Tuesday 16 October 2012

Hanya Di Malaysia, Banjir atas flyover!

Kejadian ini dikatakan berlaku di Menara Mesiniaga

Selama admin hidup, inilah kali pertama admin tengok banjir atas flyover.. admin terfikir juga, macam mana perkara ini boleh terjadi?. siapa yang harus dipersalahkan? mari kita nilaikan sama2..

Iklan : Jom Beli / Borong SanDisk USB Flash Drive


Convenient, Stylish Design with Retractable Connector
The Cruzer USB flash drive features a stylish, compact design that fits right in your pocket. The drive's USB connector can be retracted with a pull of the slider, protecting it from damage.

High-Capacity Drive Accommodates Even Large Files
Designed by the company that pioneered the USB flash drive category, the Cruzer USB flash drive packs ample capacity into a compact form. Available in capacities up to 64GB, the flash drive can accommodate photos, songs, videos, and all of your personal data.

Simple, Drag-and-Drop File Backup
Transferring data onto the Cruzer USB flash drive is easy: simply plug it into your computer's USB port and drag files into the flash drive's folder. No additional drivers or software are necessary, so you can start storing, transporting, and sharing your data immediately.

Included Software Provides Additional Data Security
The Cruzer USB flash drive comes with SanDisk SecureAccess, which lets you configure a password-protected private folder on your flash drive. The password protection uses 128-bit AES encryption, so you'll be able to share your USB drive without compromising your privacy.

Includes 2GB of Cloud Storage offered by YuuWaa
The Cruzer flash drive comes with free access to 2GB of online storage offered by YuuWaa, a cloud storage service that syncs with your USB drive. A user-friendly drag-and-drop interface lets you easily transfer files from your drive to a secure YuuWaa server for safe online backup.

Warranty
The Cruzer USB Flash Drive is backed by a two-year limited warranty.

Specifications

Available capacities: 4GB, 8GB, 16GB, 32GB, and 64GB*
Dimensions: 2.37 x 0.82 x 0.44 in. (60.20 x 20.83 x 11.18 mm)
Operating temperature: 0ºC to 45 ºC
Storage temperature: -10ºC to 70ºC
Compatibility: USB 2.0
Security: Password protection and 128-bit AES encryption
Support: Two year limited warranty
SanDisk® SecureAccess™ software: Windows® XP, Windows Vista®, Windows® 7 and Mac OS X v10.5+ (Mac software requires download, see the SanDisk SecureAccess page.). Linux: storage only
USB port USB 2.0 port required for high speed transfer

Sekiranya Anda Berminat Dibawah adalah harganya :-

Harga Biasa
8GB = RM30/Pcs
16GB = RM40/Pcs

Harga Borong
8GB = 10Pcs ( RM25/Pcs )
16GB = 10Pcs ( RM35/Pcs )

P/S : lagi banyak Beli, Lagi Murah....

* Untuk membeli secara Borong sila sms ke 0134330858

Sunday 14 October 2012

Iklan : Semburan Lada Untuk Mempertahankan Diri



"NATO" Semburan Lada(60ml)


Penilaian semburan: Kuat
Jarak Berkesan: < 3m
Bilangan semburan: 50 - 60 semburan
Dimensi: 116 x 33 x 33mm
Pengekalan tempoh: ≥ 2 tahun
Warna pilihan: Hijau
Harga : RM 35 + Rm5 (pos)

Gincu Semburan Lada(15ml)

Penilaian semburan: Sederhana
Jarak Berkesan: < 1m
Bilangan semburan: 35 - 40 semburan
Dimensi: 80 x 18 x 18mm
Pengekalan tempoh: ≥ 2 tahun
Warna pilihan: Perak, Emas, Ungu, Merah jambu

Harga : RM 25 + Rm5 (pos)



Pencabul! Rompak! Rogol!
Jenayah yang kita sering mendengar daripada rakan-rakan atau media tempatan....

Tidak pasti tentang anda, tetapi agak kerap saya dapat melihat dan mendengar jenayah yang berlaku dalam negara, kadang-kadang walaupun berhampiran tempat kerja atau rumah saya. Tak kira pergi mana, saya akan membawa semburan lada bersaiz poket dengan saya sentiasa masa. Menyatakan fakta, berita kata-kata dari mulut dan artikel jenayah yang terdedah menyebabkan saya tidak menyakinkan undang-undang dan perintah negara! Saya berasa setiap rakyat berhak memiliki keselamatan dan kuasa sendiri dari semasa ke semasa. Menghargai hidup anda sendiri, biarkan diri anda dilindungi dalam masyarakat keras hari ini!

