• HAMAS dan Israel Terbuka untuk melalukan Perpanjangan Gencatan Senjata

    Gaza City - Kelompok Hamas dilaporkan terbuka untuk kembali memperpanjang gencatan senjata dengan Israel menjelang berakhirnya perpanjangan terbaru pada Jumat (1/12) pagi waktu setempat. Amerika Serikat (AS), salah satu mediator dalam kesepakatan antara Israel-Hamas, juga menyerukan agar jeda pertempuran terus berlanjut.

  • Orang-orang yang Dilarang Ikut Pemilu dan Pilpres 2024

    Jakarta,PP88-- UU Pemilu mengatur larangan bagi orang dengan jabatan tertentu dilibatkan dalam Pemilu 2024 mendatang. siapa saja yang dilarang ??

  • Tangkap Laser dari Pesawat Antariksa NASA Berjarak 16 KM

    Jakarta, PP88 -- Badan antariksa AS NASA menangkap sinyal laser yang ditembakkan dari instrumen yang diluncurkan dengan pesawat ruang angkasa Psyche, yang saat ini berada pada jarak 16 juta kilometer dari Bumi.

Friday, March 27, 2009

9 ways to stop smoking

More than 20% of male and female adults in the U.S. smoke cigarettes, while more than 80% of them light up a cigarette every day. The reason why smoking has become such an issue is because the addictive effects of nicotine lead to various types of cancers, strokes, and heart attacks. As such, everyday is the RIGHT TIME to quit smoking.

The main goal of Stop-Smoking-Tips.com is to assist smokers aspiring to quit smoking and prevent smokers from having the urge to start smoking again. Once you quit smoking, you can immediately feel the health benefits of your decision within 24 hours, which could lead you to be free from smoking cigarettes forever.

The information on this website is based on evidence from research on stop smoking programs, stop smoking aids and counseling, which are aimed at helping people to quit smoking for good.

For smokers, to Stop Smoking is really a tough action to take. Majority of smokers want to quit smoking, but find it difficult to do so as nicotine is very addictive and hard to get rid off. We will teach you the easiest, most effective and systematic methods to stop smoking, which are tested by various studies worldwide. We will also provide you with a clear understanding of the dangers of smoking and the benefits of quitting smoking.

There are two factors that will determine your success in quitting smoking for good. They are;

* Will - You must have the desire to give up your habit of smoking and create a strong will to avoid a smoking relapse.
* Mindset – You must learn about the effects of smoking, understand its consequences and face the fact that you need to stop smoking and follow, finish and maintain a quit smoking plan.

The top recommended product by our readers is Smoke Deter
In Six straightforward and easy steps, you can stop smoking and live a normal and healthy life same as that of a non-smoker.

Step 1: Think About Quitting

According to a recent survey, around 15 million smokers try to quit smoking each day. However, less than 3% of these people stop smoking successfully for 3 to 12 months. If you’re thinking about quitting or have stopped smoking but failed to quit, don’t lose hope because smokers often try to quit more than once before they actually succeed.

In this section, you will learn about the history of cigarette smoking, facts about smoking, smoking cessation and benefits of quitting smoking. To give you a strong reason to quit smoking, this section will also tackle dangerous diseases – such as lung cancer, heart disease, strokes, diabetes, etc – caused by smoking cigarettes. In addition, this section will explain the reasons why it is extremely hard to quit smoking, hurdles in quitting and possible nicotine withdrawal symptoms that you may encounter throughout this process.
Step 2: Effects of Smoking

Years of clinical studies have proven that using Tobacco causes people to become sick, disabled or die. Since the first Surgeon General’s Report in 1964, over 12 million smoking-related deaths have occurred. More than 500,000 deaths in the U.S are caused from smoking-related illnesses. Adult smokers reduce their lifespan by an average of 13 to 14 years.

