Monday, September 19, 2011

Hantu Bonceng 2011 PPVrip Single Link




SINOPSIS




Bohsia itu mati ditempat kejadian dan Amran telah dikejarkan ke hospital. Hidup Amran mula berubah selepas kejadian tersebut. Setiap malam Amran akan dihantui oleh Bohsia itu. Amran tension dan meminta bantuan kawan karibnya Kunyit. Mereka bersama telah berikhtiar dengan pelbagai cara untuk menghapuskan badi Amran itu. Tanpa mereka sedari, mereka mula menjadi baik dan mula menghargai kehidupan mereka dan tidak lagi terjebat dengan aktiviti yang tidak sihat itu.





DOWNLOAD

Megaupload

http://adf.ly/2jvdf


Fileserve

http://adf.ly/2k0LL


Wupload

http://adf.ly/2jv2S



CREDIT TO BLACKWINTER (SH UPLOADER)






Wednesday, September 14, 2011

Tips to Combat Viruses, Worms and Trojan Horses on Your Computer

Keep The Operating System Updated

The first step in protecting your computer from any malicious there is to ensure that your operating system (OS) is up-to-date. This is essential if you are running a Microsoft Windows OS. Secondly, you need to have anti-virus software installed on your system and ensure you download updates frequently to ensure your software has the latest fixes for new viruses, worms, and Trojan horses. Additionally, you want to make sure your anti-virus program has the capability to scan e-mail and files as they are downloaded from the Internet, and you also need to run full disk scans periodically. This will help prevent malicious programs from even reaching your computer.
Use a Firewall

You should also install a firewall. A firewall is a system that prevents unauthorized use and access to your computer. A firewall can be either hardware or software. Hardware firewalls provide a strong degree of protection from most forms of attack coming from the outside world and can be purchased as a stand-alone product or in broadband routers. Unfortunately, when battling viruses, worms and Trojans, a hardware firewall may be less effective than a software firewall, as it could possibly ignore embedded worms in out going e-mails and see this as regular network traffic.

For individual home users, the most popular firewall choice is a software firewall. A good software firewall will protect your computer from outside attempts to control or gain access your computer, and usually provides additional protection against the most common Trojan programs or e-mail worms. The downside to software firewalls is that they will only protect the computer they are installed on, not a network.

It is important to remember that on its own a firewall is not going to rid you of your computer virus problems, but when used in conjunction with regular operating system updates and a good anti-virus scanning software, it will add some extra security and protection for your computer or network.

What Is a Worm?

A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.

The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line.

Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In recent worm attacks such as the much-talked-about Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.


What Is a Virus?

A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. Because a virus is spread by human action people will unknowingly continue the spread of a computer virus by sharing infecting files or sending emails with viruses as attachments in the email.


The Difference Between a Computer Virus, Worm and Trojan Horse

Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three.

One common mistake that people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus. While the words Trojan, worm and virus are often used interchangeably, they are not exactly the same thing. Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three, and knowing those differences can help you better protect your computer from their often damaging effects.


What Are Blended Threats?

Added into the mix, we also have what is called a blended threat. A blended threat is a more sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and malicious code into one single threat. Blended threats can use server and Internet vulnerabilities to initiate, then transmit and also spread an attack. Characteristics of blended threats are that they cause harm to the infected system or network, they propagates using multiple methods, the attack can come from multiple points, and blended threats also exploit vulnerabilities.

To be considered a blended thread, the attack would normally serve to transport multiple attacks in one payload. For example it wouldn't just launch a DoS attack — it would also, for example, install a backdoor and maybe even damage a local system in one shot. Additionally, blended threats are designed to use multiple modes of transport. So, while a worm may travel and spread through e-mail, a single blended threat could use multiple routes including e-mail, IRC and file-sharing sharing networks.

Lastly, rather than a specific attack on predetermined .exe files, a blended thread could do multiple malicious acts, like modify your exe files, HTML files and registry keys at the same time — basically it can cause damage within several areas of your network at one time.

