tag:blogger.com,1999:blog-63926138468408629202024-02-08T03:24:07.314+07:00Enmicron LabAntiVirus and Security Software Solutions For Your Digital WorldaNtH Bloghttp://www.blogger.com/profile/13439815750855425164noreply@blogger.comBlogger16125tag:blogger.com,1999:blog-6392613846840862920.post-80757378983376242822012-03-21T21:53:00.000+07:002012-03-21T21:53:00.402+07:00Eura Antivirus [Update v2.8]<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiF-ul2r_5IEuD18RBPTKZwEVItmMxdAPQRoEC3zDxZm3BDso78ffLG-UxRnhUJVO8U-TYzlyBkYF73rUoT7j6exAk8pLnzzf2iOahzYM6TJwd6CRtDi3U9aZ5QVWkc3Iytt2upXEYVthU/s1600/cover+box+Eura+Antivirus.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiF-ul2r_5IEuD18RBPTKZwEVItmMxdAPQRoEC3zDxZm3BDso78ffLG-UxRnhUJVO8U-TYzlyBkYF73rUoT7j6exAk8pLnzzf2iOahzYM6TJwd6CRtDi3U9aZ5QVWkc3Iytt2upXEYVthU/s200/cover+box+Eura+Antivirus.png" width="129" /></a></div><div style="text-align: justify;"><span class="">Get complete protection from dangerous threats on the Internet, worms, viruses, trojans, spyware and adware, get immediately from Eura Antivirus Antivirus protection. </span>Eura signatured AntiVirus has more than 2650 more types of virus variants coupled with AutoUpdate Module and Module AutoSendSample.</div><br />
<div style="text-align: justify;"><span class="">Eura Antivirus proactively detect and clean viruses, trojans, worms, adware, spyware, and other threats to the AutoUpdate module and the module can be updated automatically AutoSendSample components EuraAV.</span></div><br />
<div style="text-align: justify;">Eura Antivirus is an local freeware Antivirus specialized to handling solve local viruses or abroad that epidemic in Indonesia. by using own engine antivirus, Eura Antivirus can scanning virus flashily and accurate. And adding with its' algorithmic heuristic, the various virus (new even thought old various) able on database Eura Antivirus detected easily.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://i636.photobucket.com/albums/uu83/enmicron/euraav/eura_av_menu.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="277" src="http://i636.photobucket.com/albums/uu83/enmicron/euraav/eura_av_menu.png" width="400" /></a></div><br />
<div style="color: red;"><i><b>Features:</b></i></div><br />
<b>Real Time Protection</b><br />
Protection that will block virus from being executed. Using locking function when found. It is user-friendly and you can do an act to that program<br />
<br />
<b>Computer Tweaker</b><br />
Tweak up your computer by repairing registry manually, or optimizing your PC to the maximum optimization.<br />
<br />
<b>Disinfect Many Virus</b><br />
Can disinfect many types of virus. Your infected file can be repaired.<br />
<br />
<b>Eura Folder Lock</b><br />
Lock Autorun.inf.<br />
<br />
<b>On-Screen Keyboard</b><br />
On Screen Keyboard is a virtual keyboard to provide an alternative input mechanism for users with disabilities who cannot use a physical keyboard.<br />
<br />
<b>Exception List</b><br />
With this feature, you can ignore files / folders to be checked by Eura Antivirus.<br />
<br />
<b>Smart Detection</b><br />
Can detect many viruses, wheter it is from Indonesia, or even international Virus until the super virus.<br />
<br />
<b>AutoUpdate</b><br />
By activating this Auto Update fixture, Eura AntiVirus can update components of Eura AntiVirus automatically by connecting with internet surely. Update that doing automatically and consistent, can maximalized detecting of various of viruses that more which sophisticated.<br />
<br />
<b>AutoSendSample</b><br />
By activating this fixture Auto Send, Eura AntiVirus can send undetecting file automatically by connecting in internet that is useful for more analyzing also can help Team Enmicron in updating Eura AntiVirus fastly toward various of new viruses which sophisticated and excitement.<br />
<br />
<div style="color: red;"><b>Eura Antivirus Information :</b></div><div style="color: #38761d;">- <b>Eura Antivirus Version : 2.8</b></div><div style="color: #38761d;">- <b>Engine Version : 2.0.0.4</b></div><div style="color: #38761d;">- <b>Database Version : 1964</b></div></div><br />
<div style="color: red;"><b>Change Logs :</b></div>- <b>Fixed</b> Scanner Engine<br />
- <b>Fixed</b> Engine Cleaner<br />
- <b>Fixed</b> False Alarm<br />
- <b>Fixed</b> Bug Auto Update<br />
- <b>Fixed</b> Bug On-Access Scanner<br />
<br />
<blockquote class="tr_bq"><div style="color: red;"><span style="font-size: small;"><b>System Requirements:</b></span></div><br />
<b><i>Operating Systems Supported :</i></b><br />
* Windows XP, Microsoft Windows 2000, Windows 7 ,Windows Vista<br />
<br />
<i><b>Minimum Hardware Requirements :</b></i><br />
* Pentium 3 Processor<br />
* 128 MB RAM<br />
* 200 MB of free hard disk space</blockquote><br />
<b><i style="color: red;">Total <script language="Javascript">
ccount_display('1')
</script> people have downloaded Eura Antivirus</i></b><br />
<a href="http://adf.ly/274238/euraav">Download : Here</a> <br />
<a href="http://www.4shared.com/rar/jEqwsI4v/eura_av_portable.html">Mirror by <span style="color: red;">4shared</span> : Download Here</a><br />
<a href="http://adf.ly/274238/euraav-mirror-mediafire">Mirror by <span style="color: red;">MediaFire</span> : Download Here</a>aNtH Bloghttp://www.blogger.com/profile/13439815750855425164noreply@blogger.com0tag:blogger.com,1999:blog-6392613846840862920.post-58918705440692491512012-03-21T21:10:00.001+07:002012-03-21T21:12:07.744+07:00Making an in-game tutorial with StencylWorks<div style="text-align: justify;">If you are playing the latest Flash games, you will see the old “how to play” button no longer exists.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">People don’t want to read detailed instructions before playing a Flash game, they want to dig into action.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">That’s why we have the need to create in-game tutorials, which are easy levels to make players get used to the game design while keeping them in action.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">In my upcoming Flash game <b>Kira the Witch</b>, the tutorial is made of signs you can find around the levels. Once you touch a sign, you will be able to “read” it this way:</div><br />
<div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen="" frameborder="0" height="300" src="http://www.youtube.com/embed/MZO0vG1W2aA" width="250"></iframe></div><br />
<div style="text-align: justify;">I am going to show you how to do it in the painless way.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">We have two actors: the small sign and the big sign. Small signs are placed in the scene during level design, while the big sign (one for all) will be created on the fly.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Also, the small sign is a sensor so it won’t react to physics and has its own collision group, called “sign”.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">The big sign is a doodad, which means it’s a special actor never allowed to collide with anything else.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">There is a big difference between a sensor and a doodad. The sensor does not react to physics forces but registers collisions, the doodad does not register collisions.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Now let’s create some behaviors: the first, and the easiest, is called “Big sign information” and does not contain any action, as you can see:</div><br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://www.emanueleferonato.com/wp-content/uploads/2012/01/sign01.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="168" src="http://www.emanueleferonato.com/wp-content/uploads/2012/01/sign01.png" width="320" /></a></div><br />
So it may seems useless, but I added to this behavior three not hidden attributes called “Text to display”, “Big sign x position” and “Big sign y position”.<br />
<br />
When I customize the behavior of each small sign and add “Big sign information” behavior…<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://www.emanueleferonato.com/wp-content/uploads/2012/01/sign02.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="102" src="http://www.emanueleferonato.com/wp-content/uploads/2012/01/sign02.png" width="320" /></a></div><br />
<div style="text-align: justify;">I can set the each sign content, and the x and y coordinates to be shown once Kira “reads” a sign. This way, “Big sign information” behavior acts like a new data type:</div><br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://www.emanueleferonato.com/wp-content/uploads/2012/01/sign03.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="147" src="http://www.emanueleferonato.com/wp-content/uploads/2012/01/sign03.png" width="320" /></a></div><br />
<div style="text-align: justify;">Also please notice I am using an asterisk as line break character since using “\n” won’t work at this stage.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Then, I need another behavior called “Write sign text” which will write text inside the big sign, so obvioulsy will be tied to it:</div><br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://www.emanueleferonato.com/wp-content/uploads/2012/01/sign04.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="187" src="http://www.emanueleferonato.com/wp-content/uploads/2012/01/sign04.png" width="320" /></a></div><br />
<div style="text-align: justify;">This is also very easy as I am only setting a font and writing some text in the sign. Notice how at this time I need to replace “*” with “\n” to do line breaks.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">The difficult task to create the big sign, place it, and write text in it by changing “Text to write” attribute is (and then remove it) made by main player’s behavior called “Kira touches a sign”</div><br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://www.emanueleferonato.com/wp-content/uploads/2012/01/sign05.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="640" src="http://www.emanueleferonato.com/wp-content/uploads/2012/01/sign05.png" width="386" /></a></div><br />