In this section, you will learn about the dangerous effects and health risks of smoking. You will understand the facts about smoking addiction, the hazardous effects of smoking on a pregnant woman, on passive smokers, on your facial charm, on your teeth and on your general well being. You will also learn how stress could play a role in cigarette smoking. This section also deals with the effects on secondhand smoke, effects of smoking on vitamin A and C, dangerous effects of smoking on men and women, as well as the differences between cigar and pipe smoking.
Step 3: Preparing To Quit Smoking

The first key to quitting smoking successfully is planning and preparation. You need to prepare your body and mind before actually quitting. Determine your personal goals, discover your reasons for quitting and get rid of temptations that may become a hindrance to your stop smoking program. Tobacco smoke contains nicotine, a drug that is addictive and can make it very hard, but not impossible, to quit. Similar to other substances drug abuse needs professional help, such as Rehab Programs.

In this section, you will face the facts about nicotine addiction before your last stick of cigarette. You will learn the most effective steps to be followed when planning to quit smoking. You will also find out about the real reason why it is so hard to quit smoking. To help you plan your quit smoking program, you need to confront your personal reasons to start quitting and understand what you need to do stop smoking. This section also deals with the psychological recovery stages to stop smoking and provides helpful tips to quit smoking.
Step 4: Stop Smoking Tips

Even if you have no idea where to start and what to do, you can quit smoking as long as you have the mindset and commitment to do so. Stop smoking tips can help you create a good stop smoking plan and lifestyle changes that could lead to a healthier, smoke-free life.

In this section, you will learn some of the simplest ways and useful tips to quit smoking for good. You can choose from several psychological areas that can help you to stop smoking based on your lifestyle. This section also deals with stop smoking tips that will help your loved ones quit this deadly habit and tips on how to overcome nicotine withdrawal symptoms using an effective stop smoking plan, attending support groups and establishing a smoking cessation program.
Step 5: Stop Smoking Aids

When smoking cigarettes has played a large part in your life, quitting smoking may not be that simple. Fortunately, the U.S. Food and Drug Administration has approved seven over-the-counter stop smoking aids – five of these help in managing nicotine withdrawal symptoms, while the other two help in reducing cigarette cravings.

In this section, you will learn about different proven stop smoking methods like Water Therapy, Psychological Therapy and Nicotine Replacement Therapy. This section also deals with other useful stop smoking aids such as nicotine nasal sprays, nicotine lozenges, nicotine inhalers, nicotine patches, nicotine gum and stop smoking pills.
Step 6: Stay a Quitter

After sometime, some quitters get back to their smoking habit due to temptation and persistent nicotine carving. Some may slip and puff “just one cigarette”, while others experience total relapse. In fact, according to the Center for Disease Control and Prevention, smokers who quit are at greater risk of relapsing in the first three months of becoming smoke-free.

In this section, you will learn effective methods in avoiding nicotine carvings, while training how to control urges through breathing exercises. To understand what you are going to experience through this process, you need to learn and manage nicotine withdrawal symptoms. This section also tackles steps to manage weight gain, discusses FAQ on common frustrations of a quitter, handle traumatic events without a cigarette and other possible solutions for ex-smokers.
Stop Smoking Products

Some people may find it difficult to quit smoking without any aids or nicotine replacements. If you’re one of them, you still have hope because there are numerous stop smoking products available in the market today to make quitting an easier journey.

In this section, you will discover the quit smoking products available in the market today, reviews of each product and ranking of the top quit smoking products. To understand what each product can do for your body, the frequently asked questions section about ‘Quit Smoking’ Products can help you understand and choose an appropriate stop smoking product for your program.
Recommended Quit Smoking Products

The following products are the best quit smoking products available in the market and have been proven to help you stop smoking forever. Do try them out and stay smoke free forever.

Nicocure - Quit Smoking in Less than 30 Days

Stop Smoking in a week 100% Guaranteed! - Stop Smoking for Life
Health Risks of Smoking

Smoking is one of the main causes of serious health diseases, such as cancer, stroke and heart problems. If you have no plans of quitting today, having knowledge of the different types of illnesses that you may experience through years of smoking may change your perception and lead you to stop smoking. Smoking may also increase your Texas Health Insurance.

