GO TO RELATION BLOG

  • About MD5 - MD5 is an algorithm that is used to verify data integrity through the creation of a 128-bit message digest from data input (which may be a message of any l...
    15 tahun yang lalu

Minggu, 28 September 2008

About IPSwicth WhatsUpGold Release Notes v11.0.3

About IPSwicth WhatsUpGold Release Notes v11.0.3



just visit that link...

Jumat, 26 September 2008

More About Knoppix

Starting out with Knoppix

The easiest way to begin your own use of Knoppix is with a vended CD-ROM. Almost a score of distributors in Northern Europe, the United States, and Australia process orders for Knoppix CDs, including betas.

If you have bandwidth to burn, you can download the nearly 700-MB Knoppix ISO image, available at no charge through the Knoppix download/order page (see Resources). Mirrors are abundant around the world. Remember that you can burn a CD-ROM from any operating system; you don't need Linux to create a Knoppix CD.

With a standard Knoppix CD-ROM in hand, you've almost reached Linuxland. All you need is a capable PC-class machine: 80486 or later, at least 20 MB of RAM (although with anything less than 128 MB, you'll have to give up office products and perhaps the desktop manager or even X11 server), standard SVGA, and a means to boot. Even without these, it's often possible to use Knoppix. Look first, though, at a conventional situation:

* If the PC boots from CD-ROM, slide in the Knoppix CD and you should have a recognizable, useful Linux two minutes later. Many BIOSes have the capability to boot from CD-ROM but aren't configured for it. In this case, you might need to restart the PC and enter "BIOS setup" or "BIOS features" by pressing Delete or another hardware-specific key on startup. When you configure the boot medium, remember that it doesn't have to be the CD-ROM exclusively, or even first; it's fine to sequence a floppy drive before the CD-ROM. All you need is to ensure that the CD-ROM is present as a recognized boot source. Save the new configuration, and you should be ready to start.
* An alternative is to boot from a floppy disk that recognizes the CD-ROM and passes off boot control to the latter. These are often called "startup diskettes." The Knoppix image includes a "rawrite" program, which prepares such diskettes.

If Knoppix works well for you, it's natural that your next instinct will be to change it. While customization of Knoppix isn't a secret, most effort on the project has gone to making the standard installation "bullet-proof." Among the several distinct ways to alter Knoppix, the one likely to be of broadest interest is remastering, during which you can substitute your own software for a portion of that on the standard Knoppix CD-ROM. Toward the end of 2002, Jubal John prepared an authoritative "How to remaster ..." document, listed in Resources. This process is a rather delicate one, and too involved to abbreviate here. The main difficulty is that low-level management of disk partitions risks system integrity, if anything goes wrong.

Knoppix alternatives

I'm enthusiastic about Knoppix, and I'm far from alone. I've heard from dozens of administrators and network managers with such affection for Knoppix that they "wouldn't leave home without it." Any Linux professional or hobbyist operating in an environment that's at all dynamic -- even just an occasional need to run on others' equipment -- should try out a copy of Knoppix. The cost to do so is vanishingly low, and the potential benefits and convenience are quite high.

Knoppix has also proven friendly to business initiatives. Knopper relates that "there are many Knoppix derivates around; some have been published by the purchasers, and some are used only internally inside a company. It is the customer's decision whether or not to publish the free software product he purchased, since the GPL does not require you to publish or give away a customized version, and does not even force you to include only free software on the same media. So, some companies use Knoppix as a platform for their free, or also proprietary, software, in order to show a demo version of their product to potential customers without the hassle of an installation on hard disk before they can use it."

Be aware, though, that there are specific applications of Knoppix where alternatives might serve you better. The Resources section shows a few of these. If you work much with older equipment, for instance, Knoppix probably isn't practical. Knoppix's standard configuration demands too much memory -- 32 MB isn't enough. That's a case where projects such as muLinux are more likely to help.

Knoppix can also be viewed as a "least common denominator": its purpose is to get the computer running with as little delay or human assistance as possible. Among other consequences, this means that standard Knoppix gives users no chance to configure exotic video or network settings before KDE comes up.