<div style="text-align: justify;">I commented it to let you understand how it works.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Basically the key is the communication among different behaviors to get and set attributes on the fly.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">And we can say “goodbye” to that old lame “How to play” buttons in a matter of minutes.</div><br />
<span style="font-size: x-small;">source : <a href="http://www.emanueleferonato.com/2012/01/31/making-an-in-game-tutorial-with-stencylworks/">http://www.emanueleferonato.com/2012/01/31/making-an-in-game-tutorial-with-stencylworks/</a></span>aNtH Bloghttp://www.blogger.com/profile/13439815750855425164noreply@blogger.com0tag:blogger.com,1999:blog-6392613846840862920.post-68935867138863744972012-02-22T05:42:00.000+07:002012-02-22T05:42:18.573+07:005 Best Virtual Machine Applications<div class="separator" style="clear: both; text-align: center;"><a href="http://mintywhite.com/wp-content/uploads/2010/01/XP-Mode.png?c3a98b" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="http://mintywhite.com/wp-content/uploads/2010/01/XP-Mode.png?c3a98b" width="320" /></a></div><div style="text-align: justify;">The virtual machines are more popular as people need to run different operating systems on a single machine on limited resources,either for testing or for educational purposes.And the computing speed of the machines will generally be able to run more than 1 operating system on a single machine using a virtual machine application.So here are some quick reviews on the best considered top five virtual machine applications an average user.</div><br />
<br />
<a href="http://www.virtualbox.org/"><b>VirtualBox</b></a><br />
<br />
<div style="text-align: justify;">VirtualBox is available for windows systems and mac and linux distributions.This is a free software and includes a lot of features.The parameters and description values are mainly stored entirely in XML files for easier sharing and portability of the application. This tool has a bulk of features and can be found here in the documentation of the software -><a href="http://www.virtualbox.org/wiki/End-user_documentation">Documentation</a>.</div><br />
<br />
<a href="http://www.vmware.com/products/desktop_virtualization.html"><b>VMware</b></a><br />
<br />
<div style="text-align: justify;">VMware is also one of the popular virtual machine applications available for windows and linux operating systems and mainly comes in two options-> VMware Workstation and the VMware Player. VMware Player is a light weight alternative focused on a casual user level functions and features and allows to create and run virtual operating systems without much advanced tools.But VMware Workstation includes many advanced features like clone the virtual machines, capture multiple snapshots of the running virtual operating system, and replay changes made to the virtual OS for testing and also recording in the log the results occuring in the virtual machine. For further information and features and detailed description ,refer this documentation for <a href="http://www.vmware.com/products/player/">VMware Player</a> and this documentation for <a href="http://www.vmware.com/products/workstation/">VMware Workstation</a>.</div><br />
<br />
<a href="http://www.parallels.com/"><b>Parallels</b></a><br />
<br />
<div style="text-align: justify;">Available for mac,windows and linux versions, has a very powerful feature with direct link for the guest OS.This boosts performance of the guest OS in AMD and Intel chips so that when you jump to the virtual machine the host machine gives up its CPU cycles and processing power to the guest OS. Parallels also offers special features like clipboard sharing, synchronization, share folders and transparent printer and peripheral supports. For more information and details check out the documentation <a href="http://www.parallels.com/products/desktop/pd4wl/features/">here</a>.</div><br />
<br />
<a href="http://wiki.qemu.org/Main_Page"><b>QEMU</b></a><br />
<div style="text-align: justify;"><br />
</div><div style="text-align: justify;"></div><div style="text-align: justify;">QEMU is a powerful virtual machine application for Linux operating systems and is built on back of the Kernel-based Virtual Machine. It supports a lot of features like direct execution of guest code on host hardware, auto-resizing of saved virtual disks ,run on host operating system without administrative features. and many more.So this has a interesting feature of running the guest OS without the need of administrative privileges and can even be advantageous as a portable virtual machine on flash drives.</div><br />
<br />
<a href="http://www.microsoft.com/windows/virtual-pc/"><b>Windows Virtual PC</b></a><br />
<br />
<div style="text-align: justify;">This is although a good option for virtual machine application ,but solely exists for windows machines mainly to test software’s and check for backwards compatibility. It offers less in terms of variety of different operating systems but its a good catch for people working solely in windows environment.Its available in versions of Virtual PC 2004, 2007, and Windows Virtual PC.So if you are a core windows user ,you could check out this option.</div><br />
<span style="font-size: x-small;">source : <a href="http://www.hackhow.com/5-best-virtual-machine-applications-2/">http://www.hackhow.com/5-best-virtual-machine-applications-2/</a></span>aNtH Bloghttp://www.blogger.com/profile/13439815750855425164noreply@blogger.com0tag:blogger.com,1999:blog-6392613846840862920.post-29896543675078800412012-02-14T14:03:00.005+07:002012-02-29T20:39:16.695+07:00Open Recruitment<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL42tS6OpB9J6fGhaBO_MaajU0GhugDYTssq-ednRnVtETc4EpJcbRjEbyxq6Zl8RxmbEsdgihr77ZeM1AGuHez5KlSaCH_IaqEle9iLoUm1L_HdjkduB-P__6w1NePWVt2p7pQxMy3ec/s1600/images.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhL42tS6OpB9J6fGhaBO_MaajU0GhugDYTssq-ednRnVtETc4EpJcbRjEbyxq6Zl8RxmbEsdgihr77ZeM1AGuHez5KlSaCH_IaqEle9iLoUm1L_HdjkduB-P__6w1NePWVt2p7pQxMy3ec/s1600/images.jpeg" /></a></div><br />
Needed for the team Eura Antivirus. Have a high loyalty and can work well together<br />
<br />
<b>Options:</b><br />
- Analysis of Malware Team<br />
- Designers Team<br />
- Marketing Team<br />
- Virus Hunter Team<br />
<br />
Reasons for joining and reasons for job selection above?<br />
<b>Answer:</b> <br />
<br />
<br />
Send email to: <a href="mailto:enmicron@yahoo.com">enmicron@yahoo.com</a> or send to: <a href="http://enmicronlabs.blogspot.com/p/guest-book.html">http://enmicronlabs.blogspot.com/p/guest-book.html</a> List menu with the "<b>Contact Us</b>"<br />
<br />
<br />
Regards,<br />
Enmicron LabaNtH Bloghttp://www.blogger.com/profile/13439815750855425164noreply@blogger.com0tag:blogger.com,1999:blog-6392613846840862920.post-72425715194250465562012-01-20T01:33:00.000+07:002012-01-20T01:33:15.690+07:00AWicons Pro 10.3 Download<div class="separator" style="clear: both; text-align: center;"><a href="http://www.heaventools.com/img/awiconsproscreen.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="229" src="http://www.heaventools.com/img/awiconsproscreen.jpeg" width="320" /></a></div><br />
<div style="text-align: justify;"><b>AWicons Pro</b> offers a set of professional tools and ready to use effects that are optimized for small size graphics. The story that began with a fairly simple image editor, to date, reached a climax, as the 10th version impresses with its features.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><b>Features:</b></div><ul><li>Free icon sets Aero and 3D Artistic</li>
<li>Multilingual user interface</li>
<li>Fully compatible with the icons Windows Vista / 7</li>
<li>Full compatibility with Windows XP icons</li>
<li>Loading icons / cursors (ico, cur, ani)</li>
<li>Downloading and saving images in various formats (png, gif, bmp, jpg)</li>
<li>Editing icons in executables</li>
<li>Working with icons library (icl)</li>
<li>Supports all color modes (mono, 16, 256, full color, full color with alpha)</li>
<li>Search icons, cursors and images on your hard drive</li>
<li>A set of drawing tools (pen, line, ellipse, polygon, text, changing colors, etc.)</li>
<li>The set of modifier tools (opacity, color gradient, and others)</li>
<li>Many standard and artistic effects (Contrast, Brightness, Blur, Rotate, 3D Shadow, Aqua and others)</li>
<li>Import from large image (png, gif, jpg, bmp) with filters</li>
<li>Import images from the resources of executable files (exe, dll, etc.)</li>
<li>Support of all sizes, including 256x256</li>
<li>Plugin that allows you to export an image with transparency directly from Adobe Photoshop into AWicons</li>
<li>Editing pictures containing several images</li>
</ul><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><b>Download</b></div><div style="text-align: justify;"><a href="http://www.filesonic.com/file/hqqQDhx">http://www.filesonic.com/file/hqqQDhx</a></div><div style="text-align: justify;"><a href="http://letitbit.net/download/68878.6a6c8d37ee19d949facd7b4c1752/AWicons.Pro.10.3.rar.html%20">http://letitbit.net/download/68878.6a6c8d37ee19d949facd7b4c1752/AWicons.Pro.10.3.rar.html </a></div><br />
