Friday, October 9, 2009

:::::RAYA 2009:::::


















::::DINNER IRAMA 09-MALAM LUAHAN RASA::::











.....terer gak r diorg men percussion sb xyah praktis
pun da bole msuk ngan lagu ktaorg even x tau
lagu pe yg ktaorg bwak........



by the way: thanks to kump. khalifah
sbb sudi main percussion utk perfomance
group ktaorg....







....kumpulan khalifah......


....... bdk laki main percussion,ktaorg plak nyanyi.,
byk lagu gak r ktaorg nyanyi.......




..... kump an-najihah......



....muke2 control ayu....hehehe..
sbnarnye de byk lg gmbr,tp mlas r nak upload byk2,nti lmbt plak
nk display gmbrnye.....


















Tuesday, April 21, 2009

:::shows kat Dataran Segamat,Johor:::

















disini aku de ltak gambar mase buat show ari tu kat dataran segamat sempena sambutan birthday sultan johor. group aku iaitu an-najihah diinvite tuk perform malam tu..so,ktaorg perform 2 lagu je sb malam tu ade msalah teknikal sb ujan rintik2 malam tu..so,PA systems ade problem..

ktaorg start perfom pun lambat dr yg sepatutnye..so,dalm kul 1 lbih ktaorg balik kampus..tp ape2 pun mmang best r dpat perfom malm tu..x sangka plak ktaorg diinvite malm tu tuk buat persembahan. first time plak tu perfom kat luar uitm..dlam uitm da biasa perfom da..dlam semester ni je,ktaorg da buat 4 or 5 perfomance da..walaupun agk pnat sb nk kena praktis dlu, tp mmang best..















Wednesday, April 8, 2009

:::TAK SABARNYE!!!::::

nak balik!!!!!

x sabarnye rase nak mnjejakkan kaki ke terengganu....

da lame da x balik..rasenye lbih kurang 2 bulan lbih kot....

memandangkan final exam pun x lame lg dan study week akan start pd 10hb ni,jd boleh la blik mintak restu dan doa dari cik n pok (panggilan utk mak n ayah) semoga boleh jwab exam dgan jayanye...insyaallah...

x sabar rasenye nak tunggu ari sabtu,pdahal kat umah xde pape pun,tp aku rase sgt rindu nk balik umah sbab da lame x tgok muka cik n pok n adik2 yang lain..rindunye kat diorang sume..

emmm..mcm ne la org yg hidup jauh dr family yg bertahun2 x blik..msti lg trsiksa dr aku kan??
rindu sentiasa bermain di jiwa..meronta2 ingin diubati dengan raut wajah yang sentiasa dalam ingatan..betol x?

mcm mana lah agaknye keadaan kampung sekarang ea?msti da byk berubah...eee...mkin x tahan rasenye mnahan rindu di dada...

cepatla mse berlalu....nak balik...nak balik...(iskh..iskh..iskh)

nasib baik la aku study kat johor je(uitm,segamat)...klu kat kedah,perlis,pulau pinang ke..x tau la mcm ne keadaan aku..mst lagi susah nak balik sbb mane nak fikir duit tiket lg yang semakin naik tambangnye..johor nak ke terengganu pun dah rm32.20..

ok lah..aku x tau da nak post ape lg..nanti tulis lebih2 kan org ingat aku homesick plak...
tp ape2 pun aku mmang x sbar nak balik ni..

PERJALANAN JAUH TAK KURASA..
KERNA HATIKU MELONJAK SAMA..
INGIN BERJUMPA IBU DAN AYAH...
YANG SELALU TERBAYANG DI MATA...

OOOO...BALIK KAMPUNG
OOOO...BALIK KAMPUNG
HATI GIRANG...