Products like SuSE's Live Eval take a different approach. Live Eval aims to mimic as much of a full SuSE distribution as possible from a single CD-ROM. In particular, it expects user interaction for its boot sequence and configuration. This gives more flexibility, but even an experienced SuSE engineer told me it takes around seven minutes to boot to the point Knoppix typically arrives at in under two. On the other hand, a Live Eval session affords a more accurate glimpse of what it's like to use a full-blown Linux distribution in a standard working environment.

Pascal Scheffers, a programmer with Erasmus University, described still another situation where Knoppix and vendor products provide different solutions. Suppose you need to test the installation of a product. If the tool at hand is Knoppix, you might dedicate one host to installation tests, and perhaps use Ghost (or Ghost-for-Unix) to help automate the installations. Knoppix gives a standard starting point for use of the host.

For this sort of problem, Scheffers likes to use VMware and its "non-persistent" option. VMware can host an operating system within a particular session, exercise an installation, then roll back all changes to their initial state.

DOWNLOAD KNOPPIX

Knoppix boots Linux

Knoppix is a bootable CD. Although it's certainly not unique in that, the organization and content of a Knoppix CD are distinctive. Consider a few scenarios. Suppose you're an instructor. You meet your students in a training room, with only half an hour to check out all the hardware and prepare configurations for them. The result is inevitable: halfway through class, some of your demonstrations won't work, because at least a few of the student machines will have inconsistent Service Pack installations, or hardware that's never been exercised, or an environment customized by a subtle neurotic.

Or perhaps you have piles of commodity hardware. No one particularly cares about all that computing capacity -- except on the few days of the year around the Super Bowl, or Tax Day, or perhaps when your organization runs its quarterly massive simulations of the weather patterns over the North Pacific. How do you bring all those heterogeneous hosts into effective teamwork, without investing too much of your own time in tedious configuration "burn-in"?

Maybe you're just a mobile person; you move around and would happily use whatever desktops are available, but in practice you find they rarely have the software you consider necessary for a minimal working environment. You might want a quick way to set up a security scanner, a well-equipped office automation desktop on a firewalled interior network, or a secure server. Or perhaps you're often called to check out consumer-grade machines with mysterious symptoms. If you could simply exercise a consistent set of diagnostics, you wouldn't have to rely so much on end-user speculation such as, "the modem has a virus, doesn't it?".

These are just a few of the occasions when Knoppix solves simply what otherwise can be thorny problems. Knoppix's inventor, Klaus Knopper, is himself a trainer who launched the Knoppix project "in between 1999-2000," in his recollection, as an educational project and to meet his own requirements.

As 2003 begins, the main Knoppix product is an open source CD-ROM that boots into GNU/Linux, is remarkably effective and swift at detecting hardware and installing correct drivers, and cleverly uses on-the-fly decompression to make room for almost 2 GB of applications and data. Moreover, as Knopper tells it, one of Knoppix's main features is "the GPL license for the software collection as well as all scripts and tools written by me, which allows the recipients to modify, distribute, and sell the CD on their own."

Still, this simple description hides plenty. While Linux adepts often experiment with bootable media, and many applications rely on data compression, Knoppix shows a singular level of polish. It's simple, only because Knopper and a few other project contributors took so much care in constructing it to be simple.

FRAMEWORK

The Microsoft .NET Framework version 2.0 redistributable package installs the .NET Framework runtime and associated files required to run applications developed to target the .NET Framework v2.0.

The .NET Framework version 2.0 improves scalability and performance of applications with improved caching, application deployment and updating with ClickOnce, support for the broadest array of browsers and devices with ASP.NET 2.0 controls and services. For more information on the .NET Framework 2.0

System Requirements

* Supported Operating Systems: Windows 2000 Service Pack 3; Windows 98; Windows 98 Second Edition; Windows ME; Windows Server 2003; Windows XP Service Pack 2

* Required Software:

o Windows Installer 3.0 (except for Windows 98/ME, which require Windows Installer 2.0 or later). Windows Installer 3.1 or later is recommended.
o IE 5.01 or later: You must also be running Microsoft Internet Explorer 5.01 or later for all installations of the .NET Framework.
* Disk Space Requirements: 280 MB (x86), 610 MB (x64)

Instructions

1. Important: Make sure you have the latest service pack and critical updates for the version of Windows that you are running. To find recent security updates, visit Windows Update.
2. Click the Download button on this page to start the download
3. Do one of the following:
* To start the installation immediately, click Run.
* To save the download to your computer for installation at a later time, click Save.
* To cancel the installation, click Cancel.