Blended threats are considered to be the worst risk to security since the inception of viruses, as most blended threats also require no human intervention to propagate.


credit to HaTz SH

Saturday, September 10, 2011

CCNA2 : Chapter 4

Expect minimum percentage: 100%

1. What does the RIP holddown timer do?
ans:
instructs routers to ignore updates, for a specified time or event, about possible inaccessible routes

2. What metric does the RIP routing protocol consider to be infinity?
ans:
16

3. What is a routing loop?
ans:
a condition where a packet is constantly transmitted within a series of routers without ever reaching its intended destination

4. Which two statements are true regarding the function of the RIPv1 routing updates? (Choose two).
ans:
updates are broadcast at regular intervals
broadcasts are sent to 255.255.255.255

5. Which of the following can exist in a distance vector network that has not converged? (Choose three.)
ans:
routing loops
inconsistent traffic forwarding
inconsistent routing table entries

6. Refer to the exhibit. What path will packets from the 192.168.1.0/24 network travel to reach the 10.0.0.0/8 network if RIP is the active routing protocol?
ans:
The path will be router A -> router D -> router E.

7. What is the purpose of the TTL field in the IP header?
ans:
limits the time or hops that a packet can traverse through the network before it should be discarded

8. Which two conditions are most likely to cause a routing loop? (Choose two.)
ans:
inconsistent routing tables
incorrectly configured static routes

9. Refer to the exhibit. If all routers are using RIP, how many rounds of updates will occur before all routers know all networks?
ans:
3

10. The graphic shows a network that is configured to use RIP routing protocol. Router2 detects that the link to Router1 has gone down. It then advertises the network for this link with a hop count metric of 16. Which routing loop prevention mechanism is in effect?
ans:
route poisoning

11. Refer to the exhibit. The routers in this network are running RIP. Router A has not received an update from Router B in over three minutes. How will Router A respond?
ans:
The Invalid timer will mark the route as unusable if an update has not been received in 180 seconds.

12. What actions will occur after RouterA loses connectivity to network 114.125.16.0? (Choose two.)
ans:
RouterB will include network 123.92.76.0 and 136.125.85.0 in its update to RouterA.
Router C will learn of the loss of connectivity to network 114.125.16.0 from RouterB.

13. Three routers running a distance-vector routing protocol lost all power, including the battery backups. When the routers reload, what will happen?
ans:
They will send updates that include only directly connected routes to their directly connected neighbors.

14. Which statement is true regarding cisco’s RIP_JITTER variable?
ans:
It prevents the synchronization of routing updates by subtracting a random length of time ranging from 0% to 15% of the specified interval time from the next routing update interval.

15. Which of the following methods does split horizon use to reduce incorrect routing information?
ans:
Information learned from one source is not distributed back to that source.

16. A network administrator is evaluating RIP versus EIGRP for a new network. The network will be sensitive to congestion and must respond quickly to topology changes. What are two good reasons to choose EIGRP instead of RIP in this case? (Choose two.)
ans:
EIGRP only updates affected neighbors.
EIGRP updates are partial.

17. Which two statements describe EIGRP? (Choose two.)
ans:
EIGRP sends triggered updates whenever there is a change in topology that influences the routing information.
EIGRP sends a partial routing table update, which includes just routes that have been changed.

18. Which three routing protocols are distance vector routing protocols? (Choose three).
ans:
RIPv1
EIGRP
RIPv2

19. Which of the following statements are correct about RIP?
ans:
will send out an update if there is a failure of a link

20. Which event will cause a triggered update?
ans:
a route is installed in the routing table

CCNA2 : Chapter 3

Expect minimum percentage: 100%

1) Refer to the exhibit. Which statement correctly describes how R1 will determine the best path to R2?
ans:
R1 will install an EIGRP route using network B in its routing table because the administrative distance of EIGRP is lower than RIP.

2) Which two statements are true regarding classless routing protocols? (Choose two.)
ans:
sends subnet mask information in routing updates
allows for use of both 192.168.1.0/30 and 192.168.1.16/28 subnets in the same topology

3) Which command would the network administrator issue to determine if load balancing is in effect on a router?
ans:
show ip route

4) Which statement is true regarding routing protocols?
ans:
EIGRP uses DUAL to calculate the shortest path and can be configured to do unequal cost load balancing.

5) An engineer creates a static route by entering the Router(config)# ip route 10.0.0.0 255.255.255.0 192.168.1.2 command. What can be concluded about this route?
ans:
The administrative distance of this route is 1.

6) Which two conditions would create a setting where the use of a distance-vector routing protocol would be efficient? (Choose two.)
ans:
the network is using a hub and spoke topology
the network is using a flat design

7) Refer to the exhibit. If RIP is the routing protocol, what is the value of the metric from router A to network 192.168.5.0/24?
ans:
3

8) What is the purpose of a routing protocol?
ans:
It allows a router to share information about known networks with other routers.