Sunday, March 29, 2009

:::LATEST TECHNOLOGY:::


HTC TOUCH PRO2 AS A SMARTPHONE OR I-PHONE
The handset felt quite heavy to us (it weighs in at 175g) and at 116 x 59.2 x 17.25mm, it’s not the sveltest kid on the block. However, the casing is classy (the demo device was a mix of black and silver/grey, although the final color may change slightly). Our demonstrator was quick to point out that, size-wise, there’s not much in it between the Touch Pro2 and the TyTN II. He added that those who had held onto their TyTN II devices and bypassed a move to the Touch Pro, would likely leap at the chance to upgrade to this modern iteration.
The handset makes use of the latest version of HTC’s innovative TouchFLO 3D interface, which acts as a skin over Windows Mobile 6.1. Windows Mobile tends to have a marmite-like effect on business and consumers alike; you either love it or you hate it. From what we saw during our brief hands on, the new TouchFLO 3D software goes some way towards sweetening the bitter Windows pill for allergic users. Word is, you’ll also be able to bag yourself an upgrade from Windows Mobile 6.1 to Windows 6.5 for mobiles when it comes out later in the year.
The Touch Pro2 we got our hands on was running alpha software so we were ready to easily forgive any quirks it served up. However, alpha or not, navigation was a brief, providing an easy-to-use, intuitive user experience. If that’s what the alpha is capable of, we have high hopes for the final version of the software. One new treat for users is the ability to view TouchFLO in landscape mode, which depending on what you’re looking at can make quite a big difference to the whole experience. Touch-wise, we found the 3.6in screen pretty responsive to our commands and the keyboard’s keys were a good size too. Indeed, HTC says it has more tightly integrated Windows Mobile to enlarge touch focus areas so that they are much more “finger-touch friendly.” It seems to be working.

:::MAINTAINING YOUR SYSTEM:::

Maintaining A System

Perhaps you have handpicked the finest computer from the I.T mall, selected the fastest processor and graphic card and slammed in few gigabytes of memory. So you thought to yourself that your machine is probably going to sustain you for the next 5 years. But little did you discover that some 6 months down the road, your computer is behaving like a Pentium 2 computer, perpetually flustering you with its choppy images, frustrating pop-ups and tremendous slow disk access. Gradually, your computer crashes and all your data is lost on one fine afternoon.And so you wonder - what is the problem here?One thing you have probably missed out on is the need for system maintenance. The basic routine maintenance comprises of the 3 basic processes:

1. Data Backup
2. Malware Maintenance
3. Disk or File System Maintenance

Let us address each of the processes in detail so that you can better understand how you can apply them in your system to extend its longevity.What Is Data Backup?Backing up basically means to create a redundant copy of a data so that in case anything should happen to the original data, you have a spare copy. This is typically a simple thing to do.Firstly, you must ask yourself why should you back up data or system.If you feel that you should backup your valuable data, then you should decide and select what are the data to be backup. Depending on your needs, you may choose to backup your windows registry, or your Outlook Express mail data, or even your windows security keys.Windows operating system-s friendly interface allows you to drag and drop computer files from one storage device to another. And this can be as simple as copying a document file from your desktop into a floppy diskette or thumb drive.But when these files gradually grow overtime, you may need to seek help from archiver utilities such as Winzip which enables you to compact your files into a single compressed file. You can then break up this large file into several pieces to be stored in several mediums such as a span of CD or DVD-Recordable.Winzip also allows you to protect your file with encryption and a software password to prevent any unauthorized access. There are a number of backup methods you could use.What Is Malware Maintenance?Malware refers to any kind of malicious codes, objects or content that infiltrates your computer, resulting in damage and causing your system to act in an undesirable manner. Commonly, these include viruses, spyware, worms, trojan horses, spams and many more. When you-re infected, you can lose your privacy, confidential data and access to your system when software and hardware are damaged. Fortunately, there-re a couple of preventive measures you can take to protect yourself from malware.Firstly, you absolutely require a working Anti-Virus scan running in your computer. This is the only one thing that you should never compromise if you frequent the Internet. Running a system without an Anti-Virus scan is practically risking your computer to 90% of all kinds of software attacks. In some cases, your hardware can fail due to a virus attack. Remember the CIH virus that attacks the computer flash BIOS that resulted in tremendous business damage during 2001?Also, having a virus scan residing in your computer is as good as zilch if you do not take time to update the scan engine and virus pattern files. Every week, virus signature files are released for download to equip you with the latest protection.Next, the choice of websites you visit plays a major factor. Certain websites contain malicious active content such as Javascript and VBscript that automatically infects your computer when they are downloaded into your computer without your knowledge and consent. (That-s why they-re known as spywares) If you have experienced new icons appearing in your system tray or desktop, this may be a sign that your computer has been infected.Thankfully, those malicious active content usually lurks in pornographic and hacking websites. So if you can refrain from them, you generally safe. Nevertheless, if it is absolutely necessary to visit these sites, always disable ActiveX content running in your Internet options.Lastly, avoid downloading, executing software or mail attachment that you are uncertain.As a rule of thumb, do not even consider opening an attachment unless the file is from someone you know and the message makes meaningful references to the file.Okay, say you have accidentally downloaded an executable file into your computer and you are pondering if you should run it because a reliable colleague has sent it to you. But you notice that the file has a weird file name such as meetingsxpzss.jpg.exe. But you are told that it is crucial that you read it now.One thing you can do at this point in time is to scan the file for any virus infection before you attempt to open it. If the scan shows nothing, it-s probably a safe file. But then again, it may be a new virus yet to be updated in your virus scan. You can either wait and apply the next virus signature update and perform a second scan or risk it all, cross your fingers and open the file.If you ever decide to do this, you can take an extra step to protect your organization by disconnecting from your network during the process. If you suspect you have been infected, try to remove the spyware of virus immediately before they propagate to harm your entire system or network.Always make it a point to update latest operating system of software patches to shield against any security issues.