Sama ada anda seorang wanita yang berjalan seorang diri, orang tua atau yang tinggal di kawasan kasar atau perjalanan pada lewat malam sendiri, semburan lada menjadi alat keselamatan mudah dan mencegah keperluan, Ia tidak boleh membawa maut tetapi bernilai macam - senjata pertahanan diri, semburan lada bersaiz besar adalah lebih sesuai untuk persediaan di dalam kereta atau di rumah.

Adakah anda berfikirpolis tempatan atau pejalan kaki tugas kecekapan dapat membantu anda ? Ketikajenayah berlaku, bagaimana anda memberhentikan perompak berkenaan? Pecah rumahdi rumah anda pada lewat malam? Sendirian di dalam lif dengan orang asing yangmencurigakan? Berjalan untuk kereta anda di tempat letak kereta yang gelappulang lewat dari kerja lebih masa? dan lebih daripada apa yang saya bolehberfikir .. Kecuali kalau anda adalah seni mempertahankan diripakar, jikatidak, saya menyeru supaya anda memikirkan semula demi keselamatan anda!

Anda tidak lagi perlu takut akan pulanglewat, mengecas " Pengertian Keselamatan" anda hari ini! Jugaberhenti mempertimbangkan lama piawai barangan sebagai hadiah peribadi ataukorporat, mengapa tidak hadiah mereka ini semburan lada dan biarkan merekamerasai perhatian yang sejati anda untuk mereka!


FAQs
1. Mengapa saya perlu memiliki semburan lada? Saya sudah menyimpan kelawar besbol atau sesuatu yang sama di kereta / rumah saya untuk perlindungan.
Adakah anda pasti anda mahu membahayakan nyawa anda untuk melawan penyerang anda? Melainkan anda seorang pakar seni mempertahankan diri jika tidak, semburan lada pasti boleh melindungi anda sebab bersaiz kecil dan juga masa, ia boleh mendapatkan anda untuk melarikan diri apabila anda menyembur ke arah sasaran anda. Pada hari ini, setiap orang mampu membeli semburan lada ini, tetapi jika anda merasa pembaziran wang, maka berapa nilai hidup nyawa anda? Sila fikir sendiri, adalah lebih baik untuk memiliki salah satu atau berbanding tiada?? Akhirnya, sebagai konfrontasi tiap-tiap berbeza, anda perlu menilai pakai cara mana yang terbaik, menentang mungkin bukan cara yang terbaik!

2. Berapa kali semburan lada anda boleh digunakan? Berapa jauh ia boleh disemburkan?
Setiap semburan lada beroperasi berbeza, sila rujuk kepada semburan lada spesifikasi bersama-sama dengan imej mereka.

3. Apakah kesan ke atas orang yang saya sembur? Bagaimana ia berkesan apabila kita menghadapi keadaan yang berbahaya?
Mata orang yang baru dilanda oleh semburan secara automatik akan menutup sendiri, air mata, hudung berair, sakit
dan buta walaupun sementara. Dilaksanakan orang juga akan mengalami kekurangan nafas, batuk, tercekik dan juga sakit menyengat pada kulit dengan kesan berpanjangan berkurangan selama berjam-jam. Apabila penyerang mendapat disembur, ia pasti akan memberi anda masa yang cukup untuk keluar dari kawasan atau hubungi untuk mendapatkan bantuan. Walaupun tidak terkena penyerang langsung, dia akan merasa tercekik dan rasa terbakar dalam sistem pernafasan.

4. Ia kedengaran berbahaya, ia akan menyebabkan kerosakan kekal pada badan atau buta?
Semburan lada kami dibuat dengan Kapsikum Oleroresin (OC), ekstrak semula jadi daripada loceng sili, ia tidak toksik dan hanya akan mempunyai kesan beberapa jam yang berkekalan, tidak buta kekal atau tubuh kerosakan yang akan disebabkan.Terdapat laporan kematian oleh semburan lada ke atas orang asma, tetapi kemungkinan adalah sangat rendah, jika anda berkata semburan lada kami adalah terlalu berbahaya untuk digunakan, saya jamin anda akan berfikir secara berbeza jika seseorang mendekati anda dengan senjata suatu hari nanti.