<span style="font-size: x-small;">source : <a href="http://www.dl4all.com/software/1232306-awicons-pro-103.html">dl4all.com</a></span>aNtH Bloghttp://www.blogger.com/profile/13439815750855425164noreply@blogger.com0tag:blogger.com,1999:blog-6392613846840862920.post-44720385030492742802012-01-20T01:03:00.002+07:002012-01-20T01:26:35.648+07:00OpenCanvas v5.1.04 Download Full Version<div class="separator" style="clear: both; text-align: center;"><a href="http://t2.gstatic.com/images?q=tbn:ANd9GcT5s1zUOc5vm71t_RTCT8lamcBLJmpAngGXQZ2cYSWqSfgLUsKgP9tqBUny" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://t2.gstatic.com/images?q=tbn:ANd9GcT5s1zUOc5vm71t_RTCT8lamcBLJmpAngGXQZ2cYSWqSfgLUsKgP9tqBUny" /></a></div><div style="text-align: justify;">openCanvas is a paint/drawing software that enables you to record/replay your drawing procedure. If you use the "Event" function (to replay the drawing process), it is quite easy to find out how an illustration was created! openCanvas has a simple interface, nice and realistic brush stroke, and various filters/layers/tones. openCanvas will be suitable for beginners to advanced users.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><b>New Pen</b></div><div style="text-align: justify;">New Pen is added to Pencil, Eraser, Clear Watercolor, and Air Brush functions. You can adjust curve and blur with new Pen.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><b>Free Deformation</b></div><div style="text-align: justify;">You can deform an image from [Layer]>[Deformation]>[Free Deformation].</div><div style="text-align: justify;">You can deform selected area from [Selected Area]>[Free Deformation].</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><b>Layer Clipping:Let you use the content of a layer to mask the layers above it</b></div><div style="text-align: justify;">[Layer] - [Create Clipping Mask] : Clip a layer.</div><div style="text-align: justify;">[Layer] - [Release Clipping Group] : Release clipping.</div><div style="text-align: justify;">[Layer] - [Merge Clipping Group] : Merge clipped layers.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><b>Layer Link</b></div><div style="text-align: justify;">By using Layer Link function, you can move around multiple layers at once.</div><div style="text-align: justify;">Select the base layer first, and click in a box (next to the Eye icon) of a layer that you would like to link.</div><div style="text-align: justify;">If you sucessfully link layers, a chain icon will show up.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><b>Snap: Help with precise placement of selection edges, cropping marquees, shapes, paths, etc..</b></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Snap is effective to:</div><ul style="text-align: justify;"><li> All drawing tool</li>
<li>Selection</li>
<li>Fill the selected area</li>
</ul><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Home Page - <a href="http://www.portalgraphics.net/en/">http://www.portalgraphics.net/en/</a></div><br />
openCanvas 5.1.04 | 3.52 Mb : <a href="http://www.mediafire.com/?l2j2d6548qv1euq">Download</a>aNtH Bloghttp://www.blogger.com/profile/13439815750855425164noreply@blogger.com0tag:blogger.com,1999:blog-6392613846840862920.post-28196796982844423382012-01-18T13:59:00.001+07:002012-01-20T01:26:54.345+07:00Borland C + + Builder 6 + Keygen Download<div class="separator" style="clear: both; text-align: center;"><a href="http://superuce.files.wordpress.com/2011/03/borland-c-builder.jpeg?w=614" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://superuce.files.wordpress.com/2011/03/borland-c-builder.jpeg?w=614" /></a></div><div style="text-align: justify;">In this post I wanted to share master's program Borland C + + Builder version 6 (complete with serial number and key generator).</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">The download file is divided into 11 parts (11 parts) in the form of <b>zip files</b>. To be able to install, all the downloaded file should be included in a same folder, then extract from BorlandCBuilder6.part01.rar file (it automatically files part02-part11.rar will come too extract).</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Once completed it will form a new file in zip form also, extract the file again. Then open the folder <b>C + + B_6_PER_</b> and extract zip files once again is in it. Then be formed several new files and 4 folders, direct entry wrote to <b>the Install</b> folder and install the program by clicking the <b>Borland C + + Builder 6</b>.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Note: In some cases, when entering the installation process, on the <b>Setup Type</b> select <b>Typical</b> but do not select the C ustom. Then in the hierarchy Program Files, uncheck (do not install) file and <b>Help Files Sample Programs</b>.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">After Borland C + + Builder 6 is installed do not forget to register. The trick is as follows (for those of you who use Windows OS):</div><div style="text-align: justify;"><br />
</div><ol><li>Click Start -> All Programs -> Borland C + + Builder 6 -> Register Now -> Select the option number 2 (Register or activate by phone or web browser)</li>
<li>Open the folder where you extract the master's earlier, and then locate the folder with the name of the <b>CD key</b>. Double click on keygen <b>bcb6kg</b>.</li>
<li>Enter your Serial Number, Authorization and Registration Key Keygen Code'nya into the td, then you will get <b>Activation Key</b></li>
<li>Enter the activation key obtained in the registration, if successful, the Congratulations window will appear and then click Exit and your program is ready for use. </li>
</ol><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Here's the download link: </div><ul><li><a href="http://www.ziddu.com/download/9266762/BorlandCBuilder6.part01.rar.html" target="_blank">BorlandCBuilder6.part01.rar</a></li>
<li><a href="http://www.ziddu.com/download/9266793/BorlandCBuilder6.part02.rar.html" target="_blank">BorlandCBuilder6.part02.rar</a></li>
<li><a href="http://www.ziddu.com/download/9266891/BorlandCBuilder6.part03.rar.html" target="_blank">BorlandCBuilder6.part03.rar</a></li>
<li><a href="http://www.ziddu.com/download/9266937/BorlandCBuilder6.part04.rar.html" target="_blank">BorlandCBuilder6.part04.rar</a></li>
<li><a href="http://www.ziddu.com/download/9266962/BorlandCBuilder6.part05.rar.html" target="_blank">BorlandCBuilder6.part05.rar</a></li>
<li><a href="http://www.ziddu.com/download/9267000/BorlandCBuilder6.part06.rar.html" target="_blank">BorlandCBuilder6.part06.rar</a></li>
<li><a href="http://www.ziddu.com/download/9267023/BorlandCBuilder6.part07.rar.html" target="_blank">BorlandCBuilder6.part07.rar</a></li>
<li><a href="http://www.ziddu.com/download/9267070/BorlandCBuilder6.part08.rar.html" target="_blank">BorlandCBuilder6.part08.rar</a></li>
<li><a href="http://www.ziddu.com/download/9267099/BorlandCBuilder6.part09.rar.html" target="_blank">BorlandCBuilder6.part09.rar</a></li>
<li><a href="http://www.ziddu.com/download/9267134/BorlandCBuilder6.part10.rar.html" target="_blank">BorlandCBuilder6.part010.rar</a></li>
<li><a href="http://www.ziddu.com/download/9267133/BorlandCBuilder6.part11.rar.html" target="_blank">BorlandCBuilder6.part011.rar</a></li>
</ul><br />
<span style="font-size: x-small;">source : <a href="http://superuce.wordpress.com/2011/03/30/download-borland-c-builder-6/">superuce</a></span>aNtH Bloghttp://www.blogger.com/profile/13439815750855425164noreply@blogger.com0tag:blogger.com,1999:blog-6392613846840862920.post-61316242895448145192012-01-12T22:26:00.000+07:002012-01-12T22:26:09.041+07:00Keyword Optimization<div class="separator" style="clear: both; text-align: center;"><a href="http://dynamoash.com/wp-content/uploads/2009/11/keyword-optimization.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://dynamoash.com/wp-content/uploads/2009/11/keyword-optimization.jpg" /></a></div><div style="text-align: justify;">Keyword optimization, the art of choosing the correct keywords, is one of the most important things related to search engine optimization. Sadly, it's also one of the things people tend to spend too little time on. They think up a few keywords quickly, optimize their pages a bit and then submit them to the engines. This usually results in not-so-good rankings under keywords that are poorly related to the site in question.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Before you start optimizing your site for the search engines, you should spend some time in figuring out exactly what keywords, or what keyphrases, you are going to target. Search engines are an excellent source of traffic, but in order to utilize them to their full potential, some effort is required.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">What you should do is not to rush things. Sit down, open up your favorite text editor in one window and your site in another. Read through the first page of your site. When you have read it, stop to think. What is this page about? Which of the words that appear in the document describe the contents of the page accurately? What kind of words or phrases would someone use if he was using a search engine and trying to find documents like this?</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">When you have found the answers to these questions, write down the words and the phrases you have come up with. It doesn't matter if the list becomes too long, as you can always remove some of the excess words later.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">When I do keyword optimization, I usually select one or two medium-popular keywords or phrases per page. These are my main targets, and I optimize heavily for them. Then I squeeze a few less common phrases and words into the body text, hoping that they will help the page to come up on some obscure multi-word searches.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Repeat this process for every page on your site. You should be able to create an individual, distinct list of keywords for each page. The different lists should not "compete" with each other, instead each should cover different areas. This does not however mean that there shouldn't be any similarities between your lists - it's perfectly OK to have some, but the lists shouldn't be 100% identical. It is better to have 20 good listings on different search terms than 20 good listings on the same one.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">So, now you have your lists ready. The next thing would be to go to Overture's (GoTo) keyword suggestion tool and type in the different keywords and phrases you've come up with. The tool will tell you how many times each keyword and each phrase was searched at Overture during the last month. It won't tell you exactly how popular different words are, since the statistics contain only the searches executed at Overture, but it will give you a general idea.