EU to outlaw Bisphenol A in baby bottles in 2011

The European Union will ban the use of organic compound Bisphenol A (BPA) in plastic baby bottles from 2011 with the backing of a majority of EU governments, the EU's executive Commission said Thursday. What take them so long?

"There were areas of uncertainty, deriving from new studies, which showed that BPA might have an effect on development, immune response and tumor promotion," said John Dalli, Commissioner in charge of Health and Consumer Policy, in a statement.

"The decision ... is good news for European parents who can be sure that as of mid-2011 plastic infant feeding bottles will not include BPA."

EU states will outlaw the manufacture of polycarbonate feeding bottles containing the compound from March 2011, and ban their import and sale from June 2011, the Commission said.

Via Reuters

EximiousSoft Banner Maker 3.01


jika kamu pernah membuat texs banner dengan ulead gif animator maka ESB Mempunyai kesamaan .juga ditambah dengan fitur2 yang lebih menarik sbb:
Fitur:
• Mendukung lapisan sangat menenangkan
• Bolehkan gambar raster impor atau bentuk vektor dan teks kaya
• Bentuk benda dapat diisi oleh yang kaya gambar gaya gradien, atau pola
• Setiap objek dapat dicat dengan bevel, bayangan, fitur tekstur, Dengan yang terlihat dengan visi 3D tinggi
• Mendukung gambar GIF animasi
• Membangun animasi dengan efek yang disediakan dalam satu langkah
• grafis web Ekspor sebagai JPG, GIF, PGN format file, preview hasil di browser web langsung
• Preset banyak gaya gradien, gambar diisi, tekstur dan pola
• Memiliki antarmuka yang baik dan mengedit secara visual dan mudah
• Bingkai dalam animasi dapat ditambahkan atau dihapus atau dilihat


Top 10 Most Vulnerable Apps

Internet security company Bit9 has ranked the year's most vulnerable apps, based on the vulnerability database developed by the U.S. National Institute of Standards and Technology.

The applications found on this year's list were ranked by the number of "high severity" vulnerabilities reported. The list includes some of the most popular Web browsers and desktop software applications. Apple and Adobe, for example, have the most products on this year's list, according to Bit9.

Harry Sverdlove, CTO of Bit9, issued the following warning along with the company's official report: "The reality is every enterprise, including our own, is likely using at least one of the applications, and unpatched vulnerabilities are often used as the access point for the targeted enterprise attacks making headlines these days." Bit9 advises consumers that the best way to eliminate these vulnerabilities is by performing regular maintenance and patching exploits when necessary.

#10 - Apple WebKit, Reported vulnerabilities: 9
#9 - RealNetworks RealPlayer, Reported vulnerabilities: 14
#8 - Microsoft Internet Explorer, Reported vulnerabilities: 32
#7 - Adobe Shockwave Player, Reported vulnerabilities: 35
#6 - Sun Java Development Kit, Reported vulnerabilities: 36
#5 - Mozilla Firefox, Reported vulnerabilities: 51
#4 - Adobe Reader and Acrobat, Reported vulnerabilities: 54
#3 - Microsoft Office, Reported vulnerabilities: 57
#2 - Apple Safari, Reported vulnerabilities: 60
#1 - Google Chrome, Reported vulnerabilities: 76

Antilia - World's Priciest Home

Antilia - World's Priciest HomeIndian billionaire Mukesh Ambani has hosted a lavish house-warming for his new 27-storey residence, believed to be the world's most expensive home.

About 80 people attended the party in Mumbai on Friday, reported the Times of India. One guest described the house as "the Taj Mahal of the 21st Century".

Mr Ambani, said to be India's richest man, moved into the house last month with his wife and three children.

Reports suggest the residence is worth more than $1bn (£630m).

The skyscraper in Mumbai (Bombay), which overlooks sprawling slums, is said to have a cinema, swimming pools and a helicopter pad, and is named "Antilia" after a mythical Atlantic island.

Local newspapers said the house would require 600 members of staff to maintain it, and according to the Times of India, the first electricity bill, for September, is costing Mr Ambani 7m rupees (£98,000).

The house has sparked some controversy, with anti-poverty campaigners underlining the contrast between the luxury of the house and the plight of those who live in Mumbai's slums, which house about half of the city's 18 million people.

The house, which has a temple on the ground floor and a library on the top, was designed according to Vaastu principles, an Indian tradition similar to Chinese feng shui.

According to Forbes magazine, Mr Ambani, 53, has amassed a $27bn (£17bn) fortune.

He is chairman and managing director of Reliance Industries, one of the largest conglomerates in the world, and also owns the Indian Premier League team, the Mumbai Indians.