In this section, you will discover how smoking affects various parts of the body including the eyes, nose, throat, lungs, heart, skin, blood, etc. Here are some possible health effects of smoking:

• Lung Cancer
• Heart Diseases
• High Blood Pressure
• Bad Breath
• Gum Disease
• Depression
• Snoring
• Diabetes
• Infertility on men and women
• Thyroid Disease
• Harmful effects on Bones and Joints

This section also includes tips for reducing the health risks of smoking like heart attacks and blood pressure as well as dangers involved in breastfeeding while smoking

Wednesday, March 25, 2009

the most secure browser "GOOGLE CRHOME"


Race to see which browser is most secure in the case of securities that have not yet ended. But it seems Google Chrome already on winning positions.
Last week, the hackers are invited to attend the CanSecWest security conference, where they ditantang to the browser - the browser have at their heart. FireFox and Internet Explorer dihack and successfully exploited the outside and in, while Apple's Safari, which are not safe is because it Safarilah the worst case after dihack.

What about Google Chrome? Google Chrome is not left out, as many hackers terintimidasi and eventually reverse, This is because Chrome does not interact directly with the OS, so that all must work extra hard to find weaknesses in the browser. They must find a weakness in the browser and "part" that does not interact with the OS.

Monday, March 23, 2009

Intel chip flaw--but what of it?


Intel chip bug? Or simply much more than you need to know? Researchers claim Intel has a serious chip bug. But that all depends.

Security experts who are into the arcana of chip security may find "CPU cache poisoning" riveting and serious stuff. Others, however, may simply scratch their heads and move on.

But let's not move on too quickly. First, a quote from an abstract of the paper that has all, uh, let me rephrase that, some of the chip world abuzz. "In this paper we have described practical exploitation of the CPU cache poisoning...This is the third attack on SMM (system management mode) memory our team has found within the last 10 months, affecting Intel-based systems. It seems that the current state of firmware security, even in case of such reputable vendors as Intel, is quite unsatisfying."

Joanna Rutkowska, who exposed the potential of the so-called Blue Pill flaw back in August of 2006 and founded Invisible Things Lab, wrote that excerpt (along with colleague Rafal Wojtczuk) and obviously takes this very seriously. As do others. Not worried yet? "This is the scariest, stealthiest, and most dangerous exploit I've seen come around since the legendary Blue Pill!," writes Jamey Heary, a Consulting Systems Engineer for Cisco Systems in a Network World blog.

So, now that we know it's scary, what can happen in a worst case scenario? This post will not presume to dive into details. Suffice to say, if a hacker can get access to "privileged" SMM memory, this would essentially allow the hacker to do anything to the target system they want, which is described in more detail here.

In response to an email query, Heary went on to say: "If a hacker can use this new exploit to embed a SMM rootkit (malware) they would have ultimate control over the box (computer). Additionally, it would be virtually undetectable," he said. But added: "In a nutshell. This exploit is very serious and needs to fixed. But...I don't see a mass virus or worm using this. The attacks will be targeted. A rootkit must be perfectly matched to the of hardware. This makes mass infection more difficult."

Rutkowska and Wojtczuk, in the abstract, say that the paper discusses "how to practically exploit this problem, showing working proof of concept codes that allow for arbitrary SMM code execution. This allows for various kind of abuses of the super-privileged SMM mode, e.g. via SMM rootkits," she writes.

Who can do this? "We assume that the attacker has (what is in practice)...equivalent to administrator privileges on the target system, and on some systems, e.g. Windows, also the ability to load and execute arbitrary kernel code," writes Rutkowska and Wojtczuk in the abstract cited above.

And what systems are potentially vulnerable? Though both Intel and Rutkowska say the "attack" presented in the paper has been fixed on some systems, Rutkowska goes on to say: "We have however found out that even the relatively new boards, e.g. Intel DQ35 are still vulnerable (the very recent Intel DQ45 doesn't seem to be vulnerable though). The exploit attached is for DQ35 board--the offsets would have to be changed to work on other boards (please do not ask how to do this)," she writes. (Here is a list of Intel motherboards she refers to.)

These motherboards are used with Core 2 Quad, Core 2 Duo, Pentium, and Celeron processors, according to Intel's Web site.

What does Intel have to say? "We are working with these researchers. We take this research and all reports seriously. Currently as far as we know, there are no known exploits in the wild," said Intel spokesman George Alfs said in a written statement.

One point worth noting is that this is not an Intel errata per se, which Intel typically details in processor specification updates. This is a theoretical attack from a malicious hacker. Nevertheless, users can minimize the risk by keeping up to date on patches and operating system and security suite updates. In particular, BIOS (Basic Input-Output System) and firmware updates for the processors and motherboards referenced above are important.