9) Which two statements correctly describe the concepts of administrative distance and metric? (Choose two.)
ans:
Administrative distance refers to the trustworthiness of a particular route.
Routes with the smallest metric to a destination indicate the best path.

10)Which of the following best describes the operation of distance vector routing protocols?
ans:
They send their routing tables to directly connected neighbors.

11) Which of the following is associated with link-state routing protocols?
ans:
shortest-path first calculations

12) The following line of code is displayed in a routing table:
R 209.165.201.0/24 [120/2] via 192.168.252.2, 00:00:16, S0/0/0
What can be concluded from this output?
ans:
The value, 120, is used to determine the best path when a router has more than one routing protocol configured for the same destination network.

13) Why is fast convergence desirable in networks that use dynamic routing protocols?
ans:
Routers may make incorrect forwarding decisions until the network has converged.

14) Which of the following conditions must be met in order for a network to have converged
ans:
The routers in the network are operating with consistent routing knowledge.

15) Which two statements are true regarding the advantages of the use of static routes? (Choose two).
ans:
increased security
the administrator maintains control over routing

16) Which two statements are true regarding metrics? (Choose two.)
ans:
EIGRP uses bandwidth as a metric.
OSPF uses cost based on bandwidth as a metric.

17) What will be the result of the following commands?
ORL(config)# interface fastethernet 0/0
ORL(config-if)# ip address 172.16.3.1 255.255.255.0
ORL(config-if)# no shutdown
ans:
A routing table entry is made to the 172.16.3.0 network with a code of "C".

18) Refer to the exhibit. Router1 and Router2 are running EIGRP. All interfaces are operational and packets can be forwarded between all networks. What information will be found in the routing table for Router1?
ans:
The administrative distance of the route to network 172.16.0.0 will be 90.

19) A growing medium-sized manufacturing company recently began to have routing instability issues. The company uses static routes and has a mixture of over 30 Cisco and non-Cisco routers. The network administrator has decided to convert the network to dynamic routing. What characteristics of protocols should be considered in this selection process?
ans:
OSPF can be used between the routers.

20) A router learns two paths with equal metrics to a destination network via the RIP routing protocol. How will the router handle packets to the destination network?
ans:
The router will install both routes in the routing table and load balance between the two.

21) The following line of code is present in the routing table:
O 10.16.1.0/27 [110/129] via 192.168.1.5, 00:00:05, Serial0/0/1
What does the number 129 indicate in this output?
ans:
The cost for this link has a value of 129.

22) When multiple routing protocols have a route to the same destination network, what determines which route is installed in the routing table?
ans:
lowest administrative distance

Friday, July 29, 2011

Flat 3A (2011) DVDRip Single Link


Sinopsis

Mengisahkan tentang Fiqah, seorang pekerja kilang yang telah mengandungkan anak kekasihnya, Anas. Anas memaksa Fiqah untuk mengugurkan kandungannya tetapi Fiqah membantah. Fiqah dipukul dan di berikan ubat untuk menggugurkan kandungan. Kerana cintanya terhadap Anas, Fiqah menggugurkan juga kandungannya itu. Fiqah mula dihantui perasaan bersalah dan fobia. Ratna, kawan baik Fiqah mengajak Fiqah berpindah di sebuah flat murah bersamanya. Tanpa di ketahui Fiqah , rumah yang didudukinya itu adalah rumah seorang dukun bernama Kang Suman yang di percayai telah menculik dan membunuh Fatin, seorang kanak-kanak yang tinggal berhampiran flat tersebut.



Download Here

Megaupload

http://adf.ly/2F2jX

Fileserve

http://adf.ly/2F2kS

kalau ade link yg korang xboleh buka tu tlg tukar dns setting korang or guna web proxy sini ek.. :)


Credit to BlackWinter(SH crew)






Tolong! Awek Aku Pontianak (2011) Malay DVDRip Single Link


Sinopsis

Sebuah filem komedi seram yang mengisahkan Bob, berperwatakan lurus bendul dan baik hati yang bekerja di sebuah syarikat periklanan, di bawah penyeliaan Faizal. Selepas berpisah dengan teman wanitanya (Ina), Bob dan kawannya, Pian berpindah ke sebuah apartment lain. Kehidupan baru Bob bermula selepas berpindah dan bertemu dengan dua beradik iaitu Maya dan Liyana. Pada mulanya Liyana tidak menyenangi kehadiran Bob dan Pian kerana takut
identiti mereka terbongkar.