5. Semburan lada anda boleh jamin keselamatan kami? Pasti?
Kita akan berkata "Ya", tetapi ia juga bergantung kepada bagaimana anda mampu untuk melaksanakan penggunaan semburan lada anda pada pertemuan berbahaya, Kami nasihatkan, sentiasa cuba untuk memastikan semburan lada anda berguna atau simpan di tempat yang mudah dicari dan didapati, dan juga membiasakan dengan semburan lada anda seperti ia adalah kawan baik anda supaya anda boleh menembak dalam masa yang pendek apabila diperlukan. Jika anda mempunyai tetapi tersembunyi kedalaman bag, kedalaman almari atau di dalam kereta "tempat tidak tertentu", bagaimana secara berkesan akan berlakunya?

Sekiranya berminat sila sms ke 0134330858


Iklan : Pemanggang Serbaguna Fancy @ family Grill


Video 


Dibawah hasil yang di panggang:-





boleh digunakan di atas dapur gas biasa..pemanggang ni dapat mengubah nyala api biasa menjadi bara api.

makanan yang dipanggang masak rata.

permukaan panggang yang luas.

piring fancy grill akan berputar semasa api dinyalakan..

boleh digunakan untuk membuat bbq dengan senang tanpa perlu menggunakan arang kerana hasilnya adalah serupa

ayam bakar, ikan bakar, sotong bakar, daging bakar semua layan....

Kualiti bahan yang digunakan sangat bermutu agar lebih tahan lama

boleh digunakan untuk memanggang daging, ayam, ikan, satay dan sebagainya

HARGA RM 60 Termasuk POS Semenanjung 

Jika berminat sila Email / SMS  ke :-

Drsoftware88@gmail.com
013-4330858





Iklan : New External Hard Disk Buffalo 500Gb / 1Tb



New External Hard Disk Buffalo 500Gb / 1Tb
Package Contents :
- Buffalo HDD USB 3.0 Portable external hard drive
- USB cable
- Quick start guide
- Pocket Size, Ease To Travel
- Plug and Play and Hot Swapable
- Hi-Speed USB(Max.) 5 Gbps (USB 3.0)
- Support PC , Notebook and Mac
- Support Windows 98/ME/2000/XP/Vista/Win7/Mac OS

- 3 YEARS BUFFALO Manufacture Warranty

500GB (Hitam / Putih)- RM 230 SAHAJE!DROP & HOT! 

1 Tera (Hitam / Putih)- RM 330 SAHAJE!DROP & HOT! 

Additional : FREE MOVIE2 YANG LATEST SAYA DOWNLOAD!!MANE NAK DPT OFFER TERBAIK MCM NI~?KALO TAKNAK PUN TAKPE! =D

Penghantaran:

-PoS LaJU!! semenanjung (RM10)
-PREFER COD KL - Downtown Cheras .. (tentulah free of charge!)
-Harga MuRaH & QuaLiTy PrOdUcT (No. 1 di Japan)!
-Harga yg tak kan jumpa di pasaran!
-WARRANTY DARI BUFFALO kalo rosak boleh pegi direct servis center! :-)
-Pos laju,next day dh boleh sampai!plg lmbt 2 hari kalo ade masalah x cukop stok.
-If Interested korang boleh Hubungi aku.

-SMS : 0134330858

Find Health and Life Insurance



If you are an insurance agent, chances are that you already know about buying auto insurance leads online.  But did you know that you can also buy life and health insurance?

As an insurance agent, you know the great value of finding quality leads.  Like any good agent, I'm sure that you follow up on any and every lead as soon as you possibly can.  This is the best way of continuing and growing sales and it is vital that you follow every insurance lead if you want to maintain a health business.  Regardless of your methods (cold calls, newspaperr ads, trade shows, word of mouth leads), there will come a time when you are sitting around with absolutley no new leads.

The next time you find yourself in this situation, you should consider buying health insurance leads and life insurance leads online.  Insurance lead providers specialize in finding you people that want to buy.  Everyday, new people will go online to find cheaper quotes for their health insurance and life insurance.  Many of the sites that they come across will be in the form of a lead submission form.  When they enter their contact info and submit the webpage, their info will be sent to the lead  provider.  The provider will then sell these leads to you, the insurance agent.

