CLICK HERE FOR THOUSANDS OF FREE BLOGGER TEMPLATES »
Google
 

Jumat, 22 Februari 2008

Windows Server 2008

News and Reviews

Keep up to date on the latest Windows Server 2008 news and announcements from Microsoft and independent sources worldwide. Here you'll find a compilation of news reports and press releases about Windows Server 2008 and related products, services, and technologies.

  • Windows Server 2008, Vista SP1 hit RC Milestone

    Redmond Magazine Microsoft yesterday continued its hand-in-hand development of Windows Server 2008 and Windows Vista's first service pack, publishing release candidates (RC) for each product. The big updates in Windows 2008 RC1 revolve around enhancements to Group Policy, a management framework first introduced in Windows 2000 Server.

  • Microsoft Primed for a 'Hyper" 2008

    Redmond MagazineMicrosoft looks like it's going to have a hyper 2008. That's because of the introduction of Redmond's first enterprise-class virtualization product, christened "Hyper-V."

  • Analysis: Notable Changes Surface in Windows Server 2008

    ComputerworldMicrosoft announced that Release Candidate 1 (RC1) of Windows Server 2008 has been released to the public. This near-final test build of the server release incorporates a couple of new features and what is sure to be deemed an "enhancement" to the community - new capabilities in Group Policy, and an update to Windows Genuine Advantage.

  • Windows Server 2008 Revealed: Hyper-V virtualization

    ComputerworldHyper-V is the natural next step in Microsoft's virtualization story. With properly equipped hardware, you stand ready to enjoy a number of benefits that weren't possible before.

  • Microsoft Outlines Pricing, Packaging and Licensing for Windows Server 2008, Including the New Microsoft Hyper-V Server Product

    Microsoft Press ReleaseMicrosoft Hyper-V Server gives customers a new server virtualization option that can provide simplified, reliable and cost-effective virtualization solutions which can be easily plugged into existing infrastructure.

  • A Head Full of Windows Server 2008

    eWeekMicrosoft has done a lot of impressive work on Windows Server: faster networking, strikingly mature-looking server virtualization technology and administration interfaces for everything that beats the pants off the competition--both in GUI and command-line flavors. Also impressive was the focus that Microsoft has begun to train on the midsize company market.

  • Oracle, Microsoft Aim for VMware

    Windows IT ProVirtualization was a hot topic again this week, with a number of significant virtualization-related news items hitting the wire. Microsoft announced pricing and a branding strategy for their virtualization offerings.

  • Microsoft to ship Windows Server 2008, over time, in eight flavors

    ZDNetMicrosoft is readying eight SKUs of Windows Server 2008, only some of which will include Hyper-V (the new name for Microsoft’s hypervisor that was code-named “Viridian”).

  • Pricing, "Hyper V" announced for Windows Server 2008

    Network World Windows Server 2008 will be officially launched in February, but announcements continue to dribble out in bits and pieces. The latest round of news occurred today at TechEd IT in Barcelona. Pricing for the eight versions of Windows Server 2008 was announced, as was a new product called Hyper-V.

  • Microsoft's virtualization about face

    CNET News.comOne of today's most interesting tidbits came from Microsoft. Bob Kelly, corporate vice president for the company's server and tools business, announced Hyper-V: This is the official name of the server virtualization technology within Windows Server 2008 that was previously code-named "Viridian."

  • Microsoft Ships SP1, Windows Server 2008 Betas

    Windows IT ProWhile Windows 2008 RC0 isn't demonstrably different from a June pre-release drop, the code does include one little gem: The first public version of Microsoft's virtualization solution, codenamed Viridian.

  • Windows Server 2008 RC0 Tips Up

    The InquirerMicrosoft has put its latest server offering up for grabs as the first release candidate of Server 2008 hits the Web. Windows Server 2008 comes with server and presentation virtualization, IIS 7.0, Server Core, PowerShell, Network Access Protection, Server Manager, and improved networking and clustering.

  • Windows Server 2008 RC0 Available

    eChannelnews.comMicrosoft has reached another milestone with the Release Candidate (RC0) of the Windows Server 2008 operating system, which is now available for download.

  • Windows Server 2008 Release Candidate 0 Ready for Customer Review

    Microsoft Press ReleaseBuilt using an unprecedented level of customer feedback, the advancements in Windows Server 2008 are indicative of Microsoft’s commitment to give customers the tools and applications they want and need in today’s environment.


Rabu, 20 Februari 2008

numbers PROTOCOL

PROTOCOL NUMBERS

(last updated 2008-01-15)

Registries included below:
- Assigned Internet Protocol Numbers

Registry Name: Assigned Internet Protocol Numbers
Reference: [RFC-arkko-rfc2780-proto-update-02.txt]
Registration Procedures: IESG Approval or Standards Action
Note: In the Internet Protocol version 4 (IPv4) [RFC791] there is a field
called "Protocol" to identify the next level protocol. This is an 8
bit field. In Internet Protocol version 6 (IPv6) [RFC1883], this field
is called the "Next Header" field.