Namun selepas menguji Bob, mereka mengakui bahawa Bob tidaklah seperti yang mereka sangkakan. Sejak itu, mereka berempat menjadi kawan baik. Hubungan Bob dan Maya pula bertambah rapat selepas insiden beg Maya diragut. Selepas bertemu Maya di rumah Bob, Faizal melamar Maya untuk bekerja di syarikatnya. Faizal cuba memikat Maya, namun hampa. Kemudian Faizal berpakat dengan Kamal untuk menakutkan Maya. Tetapi berlaku sebaliknya, Faizal dan Kamal pula yang ketakutan setelah dikacau oleh pontianak. Faizal mula curiga dengan kehadiran Maya dan menyuruh Kamal mencari bomoh untuk menyiasat kehadiran pontianak dipejabatnya.

Faizal menyatakan keraguannya tentang Maya kepada Pian dan mereka berpakat untuk membongkar identiti Maya dan Liyana. Di parti yang diadakan oleh Faizal, mereka melakukan pelbagai cara untuk membuktikan Maya dan Liyana adalah pontianak. Benarkah Maya dan Liyana pontianak? Dan apa pula hubungan Nadia dengan dua beradik itu? Semuanya akan terjawab dalam filem `Tolong! Awek Aku Pontianak!’.



Download Here

Megaupload

http://adf.ly/2E6Fd

Fileserve

http://adf.ly/2E5jX

kalau ade link yg korang xboleh buka tu tlg tukar dns setting korang or guna web proxy sini ek.. :)


credit to BlackWinter(SH crew)

Saturday, July 16, 2011

Harry Potter and the Deathly Hallows: Part 2 (2011)






screen short


info

File Name : Harry Potter and the Deathly Hallows: Part 2 (2011) TS RMVB-KURYU
IMDB LINK: http://imdb.com/title/tt1201607/
Genre: Action | Adventure | Drama
Runtime: 130 min
User Rating: 8.7/10 (6,712 votes)
Country: USA
Language: English
Subtitle: None

sinopsis

The final chapter begins as Harry, Ron, and Hermione continue their quest of finding and destroying the Dark Lord’s three remaining Horcruxes, the magical items responsible for his immortality. But as the mystical Deathly Hallows are uncovered, and Voldemort finds out about their mission, the biggest battle begins and life as they know it will never be the same again.

DOWNLOAD










kalau ade link yg korang xboleh buka tu tlg tukar dns setting korang or guna web proxy sini ek.. :)

Credit to Team Hanna n Silent Killer(SH admin)

Sunday, July 10, 2011

[Tips] Ccleaner: Penggunaan yg berkesan!

Tips kali nie akan membincangkan cara tuk menggunakan software freeware bernama Ccleaner ngan berkesan. Ramai yg menggunakan software nie TETAPI tidak menggunakannya dengan betul lalu menyebabkan masih ader sisa yg tidak dibersihkan sepenuhnya.

Tips nie juga akan mendedahkan ttg teknologi baru sofware nie bernama " Ccleaner Enhancer :

Ccleaner? aper ker bendanya?

Software nie akan membersihkan computer anda dari sisa/baki akibat penggunaan sesuatu software yg meninggalkan temporary file semasa penggunaan software tersebut. Cth am Internet Explorer kita guna akan ader cache2 yg tidak diperlukan. Jika kita xbersihkan HDD size akan meningkat disebabkan sisa sisa cache tersebut.

Ia juga ader fungsi " Fix Registry ". Bila masa anda uninstall sesuatu program, saki baki program tu mungkin meninggalkan entry registry pro
gramnya dlm registry lalu menyebabkan optimization registry tidak kemas. Biler xkemas, keupayaan PC tercacat.

Nie gambo screen Ccleaner: Penerangan pas nie akan berbentuk gambo:

Download Ccleaner dari sini

Download Ccleaner Enhancer INI file dari sini


1. Extract winapp2.ini file dari RAR tersebut ker program directory Ccleaner. Lihat gambo dibwh:


2. Bukak applikasi Ccleaner dari desktop anda dan follow guide dibwh:


3.


4.


5.