These people specialize in finding fresh, accurate leads, so you don't have to worry about where your next sale is going to come from.  You simply have to sign up for you leads and you can buy leads in any quantity that you choose.  Some providers even offer free bonus leads when you first sign up.

Make sure to shop around for the best insurance lead provider.  Some will sell general leads, while other sell leads for specific insurance types.  Some will even give you a preview of the potential lead, so that you can choose which leads to buy.  Hometown Quotes is a great lead provider because they offer you a personal account representative and they only offer highly targeted leads.  If you are looking for health and life insurance leads, then give them a try.

Health Insurance Made Easy



Health insurance has become the issue of the moment in South Carolina and across the country. More small businesses are increasingly unable to provide cheap health insurance plans to their employees because of the rising cost and the lack of federal and state legislation that would allow small businesses to purchase cheap medical insurance in pools. In the meantime South Carolina and other states are looking to cut the costs of the Medicare and Medicaid health insurance programs for the elderly and the poor. However, more affordable forms of health insurance plans are available as some private companies are experimenting with a new variation of cheap health insurance known as health discount plans. In the article that follows we'll explain the various aspects of cheap health insurance in South Carolina and how to find a plan that works for you.

Health Care Costs due to Managed Health Care

The current health care system in America is inaccessible to approximately 47 million poor and lower middle class people. In order to address the growing health care insurance crisis in the U.S. that resulted in health care cost growth in the 1970s and 1980s, health maintenance organizations (HMOs) sprung up. These were initially as non-profit groups designed to separate unnecessary tests and treatments from those that the patient required in an effort to keep costs down. Managed care organizations began screening requested procedures by physicians to pre-authorize what the HMO would or would not cover. However, the number of people who are the riskiest to insure-diabetics, cancer, etc.-continues to rise. Many South Carolina managed care industry experts say the cost of cheap health insurance is still high because of the existing pool of insured people who use the health care system more than an average amount.


The other battle that is ongoing in South Carolina involves the health insurance companies and hospitals, the latter which cannot turn anyone away from care by law. However, as the number of South Carolinians who cannot afford health insurance increases, hospital emergency rooms are handling the majority of the load. More people have to turn to hospitals as their primary health care givers given a lack of adequate or non-existant health insurance coverage.

How To Invest With No Money With Real Estate



Most real estate investors assume they need a lot of money to get started, and this hold them back. This assumption is wrong. There are lots of deals you can do spending little to no money of your own.

Currently, most people are unable to invest in real estate because most lenders have tightened their lending procedures too much. Even if they qualify for a mortgage, they have to put down as much as 20% and can only buy a few investment properties.
 This article shows you how you can invest in real estate using little to no money of your own.

 I prefer to invest safely with little to no risk, and have been wholesaling houses for years. Wholesaling houses involves locating and flipping cheap houses for a profit to other real estate investors.

 You can assign a contract to another real estate investor with cash. When you assign the contract, the deal is closed by your buyer using the terms of the contract. The assignment fee is what you walk home with at closing.

 You can also buy and sell the property on the same closing table in a simultaneous closing. This means you have a contract to buy the house, and another contract where you are the seller. Of course, your selling price is higher than the buying price, and your profit is the difference, less fees and expenses.

A few years ago, most lenders did not care if you used their money to close the first transaction in a simultaneous closing. In recent years, most lenders now require that you have money to close the first transaction. There is an easy fix for this.

This is where transactional funding comes in. Transactional funding is available to real estate investors and allows you to cover up to 100% buying under-valued properties which you sell for a profit.

 By short term, both transactions can be close as close together as is practical, even within a few minutes of each other.

 Transactional funding can be available within a short time, such as within a few days. Typically, it does not qualify you as a person. It does not require that you to have good credit, have money in the bank or a steady income. All they need to see is a qualified buyer lined up for the property.

 Qualified buyer means someone with verifiable cash such a real estate investor, or someone approved for a loan.

In the current market, there are a lot of distressed properties for sale and lots of foreclosed properties that real estate investors can buy and sell using this method. You end up investing with little to no risk - no tenants, repairs, etc. As long as you can find a steady supply of properties and line up buyers, you can plug into this business model and move as many properties as you can find.

How To Be A Good Boyfriend



A man can easily learn how to be a good boyfriend. All it takes is a little bit of practice and determination to do it. Willingness is the key for any man to learn how to be a good boyfriend. Unfortunately not all men are willing to study and do what it takes to be a good boyfriend.
Most men foolishly adopt a ‘love me or leave me' attitude wherein they are too stubborn to admit their shortcomings. These are usually the type of men that bank on the frailty of most women, the kind of women who would rather die than be left alone without a man.