So, what is the average user to make of all of this? Security attacks and security vulnerabilities have been around since (computer) time immemorial (in the relatively brief history of mass-market computing). A report from U.K.-based technology Web site The Register in 2006, for example, suggested that people should not purchase Core 2 Duo systems (now virtually ubiquitous worldwide) because of security vulnerabilities and cited an open source expert, who prophesied doom and gloom for the Core 2 Duo architecture.

Then there's the whopper of them all. The show-stopping 1994--very different in nature from the SMM vulnerability discussed above-- Intel FDIV bug, discovered by Professor Thomas Nicely, then at Lynchburg College in Virginia. Also referred to as the floating point bug, it wasn't a flaw exploitable by malicious hackers, rather, it was a bug in Intel's original Pentium floating point unit. Certain arcane floating point division operations done on these processors would generate incorrect results.

This bug, covered prominently by The New York Times and CNN at the time, actually had virtually no affect on users, except causing them to panic and, as a consequence, some insisted that Intel provide them with new processors. The recall cost Intel close to half a billion dollars.

Rogue antivirus software pays off for scammers

Online scammers are making a lucrative business out of redirecting visitors from legitimate Web sites to sites that try install rogue antivirus software, according to a report due to be released by security firm Finjan on Monday.

Finjan's Malicious Code Research Center came across a traffic management server in Ukraine used by underground online scammers to keep track of how many redirects their rogue antivirus sites get from legitimate sites that have been compromised.

Typically, rogue antivirus software displays a message saying that the PC is infected and offering antivirus software for sale. In a successful attack, the scammers end up with the victim's credit card information and don't bother to install any legitimate software.

Members of the "affiliate network" who compromise legitimate Web sites get 9.6 cents for each successful re-direct, Finjan said in its latest Cybercrime Intelligence Report. There were 1.8 million unique users redirected to the rogue antivirus software during 16 consecutive days Finjan was monitoring the network, or about $10,800 for each day, the researchers calculated.

Finjan also discovered that between 7 percent and 12 percent of people end up installing the rogue antivirus software and 1.79 percent of them paid $50 for it.

Finjan researchers said they weren't certain how the legitimate Web sites were compromised. Once the sites were compromised, the scammers made heavy use of search engine optimization techniques to get those sites ranked high in search results by dynamically generating search keywords with typos and popular terms that people might use, Finjan said.

Lured by the high ranking on search engines, visitors end up on the compromised sites and are immediately redirected to pages that try to install rogue antivirus software on their computers.

Saturday, March 21, 2009

3G SPEED

3G technology gives iPhone fast access to the Internet and email over cellular networks around the world. iPhone 3G also makes it possible to do more in more places: Surf the web, download email, get directions, and watch video — even while you’re on a call.

Downloading lonelyplanet.com:

iPhone over EDGE
48 seconds
iPhone over 3G
20 seconds
Faster by
2.4 times

How it works.

iPhone 3G uses a technology protocol called HSDPA (High-Speed Downlink Packet Access) to download data fast over UMTS (Universal Mobile Telecommunications System) networks. Email attachments and web pages load twice as fast on 3G networks as on 2G EDGE networks.1 And since iPhone 3G seamlessly switches between EDGE, faster 3G, and even faster Wi-Fi, you always get the best speeds possible.

Talk and browse. At the same time.

iPhone already gives you mobile multitasking. But 3G technology lets you multitask in more places — without connecting via Wi-Fi. Since 3G networks enable simultaneous data and voice, you can talk on the phone while surfing the web, checking email, or using Maps. All from your 3G cellular network.

Go anywhere.

iPhone 3G meets worldwide standards for cellular communications, so you can make calls and surf the web from practically anywhere on the planet. And if you’re in an area without a 3G network, iPhone connects you via GSM for calls and EDGE for data.