Registry:
Decimal Keyword Protocol References
--------- ---------- --------------------------------------- ----------
0 HOPOPT IPv6 Hop-by-Hop Option [RFC1883]
1 ICMP Internet Control Message [RFC792]
2 IGMP Internet Group Management [RFC1112]
3 GGP Gateway-to-Gateway [RFC823]
4 IP IP in IP (encapsulation) [RFC2003]
5 ST Stream [RFC1190][RFC1819]
6 TCP Transmission Control [RFC793]
7 CBT CBT [Ballardie]
8 EGP Exterior Gateway Protocol [RFC888][DLM1]
9 IGP any private interior gateway [IANA]
(used by Cisco for their IGRP)
10 BBN-RCC-MON BBN RCC Monitoring [SGC]
11 NVP-II Network Voice Protocol [RFC741,SC3]
12 PUP PUP [PUP,XEROX]
13 ARGUS ARGUS [RWS4]
14 EMCON EMCON [BN7]
15 XNET Cross Net Debugger [IEN158,JFH2]
16 CHAOS Chaos [NC3]
17 UDP User Datagram [RFC768,JBP]
18 MUX Multiplexing [IEN90,JBP]
19 DCN-MEAS DCN Measurement Subsystems [DLM1]
20 HMP Host Monitoring [RFC869,RH6]
21 PRM Packet Radio Measurement [ZSU]
22 XNS-IDP XEROX NS IDP [ETHERNET,XEROX]
23 TRUNK-1 Trunk-1 [BWB6]
24 TRUNK-2 Trunk-2 [BWB6]
25 LEAF-1 Leaf-1 [BWB6]
26 LEAF-2 Leaf-2 [BWB6]
27 RDP Reliable Data Protocol [RFC908,RH6]
28 IRTP Internet Reliable Transaction [RFC938,TXM]
29 ISO-TP4 ISO Transport Protocol Class 4 [RFC905,RC77]
30 NETBLT Bulk Data Transfer Protocol [RFC969,DDC1]
31 MFE-NSP MFE Network Services Protocol [MFENET,BCH2]
32 MERIT-INP MERIT Internodal Protocol [HWB]
33 DCCP Datagram Congestion Control Protocol [RFC4340]
34 3PC Third Party Connect Protocol [SAF3]
35 IDPR Inter-Domain Policy Routing Protocol [MXS1]
36 XTP XTP [GXC]
37 DDP Datagram Delivery Protocol [WXC]
38 IDPR-CMTP IDPR Control Message Transport Proto [MXS1]
39 TP++ TP++ Transport Protocol [DXF]
40 IL IL Transport Protocol [Presotto]
41 IPv6 Ipv6 [Deering]
42 SDRP Source Demand Routing Protocol [DXE1]
43 IPv6-Route Routing Header for IPv6 [Deering]
44 IPv6-Frag Fragment Header for IPv6 [Deering]
45 IDRP Inter-Domain Routing Protocol [Sue Hares]
46 RSVP Reservation Protocol [Bob Braden]
47 GRE General Routing Encapsulation [Tony Li]
48 DSR Dynamic Source Routing Protocol [RFC4728]
49 BNA BNA [Gary Salamon]
50 ESP Encap Security Payload [RFC2406]
51 AH Authentication Header [RFC2402]
52 I-NLSP Integrated Net Layer Security TUBA [GLENN]
53 SWIPE IP with Encryption [JI6]
54 NARP NBMA Address Resolution Protocol [RFC1735]
55 MOBILE IP Mobility [Perkins]
56 TLSP Transport Layer Security Protocol [Oberg]
using Kryptonet key management
57 SKIP SKIP [Markson]
58 IPv6-ICMP ICMP for IPv6 [RFC1883]
59 IPv6-NoNxt No Next Header for IPv6 [RFC1883]
60 IPv6-Opts Destination Options for IPv6 [RFC1883]
61 any host internal protocol [IANA]
62 CFTP CFTP [CFTP,HCF2]
63 any local network [IANA]
64 SAT-EXPAK SATNET and Backroom EXPAK [SHB]
65 KRYPTOLAN Kryptolan [PXL1]
66 RVD MIT Remote Virtual Disk Protocol [MBG]
67 IPPC Internet Pluribus Packet Core [SHB]
68 any distributed file system [IANA]
69 SAT-MON SATNET Monitoring [SHB]
70 VISA VISA Protocol [GXT1]
71 IPCV Internet Packet Core Utility [SHB]
72 CPNX Computer Protocol Network Executive [DXM2]
73 CPHB Computer Protocol Heart Beat [DXM2]
74 WSN Wang Span Network [VXD]
75 PVP Packet Video Protocol [SC3]
76 BR-SAT-MON Backroom SATNET Monitoring [SHB]
77 SUN-ND SUN ND PROTOCOL-Temporary [WM3]
78 WB-MON WIDEBAND Monitoring [SHB]
79 WB-EXPAK WIDEBAND EXPAK [SHB]
80 ISO-IP ISO Internet Protocol [MTR]
81 VMTP VMTP [DRC3]
82 SECURE-VMTP SECURE-VMTP [DRC3]
83 VINES VINES [BXH]
84 TTP TTP [JXS]
85 NSFNET-IGP NSFNET-IGP [HWB]
86 DGP Dissimilar Gateway Protocol [DGP,ML109]
87 TCF TCF [GAL5]
88 EIGRP EIGRP [CISCO,GXS]
89 OSPFIGP OSPFIGP [RFC1583,JTM4]
90 Sprite-RPC Sprite RPC Protocol [SPRITE,BXW]
91 LARP Locus Address Resolution Protocol [BXH]
92 MTP Multicast Transport Protocol [SXA]
93 AX.25 AX.25 Frames [BK29]
94 IPIP IP-within-IP Encapsulation Protocol [JI6]
95 MICP Mobile Internetworking Control Pro. [JI6]
96 SCC-SP Semaphore Communications Sec. Pro. [HXH]
97 ETHERIP Ethernet-within-IP Encapsulation [RFC3378]
98 ENCAP Encapsulation Header [RFC1241,RXB3]
99 any private encryption scheme [IANA]
100 GMTP GMTP [RXB5]
101 IFMP Ipsilon Flow Management Protocol [Hinden]
102 PNNI PNNI over IP [Callon]
103 PIM Protocol Independent Multicast [Farinacci]
104 ARIS ARIS [Feldman]
105 SCPS SCPS [Durst]
106 QNX QNX [Hunter]
107 A/N Active Networks [Braden]
108 IPComp IP Payload Compression Protocol [RFC2393]
109 SNP Sitara Networks Protocol [Sridhar]
110 Compaq-Peer Compaq Peer Protocol [Volpe]
111 IPX-in-IP IPX in IP [Lee]
112 VRRP Virtual Router Redundancy Protocol [RFC3768]
113 PGM PGM Reliable Transport Protocol [Speakman]
114 any 0-hop protocol [IANA]
115 L2TP Layer Two Tunneling Protocol [Aboba]
116 DDX D-II Data Exchange (DDX) [Worley]
117 IATP Interactive Agent Transfer Protocol [Murphy]
118 STP Schedule Transfer Protocol [JMP]
119 SRP SpectraLink Radio Protocol [Hamilton]
120 UTI UTI [Lothberg]
121 SMP Simple Message Protocol [Ekblad]
122 SM SM [Crowcroft]
123 PTP Performance Transparency Protocol [Welzl]
124 ISIS over IPv4 [Przygienda]
125 FIRE [Partridge]
126 CRTP Combat Radio Transport Protocol [Sautter]
127 CRUDP Combat Radio User Datagram [Sautter]
128 SSCOPMCE [Waber]
129 IPLT [Hollbach]
130 SPS Secure Packet Shield [McIntosh]
131 PIPE Private IP Encapsulation within IP [Petri]
132 SCTP Stream Control Transmission Protocol [Stewart]
133 FC Fibre Channel [Rajagopal]
134 RSVP-E2E-IGNORE [RFC3175]
135 Mobility Header [RFC3775]
136 UDPLite [RFC3828]
137 MPLS-in-IP [RFC4023]
138 manet MANET Protocols [RFC-ietf-manet-iana-07.txt]
139 HIP Host Identity Protocol [RFC-ietf-hip-base-10.txt]
140-252 Unassigned [IANA]
253 Use for experimentation and testing [RFC3692]
254 Use for experimentation and testing [RFC3692]
255 Reserved [IANA]


REFERENCES
----------
[CFTP] Forsdick, H., "CFTP", Network Message, Bolt Beranek and
Newman, January 1982.