However, men of this character must be living in the dark ages, as many women today would not tolerate this type of behavior. The modern woman of today is more discerning. Any man who would want to be in a relationship with her would certainly have to brush up on how to be a good boyfriend in order to keep her interested.

Fortunately there are still a lot of men who believe in giving their best in a relationship. These men take the initiative in learning how to be a good boyfriend to their significant other. And in the end reap the rewards of their labor with a loving and satisfying relationship.

Learning How to be a Good Boyfriend

Learning how to be a good boyfriend has a lot of advantages not just for women but also for men. A man that makes an effort to learn how to be a good boyfriend can look forward to a better and stronger relationship with their partner. An appreciative girlfriend will most likely shower her man with more love and affection than before. In addition, there will probably be less nagging that will surely be a welcome respite for any man.

However if a man still experiences the same type of treatment even after learning how to be a good boyfriend then there is something wrong. It would be a good idea to assess the relationship at this point. Perhaps the man is not to blame and the fault lies elsewhere.

Keep in mind that there are some women in the world that cannot be content unless they are nagging or criticizing something. At this point, a man may want to think if the relationship is still worth pursuing or if it would be time to move on and probably find someone who would appreciate them better.

A Guide on How to be a Good Boyfriend

A good boyfriend knows how to keep his girlfriend happy. Satisfying a woman is a comprehensive plan that does not only involve the sexual aspect of a relationship. A good way to do so is to make her feel special by complimenting her on how well she looks.

Women do their best to look pretty for their man and a little flattering remark goes a long way to show her that her efforts are appreciated. It is also a good idea for a man to evaluate his own physical appearance. As a woman takes the time to look good for her man therefore a man should also look good for his woman.

To show respect for her and her family is a trait of a good boyfriend that every man should adopt. A well-mannered man is polite and nice to his girlfriend's family. Women are particularly appreciative of a man that accepts and loves her family. Communication is a vital part of every relationship. Women cherish a man who listens and pays attention to what they have to say.

There are no hard and fast rules on how to be a good boyfriend. And learning how to be a good boyfriend is not easy. The enthusiasm to learn must be present. It is also important to be comfortable and at ease with oneself when undertaking such an education.

Being true to oneself is an important part of the learning process. A man forced into learning how to be a good boyfriend can develop negative emotions that would not be healthy for the individual and for the relationship. If a man were not interested in learning then he would only be fooling himself and his partner.

Saturday 13 October 2012

House Plans And Designs



Preparation designs the basis of each and even every single task may well it be making of items or maybe building of properties. We must always dwell on the upcoming and there will be the toughest. Persons are sure to have an emergency regime organized in case of catastrophes and thus the same is the case with structure of smaller residences.
As long as everyone is to assemble a little dwelling at the outset we will have to plan for, what type household achieve most of us need? Which locality would probably align with us? What number of spaces achieve we necessitate in the house? Several such types of problems have to be responded before-time. Once we are now very clear with these questions we should instead put all the tasks in writing not to mention design and style your house accordingly.

It's often preferable to have a bit of experienced help in the organizing and even planning of the house due to the fact gurus tend to make hole and then ideal making use of the location offered. Real estate kinds one out of the three standard supplies of lifespan therefore relatives desire to keep it clear and keep it there for years so as it offers appealing appears to be.

A couple of other elements, aside from planning that playtime immense roles in the construction of a small area are time and expense. These kinds of two aspects are simply because key since considering together with need be thought about whilst you create a small house, thinking still methods the key of making a small place. Thinking at home in addition involves the selection of right kind of matter for your house, manpower preferred, and the right styles. Some constantly better to use the providers of a civil produce not to mention an administrative assistant when you need the issues to proceed as you owned set in place.

To boot using recommendation from the family members together with associates for your own tiny household is a great choice because every last consumer gives you a distinct somewhat suggestion you could unquestionably pick a qualified an individual from it. Once you would be building a little area, useful making use of place gets an actual worry as well as the specialist must design your place in this kind of manner that every single area of your dwelling is commonly employed. Constantly reveal old programs and even mental attitude with the technician for the reason that after that he may design the home in line with it.

 Before you buy any specific product or service from the industry be sure that it is of fine quality which is offered at a good expense. Typically we come across people today give and take on excellence for rate that is harmful.