More wireless. Less space.

iPhone 3G delivers UMTS, HSDPA, GSM, Wi-Fi, EDGE, GPS, and Bluetooth 2.0 + EDR in one compact device — using only two antennas. Clever iPhone engineering integrates those antennas into a few unexpected places: the metal ring around the camera, the audio jack, the metal screen bezel, and the iPhone circuitry itself. And intelligent iPhone power management technology gives you up to 5 hours of talk time over 3G networks.2 That’s some of the best in the business

Thursday, March 19, 2009

new computer virus "APRIL MOP"

April MOP? Hopefully so. However, according to Computer Associates (CA), on 1 April future, suspected that day will be spread new variants of the worm Conficker (Downadup), ie the Win32/Conficker.C, m mass-produce each day's target of up to 50,000 URLs.
According to the CA, compared to two previous vresi worm, Conficker. C is highly increased in menyusupi how computer users. CA said, this latest version throw off some of the functionality distribution, but probably will not trigger a reaction from the security software because it menjegal tool used to monitor and remove Conficker of systems infected. The dijegal for example, is ProcessExplorer.

This payload is not directly damage the file, but the worm was set to act in the future. He will modify and lower Windows security settings, remove the system restore points, turn off services such as Windows Defender and the Error Reporting Service, kill 23 security-related services, to block access to 71 Web site developer software security and be ready download arbitrary files from a number of sites Web.

According to CA, Conficker.C will try to access the URL of 50,000 each day. Therefore you are advised to update your security software before the worm becomes active.

Microsoft set to unleash Internet Explorer 8

Aiming to better compete against a growing list of rivals, Microsoft on Thursday is launching Internet Explorer 8, the latest version of its Web browser.
Click for gallery

IE 8, as the browser is known, was first shown a year ago and has been in testing for months. The new browser adds security improvements, a private browsing option, as well as the ability to save pre-defined "slices" of a Web page for at-a-glance viewing.

But perhaps the biggest change in the browser is one made behind the scenes--the decision to make the browser better adhere to Web standards. That should make life easier for Web developers in the future, but also poses compatibility challenges for sites that are optimized specifically for older versions of IE. In part to address this, Microsoft has a "compatibility" mode that lets Web sites indicate if they would prefer to be run by an engine that is more like older versions of the browser.

As expected, Microsoft is using the Mix 09 conference for Web developers as the launchpad for IE 8.

The release of IE 8 comes as Microsoft has been losing share to leading rival Firefox and also seeing stepped-up competition from Google and Apple, among others. The global market share of Internet Explorer, which was more than 90 percent in 2004, ended last year at just above 70 percent, according to Net Applications.

Both Google and Apple have been touting the performance of their new JavaScript engines, but Microsoft has sought to downplay speed concerns. The company last week released a video it says shows that, in many cases, IE 8 is just as fast as other browsers in loading popular Web sites.

"In most cases the difference could literally be measured by a blink of an eye," said Microsoft Senior Director Amy Barzdukas. "That kind of speed becomes almost a push."

Despite IE's waning share, the European Union has said it is considering sanctioning Microsoft for bundling a Web browser into its operating system in the first place, a move that it says appears to violate its antitrust laws.

As for IE 8, Microsoft will make it available for download beginning at 9 a.m. PDT on Thursday, but will wait a while before it begins to push it to Windows users who have their computers set to get the latest updates automatically.

A version of Internet Explorer 8 will also be built into Windows 7, though it is one of many Windows components that users will be able to turn off if they wish.

As for the future, Microsoft isn't saying much about its browser plans, but corporate vice president Mike Nash did seek to quash speculation that IE 8 will be the end of the road.

"I can't say what it will be called," he said of the next version of the browser. "But we're not done."

Saturday, March 14, 2009

Microsoft, researcher spar over security patch

Microsoft has released a patch for the hole in 2000 and Windows Server 2003 and 2008 that could allow an attacker to redirect network traffic to a malicious site that has been set to act as a proxy.

Vulnerability, the value of critical by Microsoft, allows IT managers to set the Windows Proxy Auto-Discovery, or WPAD, entry in DNS. If IE or Firefox is configured to automatically detect settings, "the browser will be connected to a computer proxy.

This is a useful feature for companies that want to set their own proxy servers and to monitor employees' Web use for security purposes. But also can be used for a man-in-the-middle type of attack if the outside is able to set the WPAD entry through dynamic DNS update so that traffic is diverted to the IP address dangerous.

The patch solves the problem for systems without a WPAD entry in DNS, by request to block the WPAD for the future. But for the WPAD entry system, the patch did not do anything.