[CISCO] Cisco Systems, "Gateway Server Reference Manual", Manual
Revision B, January 10, 1988.

[DDN] Feinler, E., Editor, "DDN Protocol Handbook", Network
Information Center, SRI International, December 1985.

[DGP] M/A-COM Government Systems, "Dissimilar Gateway Protocol
Specification, Draft Version", Contract no. CS901145,
November 16, 1987.

[ETHERNET] "The Ethernet, A Local Area Network: Data Link Layer and
Physical Layer Specification", AA-K759B-TK, Digital
Equipment Corporation, Maynard, MA. Also as: "The
Ethernet - A Local Area Network", Version 1.0, Digital
Equipment Corporation, Intel Corporation, Xerox
Corporation, September 1980. And: "The Ethernet, A Local
Area Network: Data Link Layer and Physical Layer
Specifications", Digital, Intel and Xerox, November 1982.
And: XEROX, "The Ethernet, A Local Area Network: Data Link
Layer and Physical Layer Specification", X3T51/80-50,
Xerox Corporation, Stamford, CT., October 1980.

[IEN90] Cohen, D. and J. Postel, "Multiplexing Protocol", IEN 90,
USC/Information Sciences Institute, May 1979.

[IEN119] Forgie, J., "ST - A Proposed Internet Stream Protocol",
IEN 119, MIT Lincoln Laboratory, September 1979.

[IEN158] Haverty, J., "XNET Formats for Internet Protocol Version 4",
IEN 158, October 1980.

[MFENET] Shuttleworth, B., "A Documentary of MFENet, a National
Computer Network", UCRL-52317, Lawrence Livermore Labs,
Livermore, California, June 1977.

[PUP] Boggs, D., J. Shoch, E. Taft, and R. Metcalfe, "PUP: An
Internetwork Architecture", XEROX Palo Alto Research Center,
CSL-79-10, July 1979; also in IEEE Transactions on
Communication, Volume COM-28, Number 4, April 1980.

[SPRITE] Welch, B., "The Sprite Remote Procedure Call System",
Technical Report, UCB/Computer Science Dept., 86/302,
University of California at Berkeley, June 1986.

[RFC741] Cohen, D., "Specifications for the Network Voice Protocol",
RFC 741, ISI/RR 7539, USC/Information Sciences Institute,
March 1976.

[RFC768] Postel, J., "User Datagram Protocol", STD 6, RFC 768,
USC/Information Sciences Institute, August 1980.

[RFC791] Postel, J., "Internet Protocol - DARPA Internet Prnogram
Protocol Specification", STD 5, RFC 791, DARPA, September
1981.

[RFC792] Postel, J., "Internet Control Message Protocol - DARPA
Internet Program Protocol Specification", STD 5, RFC 792,
USC/Information Sciences Institute, September 1981.

[RFC793] Postel, J., "Transmission Control Protocol - DARPA
Internet Program Protocol Specification", STD 7, RFC 793,
USC/Information Sciences Institute, September 1981.

[RFC823] Hinden, R., and A. Sheltzer, "The DARPA Internet Gateway",
RFC 823, BBN, September 1982.

[RFC869] Hinden, R., "A Host Monitoring Protocol", RFC 869,
Bolt Beranek and Newman, December 1983.

[RFC888] Seamonson, L., and E. Rosen, "STUB" Exterior Gateway
Protocol", RFC 888, BBN Communications Corporation,
January 1984.

[RFC905] International Standards Organization, "ISO Transport Protocol
Specification - ISO DP 8073", RFC 905, April 1984.

[RFC908] Velten, D., R. Hinden, and J. Sax, "Reliable Data Protocol",
RFC 908, BBN Communications Corporation, July 1984.

[RFC938] Miller, T., "Internet Reliable Transaction Protocol", RFC 938,
ACC, February 1985.

[RFC969] Clark, D., M. Lambert, and L. Zhang, "NETBLT: A Bulk Data
Transfer Protocol", RFC 969, MIT Laboratory for Computer
Science, December 1985.

[RFC1112] Deering, S., "Host Extensions for IP Multicasting",
STD 5, RFC 1112, Stanford University, August 1989.

[RFC1190] Topolcic, C., Editor, "Experimental Internet Stream
Protocol, Version 2 (ST-II)", RFC 1190, CIP Working Group,
October 1990.

[RFC1241] Woodburn, W., and D. Mills, " A Scheme for an Internet
Encapsulation Protocol: Version 1", RFC 1241, SAIC,
University of Delaware, July 1991.

[RFC1583] Moy, J., "The OSPF Specification", RFC 1583, Proteon,
March 1994.

[RFC1735] Heinanen, J., and R. Govindan, " NBMA Address Resolution
Protocol (NARP)", RFC 1735, Telecom Finland and USC/ISI,
December 1994.

[RFC1819] L. Delgrossi, L. Berger, and ST2 Working Group, "Internet
Stream Protocol Version 2 (ST2) Protocol Specification
- Version ST2+", RFC 1819, August 1995.

[RFC1883] Deering, S., and R. Hinden, "Internet Protocol, Version 6
(IPv6) Specification", RFC 1883, Xerox PARC, Ipsilon
Networks, December 1995.

[RFC2003] Perkins, C., "IP Encapsulation within IP", RFC 2003, IBM,
September 1996.

[RFC2393] Shacham, A., and R. Monsour, R. Pereira, M. Thomas, "IP
Payload Compression Protocol (IPComp)", RFC 2393, Cisco,
Hi/fn, TimeStep, AltaVista Internt, December 1998.

[RFC2402] S. Kent and R. Atkinson, "IP Authentication Header",
RFC 2402, November 1998.

[RFC2406] S. Kent and R. Atkinson, "IP Encapsulating Security Payload (ESP)",
RFC 2406, November 1998.

[RFC3175] F. Baker, C. Iturralde, F. Le Faucheur, B. Davie,
"Aggregation of RSVP for IPv4 and IPv6 Reservations",
RFC 3175, September 2001.

[RFC3378] R. Housley and S. Hollenbeck, "EtherIP: Tunneling Ethernet
Frames in IP Datagrams", RFC 3378, September 2002.

[RFC3692] T. Narten, "Assigning Experimental and Testing Numbers Considered
Useful", RFC 3692, January 2004.