Forensic Data Recovery



Usually, the term ‘war front' envisages gun fires, tanks and foot soldiers. With the evolution of technology, these weapons and their way of using have also changed. The latest upgrade is the war front has started moving to the web world, with the introduction of various computer malware breaking loose all traps.

The phenomenon is ubiquitous and universal across the web. It is ramifying its tentacles all time round. What benefits they get doing so might be known to all users. Those who have suffered the shock know of it very well. These malwares steal important data that are saved on the hard disk drive. They may also make a mess into the database, and harm the operations of the system.

On the occurrence of such events, computer users should call in forensic data recovery professionals in war-footing momentum for their immediate services. This may help retrieve their lost data. However, this is not as easy as it sounds. These services are costly, and not so easy. In fact, the cost of service is going so high with growing demand for data security and ensuring safety for them. In recent times, the cloud computing system has become very popular for this service.

At the very first, it needs to be said that it is expensive, at least when dedicated service is taken. Compared to the expenses of dedicated cloud computing service, the shared cloud computing service is much lower. As per the space occupied by the database, the charges are applied accordingly. For this, they don't have to defray huge fees periodically for the maintenance of the database securely and safely. In most instances, software companies and computer forensic companies having SaaS infrastructure provide this database maintenance services. In addition to these services, they provide data recovery services to personal computer users.

However, this service is largely difficult even for the professional forensic data recovery experts. Why? Usually, the data lost from the hard disc drive of a person requires handling the hard disc drive personally. They generally go to the person's home or office and look into the drive in order to track down where the data can be lying hidden. It is sure that data must be there hidden in any minuscule of the drive. But, to be honest, the task of retrieving the data is almost difficult and the chances of their recovery depend on the expertise of the professional and tenacity to reach the successful end. In most cases, thus simple efforts come as a cropper.

Kubur Atas Kubah Masjid Nabawi adakah benar?



Betul ke apa yang disebarkan tentang benda di atas kubah majid Nabawi adalah sebuah kubur penjahat yang ingin mencuri jasad rasullullah ataupun kubur seorang penjahat yang ingin memecahkan kubah majis Nabawi tersebut?

Berikut adalah perkongsian dari fan page Syahirul.com tentang isu ini:

Persoalan mengenai benda yang terdapat di atas Kubah Masjid An-Nabawi. Janganlah kita menjaja lagi pendapat2 yang tidak sahih. Pendapat Imam Az-Zabidi tentang berkuburnya seorang yang ingin mencuri/memindahkan jasad Rasulullah s.a.w daripada makamnya kerana menganggapnya bida’ah dholalah adalah tidak tepat dan tidak sahih riwayatnya kerana sebahagian ulama’ menganggap bahawasanya Imam Az-Zabidi Rohimahullahu Ta’ala hanya menaqalkan cerita2 masyarakat di persekitaran Madinah al-Munawwarah.

Apa yang berada di atas kubah Masjid An-Nabawi itu ialah jendela ataupun tutupan kubah yang akan di buka ketika hendak membersihkan atap kubah Masjid An-Nabawi. Dahulunya kubah ini terbuka, namun kerana dikhuatiri jikalau hujan, air dipastikan akan masuk yang nanti akan menyebabkan boleh merosakkan bahagian dalam Makam Rasulullah s.a.w dan dua sahabat Baginda s.a.w maka akhirnya ia di tutup. Jadi,cerita mengenai adanya mayat di atas kubah Masjid An-Nabawi adalah tidak benar kerana ia bukanlah mayat tetapi hanyalah jendela yang menutupi Kubah Masjid An-Nabawi..


Jadi, artikel yang banyak disebarkan di internet tentang ‘kubur’ tersebut adalah tidak benar. Mungkin ada pihak yang bertujuan untuk memesongkan umat islam atau mungkin ingin memper*****kan umat islam itu sendiri. Wallahualam…

Di harap agar sesuatu perkara itu diselidik dahulu sebelum disebarkan.

Sumber : http://www.carigold.com/portal/forums/showthread.php?t=330206

3 Cara Untuk Membuang Virus Ramsonware



Imagine someone getting access to your computer, encrypting all your family photos and other priceless files, and then demanding a ransom for their safe return. That is what ransomware is all about. Ransomware is a type of malware used for data kidnapping. It takes your data hostage by encrypting it using supposedly unbreakable encryption algorithms and then demands payment in exchange for the decryption key.
At this moment,the most common type of ransomware is the ‘Police Trojan’.This malicious program locks computers and asks their owners to pay fines for allegedly violating several laws through their online activity.
IF your computer is infected with this type of malware,you can use any of the below methods to remove this ransomware infection.