IT managers who install the patch can provide a false sense of security that compromised the system has been set, "said Tyler Reguly, the security research engineer at nCircle, who contacted Microsoft and write a blog post about his concerns with the same night that Microsoft released the update.

In a blog post the next day, Reguly said a Microsoft representative to select him to leave the companies that have touched the WPAD entry is not possible to distinguish legitimate WPAD entries from that taken by an attacker.

But at least Microsoft could have included a pop-up message in the example, the user has a warning that the WPAD DNS entry, and even ask if they want to save or block it, Reguly said.

"I understand the need to maintain the function, but not at the cost of sweeping security issues under the rug," he wrote.

Answers to this problem, Microsoft issued a more detailed technical note on the update on Friday said that the company will not interfere with the function and choose not to violate any risk administrator configuration on the likelihood that the WPAD is not valid, even if it means that an attack will continue to apply.

"This scenario is not a security update, or security update released by Microsoft aims to address," said Microsoft notes. "Security update is intended to help protect the system against the exploitation of the future, and does not aim to cancel any of the attacks have occurred in the past."

Notes and then give instructions for how an administrator can validate the IP address assigned to the WPAD entry in DNS.

In an interview on Friday, Reguly still disappointed with Microsoft and implemented to correct the problem.

"They can be done to reduce the things the fact that they prefer the security function," he said. "They can also change DNS so that you can not update the WPAD dynamic."

Friday, March 13, 2009

How to Caring Hair

1. Wash hair at least 4 times a week.
Rajinlah washing hair rambutmu that remain clean and not drenched. Avoid washing hair too often, for example every day, because this will make your hair dry.

2. Avoid electronic (equipment that uses electricity).
For example, hairdryer, hair clamp, etc.. As much as possible do not use it too often because the electronics that use electricity will damage the hair. Use only if trapped in a situation or may be used occasionally for example at the time to party.

3. Creambath once a week.
Creambath will make the hair becomes more supple, soft, easy to set creambath and will also stimulate hair growth. Try creambath once a week.

4. Avoid chemicals.
As we do, is interested in the natural colors of hair and hair model in accordance with the trend. In fact, I can almost once a month we ngerubah hair color. So also with the model's hair. Keritingan the start destroyed, will certainly make us restless. It is a course we have to do is curl our hair back. So also with the streamlining. If we feel we have the hair curls maize due to begin straightening / hair that long, we will make hair back so that our hair still looks fresh. Without all of that can be harmful to our hair. So I suggested, it is your natural hair beautifully. What is given by God is the most beautiful of all. But if it is terlanjur, I still have ways to improve it.

5. Use a hair vitamin.
If you fall off the hair, use a vitamin tonic or hair growth that can inflame the hair back. This vitamin is also useful for melembapkan hair dry and improve the structure of damaged hair due to chemicals such as cat hair, curling, straightening, etc..

6. Cut the tip of the hair once a month.
The ends of the hair is broken in pieces should be cut so the hair stays beautiful. Besides, this also merupaka one way to the red end of the hair due to damage. This way, hair growth will not be obstructed.

7. Pemijatan do with Aloe Vera.
Aloe Vera aloe vera or terbukti can enrich and strengthen the hair roots. To you the hair fall out, do pemijatan with aloe vera extract once a week. Diamkan few minutes, then Rinse with warm water.

8. Do not tie the hair while sleeping.
Let your hair tergerai during sleep. This will provide the tranquility of hair. Biar ga hair taut gitu loh ...

9. Do not binding hair too tight.
If we tie the hair with the use of rubber, do not let the rubber is too tight binding our hair. This will prevent the hair to be broken-broken (especially fragile hair) and reduce the tension on the hair.

10. Do not mutually shampoo.
This can make the hair so we ketombean lho ...

Tuesday, March 10, 2009

Processor Intel® Core™ i7

Brilliantly fast
With faster, intelligent, multi-core technology that applies processing power where it's needed most, new Intel® Core™ i7 processors deliver an incredible breakthrough in PC performance. They are the best desktop processors on the planet.¹

You'll multitask applications faster and unleash incredible digital media creation. And you'll experience maximum performance for everything you do, thanks to the combination of Intel® Turbo Boost technology² and Intel® Hyper-Threading technology (Intel® HT technology)³, which maximizes performance to match your workload

Sunday, March 8, 2009

Nokia has been Prepare 4g technology?

eNokia plans touchscren will release a new device for Verizon Wireless, 4g wireless network that will be launched starting in 2010. Verizon Wireless has join the European carrier Vodafone and Verizon Communications, has announced a month ago by the GSMA Mobile World Congress, which will introduce 4g network that uses technology called LTE (Long Term Evolution).