[RFC3768] R. Hinden, Ed., "Virtual Router Redundancy Protocol (VRRP)",
RFC 3768, April 2004.

[RFC3775] D. Johnson, C. Perkins, and J. Arkko, "Mobility Support in IPv6",
RFC 3775, June 2004.

[RFC3828] L-A. Larzon, M. Degermark, S. Pink, L-E. Jonsson Ed., and
G. Fairhurst, Ed., "The UDP-Lite Protocol", RFC 3828, July 2004.

[RFC4023] T. Worster, Y. Rekhter, and E. Rosen, Ed., "Encapsulating MPLS in
IP or Generic Routing Encapsulation (GRE)", RFC 4023, March 2005.

[RFC4340] E. Kohler, M. Handley and S. Floyd, "Datagram Congestion
Control Protocol (DCCP)", RFC 4340, March 2006.

[RFC4728] D.B. Johnson, D.A. Maltz and Y-C. Hu, "The Dynamic Source Routing Protocol
for Mobile Ad Hoc Networks (DSR)", RFC 4728, February 2007.

[RFC-ietf-manet-iana-07.txt]
I. Chakeres, "IANA Allocations for MANET Protocols", RFC XXXX,
Month Year.

[RFC-ietf-hip-base-10.txt]
R. Moskowitz, P. Nikander, P. Jokela, Ed., T. Henderson, "Host Identity
Protocol", RFC XXXX, Month Year.

[RFC-arkko-rfc2780-proto-update-02.txt]
J. Arkko, S. Bradner, "IANA Allocation Guidelines for the Protocol Field",
RFC XXXX, Month Year.

PEOPLE
------
[Aboba] Bernard Aboba , April 1998.

[Ballardie] Tony Ballardie

[BCH2] Barry Howard

[BK29] Brian Kantor

[BN7]

[Braden] Bob Braden, , July 1997.

[BWB6] Barry Boehm

[BXH] Brian Horn <---none--->

[BXW] Bruce Willins <---none--->

[Callon] Ross Callon, , December 1995.

[Carpenter] Brian Carpenter, , January 1995.

[Crowcroft] Jon Crowcroft , June 1999.

[DDC1] David Clark

[DLM1] David Mills

[DRC3] Dave Cheriton

[Deering] Steve Deering, , March 1995.

[Doraswamy] Naganand Doraswamy, , September 1997.

[Durst] Robert Durst, , March 1997.

[DXE1] Deborah Estrin

[Farinacci] Dino Farinacci, , March 1996.

[Feldman] Nancy Feldman January 1997.

[DXF] Dirk Fromhein

[DXM2] David Mittnacht <---none--->

[Ekblad] Leif Ekblad , March 1999.

[GAL5] Guillermo A. Loyola

[GLENN] K. Robert Glenn

[GXC] Greg Chesson

[GXS] Guenther Schreiner

[GXT1] Gene Tsudik

[Hamilton] Mark Hamilton , November 1998.

[HCF2] Harry Forsdick

[Hinden] Bob Hinden, , November 1995, 1997.

[Hunter] Michael Hunter, , July 1997.

[HWB] Hans-Werner Braun

[HXH] Howard Hart

[IANA] Internet Assigned Numbers Authority, , June 1995.

[JBP] Jon Postel

[JMP] Jean-Michel Pittet, , November 1998.

[JC120]

[JFH2] Jack Haverty

[JI6] John Ioannidis

[JTM4] John Moy

[JWF] Jim Forgie

[JXS] Jim Stevens

[KATZ] Dave Katz

[Lee] CJ Lee, , October 1997.

[Lothberg] Peter Lothberg , March 1999.

[Markson] Tom Markson, , September 1995.

[MB] Mike Brescia

[MBG] Michael Greenwald

[McIntosh] Bill McIntosh

[ML109] Mike Little

[MTR] Marshall T. Rose

[Murphy] John Murphy , October 1998.

[MXS1] Martha Steenstrup

[NC3] J. Noel Chiappa

[Oberg] Christer Oberg October 1994.

[Partridge] Criag Partridge , August 1999.

[Perkins] Charlie Perkins , October 1994.

[Petri] Bernhard Petri , March 2000.

[Presotto] Dave Presotto , July 1995.

[Przygienda] Tony Przygienda , August 1999.

[PXL1] Paul Liu <---none--->

[Rajagopal] Murali Rajagopal, , May 2000.

[RH6] Robert Hinden

[RTB3] Bob Braden

[RC77]

[RDH1] Russ Housley

[RWS4] Robert W. Scheifler

[RXB3] Robert Woodburn

[Sautter] Robert Sautter , August 1999.

[SAF3] Stuart A. Friedberg

[SC3] Steve Casner
[SGC] Steve Chipman Chipman&F.BBN.COM>

[SHB] Steven Blumenthal

[Speakman] Tony Speakman , January 1998.

[Sridhar] Manickam R.Sridhar , September 1997.

[Stewart] Randall R. Stewart , April 2000.

[Sue Hares] Sue Hares

[SXA] Susie Armstrong

[SXD] Steve Deering

[Tony Li] Tony Li

[TXM] Trudy Miller

[Volpe] Victor Volpe , October 1997.

[VXD] Victor Dafoulas <---none--->

[Waber] Kurt Waber , August 1999.

[Welzl] Michael Welzl , August 1999.

[WM3] William Melohn

[WXC] Wesley Craig

[Worley] John Worley , June 1998.

[ZSU] Zaw-Sing Su

[]

Selasa, 19 Februari 2008

Hard Disk Run IT on a Virtual




The Microsoft VHD format is the common virtualization file format that provides a uniform product support system, and provides more seamless manageability, security, reliability and cost-efficiency for customers.

Featured VHDs

Updated January 22, 2008


Using the power of virtualization, you can now quickly evaluate Microsoft and partner solutions through a series of pre-configured Virtual Hard Disks (VHDs). You can download the VHDs and evaluate them for free in your own environment without the need for dedicated servers or complex installations. Start now by selecting a lab from the VHD catalog below.

BizTalk Server 2006

Get hands-on experience of the capabilities of BizTalk Server, a business process management (BPM) server, and see how it can enable companies to automate and optimize business processes with powerful, familiar tools to design, develop, deploy, and manage.

Windows Server 2008 Beta 3

Experience the new features and functionality of Windows Server 2008, including built-in Web and virtualization technologies that enable you to increase the reliability and flexibility of your server infrastructure.

Exchange Server 2007 SP1

Reduce the growing cost and complexity of managing a corporate messaging system by providing more control for IT administrators, more value and expanded inbox access for users, and increased security and compliance for the organization as a whole.