Disk Maintenance

Did anyone tell you that your hard disk is a pretty tricky machine? When you first installed your operating system, you may be pleased to know how smooth and efficient your software applications are running. But gradually, it slows down and this bothers you. What truly causes the dip in performance? You may argue that your disk is just a couple of months old. This has much to do with the way you operate on your system.Try to imagine a big tool bucket filled with gadgets. Initially, the bucket only contains a few spanners, a hammer and some screws. So every time you search for a particular item, it is relatively easy to find. But soon as you keep pilling the bucket with all sorts of items and especially when the amount of items grows, you-ll discover that you may need more time just to search for a particular screw head. In such cases, uninstall any unnecessary software and defragment your disk. Typically, your system performance will dip when the amount of data in your hard disk starts to grow.Next, would you be surprised if I were to tell you that 30% of your data in your computer may be junk files? Temporary files are stocked up in your computer each time you browse the internet or perform an installation. Most programs clear these files away after it exits but unfortunately, software that are poorly written do not. Thankfully, Microsoft Windows comes with a couple of useful utilities which helps to solve some of these problems.The disk defragmenter packs your data neatly to facilitate quick accessibility. Disk Cleanup does the job of scanning and removing all redundant temporary files. Unnecessary startup files could also be cleaned up.And to cope with physical error such as bad sectors, ScanDisk helps to repair and recover any data lost due to mild data corruption.Your could also fix minor system file corruption or repair the corrupted system files essential for the system operation. If you suspect the installed software is giving you problems, try to repair the software corruption.So now you see that there is more to just picking and plunging a speedy hard disk drive into your computer. Healthy and regular disk maintenance practice can greatly benefit your system and data.

Wednesday, March 11, 2009

----->Avoiding A Computer Virus<-----


What is a Computer Virus?
--------------------------------
---> A Virus is a program that infects executable files. When the infected file is executed, the virus replicates itself and spreads by infecting other executable files. Of course, the virus will try to infect your computer without your knowledge or permission. A virus generally has two phases;
(1) an infection phase where the virus reproduces extensively,
(2) an attack phase where it does the damage it was programmed to do.