Diharap anda dpt memanfaatkan tips diatas supaya sistem computer anda bersih dan kemas.(ak dh cube mmg best !)

credit to mp3(SH member)



Maximunkan kelajuan download guna IDM

entry psal sofware idm yg ak buat tadi click sini.

langkah-langkah

1. pada idm pilih downloads -> option -> connections

2. pada default max. conn. number, setkan kepada 16

3. ok dh siap...cube try download.

ataupun kalu dh malas sangat korang leh guna software IDM Optimizer sini.
COVER


SCRENSHOTS


INFORMATION

Nur Kasih The Movie adalah sebuah cerita bagaimana sebuah keluarga menghadapi setiap ujian daripada Tuhan. Kematian isteri Aidil telah memberikan kesan yang mendalam terutama kepada Aidil sendiri. Dia ditemani oleh dua orang anaknya iaitu Illyas dan Mariam. Adik kepada Aidil yang bernama Adam dan juga isterinya Nur Amina turut membantu untuk memberi semangat kepada Aidil.

Setelah Aidil kembali pulih, Adam dan Nur Amina pulang ke bandar untuk menjalani hidup seperti biasa. Setelah pelbagai usaha dilakukan, akhirnya Nur Amina mengandung. Berita gembira ini telah membuatkan semua orang gembira terutama Adam sendiri. Tetapi kegembiraan tersebut tidak berpanjangan kerana kandungan tersebut telah keguguran.

Akibat daripada kesedihan itu, Adam dan Nur Amina telah pergi ke Jordon untuk menenangkan diri. Mereka melawat banyak tempat-tempat bersejarah di sana. Sehingga pada suatu hari, mereka telah terlibat dalam satu kemalangan keretapi. Pada saat ini, Adam berdoa kepada Tuhan supaya dikembalikan Nur Amina. Akhirnya, mereka berdua telah selamat.

Tetapi, cincin Nur Amina telah hilang. Jadi, Adam pun pergi ke tempat nahas tersebut untuk mencari cincin Nur Amina. Malangnya, ribut taufan telah melanda di kawasan tersebut dan Adam telah hilang. Nur Amina berusaha untuk mencari Adam tanpa berputus asa. Dia juga telah meminta pertolongan daripada Aidil untuk bersama-sama mencari Adam. Setelah puas mencari, akhirnya mereka berjaya menjumpai Adam. Tetapi pada ketika itu, Adam berada di dalam keadaan yang tenat kerana dia telah terlibat dalam satu kemalangan kereta.

Akhirnya mereka telah pulang ke Malaysia. Adam dibawa ke hospital untuk dirawat. Malangnya keadaan Adam menjadi semakin teruk di mana jantungnya lemah. Nur Amina tetap berusaha untuk menyelamatkan Adam dengan cara mencari sumber kewangan untuk membiayai perbelanjaan perubatan untuk Adam. Ketika itu juga, Nur Amina didapati telah mengandung lagi.

Sementara itu, tugas Adam sebagai cikgu telah diambil alih oleh Aidil. Pada suatu hari, Aidil telah dibelasah oleh sekumpulan samseng kerana dituduh merampas teman wanita samseng tersebut. Pada masa yang sama juga, Adam berada dalam keadaan yang amat kritikal. Mamat iaitu anak murid kepada Adam cuba untuk menyelamatkan Aidil. Malangnya, dia telah terbunuh.

Dengan pengorbanan itu, Adam berjaya diselamatkan kerana Mamat menderma jantungnya kepada Adam. Disebabkan itu Adam sempat melihat anaknya. Walau bagaimanapun, yang hidup tetap akan mati juga. Adam telah mati dahulu sebelum Nur Amina dan Aidil akibat tua.

Tarikh Tayangan
Di Pawagam 19 Mei 2011

Pelakon
Remy Ishak, Fizz Fairuz, Tiz Zaqyah, Ayu Raudhah, Liza Othman, Munif Isa, Sara Ali, Adik Mia Sara Nasuha, Adik Ilyas Suhaimi

Pengarah
Kabir Bakhtiar

Lakon Layar
Mira Mustaffa

IMDB Link: Nur kasih: The Movie (2011) - IMDb


DOWNLOAD HERE



credit to antookiller(SH member)

Nur Kasih The Movie (2011) PPVRip

COVER


SCRENSHOTS


INFORMATION

Nur Kasih The Movie adalah sebuah cerita bagaimana sebuah keluarga menghadapi setiap ujian daripada Tuhan. Kematian isteri Aidil telah memberikan kesan yang mendalam terutama kepada Aidil sendiri. Dia ditemani oleh dua orang anaknya iaitu Illyas dan Mariam. Adik kepada Aidil yang bernama Adam dan juga isterinya Nur Amina turut membantu untuk memberi semangat kepada Aidil.