IMPORTANT: If you have installed previous pre-release versions of .NET Framework v2.0, such as Beta 1, Beta 2 or Community Technical Preview (CTP) builds, then you must uninstall these versions via Add/Remove Programs in Control Panel before installing this final release version.

* Download 2.0 SP1 x86 here.
*Download 2.0 SP1 x64 here.
*Download 3.0 SP1 here.

Rabu, 24 September 2008

MySql Tutor

GROUP BY (Aggregate) Functions

Name Description
AVG() Return the average value of the argument
BIT_AND() Return bitwise and
BIT_OR() Return bitwise or
BIT_XOR()(v4.1.1) Return bitwise xor
COUNT(DISTINCT) Return the count of a number of different values
COUNT() Return a count of the number of rows returned
GROUP_CONCAT()(v4.1) Return a concatenated string
MAX() Return the maximum value
MIN() Return the minimum value
STD() Return the population standard deviation
STDDEV_POP()(v5.0.3) Return the population standard deviation
STDDEV_SAMP()(v5.0.3) Return the sample standard deviation
STDDEV() Return the population standard deviation
SUM() Return the sum
VAR_POP()(v5.0.3) Return the population standard variance
VAR_SAMP()(v5.0.3) Return the sample variance
VARIANCE()(v4.1) Return the population standard variance


This section describes group (aggregate) functions that operate on sets of values. Unless otherwise stated, group functions ignore NULL values.

If you use a group function in a statement containing no GROUP BY clause, it is equivalent to grouping on all rows.

For numeric arguments, the variance and standard deviation functions return a DOUBLE value. The SUM() and AVG() functions return a DECIMAL value for exact-value arguments (integer or DECIMAL), and a DOUBLE value for approximate-value arguments (FLOAT or DOUBLE). (Before MySQL 5.0.3, SUM() and AVG() return DOUBLE for all numeric arguments.)

The SUM() and AVG() aggregate functions do not work with temporal values. (They convert the values to numbers, losing everything after the first non-numeric character.) To work around this problem, you can convert to numeric units, perform the aggregate operation, and convert back to a temporal value. Examples:

SELECT SEC_TO_TIME(SUM(TIME_TO_SEC(time_col))) FROM tbl_name;
SELECT FROM_DAYS(SUM(TO_DAYS(date_col))) FROM tbl_name;

Functions such as SUM() or AVG() that expect a numeric argument cast the argument to a number if necessary. For SET or ENUM values, the cast operation causes the underlying numeric value to be used.

*

AVG([DISTINCT] expr)

Returns the average value of expr. The DISTINCT option can be used as of MySQL 5.0.3 to return the average of the distinct values of expr.

AVG() returns NULL if there were no matching rows.

mysql> SELECT student_name, AVG(test_score)
-> FROM student
-> GROUP BY student_name;

*

BIT_AND(expr)

Returns the bitwise AND of all bits in expr. The calculation is performed with 64-bit (BIGINT) precision.

This function returns 18446744073709551615 if there were no matching rows. (This is the value of an unsigned BIGINT value with all bits set to 1.)
*

BIT_OR(expr)

Returns the bitwise OR of all bits in expr. The calculation is performed with 64-bit (BIGINT) precision.

This function returns 0 if there were no matching rows.
*

BIT_XOR(expr)

Returns the bitwise XOR of all bits in expr. The calculation is performed with 64-bit (BIGINT) precision.

This function returns 0 if there were no matching rows.
*

COUNT(expr)

Returns a count of the number of non-NULL values of expr in the rows retrieved by a SELECT statement. The result is a BIGINT value.

COUNT() returns 0 if there were no matching rows.

mysql> SELECT student.student_name,COUNT(*)
-> FROM student,course
-> WHERE student.student_id=course.student_id
-> GROUP BY student_name;

COUNT(*) is somewhat different in that it returns a count of the number of rows retrieved, whether or not they contain NULL values.