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Because Overture's data is not always 100% accurate, you may also want to visit WordTracker. The service is not free, but the trial option offers a chance to search for good keywords without having to pay a dime. By using both Overture and WordTracker and comparing what they think about the popularity of different keywords, you should be able to separate the words people search for from those that are rarely used.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">If some of the words you were planning to select aren't commonly used in searches, you might want to consider dropping them from your list. If other words look like they are used quite a lot, then it might be a good idea to consider adding them. But remember to...</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><i>Keep the search engine optimization process in mind!</i></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">By now, your list is probably pretty full of very competitive, single-word terms such as "MP3" or "books" or "computers" or whatever. Scratch them. This might sound harsh, but if you're a novice, you have no chance of achieving a top listing under such terms. Even many (dare I say most) professionals tend to avoid them, as they are extremely competitive. There are hundreds of thousands of sites targeting them and even with excellent search engine optimization skills, they are very tough to conquer. What you should do is to narrow it down a little.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Think about different variations of these popular keywords. If you were originally thinking about the keyword "books", how about "buy used books online" or "antique bookstore"? These terms would be, not easy, but easier to rank well under. It is far better to be in the top 10 for a search term with medium usage than to rank 500th for a heavily used term. Select keyphrases that do get searched, but that aren't too competitive.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">You might also want to target common misspellings, if some of the keywords related to your site are often spelled wrong . Unfortunately, it is hard to efficiently target misspellings without damaging the authority of your site. Would you buy anything from a person that can't even spell the name of his merchandise? Didn't think so.. So, be careful with those misspellings.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">At this point, you should have completed your keyword optimization process and now possess a pretty good list of medium-popularity keyword phrases for each of your pages. I would recommend that you read the search engine optimization article on this site next. It will show you where you should place the keywords you have selected in order to achieve results with the search engines.</div><br />
<span style="font-size: x-small;">Source : apromotionguide.com</span>aNtH Bloghttp://www.blogger.com/profile/13439815750855425164noreply@blogger.com0tag:blogger.com,1999:blog-6392613846840862920.post-17496663587492203042012-01-12T22:11:00.000+07:002012-01-12T22:11:43.215+07:00Methods of Website Linking<div class="separator" style="clear: both; text-align: center;"><a href="http://globolstaff.com/images/stories/proper-link-building-2280.gif" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="298" src="http://globolstaff.com/images/stories/proper-link-building-2280.gif" width="320" /></a></div><b>Reciprocal link</b><br />
<div style="text-align: justify;">A reciprocal link is a mutual link between two objects, commonly between two websites to ensure mutual traffic. Example: Alice and Bob have websites. If Bob's website links to Alice's website, and Alice's website links to Bob's website, the websites are reciprocally linked. Website owners often submit their sites to reciprocal link exchange directories, in order to achieve higher rankings in the search engines. Reciprocal linking between websites is an important part of the search engine optimization process because Google uses link popularity algorithms (defined as the number of links that led to a particular page and the anchor text of the link) to rank websites for relevancy.</div><br />
<b>Relevant linking</b><br />
<br />
<div style="text-align: justify;">Relevant linking is a derivative of reciprocal linking in which a site linked to another site contains only content compatible and relevant to the linked site. Relevant linking has become increasingly important because most major search engines stress that—in Google's words -- "quantity, quality, and relevance of links count towards your rating.</div><br />
<div style="text-align: justify;">The engines' insistence on reciprocal links being relevant developed because many of the methods described below—free-for-all linking, link doping, incestuous linking, overlinking, multi-way linking—and other schemes were designed to unethically "fool" search-engines into awarding undeservedly high page ranks and/or return positions to sites engaged in search-engine spamming.</div><br />
<div style="text-align: justify;">Though the engines warned site developers (again quoting from Google) to avoid "free-for-all' links, link popularity schemes, or submitting your site to thousands of search engines (because) these are typically useless exercises that don't affect your ranking in the results of the major search engines -- at least, not in a way you would likely consider to be positive they also took proactive steps to recognize linking schemes and downrate or de-index sites using them. This, in turn, led to the development of search-engine compliant link-management systems enabling webmasters to benefit from the upside of reciprocal linking without putting themselves and their sites at risk from inadvertently straying over into the dark side.</div><br />
<b>Three way linking</b><br />
<br />
<div style="text-align: justify;">Three way linking (siteA ⇒ siteB ⇒ siteC ⇒ siteA) is a special type of reciprocal linking. The attempt of this link building method is to create more "natural" links in the eyes of search engines. The value of links by three-way linking can then be better than normal reciprocal links, which are usually done between two domains.</div><br />
<b>Two-Way-Linking (Link exchange)</b><br />
<br />
<div style="text-align: justify;">An alternative to the automated linking above is a link exchange forum, in which members will advertise the sites that they want to get links to, and will in turn offer reciprocal or three way links back to the sites that link to them. The links generated through such services are subject to editorial review.</div><br />
<b>One-way linking</b><br />
<br />
<div style="text-align: justify;">One-way link is a term used among webmasters for link building methods. It is a hyperlink that points to a website without any reciprocal link; thus the link goes "one-way" in direction. It is suspected by many industry consultants[who?] that this type of link would be considered more natural in the eyes of search engines. One-way links are also called Incoming Links or Inbound Links.</div><br />
<div style="text-align: justify;">An effective way to build this type of one-way linking is by distributing articles through content sites and article directories. These articles generally contain an About The Author box that contains a one-way link back to the author's URL. When publishers use these articles, those one-way links help authors increase their page rank.</div><br />
<b>Multi-way linking</b><br />
<br />
<div style="text-align: justify;">Multi-way linking is a technique used for website promotion whereby websites may create similar one-way links that each involves 3 or more partner sites. This provides each website with a one-way non-reciprocal link. This technique has evolved from reciprocal linking. The latest search algorithms have evolved to hold less favor towards websites that contain a high percentage of reciprocated links, and a higher favor towards websites that maintain a high level of incoming non-reciprocated (one way) links. How to filter out excessive reciprocal link schemes is even being mentioned in anti link spam patents.</div><br />
<div style="text-align: justify;">The term multi-way simply refers to the fact that the link exchange is between 3 or more websites, however each link is singular by only pointing to one other website. Other means of linking that may increase your web presence may also include other indirect methods such as loading images, videos, content or RSS feeds from a third partners website.</div><br />
<b>Link campaign</b><br />
<br />
<div style="text-align: justify;">Link campaigns are a form of online marketing and SEO. A business seeking to increase the number of visitors to its web site can ask its strategic partners, professional organizations, chambers of commerce, suppliers, and customers to add links from their web sites. A link campaign may involve mutual links back and forth between related sites, but it doesn't have to require the reciprocation of links.</div><br />
<b>Incestuous linking</b><br />
<br />
<div style="text-align: justify;">Incestuous linking is an SEO strategy used by a webmaster to promote a collection of their own web sites, or those of close friends.</div><br />
<div style="text-align: justify;">Due to the domination of the search engine market by Google, and its underlying PageRank technology, sites are deemed to be more important if they have large numbers of inbound links. If those inbound links are also from highly ranked web sites, they will boost the web site further. With the take-up of blogging and social networking sites such as MySpace, this has resulted in lots of web sites that are inter-linked and can artificially improve the ranking of a web site without merit, i.e. without valuable or unique content.</div><br />
<div style="text-align: justify;">When the sites are not directly owned, this is referred to as a web clique.</div><br />
<b>Overlinking</b><br />
<br />