Windows Vista Enterprise 30-Day Edition VHD
Road-test the new and improved features of the Windows Vista platform, and get a firsthand look at enhancements to management, usability, and security


Learn More About VHDs

VHD Product Overview
Learn about the VHD Test Drive Program, get an introduction to virtual machine technology, and read about key features and benefits of using VHDs in this overview.

Frequently Asked Questions about VHDs
Find general information about using VHDs, virtual machine technology, requirements, and more in the VHD FAQ.

Microsoft VHD Partners
Learn about Microsoft partners that have pre-configured VHDs available for you to test and evaluate today. If you are Microsoft partner, find out how you can take advantage of this program and distribute your applications in a VHD.

VHD Image Format Specifications
With the VHD format now available as a freely available specification, Microsoft is contributing to the continued expansion of the virtualization market by fostering interoperability among all commercial software solutions, including open source.








Senin, 18 Februari 2008

Computer hardware



Computer hardware is the physical part of a computer, including the digital circuitry, as distinguished from the computer software that executes within the hardware. The hardware of a computer is infrequently changed, in comparison with software and hardware data, which are "soft" in the sense that they are readily created, modified or erased on the computer. Firmware is a special type of software that rarely, if ever, needs to be changed and so is stored on hardware devices such as read-only memory (ROM) where it is not readily changed (and is, therefore, "firm" rather than just "soft").
Most computer hardware is not seen by normal users. It is in embedded systems in automobiles, microwave ovens, electrocardiograph machines, compact disc players, and other devices. Personal computers, the computer hardware familiar to most people, form only a small minority of computers (about 0.2% of all new computers produced in 2003). See Market statistics




Typical PC hardware
A typical personal computer consists of a case or chassis in a tower shape (desktop) and the following parts:




Motherboard
Main article: Motherboard
The motherboard is the "heart" of the computer, through which all other components interface.
Central processing unit (CPU) - Performs most of the calculations which enable a computer to function, sometimes referred to as the "brain" of the computer.
Computer fan - Used to lower the temperature of the computer; a fan is almost always attached to the CPU, and the computer case will generally have several fans to maintain a constant airflow. Liquid cooling can also be used to cool a computer, though it focuses more on individual parts rather than the overall temperature inside the chassis.
Random Access Memory (RAM) - Fast-access memory that is cleared when the computer is powered-down. RAM attaches directly to the motherboard, and is used to store programs that are currently running.
Firmware is loaded from the Read only memory ROM run from the Basic Input-Output System (BIOS) or in newer systems Extensible Firmware Interface (EFI) compliant
Internal Buses - Connections to various internal components.



PCI
PCI-E
USB
HyperTransport

CSI (expected in 2008)
AGP (being phased out)
VLB (outdated)
ISA (outdated)
EISA (outdated)
MCA (outdated)
External Bus Controllers - used to connect to external peripherals, such as printers and input devices. These ports may also be based upon expansion cards, attached to the internal buses.
parallel port
serial port
USB
firewire
SCSI
(On Servers and older machines)
PS/2 (For mice and keyboards, being phased out and replaced by USB.)




Power supply
Main article: Computer power supply
A case that holds a transformer, voltage control, and (usually) a cooling fan, and supplies power to run the rest of the computer, the most common types of power supplies are AT and BabyAT (old) but the standard for PC's actually are ATX and micro ATX




Storage controllers
Controllers for hard disk, CD-ROM and other drives like internal Zip and Jaz conventionally for a PC are IDE/ATA; the controllers sit directly on the motherboard (on-board) or on expansion cards, such as a Disk array controller. IDE is usually integrated, unlike SCSI which is found in most servers. The floppy drive interface is a legacy MFM interface which is now slowly disappearing. All these interfaces are gradually being phased out to be replaced by SATA and SAS.




Video display controller
Main article: Graphics card
Produces the output for the computer display. This will either be built into the motherboard or attached in its own separate slot (PCI, PCI-E or AGP), in the form of a Graphics Card




Removable media devices
Main article: Computer storage
CD - the most common type of removable media, inexpensive but has a short life-span.
CD-ROM Drive - a device used for reading data from a CD.
CD Writer - a device used for both reading and writing data to and from a CD.
DVD - a popular type of removable media that is the same dimensions as a CD but stores up to 6 times as much information. It is the most common way of transferring digital video.
DVD-ROM Drive - a device used for reading data from a DVD.
DVD Writer - a device used for both reading and writing data to and from a DVD.
DVD-RAM Drive - a device used for rapid writing and reading of data from a special type of DVD.
Blu-ray - a high-density optical disc format for the storage of digital information, including high-definition video. Currently a rival of HD DVD.
BD-ROM Drive - a device used for reading data from a Blu-ray disc.
BD Writer - a device used for both reading and writing data to and from a Blu-ray disc.
HD DVD - a high-density optical disc format and successor to the standard DVD. Currently a rival of Blu-ray
Floppy disk - an outdated storage device consisting of a thin disk of a flexible magnetic storage medium.
Zip drive - an outdated medium-capacity removable disk storage system, first introduced by Iomega in 1994.
USB flash drive - a flash memory data storage device integrated with a USB interface, typically small, lightweight, removable and rewritable.
Tape drive - a device that reads and writes data on a magnetic tape, usually used for long term storage


Internal storage
Hardware that keeps data inside the computer for later use and remains persistent even when the computer has no power.
Hard disk - for medium-term storage of data.
Solid-state drive - a device emulating a hard disk, but containing no moving parts.
Disk array controller - a device to manage several hard disks, to achieve performance or reliability improvement.

Sound card
Main article: Sound card
Enables the computer to output sound to audio devices, as well as accept input from a microphone. Most modern computers have sound cards built-in to the motherboard, though it is common for a user to install a separate sound card as an upgrade.


Networking
Main article: Computer networks
Connects the computer to the Internet and/or other computers.
Modem - for dial-up connections
Network card - for DSL/Cable internet, and/or connecting to other computers.
Direct Cable Connection - Use of a null modem, connecting two computers together using their serial ports or a Laplink Cable, connecting two computers together with their parallel ports.


Other peripherals
Main article: Peripheral
In addition, hardware devices can include external components of a computer system. The following are either standard or very common.