COUNT(*) is optimized to return very quickly if the SELECT retrieves from one table, no other columns are retrieved, and there is no WHERE clause. For example:

mysql> SELECT COUNT(*) FROM student;

This optimization applies only to MyISAM tables only, because an exact row count is stored for this storage engine and can be accessed very quickly. For transactional storage engines such as InnoDB and BDB, storing an exact row count is more problematic because multiple transactions may be occurring, each of which may affect the count.
*

COUNT(DISTINCT expr,[expr...])

Returns a count of the number of different non-NULL values.

COUNT(DISTINCT) returns 0 if there were no matching rows.

mysql> SELECT COUNT(DISTINCT results) FROM student;

In MySQL, you can obtain the number of distinct expression combinations that do not contain NULL by giving a list of expressions. In standard SQL, you would have to do a concatenation of all expressions inside COUNT(DISTINCT ...).
*

GROUP_CONCAT(expr)

This function returns a string result with the concatenated non-NULL values from a group. It returns NULL if there are no non-NULL values. The full syntax is as follows:

GROUP_CONCAT([DISTINCT] expr [,expr ...]
[ORDER BY {unsigned_integer | col_name | expr}
[ASC | DESC] [,col_name ...]]
[SEPARATOR str_val])

mysql> SELECT student_name,
-> GROUP_CONCAT(test_score)
-> FROM student
-> GROUP BY student_name;

Or:

mysql> SELECT student_name,
-> GROUP_CONCAT(DISTINCT test_score
-> ORDER BY test_score DESC SEPARATOR ' ')
-> FROM student
-> GROUP BY student_name;

In MySQL, you can get the concatenated values of expression combinations. You can eliminate duplicate values by using DISTINCT. If you want to sort values in the result, you should use ORDER BY clause. To sort in reverse order, add the DESC (descending) keyword to the name of the column you are sorting by in the ORDER BY clause. The default is ascending order; this may be specified explicitly using the ASC keyword. SEPARATOR is followed by the string value that should be inserted between values of result. The default is a comma (“,”). You can eliminate the separator altogether by specifying SEPARATOR ''.

The result is truncated to the maximum length that is given by the group_concat_max_len system variable, which has a default value of 1024. The value can be set higher, although the effective maximum length of the return value is constrained by the value of max_allowed_packet. The syntax to change the value of group_concat_max_len at runtime is as follows, where val is an unsigned integer:

SET [SESSION | GLOBAL] group_concat_max_len = val;

Beginning with MySQL 5.0.19, the type returned by GROUP_CONCAT() is always VARCHAR unless group_concat_max_len is greater than 512, in which case, it returns a BLOB. (Previously, it returned a BLOB with group_concat_max_len greater than 512 only if the query included an ORDER BY clause.)

See also CONCAT() and CONCAT_WS(): Section 11.4, “String Functions”.
*

MAX([DISTINCT] expr)

Returns the maximum value of expr. MAX() may take a string argument; in such cases, it returns the maximum string value. See Section 7.4.5, “How MySQL Uses Indexes”. The DISTINCT keyword can be used to find the maximum of the distinct values of expr, however, this produces the same result as omitting DISTINCT.

MAX() returns NULL if there were no matching rows.

mysql> SELECT student_name, MIN(test_score), MAX(test_score)
-> FROM student
-> GROUP BY student_name;

For MAX(), MySQL currently compares ENUM and SET columns by their string value rather than by the string's relative position in the set. This differs from how ORDER BY compares them. This is expected to be rectified in a future MySQL release.
*

MIN([DISTINCT] expr)

Returns the minimum value of expr. MIN() may take a string argument; in such cases, it returns the minimum string value. See Section 7.4.5, “How MySQL Uses Indexes”. The DISTINCT keyword can be used to find the minimum of the distinct values of expr, however, this produces the same result as omitting DISTINCT.