Method 1: Use HitmanPro in ForceBreach Mode

  1. Download the latest official version of HitmanPro from the below link.
    HITMANPRO DOWNLOAD LINK (This link will open a download page in a new window from where you can download HitmanPro)
  2. After you have downloaded HitmanPro,you’ll need to copy the file on a USB stick/CD and follow the instructions from the below video:

Method 2: Use a Kaspersky Kaspersky Rescue Disk CD

What you’ll need to perform this removal guide :
  1. A computer with Internet access.
  2. 1 blank DVD or CD
  3. 1 DVD/CD Burner
  4. Software which can create a bootable CD –  http://www.imgburn.com/index.php?act=download
  5. A copy of the latest Kaspersky Rescue Disc from here –  http://rescuedisk.kaspersky-labs.com/rescuedisk/updatable/
  6. About 1 -2  hours depending on how much data you have on C:

STEP 1: Download and create a bootable Kaspersky Rescue Disk CD

  1. Download the Kaspersky Rescue Disk ISOimage from below.
    download kaspersky rescue disk
  2. Download ImgBurn, a software that will help us create this bootable disk.
    download ImgBurn
  3. You can now insert your blank DVD/CD in your burner.
  4. Install ImgBurn by following the prompts and then start this program.
  5. Click on the Write image file to disc button.
    Create bootable CD step1
  6. Under ‘Source’ click on the Browse for file button, then browse to the location where you previously saved the Kaspersky Rescue Disk ISO file.(kav_rescue_10.iso)
    Create bootable CD step2
  7. Click on the big Write button.
    Create bootable CD step3
  8. The disc creation process will now start and it will take around 5-10 minutes to complete.

STEP 2:Configure the computer to boot from CD-ROM

  1. Use the Delete or F2 keys, to load the BIOS menu.Information how to enter the BIOS menu is displayed on the screen at the start of the OS boot:
    Boot into Bios
  2. In your PC BIOS settings select the Boot menu and set CD/DVD-ROM as a primary boot device.
    Boot into BIOS Step2
  3. Insert your Kaspersky Rescue Disk and restart your computer.

STEP 3:Boot your computer from Kaspersky Rescue Disk

  1. Your computer will now boot from the Kaspersky Rescue Disk,and you’ll be asked to press any key to proceed with this process
    Kaspersky Rescue Disk 1
  2. In the start up wizard window that will open, select your language using the cursor moving keys. Press the ENTER key on the keyboard.
    Kaspersky Rescue Disk 2
  3. On the next screen, select Kaspersky Rescue Disk. Graphic Mode then press ENTER.
    Kaspersky Rescue Disk 3
  4. The End User License Agreement of Kaspersky Rescue Disk will be displayed on the screen. Read carefully the agreement then press the C button on your keyboard.
    Kaspersky Rescue Disk 4
  5. Once the actions described above have been performed, the Kasprsky operating system will start.

STEP 4: Launch Kaspersky WindowsUnlocker to remove the PRS for Music ransomware malicious registry changes

The PRS for Music ransomware has modified your system registry so that when you’re trying to boot your computer it will instead launch his lock screen.To remove this malicious registry changes we need to use the Kasersky WindowsUnlocker from Kaspersky Rescue Disk.
  1. Click on the Start button located in the left bottom corner of the screen and select the Kaspersky WindowsUnlocker.
    Kaspersky Rescue Disk WindowsUnlocker 1
    Alternatively you can select Terminal and in the command prompt typewindowsunlocker and then press Enteron the keyboard.
  2. A white colored console window will appear and will automatically start loading the registry files for scanning and disinfection. The whole process will take only a couple of seconds and after this process you should be able to boot your computer in normal mode.
    Kaspersky Rescue Disk WindowsUnlocker 2