Setelah Aidil kembali pulih, Adam dan Nur Amina pulang ke bandar untuk menjalani hidup seperti biasa. Setelah pelbagai usaha dilakukan, akhirnya Nur Amina mengandung. Berita gembira ini telah membuatkan semua orang gembira terutama Adam sendiri. Tetapi kegembiraan tersebut tidak berpanjangan kerana kandungan tersebut telah keguguran.

Akibat daripada kesedihan itu, Adam dan Nur Amina telah pergi ke Jordon untuk menenangkan diri. Mereka melawat banyak tempat-tempat bersejarah di sana. Sehingga pada suatu hari, mereka telah terlibat dalam satu kemalangan keretapi. Pada saat ini, Adam berdoa kepada Tuhan supaya dikembalikan Nur Amina. Akhirnya, mereka berdua telah selamat.

Tetapi, cincin Nur Amina telah hilang. Jadi, Adam pun pergi ke tempat nahas tersebut untuk mencari cincin Nur Amina. Malangnya, ribut taufan telah melanda di kawasan tersebut dan Adam telah hilang. Nur Amina berusaha untuk mencari Adam tanpa berputus asa. Dia juga telah meminta pertolongan daripada Aidil untuk bersama-sama mencari Adam. Setelah puas mencari, akhirnya mereka berjaya menjumpai Adam. Tetapi pada ketika itu, Adam berada di dalam keadaan yang tenat kerana dia telah terlibat dalam satu kemalangan kereta.

Akhirnya mereka telah pulang ke Malaysia. Adam dibawa ke hospital untuk dirawat. Malangnya keadaan Adam menjadi semakin teruk di mana jantungnya lemah. Nur Amina tetap berusaha untuk menyelamatkan Adam dengan cara mencari sumber kewangan untuk membiayai perbelanjaan perubatan untuk Adam. Ketika itu juga, Nur Amina didapati telah mengandung lagi.

Sementara itu, tugas Adam sebagai cikgu telah diambil alih oleh Aidil. Pada suatu hari, Aidil telah dibelasah oleh sekumpulan samseng kerana dituduh merampas teman wanita samseng tersebut. Pada masa yang sama juga, Adam berada dalam keadaan yang amat kritikal. Mamat iaitu anak murid kepada Adam cuba untuk menyelamatkan Aidil. Malangnya, dia telah terbunuh.

Dengan pengorbanan itu, Adam berjaya diselamatkan kerana Mamat menderma jantungnya kepada Adam. Disebabkan itu Adam sempat melihat anaknya. Walau bagaimanapun, yang hidup tetap akan mati juga. Adam telah mati dahulu sebelum Nur Amina dan Aidil akibat tua.

Tarikh Tayangan
Di Pawagam 19 Mei 2011

Pelakon
Remy Ishak, Fizz Fairuz, Tiz Zaqyah, Ayu Raudhah, Liza Othman, Munif Isa, Sara Ali, Adik Mia Sara Nasuha, Adik Ilyas Suhaimi

Pengarah
Kabir Bakhtiar

Lakon Layar
Mira Mustaffa

IMDB Link: Nur kasih: The Movie (2011) - IMDb

DOWNLOAD HERE

filesonic

fileserver

hotfile

Layan Transformer 3 HD Online - free


Cara2 :

Download : http://www.graboid.com/
Run n free Register
Search - transformers 3
pastu- play
then..layannnn.....tggu buffering jap..

credit to edan

IDM 6.06 build 8 FULL

Internet Download Manager 6.06 Build 8 [FULL] | 5.25 MB


Internet Download Manager : The fastest download accelerator

Internet Download Manager (IDM) is a tool to increase download speeds by up to 500 percent, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.

Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download accelerators and managers that segment files before downloading starts, Internet Download Manager segments downloaded files dynamically during download process. Internet Download Manager reuses available connections without additional connect and login stages to achieve better acceleration performance.

Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, directories with authorization, MP3 audio and MPEG video content processing, and a large number of directory listing formats. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.