What types of files can spread viruses?
-----------------------------------------------
---> Viruses can infect any type of executable files (e.g. flies with extensions like "EXE", "COM", "VBS", "BAT" "SCR"). "Macro" viruses infect word processing and spreadsheet documents that use macros (e.g. DOC & XLS.) Files that are treated as pure data are safe from viruses. These include graphics, sound and plain text files (e.g. JPG, GIF, MP3, WAV & TXT files.) Beware of files with multiple extensions such as "help.txt.exe". Only the last extension counts. Trojan Horse programs often disguise themselves this way. By default, Windows hides the extension of files. You can turn off this feature, or you can right click on the file and choose properties. The properties dialog box will show you the true file type and extension (MS-DOS name.) Its important to note that viruses will have no effect if the file they have infected is not executed.

How are viruses spread?
-----------------------------
---> A virus' aim is usually to multiply and infect as many files as possible, and then unleash an attack of some sort. When an infected program is executed, the virus multiplies and infects other programs on its host computer or other connected computers on a network. Boot sector viruses can infect the boot sector of hard drives and floppy disk. The virus spreads if another computer is booted from the infected floppy disk. Viruses can be downloaded from the Internet hidden in downloaded programs or distributed in chat rooms when people share files. Viruses are also distributed in email.
What do viruses do to computers?
-----------------------------------------
---> Some virus can cause serious damage while some are not very harmful at all. Viruses can delete files, corrupt data, slow down your computer or cause typos in word processing documents. Less harmful viruses may play annoying music or create animations and messages on your screen. Viruses cannot physically destroy your computer's components.
What is a Trojan Horse program?
----------------------------------------
---> A Trojan Horse is a malicious, security-breaking program that disguises itself as something safe, such as a game, screensaver, photo or word document. A Trojan Horse is not a virus, but it is just as dangerous. They can delete files, steel your passwords and spread by sending itself to everyone in your email address book. The Trojan horse got is name from the legendary war of Trojan, where the Greeks won the war by hiding in a huge wooden horse. This disguise got them into the fortified city of Troy where they unleashed a successful attack.
What is a Worm?
---------------------
---> Worms are similar to viruses, in that they can duplicate themselves and infect your files. A worm, unlike a virus, can automatically spread itself to other computers over a network. Worms usually affect computer servers that host websites. Worms can cause your favourite websites to become inaccessible.
What is a Hoax?
--------------------
---> A hoax is a threat of something that is not real (a big lie). Hoaxes are often spread by chain letter emails. Fortunately, many virus warnings turn out to be hoaxes. A hoax can however cause people to damage their own systems. A good example was the "sulfnbk.exe" virus hoax back in April 2001. The news of this so called virus spread rapidly, instructing that the file "sulfnbk.exe" was a virus and if you found it on your PC, you should delete it. It also said anti-virus software cannot detect it and that you should delete it before May 25 (the date the virus attacks). Who would have guessed that sulfnbk.exe is a standard Windows system file found on every PC. The icon for the sulfnbk.exe file even looked a bit spooky. Many misinformed people were deleting this important file from their machines.

Tips on avoiding infections:
----------------------------------
--->Install anti-virus software from a reputable company. (e.g. McAfee, Norton & Pc-cillin). Don't be complacent. Anti-virus programs will not keep you 100% safe from attacks. However, the chance of catching a virus is reduced.
--->Update your anti-virus regularly. New viruses are created every day.
--->Scan any new files for viruses that you download or receive before running them.
--->Do regular backups of important files in the event you need to recover them after a virus attack.
--->Viruses and Trojan horses are spread by email. Just because the email is from someone you know doesn't mean it safe. Trojan horses can send themselves to people in the address book of the infected computer without the owner's knowledge. Always scan attachments before opening them.
--->Viruses only spread when the infected file is executed. It is safe to read a plain text email with a virus attachment. You can safely save the attachment to your computer and scan it for viruses. However, anti-virus software is not good at catching Trojan horse programs. Check the file for multiple extension remembering that only the last one counts. What appears to be Calypso.mp3 may actually be Calypso.mp3.exe. (Right click on the file and choose properties to see the extensions.) If you are uncertain about an email attachment, delete the email.