Overlinking in a webpage or another hyperlinked text is the characteristic of having too many hyperlinks.<br />
<br />
<b>It is characterized by:</b><br />
<br />
<ul style="text-align: justify;"><li>A large proportion of the words in each sentence being rendered as links.</li>
<li>Links that have little information content, such as linking on specific years like 1995, or unnecessary linking of common words used in the common way, for which the reader can be expected to understand the word's full meaning in context, without any hyperlink help.</li>
<li>A link for any single term is excessively repeated in the same article. "Excessive" is usually more than one link for the same term in a line or a paragraph, since in this case one or more duplicate links will almost certainly then appear needlessly on the viewer's screen.</li>
</ul><br />
<b>Underlinking</b><br />
<br />
<div style="text-align: justify;">The opposites of overlinking are null linking and underlinking, which are phenomena in which hyperlinks are reduced to such a degree as to remove all pointers to a likely-needed context of an unusual term, in the text-area where the term occurs. Underlinking results whenever a reader encounters an odd term in an article (perhaps not even for the first time), and wants to briefly browse more deeply at that point, but he or she cannot without an extensive search of the article for a (possibly non-existent) instance of the linked term.</div><br />
<div style="text-align: justify;">The extreme case of underlinking is a dead-end page, a page with no links at all. Usability experts discourage making dead-end pages.</div><br />
<div style="text-align: justify;">Underlinking also occurs when web pages use the rel=nofollow attribute to prevent search engines from considering these links when performing link analysis, weighting or ranking.</div><br />
<b>Link doping(Google bomb)</b><br />
<br />
<div style="text-align: justify;">Link doping refers to the practice and effects of embedding a large number of gratuitous hyperlinks on a website, in exchange for reciprocal links. Mainly used when describing blogs, link doping usually implies that a person hyperlinks to sites he or she has never visited, in return for a place on the website's blogroll, for the sole purpose of inflating the apparent popularity of his or her website. Since the search algorithms of many web directories and search engines rely on the number of hyperlinks to a website to determine its importance or influence, link doping can result in a high placement or ranking for the offending website.</div><br />
<div style="text-align: justify;">Originally used in an essay published in Sobriquet Magazine and on Blogcritics.org, link doping has been confused with the related practice of excessive hyperlinking, also known as "link whoring". While the two phrases may be used interchangeably to describe gratuitous linking, link doping carries the additional connotation of deliberately striving to attain a certain level of success for one's website without having earned it through hard work (as an average athlete on steroids might perform better than a naturally gifted athlete not on performance-enhancing drugs).</div><br />
<b>Free for all linking</b><br />
<br />
<div style="text-align: justify;">A free for all (FFA) link page is a web page set up ostensibly to improve the search engine placement of a particular web site. Webmasters typically will use software to place a link to their site on hundreds of FFA sites, hoping that the resulting incoming links will increase the ranking of their site in search engines. Experts in SEO techniques do not place much value on FFAs. First, most FFAs only maintain a small number of links for a short time, too short for most search engines to pick up. Second, the high "human" traffic to FFA sites is almost completely other webmasters visiting the site to place their own links manually. Finally, search engine algorithms count more than link numbers, they also check relevancy which the unrelated links on FFA sites do not have. Another drawback to FFAs is the amount of spam e-mail webmasters will receive from members of the FFA. Using an FFA can be considered a form of spamdexing.</div><br />
<b>Link popularity</b><br />
<br />
<div style="text-align: justify;">Link popularity is a measure of the quantity and quality of other web sites that link to a specific site on the World Wide Web. It is an example of the move by search engines towards off-the-page-criteria to determine quality content. In theory, off-the-page-criteria adds the aspect of impartiality to search engine rankings. Link popularity plays an important role in the visibility of a web site among the top of the search results. Indeed, some search engines require at least one or more links coming to a web site, otherwise they will drop it from their index.</div><br />
<div style="text-align: justify;">Search engines such as Google use a special link analysis system to rank web pages. Citations from other WWW authors help to define a site's reputation. The philosophy of link popularity is that important sites will attract many links. Content-poor sites will have difficulty attracting any links. Link popularity assumes that not all incoming links are equal, as an inbound link from a major directory carries more weight than an inbound link from an obscure personal home page. In other words, the quality of incoming links counts more than sheer numbers of them.</div><br />
<b>Link bait</b><br />
<br />
<div style="text-align: justify;">Link bait is any content or feature within a website that somehow baits viewers to place links to it from other websites. Matt Cutts defines link bait as anything "interesting enough to catch people's attention. Link bait can be an extremely powerful form of marketing as it is viral in nature.</div><br />
<b>Link bait in search engine optimization</b><br />
<br />
<div style="text-align: justify;">The quantity and quality of inbound links are two of the many metrics used by a search engine ranking algorithm to rank a website. Link bait creation falls under the task of link building, and aims to increase the quantity of high-quality, relevant links to a website. Part of successful linkbaiting is devising a mini-PR campaign around the release of a link bait article so that bloggers and social media users are made aware and can help promote the piece in tandem. Social media traffic can generate a substantial amount of links to a single web page. Sustainable link bait is rooted in quality content.</div><br />
<b>Types of link bait</b><br />
<br />
<div style="text-align: justify;">Although there are no clear-cut subdivisions within link bait, many[who?] attempt to divide them into types of hooks. This is a short list of some of the most common approaches with brief descriptions:</div><br />
<ul><li>Informational hooks - Provide information that a reader may find very useful. Some rare tips and tricks or any personal experience through which readers can benefit.</li>
<li>News hooks - Provide fresh information and obtain citations and links as the news spreads.</li>
<li>Humor hooks - Tell a funny story or a joke. A bizarre picture of your subject or mocking cartoons can also prove to be link bait.</li>
<li>Evil hooks - Saying something unpopular or mean may also yield a lot of attention. Writing about something that is not appealing about a product or a popular blogger. Provide strong reasons for it.</li>
<li>Tool hooks - Create some sort of tool that is useful enough that people link to it.</li>
<li>Widgets hooks - A badge or tool, that can be placed or embedded on other websites, with a link included.</li>
</ul><br />
<b>Forum signature linking</b><br />
<br />
<div style="text-align: justify;">Forum signature linking is a technique used to build backlinks to a website. This is the process of using forum communities that allow outbound hyperlinks in their member's signature. This can be a fast method to build up inbound links to a website; it can also produce some targeted traffic if the website is relevant to the forum topic. It should be stated that forums using the nofollow attribute will have no actual Search Engine Optimization value.</div><br />
<b>Link broker</b><br />
<br />
<div style="text-align: justify;">A link broker is a company that allows you to buy or rent links. Link brokerages function in a few different ways but all offer the same service: selling or renting you links. The quality of the sites, the links they sell and the prices vary greatly, as do the effects those links can have at the search engines.</div><br />
<b>Blind link</b><br />
<br />
<div style="text-align: justify;">Some links are created to intentionally hide the ultimate destination of a link until the user has clicked on it. It's accomplished via redirection (possibly a URL shortening service) or client-side JavaScript. Blind links are usually used for deceptive or advertising reasons, and are most associated with TGPs and Rickrolling.</div><br />
<b>Blog comments</b><br />
<br />
<div style="text-align: justify;">Leaving a comment on a blog can result in a relevant do follow link to the individual's website. Most of the time however leaving a comment on a blog turns into a no follow link, which is almost useless in the eyes of search engines such as Google and Yahoo. On the other hand, most blog comments get clicked on by the readers of the blog if the comment is well thought out and pertains to the discussion of the other commenters and the post on the blog.</div><br />
<span style="font-size: x-small;">Source : wikipedia.org</span>aNtH Bloghttp://www.blogger.com/profile/13439815750855425164noreply@blogger.com0tag:blogger.com,1999:blog-6392613846840862920.post-20121319204556908722012-01-12T21:51:00.000+07:002012-01-12T21:51:08.354+07:00Want to Increase Traffic to your Website using Articles<div class="separator" style="clear: both; text-align: center;"><a href="http://lewysdaviesofficial.com/wp-content/uploads/2011/07/increase-traffic.gif" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://lewysdaviesofficial.com/wp-content/uploads/2011/07/increase-traffic.gif" /></a></div><div style="text-align: justify;">One always wants to drive traffic to their website or blog on a daily basis. This is normally achieved by performing various SEO traffic techniques that help in driving traffic by either doing it yourself or hiring an expert. In the former case, you will end up spending too much time doing it yourself as the processes are time consuming and cumbersome while in the latter case you will save on time but end up spending a lot of money to the provider.</div><br />