Key features of Internet Download Manager:
* All popular browsers and applications are supported! Internet Download Manager supports all versions of popular browsers, and can be integrated into any 3rd party Internet applications.
* Download with one click. When you click on a download link in a browser, IDM will take over the download and accelerate it. IDM supports HTTP, FTP and HTTPS protocols.
* Download Speed. Internet Download Manager can accelerate downloads by up to 5 times due to its intelligent dynamic file segmentation technology.
* Download Resume. Internet Download Manager will resume unfinished download from the place where they left off.
* Simple installation wizard. Quick and easy installation program will make necessary settings for you, and check your connection at the end to ensure trouble free installation of Internet Download Manager
* Automatic Antivirus checking. Antivirus checking makes your downloads free from viruses and trojans.
* Advanced Browser Integration. When enabled, the feature can be used to catch any download from any application. None of download managers have this feature.
* Built-in Scheduler. Internet Download Manager can connect to the Internet at a set time, download the files you want, disconnect, or shut down your computer when it's done.
* IDM supports many types of proxy servers. For example, IDM works with Microsoft ISA, and FTP proxy servers.
* IDM supports main authentication protocols: Basic, Negotiate, NTLM, and Keberos. Thus IDM can access many Internet and proxy servers using login name and password.
* Download All feature. IDM can add all downloads linked to the current page. It's easy to download multiple files with this feature.
* Customizable Interface. You may choose the order, and what buttons and columns appear on the main IDM window.
* Download Categories. Internet Download Manager can be used to organize downloads automatically using defined download categories.
* Quick Update Feature. Quick update may check for new versions of IDM and update IDM once per week.
* Download limits. Progressive downloading with quotas feature. The feature is useful for connections that use some kind of fair access policy (or FAP) like Direcway, Direct PC, Hughes, etc.
* Drag and Drop. You may simply drag and drop links to IDM, and drag and drop complete files out of Internet Download Manager.
* IDM is multilingual. IDM is translated to Arabic, Bosnian, Bulgarian, Chinese, Croatian, Czech, Danish, Dutch, French, German, Hungarian, Italian, Japanese, Lithuanian, Macedonian, Polish, Portuguese, Romanian, Russian, Slovenian, Spanish, Thai languages.

What's new in version 6.06 Build 8:
* Added support for Firefox 5
* Resolved problems with foreign versions of Windows when a username contains hieroglyphs or other Unicode characters
* Advanced browser integration has been significantly amended. Improved automatic interception of downloads, enhanced video stream detection in Chrome, Opera and in other browsers which are integrated with network driver

MULTILINGUAL: English Spanish, French, Italian, Deustch, Japanese, Portuguese, etc
COMPATIBILITY: Windows 95/98/Me/2000/NT/XP/2003/Vista/Server 2008/7 (32/64-bit)

DOWNLOAD pass: 1rEbbs

credit to eden.

Tuesday, July 5, 2011

Top 10 Internet Browser 2011

1- Firefox

2- Google Chrome

3- Internet Explorer

4- Opera

5- Safari

6- Maxthon

7- Avant Browser

8- PhaseOut

9- Deepnet Explorer

10- Space Time

Top 10 AntiVirus 2011

1. BitDefender AntiVirus

2. KasperSky AntiVirus

3. WeBroot AntiVirus

4. NorTon AntiVirus

5. ESET NoD32 AntiVirus

6. AVG AntiVirus

7. G DATA AntiVirus

8. AviRa AntiVir

9. ViPre AntiVirus

10. TreNd MiCro TitaNiuM

Monday, July 4, 2011

Mozilla Firefox v4.0 Deluxe Special Edition x86-x64 Silent Installs




Information:
Mozilla Firefox 4 - faster, more secure, easier to use and sporting a new look, this latest Firefox release sets a new standard for web browser innovation. Mozilla Firefox project (formerly Firebird, which was formerly Phoenix) is a redesign of Mozilla's browser component, written using the XUL user interface language and designed to be cross-platform. It is small, fast and easy to use, and offers many advantages over other web browsers, such as the tabbed browsing and the ability to block pop-up windows. Firefox has the most ways to customize your online experience specifically for the way you use the web. There are more than 6,000 Add-ons (little extras that augment Firefox to meet your unique needs) just waiting out there to help you do more, have more fun and be more creative online. Firefox keeps your personal info personal and your online interests away from the bad guys. Simply put, your security is our top priority.

What makes Firefox different? Most importantly, we’re open. That means anyone around the world (and we have thousands of experts watching our back) is able to look into our code and find any potential weak spots in our armor. And when we hear about a problem, we roll up our sleeves and get to work fixing it right away. It’s in your best interest (and ours) to take care of the issue, even if it means admitting we’re a little less than perfect.

The TraceMonkey javascript engine brings screaming fast performance to Firefox 3.5. With javascript that's more than twice as fast as Firefox 3 and 10x faster than Firefox 2, you’ll be able to see the difference without breaking out your stopwatch.