Via BBC

Recommended reading:
* Top 10 Richest People - 2010

Now, anyone can hack

Cyber crimes are evolving. A lay person can now have a go at hacking with the advent of “attack tool kits” sold in the underground economy servers.

MALAYSIAN Lin Mun Poo did more than get himself arrested when he allegedly hacked into the high security computer networks of the United States’ Federal Reserve Bank (FRB) and the Pentagon’s security contractor.

He put Malaysia on the map of “super hackers”, on par with those from China and Russia, raising concerns from US security and intelligence officials.

“How did a hacker in Malaysia manage to penetrate a computer network operated by the Federal Reserve Bank of Cleveland?” mused MSNBC.com, the website of the giant US cable news network NBC, when the news broke.

“To have the skills to break into highly sensitive systems like that is an impressive level of criminal activity,” MSNBC.com quoted Kurt Baumgartner of Kaspersky Lab, a computer security firm, as saying.

Last Monday, Lin, 32, pleaded not guilty to charges of hacking into the FRB and unlawful possession of stolen credit and debit card account numbers belonging to individuals. He was denied bail.

Little is known of Lin except that he hails from Ipoh where he has a business address. It turns out to be a pub cum karaoke lounge in a commercial district of Ipoh.

Malaysian police say Lin has no criminal record and it appears he commits his cyber crimes outside the country.

“We are working together with our US counterpart to obtain more information of his activities there,” said a senior police source.

Describing Lin as “highly professional”, the source said Lin appeared on US authorities’ radar four years ago – in Thailand where he was alleged to be involved with hacking into US-linked corporations.

Cyber crime has evolved from the past when men and women hacked into computer systems of established entities for their five minutes of fame.

“Cyber criminals used to be after fame. The attacks were noisy, brought down systems and were highly visible,” said Nigel Tan, Symantec Corporation principal consultant for the Asia South region.

Symantec’s Global Intelligence Network has the largest, most sophisticated intelligence network worldwide, processing over eight billion e-mail messages daily and gathering malicious code data from 130 million systems.

Today’s hackers are mainly motivated by money. They move silently across borders in cyber space and the physical world, selling their ill-gotten wares in the underground economy.

“The attacks have now become more silent and they are motivated purely by financial gains. Their motivation is to sell whatever information they get,” Tan added.

Lin was arrested by the US Secret Service on Oct 21 at a diner in Brooklyn after being caught red-handed selling stolen credit card numbers for US$1,000 (RM3,000). He had just arrived a few hours earlier on a flight from Europe.

Secret Service agents seized his heavily encrypted laptop computer and found more than 400,000 credit, debit and bank account numbers which he had allegedly obtained by hacking into various computer systems.

In his post-arrest statement, Lin said the primary purpose of his trip to the US was to meet with an individual whom he believed was capable of regularly providing him with a large volume of stolen card numbers and personal identification numbers.

Credit card information topped the list of goods advertised for sale on the underground economy servers, accounting for 28% of all goods, according to the Symantec Intelligence Quarterly for April-June 2010.

Prices ranged from US$1 (RM3) to US$30 (RM90) depending on three main factors: the amount of information included with the card, rarity of the card type and bulk purchase sizes.

Credit cards that included security features such as CVV2 numbers, PINs and online verification service passwords were offered at higher prices.

The Federal Reserve Bank of Cleveland, Ohio was not Lin’s only victim, as it is alleged that he also breached the computer servers of major financial institutions and companies.

“The defendant possessed data illegally obtained from the computer network of FedComp, a data processor for various credit unions in the United States,” Justice Department prosecutors told US District Judge Dora L. Irizarry in a letter.

By hacking into FedComp, Lin gained access to the data of the Firemen’s Association of the State of New York Federal Credit Union and the Mercer County New Jersey Teachers’ Federal Credit Union, among other victims.

According to the prosecutors, the amount of stolen data found in Lin’s possession is staggering and has led them to describe him as an “extremely sophisticated and dangerous” computer hacker.

It underscored cyber criminals’ single-mindedness in searching and exploiting vulnerabilities in the computer systems of government institutions and corporations.

Lin admitted he made money by “finding and exploiting network vulnerabilities,” or trading and selling the information contained therein, according to the prosecutors.

Symantec warns that it is now easier than ever to launch a cyber attack, thanks to the advent of a so-called “attack tool kit” sold in the underground economy. The attack tool kit is changing the landscape of cyber criminals that was once dominated by IT savvy individuals.

Now anyone can purchase a cyber attack tool kit and use it to launch sophisticated attacks.

“Attack tool kits are easily available on the web for reasonable prices. A tool kit allows people to customise a piece of malicious code designed to steal data and other personal information,” said Tan.

“Such tool kits are easy enough to implement that even people with minimal technical knowledge can use them effectively,” he added.

Two of the most common platforms where such tool kits are sold are the Internet relay chat (IRC) servers (IRC) and web-based forums, according to Tan.

“Both feature discussion groups that participants use to buy and sell fraudulent goods and services.”

For as little as US$5 (RM16) to US$20 (RM63), one can purchase an attack tool kit, he said.

The tool kit is also sold on a monthly basis at a subscription rate of US$120 (RM378). This package comes with technical support.

“The market for these tool kits is now sophisticated enough that updated versions are released on a development schedule, advertising the inclusion of exploits for the latest vulnerabilities while retaining previous exploits,” Tan said.

The lowering of barriers for attackers to enter into cyber crime is reflected in the increase in malicious code that steals confidential information. New malicious codes more than doubled, year-on-year, between 2006 and 2008.

In 2009, it continued the upward trend, reaching 2.9 million, according to Symantec.

Efforts to combat cyber crimes on an international scale are being hampered by the lack of agreement in law enforcement procedures and cooperation across international jurisdictions.

In the meantime, malicious activity is moving to countries with emerging IT and broadband infrastructure.

As a result, it is likely that cyber crime will grow in emerging nations while levels remain relatively constant in established countries.

But from all accounts, Lin is no ordinary hacker. In August 2010, he allegedly hacked into the secure computer system of a major Department of Defence contractor which provides systems management for military transport and other highly sensitive military operations.

The Justice Department said he “potentially compromised” highly sensitive military logistics information.

If convicted, Lin faces a maximum prison sentence of between six-and-a-half years and eight years.

Via TheStar

Software _WinRAR 4.00 Beta 2


WinRAR adalah manajer arsip kuat (Win86/64, Linux, Mac).
RAR file BISA Biasanya kompres konten sebesar 8 persen menjadi 15 persen Lebih dari file ZIP dapat. WinRAR adalah sebuah alat kompresi yang kuat dengan banyak fungsi tambahan terintegrasi yang membantu Anda Mengatur arsip terkompresi. Ini BISA backup data dan Kurangi ukuran lampiran email, dekompresi RAR, ZIP dan file lainnya download dari Internet dan membuat arsip baru dalam format RAR dan ZIP file.
WinRAR menempatkan Anda di depan orang banyak Ketika datang ke kompresi. Dengan konsisten membuat arsip yang lebih kecil, WinRAR Sering kali lebih cepat dari Kompetisi. Apakah ini akan menghemat ruang disk, Biaya transmisi dan waktu berharga dan bekerja dengan baik. WinRAR sangat ideal untuk file multimedia. WinRAR secara otomatis mengenali dan memilih metode kompresi terbaik. Algoritma kompresi khusus kompres file multimedia, executables dan
perpustakaan objek

Fitur WinRAR:


- Menggunakan WinRAR menempatkan Anda di depan orang banyak Ketika datang ke kompresi oleh konsisten membuat arsip kecil Than kompetisi, menghemat ruang disk dan Biaya transmisi.
- WinRAR menyediakan dukungan lengkap untuk RAR dan ZIP arsip dan Mampu membongkar CAB, ARJ, LZH, TAR, GZ, ACE, uue, bz2, JAR, ISO, 7z, Z arsip.
- WinRAR Menawarkan antarmuka grafis interaktif menggunakan mouse dan menu serta antarmuka baris perintah.
- WinRAR lebih mudah digunakan mana Than archivers lain dengan dimasukkannya modus khusus "Wizard" Yang memungkinkan akses cepat ke fungsi dasar Pengarsipan Melalui pertanyaan sederhana dan prosedur jawaban. Hal ini untuk menghindari kebingungan dalam Tahapan Awal Penggunaan.
- WinRAR Penawaran Anda manfaat dari kekuatan industri enkripsi arsip menggunakan AES (Advanced Encryption Standard) dengan kunci 128 bit.
- Mendukung WinRAR file dan arsip hingga 8589000000000 Gigabytes dalam ukuran. Jumlah file yang diarsipkan, untuk semua Tujuan Praktis, Unlimited.
- WinRAR Penawaran Kemampuan untuk Buat selfextracting dan multivolume arsip.
Pemulihan merekam dan pemulihan dan volume memungkinkan untuk merekonstruksi arsip Bahkan secara fisik Rusak.
- WinRAR fitur yang Terus-menerus dikembangkan untuk menjaga WinRAR depan pak.

Versi 4.00 Beta 2:
1 "Masukkan kembali kata sandi untuk verifikasi" field tidak ditampilkan dalam dialog sandi Ketika penggalian atau membuka sebuah arsip dienkripsi. Hal ini kini hanya Ketika Pengarsipan dan hanya jika "Tampilkan sandi" pilihan tidak aktif.
2 Jika Anda mengaktifkan "Gunakan untuk semua arsip" pilihan Ketika Memasuki password default (Ctrl P) dan ditetapkan password kosong, ekstrak dan uji perintah akan melewatkan semua arsip dienkripsi.
3 Jika Anda lebih suka menggunakan tombol "Install" daripada "Extract" di SFX, Tapi Jangan Butuh Setiap Program setup, Anda BISA menambahkan "Setup = <>" Perintah arsip komentar atau masukkan "> <" dalam nama dan setup " Advanced SFX options "dialog. Kami berubah ke "Setup = <>" bukannya "Setup" dan dalam beta pertama Karena adanya parameter tertentu memungkinkan untuk mengaktifkan modus ook melalui "Advanced SFX options" dialog harus Memasuki "<>" nama dan setup.

4 Bugs tetap:
a) operasi ekstraksi diaktifkan dari Explorer Menu Konteks Bisa Gagal jika arsip Beberapa Apakah yang dipilih dan diproses sekaligus;
b) Judul jendela WinRAR tidak MENGANDUNG nama disk saat ini, Saat browsing folder root disk;
c) item yang terkait dengan ekstraksi Apakah tidak hadir dalam menu konteks Explorer untuk 7-Zip self-extracting arsip;
d) menyortir menurut "Type" di WinRAR shell tidak bekerja dalam arsip.
DOWNLOAD + KEYDISINI

TUTORIAL PHP “Membuat Vooting atau Poling”


Hai kita jumpa lagi dalam tutorial Sederhana ini,Kali ini saya akan berbagi mengenai cara pembuatan voting pada sebuah website,yang tentu nya saya buat secara sederhana agar dapat dimodifikasi lagi ,supaya lebih menarik tentunya…Tutorial ini saya baca dari sebuah buku dan sepertinya menarik juga untuk pembelajaran…ok langsung kita ke TKP….! 
1.Pertama kita siapkan sebuah DATABASE dengan 3buah table di dalam nya seperti berikut:







 -> Database: `cepot-web`

-> CREATE TABLE `voting` (

  `kriteria` varchar(50) NOT NULL,

  `value` int(10) unsigned NOT NULL,

  `kriteriaid` smallint(6) NOT NULL AUTO_INCREMENT,

  PRIMARY KEY (`kriteriaid`)

) ENGINE=MyISAM  DEFAULT CHARSET=latin1 AUTO_INCREMENT=6 ;


3.Ketik script php berikut pada NOTEPAD atau media script editor lainya,Disini saya menggunakan “KOMODO EDIT 5”.  Script php nya sbb:
<!doctype html publick "-//W3C//DTD HTML 4.0 //EN">
<html>
    <head>
        <title>Tutor VOTING</title>
    </head>
    <body>
<?php
$server ='localhost';
$user ='root';
$password='';
$database = 'cepot-web';
$koneksi=mysql_connect($server,$user,$password)
or die ("DATA BASE TIDAK TERHUBUNG...!");
mysql_select_db($database,$koneksi);

?>
<table border="6" style="border-collapse: collapse"
bordercolor="blue" width="100% height="56">
    <tr>
        <td align="center" width="100%" height="26"> <b><font color="green" face="verdana"><h2>Apakkah saya tampan???</h2></font></b></td>
    </tr>
    <form action="voting.php" method="post">
        <tr>
            <td width="100%" height="26">
                <table border="0" cellpadding="0" cellspacing="0"
                style="border-collapse: collapse" bordercolor="#78602c"
                width="100%">
                    <tr>
                        <td width="100%" bgcolor="yellow">
                            <?php
                            $qr=mysql_query("SELECT kriteria,kriteriaid
                                            FROM voting order by kriteria", $koneksi)
                            or die ("kriteria voting Salah !");
                            while ($row = mysql_fetch_array($qr))
                            {
                                echo "<input type=radio name=pilihan value=$row[kriteriaid]
                                > &nbsp;&nbsp;&nbsp;<u>$row[kriteria]</u><br>";
                            }
                            ?>
                            &nbsp;</td>
                    </tr>
                </table>
            </td>
        </tr>
        <tr>
            <td width="100%" height="26"> <input type=submit name=submit value=vote></td>
        </tr>
    </form>
    <tr>
        <td align="center" width="100%" height="61"> <b><font color="green" face="verdana">
        <marquee bgcolor="black"><h4>Hasil Pooling Anda - Hasil Pooling Anda - Hasil Pooling Anda - Hasil Pooling Anda </h4></font></b></marquee>
        <hr noshade color="#000000" size="1"></td>
    </tr>
        <tr>
            <td width="100%" height="50">
                <table border="0" cellpadding="0" cellspacing="0"
                style="border-collapse: collapse" width="100%"
                height="50" bordercolor="blue">
                    <?php


                   
                   $qr=mysql_query("UPDATE voting Set value = value + 1
                                    WHERE kriteriaid='$_POST[pilihan]'",$koneksi)
                    or die ("Kriteria VOOTING Salah !");
                   
                    $qr=mysql_query("SELECT Sum(value) as TotalPersen FROM voting",$koneksi)
                    or die ("Query Tidak Tersambung Atau Gagal Ada kesalahan..!!");
                    $row = mysql_fetch_array($qr);
                    $Total=$row['TotalPersen'];
                   
                    $qr= mysql_query("SELECT Max(value) as NilaiMax
                                    FROM voting",$koneksi) or die
                    ("Query MAX SALAH Tidak Tersambung...!!");
                    $row =mysql_fetch_array($qr);
                    $pengali = 100/$row['NilaiMax'];
                   
                    $qr = mysql_query("SELECT kriteria, value FROM
                                      voting order by kriteria",$koneksi)
                    or die ("query GAGAL TERSAMBUNG...!");
                 
                    while ($row = mysql_fetch_array($qr))
                    {
                        $persen=round($row['value']* $pengali,0);
                        $ValPersen=round($row['value']/$Total*100,2);
                        echo "<tr> <td width=25% height=22>$row[kriteria]
                       </td><td width=75% height=18>";
                       echo "<table border=1 cellpadding=0 cellspacing=0 style='border-collapse: collapse'
                       width=$persen% height=18>";
                       echo "<tr> <td width=100% bgcolor=yellow align=center>$ValPersen%</td>";
                       echo "</tr></table></td></tr>";
                    }
                   
                   
                    ?>
                    </table>
                </td>
            </tr>
        </body>
    </html>

 
…..Atau kalau malas juga untuk mengetik nya dapat di download DISINI
4.Setelah DATABASE dan script PHP selesai di buat ,simpan scipt PHP dengan
Nama “voting.php” sebab nama tersebut terkait dengan script “$_POST” di atas.
Dan buka pada web browser anda hasil nya sebagai berikut :
 Selesai .

Selamat pemilu….uppppssss….. :)

Untuk saran dan kritik serta ada kesulitan dalam pengerjaan nya dapat di tanyakan langsung melalui POST KOMENTAR di bawah.




TomorrowNow Caused SAP To Lose Billion

What did SAP get from their $10million acquisition on TomorrowNow? A net loss of $1.3billion penalty due to Oracle. SAP must be remorseful about that deal.

So would SAP still have gone ahead with the $10m January 2005 purchase of fledgling third-party apps support player TomorrowNow had it had any inkling then of the financial cost more than five years later -- a $1.3bn payout to Oracle and a ton of legal fees -- as well as the dent to its previous sterling reputation? TN was always a loss-making business for SAP and at its height attracted less than 400 customers, a tiny proportion of the tens of thousands of Oracle apps customers.

On the losing end of a US$1.3 billion jury verdict for stealing a rival's intellectual property, SAP AG is facing the difficult decision about whether to double down - by appealing - or folding.

Either route is going to cost the German company dearly, and will have implications for how other technology companies approach copyrights.

A jury in U.S. District Court for the Northern District of California on Tuesday found that SAP's behavior in plundering software and documents from archenemy Oracle Corp.'s secured websites was so egregious that it awarded Oracle nearly all of the damages it was seeking.

If SAP appeals, it will have to endure several more years of disastrous publicity, a jackpot for Oracle.

Many analysts suspect that SAP will stand down and try and figure out a way to pay one of the biggest software piracy penalties on record. Doing so would put the $10 million acquisition of the tiny, now-shuttered company called TomorrowNow that landed SAP in this mess that much farther in the rearview mirror.

Recommended reading:
* Why is SAP accepting TomorrowNow liability at this time?

See Future Sky With Google Sky Map

Google claimed that the latest version of Google Sky Map allowed you to see previous years sky map and current sky map with your phone. So someone has been recording the sky. But get this, Google Sky Map also let you peek into the future sky. Is that for real?

Quote from the Google Mobile Blog "the new version of Google Sky Map lets you time travel to see the sky at a specific date, past or future. After smooth travel to the desired year, you can fast forward or rewind in various speeds and watch how the sky changes."

Google Sky Map is available for Android-powered devices running Android 1.6 and above.

Don't have any Android-mobile phone? Try websites like heavens-above.com or with the Heavens Above Me and MySatellites apps. Those sites allow you to see the high sky as well.

NROL-32 - World Largest Satellite

The United States has launched the largest satellite ever to orbit earth; while its exact purpose is secret, it’s not going to be monitoring the weather.

Its mission will be to gather intelligence for the US National Reconnaissance Office.

The satellite, dubbed NROL-32, was sent into orbit by a Delta 4 Heavy rocket — the largest unmanned rocket with the most powerful liquid-fueled booster. US National Reconnaissance Office (NRO) Director Bruce Carlson said the NROL-32 would be “the largest satellite in the world”.

All this superlative hugeness isn’t likely just a result of Americans’ obsession with size; in fact, the NRO launches almost as many small vehicles into space as it does large ones. More to the point, however, NROL-32 has a very important job: replacing a slew of Cold War-era satellites currently in orbit past their expiration dates.

Carlson gave an address last month in which he stated that the agency had adopted a new charter and “a remarkably aggressive launch campaign” to go along with it.

Referencing the then-upcoming NROL-32 launch and related launches, Carlson said, “This is the most aggressive launch campaign that the National Reconnaissance Office has had in 20 yea ... These [satellites] are very important, because they all go to update a constellation which is aging rapidly. We bought most of our satellites for three, five, or eight years, and we’re keeping them on orbit for ten, twelve, and up to twenty years.”

Carlson also said then that those aging satellites “designed to essentially operate during the era of the Soviet Uni ... are today doing tactical intelligence collection that leads us to actionable intelligence on bad guys every day. Every day.”

In a September 13 address, Carlson told an audience that this Delta 4 Heavy rocket would launch "with the largest satellite in the world on it", according to Space.com.

Via Space.com

Asia Bibi sentenced to death for blasphemy will be pardon by Pakistan President

Good news for the Christian minorities in Pakistan. Pakistani President Asif Ali Zardari will pardon a Christian woman sentenced to death for blasphemy, the governor of Punjab state told CNN Tuesday.

"What basically he's made it clear is that she's not going to be a victim of this law," Gov. Salman Taseer told CNN International's "Connect the World" program.
"I mean, he's a liberal, modern-minded president and he's not going to see a poor woman like this targeted and executed. ... It's just not going to happen," Taseer said.

Asia Bibi, who has been jailed for nearly 15 months, was convicted in a Pakistani court earlier this month of breaking the country's controversial blasphemy law by insulting Islam's Prophet Mohammed, a crime punishable with death or life imprisonment, according to Pakistan's penal code. She was sentenced to death.

She has filed a petition for mercy with the Pakistan High Court, Taseer said.

"If the High Court suspends the sentence and gives her bail then that is fine. We'll see that, and if that doesn't happen, then the president will pardon her," he said.
A preliminary investigation showed Bibi was falsely accused, a government official said Monday.

"The president asked me to investigate her case and my preliminary findings show she is innocent and the charges against her are baseless," Pakistani Minister for Minority Affairs Shahbaz Bhatti told CNN.

Bhatti emphasized Monday that he has reached only preliminary conclusions and will submit a final report Wednesday to Zardari's office.

Prosecutors say Bibi, a 45-year-old field worker, insulted the Prophet Mohammed after she got into a heated argument with Muslim co-workers who refused to drink from a bucket of water she had touched.

In a brief news conference at the prison where she's being held, Bibi said Saturday that the allegations against her are lies fabricated by a group of women who don't like her.

"We had some differences and this was their way of taking revenge," she said.
Bibi's death sentence sparked outrage among human rights groups, who condemned Pakistan's blasphemy law as a source of violence and persecution against religious minorities.

Via CNN

Selamat Jalan Dunia Pondan by Azwan Ali

Love him or loathe him, you've got to respect Azwan Ali for his brutal honesty. Which is also his biggest vice. Azwan Ali made his confession with a explosive book on transvestites title "Selamat Jalan Dunia Pondan".

The top Malaysian TV host - notoriously known for his acidic tongue and flamboyant style - is set to release a tell-it-all book on his conflicted life as a man who has kept in touch with his feminine side, and how Islam is changing him, titled Selamat Jalan Dunia Pondan [Goodbye Transvestite World].

"It's my true confession. It's my real life story," Azwan told The Daily Chilli exclusively about his controversial autobiography.

So is he out of the closet, you ask? "I'm not a hypocrite. I am who I am," he declares.

"There are a lot of male celebrities like me in the local entertainment industry. But I don't think they've got the guts to own up to it like I do. Semua guna cover line [Everyone is trying to cover up his sexuality]."

But as a 'born-again' Muslim who has performed umrah [small haj] twice, the 44-year-old says he's learning to live his life as a practising Muslim these days.

"I've always been searching for God's divine guidance," he says. "That's why I went to Mecca. I want to learn to be a better human being who can serve his Lord better. And the idea to write the book came when I was doing my umrah for the first time in 2009."

Selamat Jalan Dunia Pondan comprises 15 shocking chapters that redefined his life the most.

In the book, Azwan also reveals his special friendship with the "3 Siti" - pop stars Ziana Zain, Siti Nurhaliza and Fauziah Latiff and how they altered his perception of women.

So far, Ziana is the only love interest that Azwan has made public.

"The world has accused me of becoming a pondan because the three women rejected me," he drops hints. "But you have to read my book to understand my relationship with them. The stories come with never-released-before photos - all taken from my personal collection."

Well, that's not all the juicy bits. Azwan also talks about married men whom he knows are crazy about gay sex. "It's meant to be a good lesson for everyone," he opines. "I'm sharing my life experience with everybody."

Citing that the world of pondans is constantly misunderstood, he adds, "It takes someone who's lived that kind of life to really know how it feels. We're mocked at. We're ridiculed. I even got tranny friends who have been murdered mercilessly in hate crimes."

Priced at RM21.90, Selamat Jalan Dunia Pondan will be available in major bookstores nationwide on Feb 13 next year.

Via dailychilli.com

AuditionBooth.com to connect aspiring entertainers with show business top men

Former "American Idol" judge Paula Abdul's days of discovering fresh new talent aren't over. The singer-dancer has just launched AuditionBooth.com, a new casting website for aspiring entertainers.

According to the Hollywood Reporter, AuditionBooth - which 48-year-old Abdul co-founded - hopes to connect those with dreams of being in show business with casting directors, producers, and managers of TV shows, reality series, Web videos, and ad campaigns.

Talent can use AuditionBooth to record and upload their audition videos, while casting decision-makers can search and screen submissions, and visitors can comment on and "Like" videos.


"I've spent so much time throughout my career nurturing great talent, some of whom have realized their dreams and some of whom haven't been as lucky," says Abdul, who gives advice and inspiration in the Paula's Blog section of the site. "The fact is, though, that in some cases the only difference has been opportunity. That is what AuditionBooth is about - the opportunity."

Simon Cowell would surely agree.

GMail Homepage Make Over Saved 42,500,000,000 Bytes Per Day

With the recent makeover of Gmail homepage, how much bandwidth did Google saved? Maybe around 42,500,000,000 bytes per day, at least. Google cited that they removed 250 words in the process and that would be more than 250 bytes. Anyway, 250 bytes will be used for calculation.

At the same time Google has more than 170 million users and most Google GMail users are active. Thus, 170,000,000 * 250 would equals 42,500,000,000 bytes. Figures not right? Then present your calculation.

Anyway, with modern computers that big figures are actually small but in the long run, it will matter.

Moving on to the number of GMail users, there is no actual figures, just estimates.
1. Number of Gmail Users as of March 2010: 170 million users. Source: numberof.net

2. Number of GMail Users as of February 2008: 91.6 million users. Source: email-marketing-reports.com

3. Number of GMail Users as of February 2007: 51 million users. Source: TechCrunch

Wireless Internet Connection With MiFis

Talking about wireless connectivity, we first have WiFi, followed by Super WiFi and now, MiFi.

Two prevailing theories for how we will access the internet in the future hinge on the success of small plastic gadgets called MiFis.

The devices, many of them smaller than a smartphone, are similar to the wireless routers in many homes except they don't need to be plugged into anything.

They connect to a cellular carrier's data network. Once the battery is charged, a MiFi can be taken anywhere, and it provides a Wi-Fi signal to computers or iPods in a nearby vicinity.

In one of those future scenarios, each family would have their own one of these gadgets.

This can be more economical than subscribing to separate data plans for each cell phone and tablet you buy. Some families have found this especially effective for staying connected on road trips or in hotels that don't offer free Wi-Fi.

AT&T introduced its first MiFi device on Wednesday. Sprint Nextel, which already has the 4G-enabled Overdrive, started selling a thinner gadget called the ZTE Peel last week. Verizon Wireless offers the popular MiFi 2200 Intelligent Mobile Hotspot and another equipped for international travel.

These products generally cost $50 to $150 (some require a two-year contract) and $35 to $60 per month for the service, depending on the carrier and amount of data you use. Virgin Mobile also has an unlimited plan for $40 with no contract.

T-Mobile USA, the only of the major wireless carriers not to offer a MiFi device, is considering releasing one next year when it expands and updates its network, Neville Ray, the company's chief technology officer, told CNN recently. Current third-generation technology hasn't been fast enough to serve this growing breed of products, he said.

But telecoms are rapidly improving the speeds of their networks with fourth-generation technology. So MiFi could eventually replace wired broadband subscriptions in the same way that Americans are canceling home phone lines in favor of cell phones. (That depends on whether the U.S. government solves an industry threat relating to wireless spectrum availability.)

Telecoms have been hot and cold about which connectivity methods to promote. Should they focus on MiFi as a gadget to connect everything, or on having a 3G chip in each device? Or maybe even on high-end smartphones that have the MiFi functionality built in (an additional fee is required)?

Not long after Apple's iPad debuted in April, Sprint shrewdly began promoting the Overdrive with a case designed to fit the tablet and the MiFi. After selling out of initial stock, the telecom didn't renew the program.

"It achieved its purpose at the time, which was to raise awareness that you can put these two devices together," said Teresa Kellett, Sprint's director of 4G.

When Verizon announced that it would begin carrying the iPad, it bundled the Wi-Fi version of the tablet with a MiFi, rather than selling an iPad with a 3G chip built in, like AT&T does.

Jon von Tetzchner, the co-founder of the Opera browser, endorses the MiFi concept.

Not only is it cheaper, but it can be more efficient having one gizmo talk to cell towers and satellites and then distribute that signal to Wi-Fi-enabled appliances in the house, he said.

"In the next 10 years, every device will have an internet connection," Tetzchner said recently.

On the other side of the debate, MiFis are believed by many to be a passing fad. Once every device can have a cellular chip in it, why would we need an extra gadget to carry around?

Telecoms are pushing this concept of "machine-to-machine," which means adding cell chips to refrigerators, stoves and other appliances that you wouldn't normally expect to connect to the Web. Some say this is the future of internet connectivity.

Dan Deeney, co-founder of technology investment firm New Venture Partners, doesn't see a long-term future for the MiFi.

"I think there will be a role for them going forward, but I don't think it'll go mainstream," said Deeney, who works closely with Verizon. "Right now it's a matter of costs. Wi-Fi chips are cheap."

Once the price of cell chips comes down, he says connected machines will become more ubiquitous. In that scenario, each gadget will manage its own connection and won't need to rely on the limited battery life of one MiFi device.

Whichever the outcome, technologists agree that we'll be seeing internet functionality embedded in a lot more products than we have now.

TUTORIAL 3D MAX “Reactor Cloth”


Kita akan mencoba membuat animasi REACTOR CLOTH atau juga hampir mirip cara kerjanya seperti
SIM CLOTH3 Pada 3D MAX 9,Berhubung spek di kompi pas2 an jadi yaaahhhh…Kita akalin aje ye…xixixiiii..
3D MAX yang saya guna kan adalah 3D MAX 7 Tapi bisa juga bekerja pada 3D max 6.
Ok langsung kita mulai …PERTAMAXXX…:
1.Di Viewport Kita buat sebuah Plane, clik PANEL -> CREATE ->GEOMETRY->PLANE Dengan parameter sebagai berikut :



2.Lalu buat kembali  ->PLANE dan ->TEAPOT Sebagai objek
->CREATE ->GEOMETRY ->TEAPOT
Dengan PARAMETERS Sebagai berikut :


Agar terkesan seperti kain click objek PLANE 01
Dan click dI Panel :
->MODIFIER LIST -> WAVE
Dengan parameters sebagai berikut :


Objek sudah jadi sekarang saat nya kita membuat simulasi animasi sebagai berikut:
1.Aktifkan Objek PLANE01
Lalu click
 MODIFIER LIST->REACTOR CLOTH :
2.Aktif kan
“AVOID SELF-INTERSECTIONS”
Fungsi nya agar nantinya kain tidak melipat atau saling bertubrukan.




3.Click panel
->CREATE->HELPERS->REACTOR
Lalu click tombol CLC COLLECTION dan di VIEWPORT kita click agar tampak icon CL COLLECTION sebagai berikut :
 

4.Click -> MODIFY
Lalu atur parameters CLColection.Click Tombol ADD ->PLANE01->SELECT sebagai berikut:





5.Kita akan menambahkan  RIGID BODY sebagai berikut :
Click -> CREATE->HELPERS->REACTOR
Lali click tombol RBCOLECTION dan jangan lupa di VIEWPORT clik skali untuk menampilkan RBCOLECTION sebagai barikut :
6.click MODIFY->ADD->TEAPOT &PLANE02->SELECT.
di PARAMETERS RBCOLLECTION :




7.click TEAPOT->lalu click
 UTILITIES->REACTOR->PROPERTIES
Lalu atur PARAMETERS nya sebagai berikut :

Jangan lupa checklist
“Use Mesh”
Begitu juga Dengan -->PLANE 02 sama dengan TEAPOT pengaturan PARAMETERS nya.











Ok sudah mulai paham Dengan teori REACTOR atau masih ada pertanyaan  maupun kesulitan dalam menjalankan nya ???,silah kan masukan komentar tentang tutorial yang barusan kita bahas.
…SELAMAT BERKREASI…!!