Wheel mouse
Includes various input and output devices, usually external to the computer system


Input
Main article: Input
Text input devices
Keyboard - a device, to input text and characters by depressing buttons (referred to as keys), similar to a typewriter. The most common English-language key layout is the QWERTY layout.
Pointing devices
Mouse - a pointing device that detects two dimensional motion relative to its supporting surface.
Trackball - a pointing device consisting of an exposed portruding ball housed in a socket that detects rotation about two axes.
Gaming devices
Joystick - a general control device that consists of a handheld stick that pivots around one end, to detect angles in two or three dimensions.
Gamepad - a general game controller held in the hand that relies on the digits (especially thumbs) to provide input.
Game controller - a specific type of controller specialized for certain gaming purposes.
Image, Video input devices
Image scanner - a device that provides input by analyzing images, printed text, handwriting, or an object.
Webcam - a low resolution video camera used to provide visual input that can be easily transferred over the internet.
Audio input devices
Microphone - an acoustic sensor that provides input by converting sound into an electrical signal

Output
Main article: Output
Image, Video output devices
Printer - a peripheral device that produces a hard (usually paper) copy of a document.
Monitor - device that displays a video signal, similar to a television, to provide the user with information and an interface with which to interact.
Audio output devices
Speakers - a device that converts analog audio signals into the equivalent air vibrations in order to make audible sound.
Headset - a device similar in functionality to computer speakers used mainly to not disturb others nearby




Computer software

"Software" redirects here. For other uses, see Software (disambiguation).
"Scientific software" redirects here. For the company, see Scientific Software (company).

A screenshot of the AbiWord word processing software.
Computer software is a general term used to describe a collection of computer programs, procedures and documentation that perform some task on a computer system.The term includes application software such as word processors which perform productive tasks for users, system software such as operating systems, which interface with hardware to provide the necessary services for application software, and middleware which controls and co-ordinates distributed systems.

Terminology
The term "software" is sometimes used in a broader context to describe any electronic media content which embodies expressions of ideas such as film, tapes, records

Relationship to computer hardware
Main article: Computer hardware
Computer software is so called to distinguish it from computer hardware, which encompasses the physical interconnections and devices required to store and execute (or run) the software. In computers, software is loaded into RAM and executed in the central processing unit. At the lowest level, software consists of a machine language specific to an individual processor. A machine language consists of groups of binary values signifying processor instructions which change the state of the computer from its preceding state. Software is an ordered sequence of instructions for changing the state of the computer hardware in a particular sequence. It is usually written in high-level programming languages that are easier and more efficient for humans to use (closer to natural language) than machine language. High-level languages are compiled or interpreted into machine language object code. Software may also be written in an assembly language, essentially, a mnemonic representation of a machine language using a natural language alphabet. Assembly language must be assembled into object code via an assembler.
The term "software" was first used in this sense by John W. Tukey in 1958 In computer science and software engineering, computer software is all computer programs. The theory that is the basis for most modern software was first proposed by Alan Turing in his 1935 essay Computable numbers with an application to the Entscheidungsproblem

Types
Practical computer systems divide software systems into three major classes: system software, programming software and application software, although the distinction is arbitrary, and often blurred.
System software helps run the computer hardware and computer system. It includes operating systems, device drivers, diagnostic tools, servers, windowing systems, utilities and more. The purpose of systems software is to insulate the applications programmer as much as possible from the details of the particular computer complex being used, especially memory and other hardware features, and such as accessory devices as communications, printers, readers, displays, keyboards, etc.
Programming software usually provides tools to assist a programmer in writing computer programs and software using different programming languages in a more convenient way. The tools include text editors, compilers, interpreters, linkers, debuggers, and so on. An Integrated development environment (IDE) merges those tools into a software bundle, and a programmer may not need to type multiple commands for compiling, interpreter, debugging, tracing, and etc., because the IDE usually has an advanced graphical user interface, or GUI.
Application software allows end users to accomplish one or more specific (non-computer related) tasks. Typical applications include industrial automation, business software, educational software, medical software, databases, and computer games. Businesses are probably the biggest users of application software, but almost every field of human activity now uses some form of application software

Program and library
A program may not be sufficiently complete for execution by a computer. In particular, it may require additional software from a software library in order to be complete. Such a library may include software components used by stand-alone programs, but which cannot work on their own. Thus, programs may include standard routines that are common to many programs, extracted from these libraries. Libraries may also include 'stand-alone' programs which are activated by some computer event and/or perform some function (e.g., of computer 'housekeeping') but do not return data to their calling program. Libraries may be called by one to many other programs; programs may call zero to many other programs.

Three layers

Starting in the 1980s, application software has been sold in mass-produced packages through retailers.
See also: Software architecture
Users often see things differently than programmers. People who use modern general purpose computers (as opposed to embedded systems, analog computers, supercomputers, etc.) usually see three layers of software performing a variety of tasks: platform, application, and user software.
Platform software
Platform includes the firmware, device drivers, an operating system, and typically a graphical user interface which, in total, allow a user to interact with the computer and its peripherals (associated equipment). Platform software often comes bundled with the computer. On a PC you will usually have the ability to change the platform software.
Application software
Application software or Applications are what most people think of when they think of software. Typical examples include office suites and video games. Application software is often purchased separately from computer hardware. Sometimes applications are bundled with the computer, but that does not change the fact that they run as independent applications. Applications are almost always independent programs from the operating system, though they are often tailored for specific platforms. Most users think of compilers, databases, and other "system software" as applications.
User-written software
User software tailors systems to meet the users specific needs. User software include spreadsheet templates, word processor macros, scientific simulations, and scripts for graphics and animations. Even email filters are a kind of user software. Users create this software themselves and often overlook how important it is. Depending on how competently the user-written software has been integrated into purchased application packages, many users may not be aware of the distinction between the purchased packages, and what has been added by fellow co-workers.

Creation
Main article: Computer programming

Operation
Computer software has to be "loaded" into the computer's storage (such as a hard drive, memory, or RAM). Once the software is loaded, the computer is able to execute the software. Computers operate by executing the computer program. This involves passing instructions from the application software, through the system software, to the hardware which ultimately receives the instruction as machine code. Each instruction causes the computer to carry out an operation -- moving data, carrying out a computation, or altering the control flow of instructions.
Data movement is typically from one place in memory to another. Sometimes it involves moving data between memory and registers which enable high-speed data access in the CPU. Moving data, especially large amounts of it, can be costly. So, this is sometimes avoided by using "pointers" to data instead. Computations include simple operations such as incrementing the value of a variable data element. More complex computations may involve many operations and data elements together.
Instructions may be performed sequentially, conditionally, or iteratively. Sequential instructions are those operations that are performed one after another. Conditional instructions are performed such that different sets of instructions execute depending on the value(s) of some data. In some languages this is known as an "if" statement. Iterative instructions are performed repetitively and may depend on some data value. This is sometimes called a "loop." Often, one instruction may "call" another set of instructions that are defined in some other program or module. When more than one computer processor is used, instructions may be executed simultaneously.
A simple example of the way software operates is what happens when a user selects an entry such as "Copy" from a menu. In this case, a conditional instruction is executed to copy text from data in a 'document' area residing in memory, perhaps to an intermediate storage area known as a 'clipboard' data area. If a different menu entry such as "Paste" is chosen, the software may execute the instructions to copy the text from the clipboard data area to a specific location in the same or another document in memory.
Depending on the application, even the example above could become complicated. The field of software engineering endeavors to manage the complexity of how software operates. This is especially true for software that operates in the context of a large or powerful computer system.
Currently, almost the only limitations on the use of computer software in applications is the ingenuity of the designer/programmer. Consequently, large areas of activities (such as playing grand master level chess) formerly assumed to be incapable of software simulation are now routinely programmed. The only area that has so far proved reasonably secure from software simulation is the realm of human art— especially, pleasing music and literature.[citation needed]
Kinds of software by operation: computer program as executable, source code or script, configuration.

