws. Addressing issues early can often avoid crippling compliance issues.
  6. Failure to Protect Intellectual Property
    Liability: The primary asset of most online retailers, software companies and companies with solid brand identity is intellectual property. Whether it is trademarks, customer lists, proprietary technology or patents, these companies depend on their intellectual property to stay in business. Unfortunately, reclaiming intellectual property that has become lost or moved into the public domain is not possible. Failure to properly protect these assets could single-handedly destroy an entire company.

    Solution: Due diligence is the first step. Find out what intellectual property the company thinks it has and collect the documentation regarding ownership. Many items, such as the design of a website, are owned by the developer, even though the company dictated the parameters and fully paid the developer for the time involved in creating the site. If a company discovers that some of the intellectual property has been improperly transferred, the company must immediately execute and file the appropriate paperwork with the appropriate entities to attempt to secure rights which became lost, or which remained with the owner after the “transfer.” A well documented intellectual property portfolio allows easy analysis and access to intellectual property transfer documentation. Additionally, intellectual property transfer procedures should also be incorporated into the company’s policy. Most importantly, appropriate transfer documentation should always be drafted and executed well prior to any use of intellectual property received from outside the company.
  7. Security Breaches
    Liability. Lapses in security can translate into damages many times the value of the entire company. Security breaches may arise from hackers, who do it for fun or profit. The most common security breaches, however, result internally from disgruntled or careless employees. Damages associated with information technology security breaches total over $1.5 trillion annually.

    Solution. As the types of security breaches are as varied as the types of companies, companies must carefully tailor appropriate security plans to the particular type of website and its associated vulnerabilities. Companies must adopt a strict security policy, even if one is not legally required. Such policies should be detailed, including flexibility and remedial protocols in the event of a breach.
  8. Intellectual Property Infringement
    Liability: Liability for intellectual property infringement can range from an injunction to a multi-million dollar judgment. Online infringement of patent, copyright, trademark, trade secret or trade dress often leads to a website being judicially removed. For a company that relies on its website for sales and communication, the ramifications can be catastrophic. If the company becomes aware of an accusation of infringement and fails to take immediate remedial steps, the court may award punitive damages and order the company to pay the intellectual property owner’s attorney fees as well.

    Solution: Everyone associated with the company website must be acutely aware of the proper use of trademarks, copyrighted material and patentable processes. Companies can assist employees and their website developer by adopting a detailed policy relating to the use and/or dissemination of intellectual property. It is critical that all intellectual property used on the website is owned by the company or properly licensed. No material should be assumed to be “freeware,” in the public domain or corporate property without detailed documentation to that effect. As no policy or documentation can absolutely insure the provenance of intellectual property, every company must have a contingency procedure in place. Once an allegation of infringement is levied, time wasted determining the appropriate course of action can cause the liability to skyrocket. Informing employees of the appropriate procedures in advance, can be the difference between simply removing the infringing material from the website to having the company’s online operations brought to a grinding halt.
  9. Privacy Breaches
    Liability: Failing to properly inform website visitors of the company’s privacy policy, or using confidential information in a manner not stipulated in the policy, could lead to severe repercussions. Although the monetary damage may indeed be high, the majority of the liability typically stems from the bad publicity surrounding such breaches. While many privacy breaches go undetected and are, therefore, not associated with any direct liability, large-scale or egregious breaches can quickly devolve into a financial and public relations nightmare.

    Solution: Companies must post a detailed privacy policy which dictates the disposition and security associated with various types of private information collected from users. As it is very difficult to retroactively broaden a privacy policy once information has been collected, it is critical not to adopt a policy which is too restrictive in scope. A properly worded policy will be sensitive to how the collected information may be used in the future. Companies must also be sure that privacy policies comport with all legal and regulatory restrictions pertaining to the particular type of business, the type of user providing the information and how the company will use the information.
  10. No Website DisclaimerLiability: The liability depends on the type of disclaimer omitted and the resulting damage. Problems arise when a website reasonably leads someone to believe something that ends up causing them damage. If the website causes them to forego an opportunity or take some action based upon information provided on the website, the website owner can be held liable. Disclaimers typically relate to errors or omissions on the website, third party links and the website not constituting an engagement of any kind. While it is a good idea to include all necessary disclaimers, too many disclaimers can lead to additional problems. In theory, nearly every legal issue could be the subject of disclaimer. Including irrelevant, redundant or non-applicable items in disclaimers can diminish the legal effectiveness of the most important disclaimers. This type of overkill can potentially destroy the liability insulation the disclaimers were designed to provide.

    Solution: While some websites may not need any disclaimer, others may need very broad and detailed disclaimers. Determining the appropriate metes and bounds of the desired disclaimer, without going overboard is often difficult. Drafting proper disclaimers requires a thorough review of the information contained on the website, as well as the circumstances surrounding the collection, distribution and presentation of information in association therewith.




Wednesday, February 2, 2011

Thesis Seo Blogger Template

Thesis Seo Blogger Template. Thesis Seo adalah template Blogger seo friendly gratis yang di desain oleh Blog Juragan. Desain template ini sangat simpel dengan 1 header dan sidebar kanan serta halaman posting. Kecepatan? untuk kecepatan tidak perlu di ragukan lagi karen template ini sangat minimalis dalam penggunaan gambar atau Image, jadi kecepatan penuh kwkwk. Silahkan lihat template blogger

Ad Placement

Intermezzo

Travel

Teknologi