According to the quoted from the Street.com, the agreement between Nokia and Verizon is very exclusive. Nokia will develop a plan to LTE with WiMAX standard 4g. In a conference in Texas last week, Nokia executives said that the government is planning to have LTE in early 2010.

"All the existing agreement has been well documented and Verizon LTE intend to spread in the USA and outside USA for five years, and Nokia gave 'power' to Verizon over their decision. While we will not develop the device 4g touchscreen that's exclusive, but we will still continue to strive for the development of devices 4g land new business. "Nokia said parties.

However, Verizon's own party have not mengkomentari statement is Nokia.

NASA Ready to Launch Space telescope


NASA has launched a new space telescope that is ready to investigate the universe with "gamma-ray lens" (gamma-ray glasses).
Telescopes that have given the name Glast mission to monitor the events that emit intensive masif amount of energy in the form of gamma rays.

In addition, this telescope will also attempt to explore new forms of physics to find the dots of light from the nature of the dark up 22% of the universe.

This telescope will scan the sky for cosmic explosion explosion-like black holes that attract large objects across the room, and a solid netron stars emit strong magnit field.

Glast will be launched from the space stasion Cape Canaveral in Florida on Thursday at 1545 hrs GMT using the Delta II rocket.

Saturday, March 7, 2009

Intel Core i7 920


When Intel announced its awesome new Core i7 quad-core processor, we were sure it would be priced out of reach of mere mortals.

After all, in raw performance terms this CPU architecture has no equals. Surely Intel can name its price?

It came as a pleasant surprise when we discovered the 2.66GHz 920 model would retail at under £250. OK, that's a lot of cash, but given that this chip outperforms the £1,000 Core 2 Extreme QX9770 in most benchmarks and beats AMD's Phenom II hands down, you could almost call it a bargain.

The catch? You'll need a new mobo and probably some DDR3 memory costing a grand total of £400. An awesome performer and deeply desirable. Just don't be fooled by the superficially attractive price…

Sky Player TV to stream Sky Movies live

Satellite provider's on-demand service just got better
Sky announced it is to expand its Sky Player TV service, with six new live channels – including Sky Movies Screen 1 and 2.

This means that anyone who has signed up to the service can watch movies from the comfort of their laptop anywhere they want – as long as there's a web connection.

Choice and control

Other channels that the Satellite provider is to stream live are Nat Geo Wild, Eden, G.O.L.D. and Sky Real Lives. Sky has said that the addition of this new content "strengthens its position as the natural destination for online viewing".

Speaking about the Sky Player TV expansion, Griff Parry, Sky's Director of On-demand, said: "At Sky, viewers come first, whether they watch live or on-demand, via their TV or online.

"The continued expansion of Sky Player puts choice and control over what and how to watch, firmly in people's hands; whether they're already familiar with Sky TV or just want to watch the content we offer online."

Live catch

There is a catch: only new subscribers will be able to view Sky Movies Screen 1 and 2 as 'live channels' online. Defending its decision, Sky argues that: "Sky Player already makes over 500 movie titles available to Sky Movies [existing] subscribers to view at any time for free."

Friday, March 6, 2009

Panda Antivirus Pro 2009

Install it and forget about viruses, spyware and hackers.

Panda Antivirus Pro 2009 is the easiest-to-use and most intuitive protection for your computer. Just install it and forget about viruses, spyware, rootkits, hackers, online fraud and identity theft. Chat, share photos and videos, bank and buy online, read your favorite blogs or simply surf the Web, with complete peace of mind. And thanks to the new Collective Intelligence technology, the solution is now much faster than previous versions.

Internet Security 2009 "PANDA"

Maximum protection against all kinds of Internet threats.