MIN() returns NULL if there were no matching rows.

mysql> SELECT student_name, MIN(test_score), MAX(test_score)
-> FROM student
-> GROUP BY student_name;

For MIN(), MySQL currently compares ENUM and SET columns by their string value rather than by the string's relative position in the set. This differs from how ORDER BY compares them. This is expected to be rectified in a future MySQL release.
*

STD(expr)

Returns the population standard deviation of expr. This is an extension to standard SQL. As of MySQL 5.0.3, the standard SQL function STDDEV_POP() can be used instead.

This function returns NULL if there were no matching rows.
*

STDDEV(expr)

Returns the population standard deviation of expr. This function is provided for compatibility with Oracle. As of MySQL 5.0.3, the standard SQL function STDDEV_POP() can be used instead.

This function returns NULL if there were no matching rows.
*

STDDEV_POP(expr)

Returns the population standard deviation of expr (the square root of VAR_POP()). This function was added in MySQL 5.0.3. Before 5.0.3, you can use STD() or STDDEV(), which are equivalent but not standard SQL.

STDDEV_POP() returns NULL if there were no matching rows.
*

STDDEV_SAMP(expr)

Returns the sample standard deviation of expr (the square root of VAR_SAMP(). This function was added in MySQL 5.0.3.

STDDEV_SAMP() returns NULL if there were no matching rows.
*

SUM([DISTINCT] expr)

Returns the sum of expr. If the return set has no rows, SUM() returns NULL. The DISTINCT keyword can be used in MySQL 5.0 to sum only the distinct values of expr.

SUM() returns NULL if there were no matching rows.
*

VAR_POP(expr)

Returns the population standard variance of expr. It considers rows as the whole population, not as a sample, so it has the number of rows as the denominator. This function was added in MySQL 5.0.3. Before 5.0.3, you can use VARIANCE(), which is equivalent but is not standard SQL.

VAR_POP() returns NULL if there were no matching rows.
*

VAR_SAMP(expr)

Returns the sample variance of expr. That is, the denominator is the number of rows minus one. This function was added in MySQL 5.0.3.

VAR_SAMP() returns NULL if there were no matching rows.
*

VARIANCE(expr)

Returns the population standard variance of expr. This is an extension to standard SQL. As of MySQL 5.0.3, the standard SQL function VAR_POP() can be used instead.

VARIANCE() returns NULL if there were no matching rows.

Safe from Hacker

According to a survey commissioned by F-Secure in January, only 7 percent of Americans are confident that they can open e-mail attachments without infecting their computers with malware built by hackers. However, 95 percent of respondents had security software installed on their computers. Needless to say, computer users have little confidence in their computing actions and the security suites meant to defend them.



Ron Teixeira, executive director of the National Cyber Security Alliance, agrees. “You can’t just leave the security software program running and expect yourself to be safe from hackers and malicious attacks. People have started to figure that out,” he said. Teixeira isn’t suggesting that security software doesn’t work. Users just need to be aware of the latest threats and take an active role in protecting their systems and ultimately their identities. He offered the advice of “actively defending your system. For example, users can make sure their security software has all the most recent updates.”
Think Beyond the Security Suite

Other experts argue that the average computer user can do much more to take security action. Mugzzi told us, “What doesn’t break you makes you stronger,” and she learned directly from her hacking experience. “Now, I have specific security programs running on my computer to defend against all types of threats,” she said. Mugzzi uses Keylogger Pro to protect against keylogging attacks (a hacker’s method of capturing and recording user keyboard keystrokes), and she uses IdentityLock to safeguard her passwords. Because Mugzzi does business online she also invested in a corporate software and hardware firewall solution called SonicWall.

If you asked Ryan Russell of El Cerrito, Calif., who is a security researcher and author of Hack Proofing Your Network, what he thought of Mugzzi’s efforts, he would say that she won’t know for sure that her network and PC are safe until she tries to hack herself. His attitude has been that in order to understand attacks and vulnerabilities, you have to understand “how to hack.” He is a believer in “hacking yourself” because if you don’t, the hackers will. “I have received a lot of criticism over the years for providing hacking tips, but it is a solid way to understand how hackers work and how secure your system really is. People learn by doing,” he said.

Russell shared with LAPTOP three simple ways to invade your own computer. The tools he instructed us to use through each of the hacks are publicly available and are used by real hackers. Note: We only encourage the use of these tools on your own PC. If you use any of these tools on a computer or network where you don’t have explicit permission to do so, you could be potentially committing a crime.

Hack Yourself to Save Yourself

download : HackersaVeZipp

Knowledge is Power

Senin, 22 September 2008

Meningkatkan Kecepatan Browser Firefox3

Jika Anda menggunakan koneksi internet jenis broadband, Anda dapat menggunakan feature pipelining untuk meningkatkan kecepatan firefox. hasilnya program firefox yang anda gunakan dapat membuka halaman website lebih cepat secara simultan dan tentunya menghemat waktu yang Anda miliki.

Untuk meningkatkan kecepatan firefox ini, pertama-tama buka program firefox dan ketik "about:config" di dalam address bar lalu "Enter".
Anda akan masuk ke area konfigurasi yang menyajikan bbrp list "Preference Name".
Selajutnya, ketikan "Network.http" pada kolom filter dan tekan "Enter" kembali.

Cari baris "Network.http.pipelining" dam "Network.http.proxy.pipelining" di dalam "Preference Name"

Klik ganda baris "network.http.pipelining" dan "network.http.proxy.pipelining" sehingga kondisi "value" berubah menjadi "True"

Langkah berikutnya, klik ganda baris "Network.http.pipelining.maxrequests". Pada window "Enter integer value" masukkan nilai sebesar 30, lalu tekan "OK".

Terakhir tutup area konfigurasi dan silakan masukan bbrp alamat website yg ingin di jelajah

penulis : Eko.Lanunueardy@chip.co.id
ditulis kembali dari Majalah Chip Edisi 09/2008 halaman 183

http://www.forummikrotik.com/chit-chat/3264-firefox3-meningkatkan-kecepatan-browser.html#post30989

Selasa, 16 September 2008

Tweak Friendster With JS Part 3

11. menghilangkan sesuatu........(ntah apa lah namanya)

A) Hide boxes:
=blogs & review:
Code:
.blogsreviews { display:none;}
.blogs {display:none;}
.reviews { display:none;}
=fan of:
Code:
.myfans {display:none;}
.fanof {display:none;}
=groups:
Code:
.groups {display:none;}
=friends:
Code:
.friends{display:none;}
=photo gallery:
Code:
.photos {display:none;}
=media box:
Code:
.scrapbook{display:none;background:transparent;}
b)add ons:
=menghilangkan "recent updates":
Code:
.user_tracker {
display:none;
}
= code menghilangkan logo,search,dll:
Code:
/* FriendsterMagic - remove top banner */
.banner_ad_fix{display:none;}

/* FriendsterMagic - remove logo */
#logo {display:none;background:transparent;}

/* FriendsterMagic remove search form*/
#search {display:none;background:transparent;}
#search form {display:none;background:transparent;}


/* FriendsterMagic - hide the connection box */
.meettrail{display:none;background:transparent;}

/* FriendsterMagic - hide google ads */
#content_14 {display:none!important;}

/* FriendsterMagic - hide report abuse */
#reportabuse{display:none;}

/* FriendsterMagic - remove featured sponsor */
#marketing_bg{display:none;background:transparent;}
= remove footer:
Code:
#footer_container {
display: none;
}

#footer {
display: none;
}
=hide main navigation,sub navigation.(tombol home,profil,logout,dll):
Code:
#subnav {
display: none;
}

#mainnav, #mainnav .left, #mainnav .right {
display: none;
}

#navdivider {
display: none;
}

#navigation{
dispaly: none;
}
= customize main navigation:
Code:
/* FriendsterMagic - main navigation*/
#mainnav {
margin:0 0 10px 0;
padding:0 0 2px 0;
width:100%;
font-size:9px;
font-weight:bold;
background: url(URL_OF_IMAGE) fixed no-repeat center; #000000;}
=hide main navigations
Code:
#mainnav div.links a:link, #mainnav div.links a:visited, #mainnav div.links a:active { color:#FF0000; text-decoration:none; }
}
#mainnav .left {display:none;}
#mainnav .right {display:none;}
#navdivider {display:none;background:transparent;}
#subnav {display:none;}
*klo navigasi kmu hidden, jangan kmu pake lagi code "costomize main navigation" nya...
percuma..............hauhauhauua

= fiend list dibuat satu colom:
Code:
/* FriendsterMagic - one column friends list */
.friends div.boxcontent{width:100%;text-align:center;}
.friends.flogrid75{text-align:center;width:75px;}
.friends div.viewall a{text-align:center;width:100%;padding-left:20px;}
=image effect:
ada banyak image effect, tapi akoe kasi satu aja dolo ya??
Code:
/* EMOKIDD IMAGE EFFECT*/
img { opacity:.50;filter:alpha(opacity=50) }
a:hover img { opacity:.50;filter:alpha(opacity=50, style=1) }
or u can try dis one:
Code:
/*KHER IMAGE EFFECT*/
a:hover img { filter:alpha(Opacity=100,FinishOpacity=0,Style=2); }
A:hover img{filter:alpha(finishopacity=0, style=2)}
12.dan lain lain
=merubah tampilan foto prymary menjadi gif image
Code:
div.imgblock200 {
background:url(URL_GIF_IMAGE);
background-position: center center;
background-repeat: no-repeat;
height:128px;
width:170px;
}
div.imgblock200 img {display:none !important}
=bullet/icon/emoticon in control panel data:
Code:
.controlpanel .q {background: url(URL) background-attachment: fixed;
background-position:center;
background-position: center left;
background-repeat: no-repeat;}
=bullet/icon/emoticon in control panel buttons:
Code:
#controlPanelButtons a, #controlPanelButtons a:link, #controlPanelButtons a:visited {
background-image: url( URL);
background-attachment: fixed;
background-position: center left;
background-repeat: no-repeat;
background-color: transparent;}
=background di master headers:
Code:
.commonbox h1, .commonbox h2 {
background-color: transparent;
background-image: url(IMG URL HERE);
background-attachment: fixed;
background-position:center;
background-position: center center;
background-repeat: repeat;
text-align:center;}

by : Feri Wiliandi Pradana

Kamis, 11 September 2008

Puppy Linux

What is Puppy Linux?

Basics

Okay, let's get the basics out the way first. If you just want to get on and see Puppy in action for yourself head off to the Manual for instructions on downloading, burning and booting ISOs. Or, if you're actually wondering what on earth an operating system actually is, or what Linux is, or what makes Puppy different, or what it might be able to do for you, read on...

Operating Systems, Linux and little Puppies

Puppy Linux is an operating system, which means it is that which makes a computer able to function at all, it is that which allows all the hardware on a computer to talk to each other and that which enables applications to run. Other famous operating systems are Microsoft Windows, Apple's OSX and MSDOS. Puppy takes its ancestory from Linux and so, like most other Linux-based operating systems, it is a completely free and open source.

There are a number of things that make Puppy different from other Linux derivatives, but the most significant is its small size, around 80MB! This lends itself to some very useful and unique features;

* 'Live' booting from CDs, USB sticks and other portable media.
* Ability to run entirely from RAM, making it unusually fast and particularly relevant to modern PCs with solid state CF drives, such as Wyse & HP/Compaq 'thin clients' and the ASUS EeePC & similar 'next generation' hand-helds.
* Very low minimum system requirements, runs happily on old Pentiums with as little as 32Mb RAM.
* Sub-60 second boot times.

Usability and Compatibility

Though Puppy is small, it's still able to offer the complete range of a applications you'd expect to see on any average computer, like wordprocessors, spreadsheets, internet browsers, games and image editors. Extra software comes in the form of dotpets and dotpups and there are a number of methods to find and install them. There is a Puppy Software Installer (for Puppy 2, for Puppy 3) that offers repository searches and automatic installations, or this website offers the ability to browse and search repositories -- the Puppy forum is also a good place to find newer or rarer applications and drivers.

Puppy is aimed to be as easy to use as possible and very little technical knowledge is assumed. As much hardware is automatically detected as possible, you will often find that, whereas on other operating systems you had to install extra driver software to get your particular device functioning, Puppy will succesfully detect and install the driver without user prompting.



Download New Puppy Linux

Just Searching, Can Get Earnings