Quality and reliability
Software reliability considers the errors, faults, and failures related to the creation and operation of software.
See Software auditing, Software quality, Software testing, and Software reliability.

License
Software license
gives the user the right to use the software in the licensed environment, some software comes with the license when purchased off the shelf, or an OEM license when bundled with hardware. Other software comes with a free software licence, granting the recipient the rights to modify and redistribute the software. Software can also be in the form of freeware or shareware. See also License Management.

Patents
The issue of software patents is controversial. Some believe that they hinder software development, while others argue that software patents provide an important incentive to spur software innovation. See software patent debate

Ethics and rights for software users
Being a new part of society, the idea of what rights users of software should have is not very developed. Some, such as the free software community, believe that software users should be free to modify and redistribute the software they use. They argue that these rights are necessary so that each individual can control their computer, and so that everyone can cooperate, if they choose, to work together as a community and control the direction that software progresses in. Others believe that software authors should have the power to say what rights the user will get.
The former philosophy is somewhat derived from the "hacker ethic" that was common in the 60s ,70s and mid 80s.

freeware

WildSpeller • Business and Productivity

WildSpeller is an English spelling aid for Windows that can help when you know how to spell part of a word. Type the word, using wild cards "*" and "?
WinGhost • Games

Play the ghost word game against WinGhost, try to avoid spelling words of four or more letters. You move first by typing a letter, you and WinGhost take turns adding a letter to the end until someone completes a word, at which point that player loses.
ClicksAndWhistles IRC Client • Internet

ClicksAndWhistles is a free IRC client for Windows featuring multiple server connections. Support for multiple "identities"; Channel favourite list; Floating (desktop) and MDI windows.
TotalEdit • Programming

A powerful editor and notepad replacement TotalEdit makes it easier to complete your file editing and software development tasks. TotalEdit delivers a broad range of features and tools and it can be configured to work the way you want to.
FlexTk Express • System Utilities

FlexTk is an advanced file management toolkit allowing you to classify and categorize files, analyze storage utilization, copy vast amounts of data in a fault-tolerant way, identify duplicate files and free-up wasted storage space.
ScreenVideoPlayer • Home and Hobby

ScreenVideoPlayer is a simple utility which allows you to scroll through screencasts or screen capture videos and search the transcript of the video (only on videos whose transcripts have already been created). It is possible to create bookmarks of favorite locations in the video.
Video Caster • Home and Hobby

Video Caster is a FREE feature packed video to web publishing software. With Video Caster, you can capture video footage from your camera, create video slideshows automatically from your photos, convert video and audio files to streaming media format and publish them to any web servers.
NetworkActiv PIAFCTM • Internet

NetworkActiv PIAFCTM is a network data capturing utility that provides both packet capturing and HTTP (Web) based file capturing. This can allow you to see the data coming in from- and going out to- your computer, such as instant messages, e-mails, and Web pages.
NetworkActiv AUTAPF • Internet

Configurable UDP and TCP port forwarder (redirector). With TCP port forwarding you can hide your web-server behind a gateway computer for added security.
LockCrypt • System Utilities

LockCrypt is an easy-to-use database to guard your personal details and a central location to manage your passwords, accounts and other sensitive data.

Top 10 Freeware

Program of the Month
Stellariumrealistic sky in 3D
more »
Top 10 Freeware Arachnophilia, BonkEnc, Comodo Firewall Pro, Defraggler, FastStone Image Viewer, FeedReader, Periodic Table, Stellarium, System Explorer, WPanorama
more »
Featured Freeware
minipad2Version 2.3.2, release date: February 10, 2008minipad2 is a tiny, multi-page style windows program which integrates all the useful functions including text editor, calculator, reminder, dictionary, text template & clipboard-enhancement . All the contents saved in a single text file. It automatically restores the last state when re-opened. It can be set as start with windows and minimize to the system tray with very few memory take-up.minipad2 is a single-exe green software. It can be directly used when unzipped to a random directory without installation. It adds no key to the system registry, except for the "Run" key when set as start with windows.Screenshot Download (307 kB)
Avignon Concept 2008Version 8.080210, release date: February 10, 2008Avignon Concept is the best freeware solution for all your Personal Data having data management for Books, Movies, Contacts and Music, including a full fledged personal Document manager. Avignon Concept has off-course a To-do manager, which, combined with the Avignon Concept Calendar and Planning functions, gives you the complete system you need. On top of these functions, Avignon Concept also delivers a Finance manager enabling you to run your all your worldwide bank accounts. An Internet manager is also included.Avignon Concept has more than 40 standard reports, which can be run to screen, in PDF format and exported to Excel. These reports have also the possibility to filter your data and give you all the information you need ! Most data can also be imported and exported in XML. Avignon Concept is freeware, has no spyware, and is available in English, Français, Deutsch, Nederlands, Magyar and Polski languages. Real-time change of the language is included in the package.Version 2008-2 (Build 8.080210)Updated:- Synchronise with your hard disks and import your music files (mp3, wav, etc).- Synchronise with your hard disks and import your movie files (mpg, mpeg, etc).- Various modifications in several windows.Screenshot Download (9.7 MB)
Secunia PSIVersion 0.9.0.1, release date: February 7, 2008The Secunia Personal Software Inspector (PSI) detects installed software and categorises your software as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors.Detects and advises on more than 4,200 applications!Windows 2000/XP/2003The PSI is only free for private use.Screenshot Download (459 kB)
Monthly freeware pick (February 2008)
Log Monitor Log Monitor is a files and directories monitoring tool. The program periodically checks selected file's modification time and executes external program if file's time was changed or not changed. For directories it handles such events as files change, addition or removal.Features:- Several files can be monitored simultaneously, each file has its own interval and is processing in the separate thread.- List of files stores in the configuration file.- Minimizes to System Tray.- There is ability to pause monitoring of selected files. "Paused" state can be stored in the configuration file.- Works on the schedule, can check files and directories only during selected time interval and days of week.- Ability to pass changed/added file(s) information to the external program via parameters.Download Log Monitor (596 kB)
Monthly freeware pick