Panda Internet Security 2009 is a security suite that lets you use the Internet with complete peace of mind. It protects you from viruses, spyware, rootkits, hackers, online fraud, identity theft and all other Internet threats. The anti-spam engine will keep your inbox free from junk mail while the Parental Control feature ensures your children can use the Web safely. And thanks to the new Collective Intelligence technology, the solution is now much faster than previous versions.

Tuesday, March 3, 2009

Sony 2009 line show: Complete coverage


companies Most use the January Consumer Electronics Show to show the world their product lineup for the new year. But Sony deliberately holds back on its CES announcements; that's because the company waits about eight weeks before returning to Las Vegas to have its own Sony-centric launch event, where it touts its new products for dealers, retailers, and journalists.

Here are the highlights of the company's new March announcements. We've also included the CES product highlights, to give you an overview of Sony's complete 2009 lineup:

Home Theater

New 2009 Sony AV receivers: Here comes the gloss

Sony dishes out three five-disc DVD home theater in a box systems

Sony slims component home theater system

Sony lowers price on Blu-ray home theater systems

Sony unveils HT-CT500 soundbar/subwoofer combo

ony's BDP-S560 Blu-ray player goes wireless

Television

Sony wings 'W' LCDs with Yahoo widgetsEco-friendly

Sony HDTVs sense your presence (CES)

Sony's Z-series of LCDs gets widgets, 240Hz (CES)

Sony XBR9 HDTVs up interactive ante with widgets (CES)

Photos: Sony 2009 HDTVs (CES)

Cameras and Camcorders

Sony shows speedy CMOS superzoom

Sony's first to market with GPS-enabled, back-illuminated CMOS camcorder (CES)

Sony's spring camcorders: Changes at the extremes (CES)Does

Sony DSC-G3 camera get wireless right? (CES)

Not dead yet: Sony rolls out two DVD-based Handycams (CES)

Sony's new Flash-based Handycam puts an HD camcorder in your pocket (CES)

Sony takes on Flip Video, in Technicolor (CES)

Sony offers up Web camcorder with 5X zoom (CES)

Sony evolves its AVCHD hard-disk camcorders (CES)

Portable Audio

Sony updates EX headphone lineup

Sony boombox mistaken for magic toadstool

Sony Dream Machine for cheap, humble dreams

Sony confirms touch-screen X-Series Walkman (CES)

Sony W-Series Walkman: Wearable and wireless (CES)

Car Tech

Sony expands Xplod line of in-dash receivers (CES)

Microsoft says research budget may create new jobs

Microsoft may create up to 3,000 jobs as it raises investment in research and development by $1 billion this year, its chief operating officer said Tuesday.

"Realignment of the company will help us reassign people and could allow us to create some 2,000 to 3,000 new jobs," Kevin Turner said here at CeBit, Europe's biggest technology trade fair.

Turner said while Microsoft was eliminating jobs in some areas, new opportunities would arise at the same time. He reiterated that Microsoft, under pressure to trim costs amid a global recession, would stick to its research budget this year.

"We will invest a record $9 billion in R&D...spend a billion more than last year," Turner said, adding Internet-based applications--so called cloud computing--would be a major field for Microsoft's investment.

The current macroeconomic climate was the most challenging most people had ever seen in their lifetime, Turner said.

"We believe while this may be a once in a lifetime event it may also be a once in a lifetime opportunity to create new business models," Turner said.

Change the way your Windows XP, Windows 7 Becoming a glance

May be bored with the look of Windows XP on your screen, you want to upgrade to Windows 7 but serasa lazy, because it is still beta and Windows Visa also can not be expected. Software niwradsoft Using this you can change the look of Windows XP so that you like Windows 7. Software Niwradsoft Seven Remix XP is a free software that can change the entire look into your OS is similar to the Windows 7.
Both of the boot screen, logon screen, screensaver, theme system, and so forth. Can be found here Installer is designed to work in OS below: - Windows XP (Home, Pro, RTM, SP1, SP2, SP3, Corporate) - Windows 2003 (Standard, Enterprise, Datacenter, Web, RTM, SP1) - Windows Media Center Edition (2003, 2004, 2005) - Windows XP Tablet PC Edition - All Language Versions - Does NOT work with 64 bit versions of Windows! You can also add a function - the function of the other 7 Shake like Aero, Aero and Aero Snap peek. It seems the upgrade to Windows 7 is not required: