Monday, September 19, 2011

Hantu Bonceng 2011 PPVrip Single Link




SINOPSIS




Bohsia itu mati ditempat kejadian dan Amran telah dikejarkan ke hospital. Hidup Amran mula berubah selepas kejadian tersebut. Setiap malam Amran akan dihantui oleh Bohsia itu. Amran tension dan meminta bantuan kawan karibnya Kunyit. Mereka bersama telah berikhtiar dengan pelbagai cara untuk menghapuskan badi Amran itu. Tanpa mereka sedari, mereka mula menjadi baik dan mula menghargai kehidupan mereka dan tidak lagi terjebat dengan aktiviti yang tidak sihat itu.





DOWNLOAD

Megaupload

http://adf.ly/2jvdf


Fileserve

http://adf.ly/2k0LL


Wupload

http://adf.ly/2jv2S



CREDIT TO BLACKWINTER (SH UPLOADER)






Wednesday, September 14, 2011

Tips to Combat Viruses, Worms and Trojan Horses on Your Computer

Keep The Operating System Updated

The first step in protecting your computer from any malicious there is to ensure that your operating system (OS) is up-to-date. This is essential if you are running a Microsoft Windows OS. Secondly, you need to have anti-virus software installed on your system and ensure you download updates frequently to ensure your software has the latest fixes for new viruses, worms, and Trojan horses. Additionally, you want to make sure your anti-virus program has the capability to scan e-mail and files as they are downloaded from the Internet, and you also need to run full disk scans periodically. This will help prevent malicious programs from even reaching your computer.
Use a Firewall

You should also install a firewall. A firewall is a system that prevents unauthorized use and access to your computer. A firewall can be either hardware or software. Hardware firewalls provide a strong degree of protection from most forms of attack coming from the outside world and can be purchased as a stand-alone product or in broadband routers. Unfortunately, when battling viruses, worms and Trojans, a hardware firewall may be less effective than a software firewall, as it could possibly ignore embedded worms in out going e-mails and see this as regular network traffic.

For individual home users, the most popular firewall choice is a software firewall. A good software firewall will protect your computer from outside attempts to control or gain access your computer, and usually provides additional protection against the most common Trojan programs or e-mail worms. The downside to software firewalls is that they will only protect the computer they are installed on, not a network.

It is important to remember that on its own a firewall is not going to rid you of your computer virus problems, but when used in conjunction with regular operating system updates and a good anti-virus scanning software, it will add some extra security and protection for your computer or network.

What Is a Worm?

A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.

The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line.

Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In recent worm attacks such as the much-talked-about Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.


What Is a Virus?

A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. Because a virus is spread by human action people will unknowingly continue the spread of a computer virus by sharing infecting files or sending emails with viruses as attachments in the email.


The Difference Between a Computer Virus, Worm and Trojan Horse

Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three.

One common mistake that people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus. While the words Trojan, worm and virus are often used interchangeably, they are not exactly the same thing. Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three, and knowing those differences can help you better protect your computer from their often damaging effects.


What Are Blended Threats?

Added into the mix, we also have what is called a blended threat. A blended threat is a more sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and malicious code into one single threat. Blended threats can use server and Internet vulnerabilities to initiate, then transmit and also spread an attack. Characteristics of blended threats are that they cause harm to the infected system or network, they propagates using multiple methods, the attack can come from multiple points, and blended threats also exploit vulnerabilities.

To be considered a blended thread, the attack would normally serve to transport multiple attacks in one payload. For example it wouldn't just launch a DoS attack — it would also, for example, install a backdoor and maybe even damage a local system in one shot. Additionally, blended threats are designed to use multiple modes of transport. So, while a worm may travel and spread through e-mail, a single blended threat could use multiple routes including e-mail, IRC and file-sharing sharing networks.

Lastly, rather than a specific attack on predetermined .exe files, a blended thread could do multiple malicious acts, like modify your exe files, HTML files and registry keys at the same time — basically it can cause damage within several areas of your network at one time.

Blended threats are considered to be the worst risk to security since the inception of viruses, as most blended threats also require no human intervention to propagate.


credit to HaTz SH

Saturday, September 10, 2011

CCNA2 : Chapter 4

Expect minimum percentage: 100%

1. What does the RIP holddown timer do?
ans:
instructs routers to ignore updates, for a specified time or event, about possible inaccessible routes

2. What metric does the RIP routing protocol consider to be infinity?
ans:
16

3. What is a routing loop?
ans:
a condition where a packet is constantly transmitted within a series of routers without ever reaching its intended destination

4. Which two statements are true regarding the function of the RIPv1 routing updates? (Choose two).
ans:
updates are broadcast at regular intervals
broadcasts are sent to 255.255.255.255

5. Which of the following can exist in a distance vector network that has not converged? (Choose three.)
ans:
routing loops
inconsistent traffic forwarding
inconsistent routing table entries

6. Refer to the exhibit. What path will packets from the 192.168.1.0/24 network travel to reach the 10.0.0.0/8 network if RIP is the active routing protocol?
ans:
The path will be router A -> router D -> router E.

7. What is the purpose of the TTL field in the IP header?
ans:
limits the time or hops that a packet can traverse through the network before it should be discarded

8. Which two conditions are most likely to cause a routing loop? (Choose two.)
ans:
inconsistent routing tables
incorrectly configured static routes

9. Refer to the exhibit. If all routers are using RIP, how many rounds of updates will occur before all routers know all networks?
ans:
3

10. The graphic shows a network that is configured to use RIP routing protocol. Router2 detects that the link to Router1 has gone down. It then advertises the network for this link with a hop count metric of 16. Which routing loop prevention mechanism is in effect?
ans:
route poisoning

11. Refer to the exhibit. The routers in this network are running RIP. Router A has not received an update from Router B in over three minutes. How will Router A respond?
ans:
The Invalid timer will mark the route as unusable if an update has not been received in 180 seconds.

12. What actions will occur after RouterA loses connectivity to network 114.125.16.0? (Choose two.)
ans:
RouterB will include network 123.92.76.0 and 136.125.85.0 in its update to RouterA.
Router C will learn of the loss of connectivity to network 114.125.16.0 from RouterB.

13. Three routers running a distance-vector routing protocol lost all power, including the battery backups. When the routers reload, what will happen?
ans:
They will send updates that include only directly connected routes to their directly connected neighbors.

14. Which statement is true regarding cisco’s RIP_JITTER variable?
ans:
It prevents the synchronization of routing updates by subtracting a random length of time ranging from 0% to 15% of the specified interval time from the next routing update interval.

15. Which of the following methods does split horizon use to reduce incorrect routing information?
ans:
Information learned from one source is not distributed back to that source.

16. A network administrator is evaluating RIP versus EIGRP for a new network. The network will be sensitive to congestion and must respond quickly to topology changes. What are two good reasons to choose EIGRP instead of RIP in this case? (Choose two.)
ans:
EIGRP only updates affected neighbors.
EIGRP updates are partial.

17. Which two statements describe EIGRP? (Choose two.)
ans:
EIGRP sends triggered updates whenever there is a change in topology that influences the routing information.
EIGRP sends a partial routing table update, which includes just routes that have been changed.

18. Which three routing protocols are distance vector routing protocols? (Choose three).
ans:
RIPv1
EIGRP
RIPv2

19. Which of the following statements are correct about RIP?
ans:
will send out an update if there is a failure of a link

20. Which event will cause a triggered update?
ans:
a route is installed in the routing table

CCNA2 : Chapter 3

Expect minimum percentage: 100%

1) Refer to the exhibit. Which statement correctly describes how R1 will determine the best path to R2?
ans:
R1 will install an EIGRP route using network B in its routing table because the administrative distance of EIGRP is lower than RIP.

2) Which two statements are true regarding classless routing protocols? (Choose two.)
ans:
sends subnet mask information in routing updates
allows for use of both 192.168.1.0/30 and 192.168.1.16/28 subnets in the same topology

3) Which command would the network administrator issue to determine if load balancing is in effect on a router?
ans:
show ip route

4) Which statement is true regarding routing protocols?
ans:
EIGRP uses DUAL to calculate the shortest path and can be configured to do unequal cost load balancing.

5) An engineer creates a static route by entering the Router(config)# ip route 10.0.0.0 255.255.255.0 192.168.1.2 command. What can be concluded about this route?
ans:
The administrative distance of this route is 1.

6) Which two conditions would create a setting where the use of a distance-vector routing protocol would be efficient? (Choose two.)
ans:
the network is using a hub and spoke topology
the network is using a flat design

7) Refer to the exhibit. If RIP is the routing protocol, what is the value of the metric from router A to network 192.168.5.0/24?
ans:
3

8) What is the purpose of a routing protocol?
ans:
It allows a router to share information about known networks with other routers.

9) Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.)
ans:
Administrative distance refers to the trustworthiness of a particular route.
Routes with the smallest metric to a destination indicate the best path.

10)Which of the following best describes the operation of distance vector routing protocols?
ans:
They send their routing tables to directly connected neighbors.

11) Which of the following is associated with link-state routing protocols?
ans:
shortest-path first calculations

12) The following line of code is displayed in a routing table:
R 209.165.201.0/24 [120/2] via 192.168.252.2, 00:00:16, S0/0/0
What can be concluded from this output?
ans:
The value, 120, is used to determine the best path when a router has more than one routing protocol configured for the same destination network.

13) Why is fast convergence desirable in networks that use dynamic routing protocols?
ans:
Routers may make incorrect forwarding decisions until the network has converged.

14) Which of the following conditions must be met in order for a network to have converged
ans:
The routers in the network are operating with consistent routing knowledge.

15) Which two statements are true regarding the advantages of the use of static routes? (Choose two).
ans:
increased security
the administrator maintains control over routing

16) Which two statements are true regarding metrics? (Choose two.)
ans:
EIGRP uses bandwidth as a metric.
OSPF uses cost based on bandwidth as a metric.

17) What will be the result of the following commands?
ORL(config)# interface fastethernet 0/0
ORL(config-if)# ip address 172.16.3.1 255.255.255.0
ORL(config-if)# no shutdown
ans:
A routing table entry is made to the 172.16.3.0 network with a code of "C".

18) Refer to the exhibit. Router1 and Router2 are running EIGRP. All interfaces are operational and packets can be forwarded between all networks. What information will be found in the routing table for Router1?
ans:
The administrative distance of the route to network 172.16.0.0 will be 90.

19) A growing medium-sized manufacturing company recently began to have routing instability issues. The company uses static routes and has a mixture of over 30 Cisco and non-Cisco routers. The network administrator has decided to convert the network to dynamic routing. What characteristics of protocols should be considered in this selection process?
ans:
OSPF can be used between the routers.

20) A router learns two paths with equal metrics to a destination network via the RIP routing protocol. How will the router handle packets to the destination network?
ans:
The router will install both routes in the routing table and load balance between the two.

21) The following line of code is present in the routing table:
O 10.16.1.0/27 [110/129] via 192.168.1.5, 00:00:05, Serial0/0/1
What does the number 129 indicate in this output?
ans:
The cost for this link has a value of 129.

22) When multiple routing protocols have a route to the same destination network, what determines which route is installed in the routing table?
ans:
lowest administrative distance

Friday, July 29, 2011

Flat 3A (2011) DVDRip Single Link


Sinopsis

Mengisahkan tentang Fiqah, seorang pekerja kilang yang telah mengandungkan anak kekasihnya, Anas. Anas memaksa Fiqah untuk mengugurkan kandungannya tetapi Fiqah membantah. Fiqah dipukul dan di berikan ubat untuk menggugurkan kandungan. Kerana cintanya terhadap Anas, Fiqah menggugurkan juga kandungannya itu. Fiqah mula dihantui perasaan bersalah dan fobia. Ratna, kawan baik Fiqah mengajak Fiqah berpindah di sebuah flat murah bersamanya. Tanpa di ketahui Fiqah , rumah yang didudukinya itu adalah rumah seorang dukun bernama Kang Suman yang di percayai telah menculik dan membunuh Fatin, seorang kanak-kanak yang tinggal berhampiran flat tersebut.



Download Here

Megaupload

http://adf.ly/2F2jX

Fileserve

http://adf.ly/2F2kS

kalau ade link yg korang xboleh buka tu tlg tukar dns setting korang or guna web proxy sini ek.. :)


Credit to BlackWinter(SH crew)






Tolong! Awek Aku Pontianak (2011) Malay DVDRip Single Link


Sinopsis

Sebuah filem komedi seram yang mengisahkan Bob, berperwatakan lurus bendul dan baik hati yang bekerja di sebuah syarikat periklanan, di bawah penyeliaan Faizal. Selepas berpisah dengan teman wanitanya (Ina), Bob dan kawannya, Pian berpindah ke sebuah apartment lain. Kehidupan baru Bob bermula selepas berpindah dan bertemu dengan dua beradik iaitu Maya dan Liyana. Pada mulanya Liyana tidak menyenangi kehadiran Bob dan Pian kerana takut
identiti mereka terbongkar.

Namun selepas menguji Bob, mereka mengakui bahawa Bob tidaklah seperti yang mereka sangkakan. Sejak itu, mereka berempat menjadi kawan baik. Hubungan Bob dan Maya pula bertambah rapat selepas insiden beg Maya diragut. Selepas bertemu Maya di rumah Bob, Faizal melamar Maya untuk bekerja di syarikatnya. Faizal cuba memikat Maya, namun hampa. Kemudian Faizal berpakat dengan Kamal untuk menakutkan Maya. Tetapi berlaku sebaliknya, Faizal dan Kamal pula yang ketakutan setelah dikacau oleh pontianak. Faizal mula curiga dengan kehadiran Maya dan menyuruh Kamal mencari bomoh untuk menyiasat kehadiran pontianak dipejabatnya.

Faizal menyatakan keraguannya tentang Maya kepada Pian dan mereka berpakat untuk membongkar identiti Maya dan Liyana. Di parti yang diadakan oleh Faizal, mereka melakukan pelbagai cara untuk membuktikan Maya dan Liyana adalah pontianak. Benarkah Maya dan Liyana pontianak? Dan apa pula hubungan Nadia dengan dua beradik itu? Semuanya akan terjawab dalam filem `Tolong! Awek Aku Pontianak!’.



Download Here

Megaupload

http://adf.ly/2E6Fd

Fileserve

http://adf.ly/2E5jX

kalau ade link yg korang xboleh buka tu tlg tukar dns setting korang or guna web proxy sini ek.. :)


credit to BlackWinter(SH crew)

Saturday, July 16, 2011

Harry Potter and the Deathly Hallows: Part 2 (2011)






screen short


info

File Name : Harry Potter and the Deathly Hallows: Part 2 (2011) TS RMVB-KURYU
IMDB LINK: http://imdb.com/title/tt1201607/
Genre: Action | Adventure | Drama
Runtime: 130 min
User Rating: 8.7/10 (6,712 votes)
Country: USA
Language: English
Subtitle: None

sinopsis

The final chapter begins as Harry, Ron, and Hermione continue their quest of finding and destroying the Dark Lord’s three remaining Horcruxes, the magical items responsible for his immortality. But as the mystical Deathly Hallows are uncovered, and Voldemort finds out about their mission, the biggest battle begins and life as they know it will never be the same again.

DOWNLOAD










kalau ade link yg korang xboleh buka tu tlg tukar dns setting korang or guna web proxy sini ek.. :)

Credit to Team Hanna n Silent Killer(SH admin)