Dup Detector Duplicate images often find their way into collections, even commercial stock collections. Now you can clean them of duplicates and near duplicates. Search a folder (including subfolders) for duplicate and near duplicate images. Match all images or restrict match to same size or same aspect ratio. Dup Detector creates a data file by opening and reading image pixel data for each image in your collection. It then finds duplicates by % match and displays matching pairs from a log file. You may delete a duplicate at any time.Supports 9 image file formats (jpg, bmp, png, tif, pcx, tga, wmf, emf, psp).Download Dup Detector (732 or 599 kB)

The escort made Layout Overlay Friendster

Panduan Membuat Layout Overlay Friendster
Oke, sebelumnya, saya harapkan temen-temen sudah baca bagian ini: Customizing The Friendster Layout.
Langsung aja, pada dasarnya overlay untuk layout Friendster adalah desain web biasa yang ditambahin script dikit biar bisa dipakai untuk menggantikan layout yang ‘biasa’ di Friendster.
Dari bagian Customizing The Friendster Layout, saya kutip sedikit:“Dasar teknik overlay profile Friendster ini adalah seperti ini:Saat browser kita me-load halaman profile Friendster, kita sisipkan suatu perintah javascript untuk memanggil halaman baru yang akan me-nimpal (meng-override atau meng-overlay) halaman profile Friendster kita yang asli. Dimana halaman baru ini merupakan suatu tampilan profile Friendster yang telah kita kostumasi sedemikian rupa agar tampak beda.”
Dimana yang dimaksud dengan ‘halaman baru’ ini adalah desain web (1 halaman) yang telah di-utak-atik agar mempunyai link-link atau hal-hal yang berkaitan dengan profil Friendster kita. Jadi, jika di halaman asli profil Friendster ada link untuk ‘View Comments’, ‘Add Comments’, ‘View Blog’, ‘Home’ dan sebagainya, maka kita buat juga link-link tersebut di desain web yang kita inginkan untuk meng-overlay (me-nimpal atau meng-override) halaman asli profil Friendster kita.Jadi, kalo ingin bisa menggunakan teknik ‘Layout Overlay Friendster’ ini, setidaknya temen-temen harus punya bekal setidaknya mengetahui pengetahuan dasar mengenai html, dan lebih baik lagi mengenai css.
Oke, sampai sini saya harapkan temen-temen sudah ada gambaran mengenai apa yang akan kita lakukan.Sebelum melangkah lebih lanjut, saya harapkan temen-temen sudah punya 1 desain halaman web yang bisa dipakai. Untuk masalah link-link untuk halaman baru, bisa di-save dari halaman asli profil Friendster temen-temen.
Setelah jadi desain web halaman baru tadi (ada link-link dan profil baru kamu, terserahlah…), uploadlah file-file gambar yang akan dipanggil oleh halaman tersebut ke layanan upload gambar gratis, semisal imageshack.us. Setelah selesai di-upload, jangan lupa mengganti link-link gambar di desain web halaman baru agar mengarah ke alamat gambar-gambar yang telah di-upload.
Setelah selesai, mari kita buka situs www.markyctrigger.com.
Di halaman www.markyctrigger.com, kita akan menemukan link-link berikut:
OGStandard v10.4The most popular Overlay Generator for friendster. With the power of AJAX, OGstandard is the fastest among the other Overlay Generator for friendster. By using the Overlay Add-ons, you don’t need to worry about spawning your testimonials, friends, groups, blogs etc. plus! you can also have additional functionalities such as “who viewed your profile”,”anti-poser” etc.
OG++OG++ enables you to apply external source code to overcome friendster character limitations. Like OGstandard, OG++ also supports friendster add-ons with no problems.
OGFlashIf you’re a flash master or you’re using flash to cover up your friendster profile, then this is the right Overlay Generator for you. With OGflash, Major friendster add-ons are supported inside your flash profile.
OGMultiplyIs an exclusive Overlay Generator for http://www.multiply.com. With OGmultiply, you can use multiply add-ons to spawn your contents easily. so what are you waiting for? take generate your code and take advantage with OGmultiply.
OGXangaIs an exclusive Overlay Generator for http://www.xanga.com. OGxanga is currently on beta stage with no add-on support.
OGDownelinkIs an exclusive Overlay Generator for http://www.downelink.com. OGdownelink is currently on beta stage with no add-on support.
Ok, pasti pusing kan,… Hehe…Yang jelas, untuk memakai overlay layout di friendster, kita bisa memakai OGstandard, OG++ dan OGflash. Perbedaan yang utama dari ketiga Overlay Generator (OG) tersebut adalah perbedaan peruntukan.
Dengan OGstandard, maka file halaman baru kita yang telah di-generate akan disimpan di Media Box di halaman http://www.friendster.com/editskin.php
Dengan OG++, maka file halaman baru kita yang telah di-generate akan disimpan di luar (dalam artian di situs atau alamat lain), dan hanya menyimpan file pemanggil halaman tersebut di Media Box. Jadi, dengan OG++, yang terjadi adalah redirect halaman profil friendster kita.
Sedangkan OGflash, dipergunakan untuk halaman baru kita yang mengandung animasi flash.
Klik pada Overlay Generator untuk men-generate halaman overlay kamu.Yah, sekian dulu.
Selamat menikmati

Minggu, 17 Februari 2008

Trojan Hunter 5.0

TrojanHunter searches for and removes trojans from your system. With an easy-to-use Scanner and a Guard that scans in the background TrojanHunter is a must-have complement to your virus scanner. If you are downloading files from the Internet, you need TrojanHunter!

Features:

High-speed file scan engine capable of detecting modified trojans
Memory scanning for detecting any modified variant of a particular build of a trojan Registry scanning for detecting traces of trojans in the registry
Inifile scanning for detecting traces of trojans in configuration files
Port scanning for detecting open trojan ports
The Advanced Trojan Analyzer, an exclusive feature of TrojanHunter, is able to find whole classes of trojans using advanced scanning techniques
TrojanHunter Guard for resident memory scanning - detect any trojans if they manage to start up LiveUpdate utility for effortless ruleset updating via the Internet Process list giving details about every running process on the system, including the path to the actual executable file Accurate removal of all detected trojans - even if they are running or if the trojan has injected itself into another process
Built-in netstat viewer
Extensive help files
Free technical support via e-mail