Faster, Safer, Smarter, Better
Things move quickly online, and we’ve beefed up the engine that runs Firefox to make sure you can keep up: Firefox 3.5 is more than twice as fast as Firefox 3, and ten times as fast as Firefox 2. As a result, Web applications like email, photo sites and your favorite social networks will feel snappier and more responsive.

More Ways to Keep You Safe
Keeping you safe while you surf is our top priority, which is why we’ve upgraded our anti-phishing and anti-malware technologies and have added private browsing and “forget this site” options to ensure your privacy. Plus, our open source security process means we have experts around the globe working around the clock to keep you (and your
personal information) safe.

One Size Doesn’t Fit All
Everybody uses the Web differently, so why should your browser be exactly like the next guy’s? Whether you’re into chatting, cooking or coding, Firefox has more than 6,000 add-ons to help you customize it to fit your exact needs.

Advancing the Web
We’ve been working hard to make sure Firefox brings you the best of the modern web. With new features like private browsing, tear-off tabs and enhancements to the Awesome Bar, plus major performance enhancements, you’ll enjoy life on the cutting edge.

New In Firefox 4.0:
  • Tabs are now on top by default on Windows only - OSX and Linux will be changing when the theme has been modified to support the change.
  • On Windows Vista and Windows 7 the menu bar has been replaced with the Firefox button.
  • You can search for and switch to already open tabs in the Smart Location Bar
  • New Addons Manager and extension management API (UI will be changed before final release)
  • Significant API improvements are available for JS-ctypes, a foreign function interface for extensions.
  • The stop and reload buttons have been merged into a single button on Windows, Mac and Linux.
  • The Bookmarks Toolbar has been replaced with a Bookmarks Button by default (you can switch it back if you'd like).
  • Crash protection for Windows, Linux, and Mac when there is a crash in the Adobe Flash, Apple Quicktime or Microsoft Silverlight plugins.
  • CSS Transitions are partially supported.
  • Full WebGL support is included but disabled by default at this time.
  • Core Animation rendering model for plugins on Mac OS X. Plugins which also support this rendering model can now draw faster and more efficiently.
  • Native support for the HD HTML5 WebM video format.
  • An experimental Direct2D rendering backend is available on Windows, turned off by default.
  • Web developers can use Websockets for a low complexity, low latency, bidirectional communications API.
  • Web developers can update the URL field without reloading the page using HTML History APIs.
  • More responsive page rendering using lazy frame construction.
  • Link history lookup is done asynchronously to provide better responsiveness during pageload.
  • CSS :visited selectors have been changed to block websites from being able to check a user's browsing history.
  • New HTML5 parser.
  • Support for more HTML5 form controls.
  • Mozilla Firefox "Deluxe Special Edition" news interface, very high speed, very awesome, very marvellous and very power.
  • Disable update, tweaked script, news add-ons added, fix all icons and fix all surface outside and inside.
  • Now enjoy the power of "Deluxe Special Edition" version for you all to surf the Internet without limits.
DOWNLOAD

Mozilla Firefox v4.0 Deluxe Special Edition Vista And 7 x64 Silent Installs
Mediafire

Mozilla Firefox v4.0 Deluxe Special Edition Vista And 7 x86 Silent Installs
Mediafire

Mozilla Firefox v4.0 Deluxe Special Edition XP x64 Silent Installs
Mediafire

Mozilla Firefox v4.0 Deluxe Special Edition XP x86 Silent Installs
Mediafire

credit to h4x0r

Friday, July 1, 2011

Mengelakan/Mengesan Laptop Dicuri

ak nak berkongsi satu project oleh team luar negara yang telah membuat software bagi mengesan jika laptop korang dicuri..
cara dia senang saje,just install dan register,jika laptop korang dicuri korang hanya perlu memberitahu mereka di profile yg korang register tadi dan mereka akan mengesan laptop tersebut serta merekod gambar pencuri andainya ade webcam d laptop korang,data akan d hantar melalui emel..

1.download software tersebut maybe ade AV yg mengesan nya sebagai trojan maybe sebab fungsi dia yg seakan-akan trojan..download di mediafire sini.

2.semasa install korang pilih +control panel dan selepas itu new user dan isi ruangan kosong yg disediakan.

3.selepas itu link untuk aktifkan akaun korang akan dihantar ke emel yg di korang guna tadi.

4.selepas aktifkan dan login korang masuk ke device dan ikut setting seperti di bawah ni


jika laptop korang dicuri korang perlu buka akaun korang tadi dan ON kan button ALERT ok?
2 saje.

credit to xxx