<div style="text-align: justify;">However, there is one technique that can achieve a lot of traffic without having to spend too much or investing a lot of time. Article Writing!</div><br />
<div style="text-align: justify;">Now the next question that may come to your mind is how does Article Writing drive traffic? It’s quite simple! The Internet comprises of a lot of information and there are millions of visitors, researchers and webmasters who are looking out for content for their blogs and websites. They have a choice where they can either create their own content or search on the Internet for a good quality article which they can utilize easily and quickly. This is exactly where you come in.</div><br />
<i>This article will describe the points that you need to keep in mind while writing your article:</i><br />
<br />
<b>Choosing the Right Headline:</b><br />
<div style="text-align: justify;">It is important to create a headline that is appealing. A catchy headline will attract the attention of the viewer and will appeal them to read the article.</div><br />
<b>Preferred Word Count:</b><br />
<div style="text-align: justify;">A good article is one that can convey a message, strategy and tips in 500 to 750 words. Making an article too long will dilute the attention of the reader and may be considered as a drag.</div><br />
<b>Preferred Software:</b><br />
<div style="text-align: justify;">The best software is Microsoft Word as it has a spell check, word count option, synonyms option, etc. If you don’t have Word, you can use Open Office Word (which is free) or you can use Notepad.</div><br />
<b>Resource Box:</b><br />
<div style="text-align: justify;">This is where one hits the bulls-eye. Use this box to the maximum possible extent. Write about the author, place a link of your website, add a freebie if possible, create a call to action phrase (Download now, Submit now, Click here, Submit here, etc).</div><br />
<b>Editing the Master Piece:</b><br />
<div style="text-align: justify;">Once you have written your article, don’t forget to proofread and edit it. Ensure that the article is grammatically correct and free of any spelling mistakes, etc.</div><br />
<div style="text-align: justify;">Now that you are done with writing the article, the next step would be to find an online website where you can submit your article. In this way you will be able to create an online archive of all your articles. If the site has an article content management system, then it will be excellent as it automates the submission of the article to your website.</div><br />
<b>Strategies for building the traffic through the article</b><br />
<br />
<ul><li>This involves submitting your article to the top page rank article submission directories that will publish your article on their website.</li>
<li>Create a blog if you don’t have one and post the article there.</li>
<li>You can register with Yahoo Groups and post your articles there as well.</li>
<li>Create an eBook on a collection of articles that relate to a topic and give it away for free. When you give it away for free, you are actually engaging in viral marketing which brings in wide exposure.</li>
<li>Add the article to your website and if possible do generate some extra revenue by adding Google AdSense to it.</li>
<li>You can also create an e-course on the articles that you have written and send it out through an auto-responder. Example, Free Auto Bot.</li>
<li>Use any social media to build awareness around your article.</li>
<li>Submit your article to various article announcement groups. For example, Yahoo Groups. These groups give a lot of eyeballs to your article as they can be used on their own websites.</li>
</ul><br />
<div style="text-align: justify;">By adopting the techniques listed above, you will be able to get loads of incoming links which boosts traffic and also the performance of your website.</div>aNtH Bloghttp://www.blogger.com/profile/13439815750855425164noreply@blogger.com0tag:blogger.com,1999:blog-6392613846840862920.post-9447125154175933112012-01-11T22:51:00.001+07:002012-01-11T23:32:54.763+07:00A Very Basic Web Server Test<div class="separator" style="clear: both; text-align: center;"><a href="http://breakthelimit.blog.ugm.ac.id/files/2010/09/webserver.gif" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="173" src="http://breakthelimit.blog.ugm.ac.id/files/2010/09/webserver.gif" width="320" /></a></div><div style="text-align: justify;">Writing network related programs is fun and exciting. At times it almost seems like magic. This source code sample shows how you can create a very basic web server that when your browser connects to it the specified text will show up in the browser. This uses the <b>Microsoft Winsock control</b>.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">This source code sample demonstrates how you can create a very, very, basic web server. It is not intended for you to actually use but instead to just wet your appetite with a simple networking example. Before someone leaves a nasty comment read this: I am in no way calling this a true web server - just a simple fun example.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">What you will end up with after using this very simple code snippet is a little server running in VB that when a web browser hits it will return out whatever text you have set up. I know when I first started playing with networking development it seemed kind of like magic. You can very quickly begin to understand how web servers, a virtual private server, chat programs, email programs, etc. work.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">To use this code example do the following: Create a new VB program. Next place a command button on your form named command1 and set the caption to Start Server, you will also need to place the Winsock control on the form. Set its name to Winser. If you don't know how to put a winsock control on your form check out this Client server tutorial to see how. Lastly place the code below into the source code area for your form.</div><br />
<blockquote class="tr_bq">Private Sub Command1_Click()<br />
WinSer.LocalPort = 80<br />
WinSer.Listen<br />
Command1.Enabled = False<br />
End Sub<br />
<br />
Private Sub WinSer_ConnectionRequest(ByVal requestID As Long)<br />
WinSer.Close<br />
WinSer.Accept requestID<br />
End Sub<br />
<br />
Private Sub WinSer_DataArrival(ByVal bytesTotal As Long)<br />
Dim DataSend As String<br />
DataSend = "Webserver Test"<br />
DataSend = DataSend & vbNewLine & Now<br />
WinSer.SendData DataSend<br />
End Sub<br />
<br />
Private Sub WinSer_SendComplete()<br />
WinSer.Close<br />
End Sub</blockquote><br />
<div style="text-align: justify;">Once you have the code in place press F5 to run your program. Then pull open a web browser and navigate to http://localhost - This will connect to your VB web server and you should see "Webserver Test" show up in your browser.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Obviously this just barely scratches the surface as to what we can do with the winsock control. You can write virtually any networking application you can think of. If you would like to go more in depth with writing client server or other networking programs check out the links below.</div><br />
<i>Note: The source for this was found at DreamVB which is no longer online.</i>aNtH Bloghttp://www.blogger.com/profile/13439815750855425164noreply@blogger.com0tag:blogger.com,1999:blog-6392613846840862920.post-9110293897825987052012-01-11T21:58:00.000+07:002012-01-11T21:58:53.141+07:00Beginner Tutorial - Hello World<div class="separator" style="clear: both; text-align: center;"><a href="http://www.vb6.us/files/Image/Hello-World/Visual-Basic-Tutorial-screen6.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://www.vb6.us/files/Image/Hello-World/Visual-Basic-Tutorial-screen6.jpg" /></a></div><div style="text-align: justify;">Visual Basic is a great starter programming language. Not only is it easy to learn, but many business applications use it extensively for their applications. If you are just starting to learn to develop applications - this is a great language to start with. This tutorial and the many other Visual Basic tutorials at this site will give you a solid foundation in your Visual Basic knowledge.</div><br />
<div style="text-align: justify;">Lets jump right in with a simple application. When you are done with this Visual Basic tutorial, you should have a complete working application that when you click on the button it will say "Hello, World"</div><br />
<b>Start Microsoft Visual Basic 6.0 (VB6)</b><br />
The New Project dialog box will appear. If it doesn't go up to the menu bar and select <b>File -> New Project</b><br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://www.vb6.us/files/Image/Hello-World/Visual-Basic-Tutorial-Screen1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="310" src="http://www.vb6.us/files/Image/Hello-World/Visual-Basic-Tutorial-Screen1.jpg" width="320" /></a></div><br />
In the New Project dialog select <b>Standard EXE</b>, and click the <b>Open</b> Button.<br />
<br />
This will bring up your new Project 1 application with Form1 visible.<br />
<br />
<div style="text-align: justify;">Already Visual Basic has done a lot for us. As you can see this tutorial isn't very long but already you have a full working application. You can see your new program in action by going up to the menu bar and selecting Run -> <b>Start</b> (Or simply press the <b>F5</b> key).</div><div style="text-align: justify;"><br />
</div>You should see the Form1 window appear:<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://www.vb6.us/files/Image/Hello-World/Visual-Basic-Tutorial-Screen2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://www.vb6.us/files/Image/Hello-World/Visual-Basic-Tutorial-Screen2.jpg" /></a></div><br />
<div style="text-align: justify;">This is a fully functional application. You can move it around, minimize and maximize it, and close it down. For you to do this same thing in C++ - the original language most of Windows was written in you would have written hundreds of lines of code. You area already getting to see some of the extreme power VB gives you. Now lets continue with the tutorial.</div><br />
<b>Lets make this program say hello!</b><br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://www.vb6.us/files/Image/Hello-World/Visual-Basic-Tutorial-screen3.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="250" src="http://www.vb6.us/files/Image/Hello-World/Visual-Basic-Tutorial-screen3.JPG" width="320" /></a></div><br />
<div style="text-align: justify;">On the left side of the screen you can see the toolbox (if this doesn't show up go to the top menu bar and select <b>View -> Toolbox</b>). In this toolbox you will see a picture of a button. Double click the button icon and it will create a <b>Command1 CommandButton</b> in the center of your form.</div><br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://www.vb6.us/files/Image/Hello-World/Visual-Basic-Tutorial-screen4.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="250" src="http://www.vb6.us/files/Image/Hello-World/Visual-Basic-Tutorial-screen4.JPG" width="320" /></a></div><br />
<div style="text-align: justify;">If you run the program now (Press <b>F5</b>) you will see your window now has a button labeled Command1 in the center of it, but if you click the button it doesn't do anything. So lets wire things up so our program will say "Hello, World" when you click the button. Close out of your running program so you are back to the main design environment (pictured above)</div><br />
<div style="text-align: justify;">Visual Basic allows you to do event driven programming. This is a concept that is very powerful and easy to use. Event driven programming works as follows: Visual Basic has many different events defined that occur when a specified thing happens. We as the programmer can link into these events and write our custom code to do what we want. One very useful event is the Click event. This event occurs any time the user clicks on the specified object. I'm sure the wheels are already turning in your head, if we want to say hello world when someone clicks the button on our form than we should do something in the Click event for the Command1 button. That is exactly what we are going to do.</div><br />
<div style="text-align: justify;">To write the click event code double click on the <b>Command1</b> button. This will bring up the code editor and will automatically write the beginning code to handle the click event. </div><br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://www.vb6.us/files/Image/Hello-World/Visual-Basic-Tutorial-screen5.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="250" src="http://www.vb6.us/files/Image/Hello-World/Visual-Basic-Tutorial-screen5.jpg" width="320" /></a></div><br />
<div style="text-align: justify;">Now any code you put between the Private Sub ... and the End Sub statements will be executed when the user clicks the command button. To demonstrate this we will have a message box appear saying hello world. So add this line of code:</div><br />
<blockquote class="tr_bq">Private Sub Command1_Click()<br />
MsgBox "Hello, World!"<br />
End Sub</blockquote><br />
<div style="text-align: justify;">MsgBox is a built in Visual Basic function that causes a message box to be displayed to the user. The first parameter this function takes is the text string you wish to have displayed. We choose the text string "Hello, World!". MsgBox also takes other parameters to specify things such as what buttons to display and what caption to use, but these will be discussed later. For now lets see how this works. Run your newly created Visual Basic hello world program (Press <b>F5</b>). Once the program is running click the Command1 button, you should see a message box saying Hello, World! appear. </div><br />
<div style="text-align: justify;">Congragulations! You have written a complete working Visual Basic program using this Hello, World tutorial. Read some of our other VB6 tutorials to learn how powerful this language really is.</div><br />
<span style="font-size: x-small;">credit: vb.us</span>aNtH Bloghttp://www.blogger.com/profile/13439815750855425164noreply@blogger.com0tag:blogger.com,1999:blog-6392613846840862920.post-12779376985669080602012-01-11T20:59:00.001+07:002012-01-12T22:16:11.601+07:00Beginner's Web Site Creating Guide<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJuvBqI7h661WaDNdnHCkfdIyww3invXzF_0VKLjfelrDwLKmgpYb8N_98U7Q9rgkTo6kBIr0lsbGTPQM1f_TzLSj-l0NPFqHta5SprTCETGS7cmtEmu9a5w1JXa5v_exFsB6MA5xjHO8/s1600/belajar_html.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJuvBqI7h661WaDNdnHCkfdIyww3invXzF_0VKLjfelrDwLKmgpYb8N_98U7Q9rgkTo6kBIr0lsbGTPQM1f_TzLSj-l0NPFqHta5SprTCETGS7cmtEmu9a5w1JXa5v_exFsB6MA5xjHO8/s200/belajar_html.jpg" width="200" /></a></div><br />
<div style="text-align: justify;">Welcome to Enmicron Lab introduction to HTML and web design. This short tutorial is aimed to give newbies a little experience in writing HTML code, saving their files correctly, and viewing the completed works in a web browser. Regrettably this tutorial cannot teach you the basics of using a computer, so please be sure that you meet the following requirements:</div><br />
<ol><li>Know what notepad is and how to use it</li>
<li>Are able to open up a file using Internet Explorer (or the browser of your choice)</li>
<li>Know how to copy and paste text from a webpage (important!)</li>
</ol><br />
If you are lacking the ability of the aforementioned items please contact a local geek and ask nicely for a quick lesson.<br />
<br />
<br />
<b>Tutorial Overview</b><br />
<div style="text-align: justify;">In this tutorial you will be transcribing code into notepad and then viewing it with a web browser. The code is called HTML (Hyper Text Markup Language) and notepad is a commonly used text editor on Window PCs. HTML may seem confusing at first, but we will help you understand how it works in this step-by-step tutorial of how to make your first web page.</div><br />
<b>Your First Web Page</b><br />
<div style="text-align: justify;">To start off with copy the following HTML code into notepad. Be sure to copy the code exactly, otherwise your web page may not function correctly. </div><br />
<blockquote class="tr_bq"><html><br />
<br />
<head><br />
</head><br />
<br />
<body><br />
<br />
<h2>My first webpage!</h2><br />
<br />
</body><br />
</html></blockquote><br />
<br />
<div style="text-align: justify;">The above code is all that is required to create a basic web page! Now save your file in notepad by selecting Menu and then Save. Click on the <b>Save as</b> Type drop down box and select the option <b>All Files</b>.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">When asked to name your file, type "index.html", without the quotes. Double check that you did everything correctly and then press save. Remember where it was saved to because you will need to open this file, soon.</div><br />
<br />
<b>Viewing Your Web Page - Web Browsers</b><br />
<div style="text-align: justify;">To view your web page, you are going to have to use a web browser (of course). Web browsers are programs that interpret HTML, like what you have just copied into notepad, and transform that code into a visual representation, or a web page. Common web browsers include:</div><br />
<ul><li>Internet Explorer</li>
<li>FireFox</li>
<li>Opera</li>
<li>Netscape Navigator - R.I.P.</li>
</ul><br />
<br />
<b>Viewing your page</b><br />
<div style="text-align: justify;">To view your web page, you must open the "index.html" file inside of a web browser. Open up another browser window and then follow these instruction.</div><br />
<ol><li>In the new browser window, select File then Open</li>
<li>Then click Browse to enter Windows Explorer</li>
<li>Do you remember where you file is? Good, then navigate to its location</li>
<li>When you find your file, index.html, double-click the file to open it inside your web browser</li>
</ol><br />
Success! You have just viewed your very first webpage.<br />
<br />
<div style="text-align: justify;">If this did not work for you, please go through the steps again and follow the directions closely. If you still can't get this to work, please Contact Us and we will get you up and running. </div><br />
<br />
<b>First Web Page - Review</b><br />
<div style="text-align: justify;">Very good! Now let's be sure that you remember what you learned in this lesson.</div><br />
<ul><li>How to copy some weird looking text (HTML) into notepad</li>
<li>How to correctly save this weird text in notepad</li>
<li>How to open your saved file and view the your webpage</li>
</ul><br />
<br />
<b>Tips</b><br />
<div style="text-align: justify;"><a href="http://www.crimsoneditor.com/">Crimson Editor</a> is a small, simple-text program that has features notepad does not. Such features include: spellcheck, code highlighting (you'll like this!), ability to open multiple files, and a more sophisticated undo feature. It is easy to set up and it is free! Visit <a href="http://www.crimsoneditor.com/">CE.com</a> (However, using notepad is also OK).</div><br />
<div style="text-align: justify;">You may have heard of FrontPage, Dreamweaver, and other WYSIWYG programs (What You See Is What You Get). Though these programs will let you create pages quickly, you will soon learn there are many advantages to knowing how to code HTML. Spicing up or polishing up HTML effects can only be done manually.</div><br />
<div style="text-align: justify;">Ever wonder what a website's designer did to get that awesome look it has? You can view a websites source (HTML) and if you know HTML you'll understand how they did it. On any browser, select the view command, scroll down and select 'view source' to see the HTML code for the site you are currently viewing.</div>aNtH Bloghttp://www.blogger.com/profile/13439815750855425164noreply@blogger.com0tag:blogger.com,1999:blog-6392613846840862920.post-63528104882953532462012-01-05T11:15:00.000+07:002012-01-05T11:15:36.438+07:00Microsoft Access User-Level Security Tutorial<div class="separator" style="clear: both; text-align: center;"><a href="http://0.tqn.com/d/databases/1/5/j/2/UserSecurity1.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="242" src="http://0.tqn.com/d/databases/1/5/j/2/UserSecurity1.JPG" width="320" /></a></div><br />
<div style="text-align: justify;">If you’re a Microsoft Office power user, you might be familiar with the encryption features of Word, PowerPoint and Excel. These programs all allow file owners to quickly and easily apply encryption through the use of a simple password. Unfortunately, Microsoft Access doesn’t offer similar functionality, but it still has relatively powerful security functionality. In this article, we’ll take a look at Microsoft Access user-level security, a feature that lets you specify the level of access to grant each individual user of your database.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">User-level security is quite powerful. It allows you to control the types of data that a user might access (for example, prohibiting sales personnel from looking at accounting data) and the actions they can perform (e.g. only allowing the HR department to change personnel records). Before we begin, it’s important to keep in mind that these functions mimic some of the functionality of more powerful databases, like SQL Server and Oracle. However, Access is still fundamentally a single-user database. If you find yourself attempting to implement complex security schemes with user-level security, you’re probably ready to trade up to a more powerful relational database.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">The first step is to start the Wizard, as shown in the image. From the Tools menu, select Security and then User-Level Security Wizard.</div>aNtH Bloghttp://www.blogger.com/profile/13439815750855425164noreply@blogger.com0tag:blogger.com,1999:blog-6392613846840862920.post-37890534459944821142011-12-24T02:50:00.000+07:002011-12-24T02:50:34.654+07:00Phishing For Your Identity<div class="separator" style="clear: both; text-align: center;"><a href="http://www.cjdw.net/wp-content/uploads/2011/02/phising1.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="200" src="http://www.cjdw.net/wp-content/uploads/2011/02/phising1.jpg" width="187" /></a></div><div style="text-align: justify;">Who hasn’t received an email directing them to visit a familiar website where they are being asked to update their personal information? The website needs you to verify or update your passwords, credit card numbers, social security number, or even your bank account number. You recognize the business name as one that you’ve conducted business with in the past. So, you click on the convenient “take me there” link and proceed to provide all the information they have requested. Unfortunately, you find out much later that the website is bogus. It was created with the sole intent to steal your personal information. You, my friend, have just been “phished”.</div><br />
<div style="text-align: justify;">Phishing (pronounced as “fishing”) is defined as the act of sending an email to a recipient falsely claiming to have an established, legitimate business. The intent of the phisher is to scam the recipient into surrendering their private information, and ultimately steal your identity.</div><br />
<div style="text-align: justify;">It is not at easy as you think to spot an email phishing for information. At first glance, the email may look like it is from a legitimate company. The "From" field of the e-mail may have the .com address of the company mentioned in the e-mail. The clickable link even appears to take you to the company's website, when in fact, it is a fake website built to replicate the legitimate site.</div><br />
<div style="text-align: justify;">Many of these people are professional criminals. They have spent a lot of time in creating emails that look authentic. Users need to review all emails requesting personal information carefully. When reviewing your email remember that the "From Field" can be easily changed by the sender. While it may look like it is coming from a .com you do business with, looks can be deceiving. Also keep in mind that the phisher will go all out in trying to make their email look as legitimate as possible. They will even copy logos or images from the official site to use in their emails. Finally, they like to include a clickable link that the recipient can follow to conveniently update their information.</div><br />
<div style="text-align: justify;">A great way to check the legitimacy of the link is to point at the link with your mouse. Then, look in the bottom left hand screen of your computer. The actual website address to which you are being directed will show up for you to view. It is a very quick and easy way to check if you are being directed to a legitimate site.</div><br />
<div style="text-align: justify;">Finally, follow the golden rule. Never, ever, click the links within the text of the e-mail, and always delete the e-mail immediately. Once you have deleted the e-mail, empty the trash box in your e-mail accounts as well. If you are truly concerned that you are missing an important notice regarding one of your accounts, then type the full URL address of the website into your browser. At least then you can be confident that you are, in fact, being directed to the true and legitimate website. </div>aNtH Bloghttp://www.blogger.com/profile/13439815750855425164noreply@blogger.com0tag:blogger.com,1999:blog-6392613846840862920.post-42441227476482881862011-12-24T01:03:00.001+07:002012-01-12T22:13:36.909+07:00Encryption and Making Your System Secure<div class="separator" style="clear: both; text-align: center;"><a href="http://www.pctools.com/security-news/wp-content/uploads/2010/12/encryption.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="153" src="http://www.pctools.com/security-news/wp-content/uploads/2010/12/encryption.jpg" width="200" /></a></div><br />
<div style="text-align: justify;"><b>What does encryption do for me?</b></div><br />
<div style="text-align: justify;">Encryption and cryptographic software has been used in many different ways to make systems more secure. This article discusses only a few ways that such software can make your system more secure, including:</div><ol><li>Encrypting your email</li>
<li>Encrypting your files</li>
</ol><div style="text-align: justify;">To programs are mentioned that will help encrypt information. There are many more programs out there that will help, but these programs are good and a good place to start as any. They have the added benefit of both being free with source code available.</div><br />
<div style="text-align: justify;"><b>Will encryption stop people from accessing my information?</b></div><br />
<div style="text-align: justify;">Encryption simply makes it harder for people to gain access to important information, like passwords or sensitive information in a file. The first thing you should know about encryption is that the algorithm that is used to encrypt can be simple or more complex and that affects how securely what you have encrypted is protected. Encryption systems have been broken when the method of encryption is understood by hackers and is easy to break. </div><br />
<div style="text-align: justify;"><b>Why bother to encrypt my email?</b></div><br />
<div style="text-align: justify;">It should be noted that email is far less secure than paper mail for two very good reasons: first, electronic data can be accessed easily over an Internet and secondly, electronic data is really simple to copy. There is a very good chance that someone has snooped around in your email despite your best intentions to stop it.</div><br />
<div style="text-align: justify;"><b>How do I go about encrypting my email?</b></div><br />
<div style="text-align: justify;">There are many programs out there that can help you encrypt your email. A very popular one is PGP (Pretty Good Privacy) or its Gnu offshoot GPG. </div><br />
<div style="text-align: justify;">PGP (http://www.pgpi.org/) self-describes itself this way: This "is a program that gives your electronic mail something that it otherwise doesn't have: Privacy. It does this by encrypting your mail so that nobody but the intended person can read it. When encrypted, the message looks like a meaningless jumble of random characters. PGP has proven itself quite capable of resisting even the most sophisticated forms of analysis aimed at reading the encrypted text."</div><br />
<div style="text-align: justify;"><b>Why bother to encrypt my files?</b></div><br />
<div style="text-align: justify;">The answer to this boils down to what you store on your computer. If you have financial data with important information like social security numbers, email addresses, account numbers and passwords, then you open yourself up to losing very valuable information. Most corporate Internet security employees will attest to the widespread theft of very valuable information. As long as you are connected to the Internet you are vulnerable.</div><br />
<div style="text-align: justify;"><b>How do I go about encrypting my files?</b></div><br />
<div style="text-align: justify;">AxCrypt File Encryption Software (http://axcrypt.sourceforge.net/) Self-described as "Free Personal Privacy and Security for Windows 98/ME/NT/2K/XP with AES-128 File Encryption, Compression and transparent Decrypt and Open in the original application."</div><br />
<span style="font-size: x-small;">Source : wikipedia.org</span>aNtH Bloghttp://www.blogger.com/profile/13439815750855425164noreply@blogger.com0