STEP 5:Scan your system with Kaspersky Rescue Disk

  1. Click on the Start buttonlocated in the left bottom corner of the screen andselect the Kaspersky Rescue Disk then click on My Update Center and press Start update.
    Kaspersky Bootable Cd scan 1
  2. When the update process has completed, the light at the top of the window will turn green, and the databases release date will be updated.
    Kaspersky Bootable Cd scan 2
  3. Click on the Objects Scan tab, then click Start Objects Scanto begin the scan.
    Kaspersky Bootable Cd scan 3
  4. If any malicious items are found, the default settings are to prompt you for action with a red popup window on the bottom right. Delete is the recommended action in most cases but we strongly recommend that you try first to disinfect , and if it doesn’t work chose to quarantine the infected files just to be on the safe side.
    Kaspersky Bootable Cd scan 5
  5. When all detected items have been processed and removed, the light in the window will turn green and the scan will show as completed.
    Kaspersky Bootable Cd scan 7
  6. When done you can close the Kaspersky Rescue Disk window and use the Start Menu to Restart the computer.

Method 3: Use our manual removal guide

STEP 1 :Start your computer in Safe Mode with Command Prompt

  1. Remove all floppy disks, CDs, and DVDs from your computer, and then restart your computer.
  2. Press and hold the F8 key as your computer restarts.Please keep in mind that you need to press the F8 key before the Windows start-up logo appears.
    Note: With some computers, if you press and hold a key as the computer is booting you will get a stuck key message. If this occurs, instead of pressing and holding the “F8 key”, tap the “F8 key” continuously until you get the Advanced Boot Options screen.
  3. On the Advanced Boot Options screen, use the arrow keys to highlight Safe Mode with Command Prompt, and then press ENTER.
    Enter Safe Mode with Command Prompt

STEP 2: Remove the malicious registry key and file

  1. When Windows loads in Safe Mode with Command Prompt, the Windows command prompt will show up as show in the image below. At the command prompt, type explorer.exe, and press Enter.
    explorer.exe at Safe Mode with Command Prompt
    The Windows Explorer will open, do not close this window.
  2. Using the same Windows command prompt,type regedit.exe and press Enter.
    Type regedit.exe at Safe Mode with Command Promp
  3. The Registry Editor will now open and you’ll need to browser to :
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\.
    And search on the list to the right for an registry entry named Shell.
    Browse to registry
    Right click on this registry key and select the Modify option. The default value should be explorer.exe however this infection most likely modified this entry.
  4. Before you rename this registry entry to explorer.exe, copy the location of the modified value to a piece of paper or Notepad because this value will point you to the ransomware executable file ,which needs to be removed.
    In our case, the malicious file is running from the Desktop and it’s calledcontacts.exe, but the cyber crimanls may have changed the file name in your case so it might have a different name.
    Path to infection
  5. Modify the value of the registry entry back to its default value
    explorer.exe
    Then click OK to save your changes and exit the Registry editor.
    value explorer.exe
  6. Use the window opened on Step 1 and browse to the location indicated in the value of modified registry entry and delete the malicious file. In our case, the malicious file was running from the Desktop and it was calledcontacts.exe.
    Delete malicious file
  7. Go back into Normal Mode.To restart your computer, at the command prompt, type shutdown /r /t 0 and then press Enter.
    Restart command
Alternatively you can use this other manual removal guide to get rid of this trojan:
1 – Press Ctrl-O (that’s the letter O, not the number zero).
2 – Select “Browse“, and then go to C:\windows\system32 and open cmd.exe.
3 – Type “explorer.exe” into the newly opened window. You should now be able to use the desktop again.
4 – Browse to your Startup folder. The path will vary depending on the language settings and Windows version. The screenshot below shows the path on the English version of Windows XP. You will also have to replace “Administrator” with your user name in the path (unless you’re already using the Administrator account, but lets not get started on that…).
Windows 7 and Vista users can go to : 
C:\Users\%username%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
5 – Delete any entries you don’t recognize. The names of the malicious entries may be different than the ones shown in the screenshot. If you are unsure, you can remove all entries, but at the risk of disabling other valid applications from automatically starting.
6 – Reboot the computer.

Alert-SOPA muncul kembali dalam bentuk 'ramsonware virus'


Januari dulu dunia laman sesawang digemparkan dengan tindakan SOPA atau Stop Online Piracy Act atas tindakan mereka dgn menahan beberapa individu termasuk laa kim dot com tokey megaupload..semenjak beberapa minggu kebelakangan ini ramai pengguna internet di kejutkan dgn amaran kemunculan semula SOPA sebagai nasty cryptovirus that locks up people’s computers and accuses them of distributing copyright infringing files. Infected users can get their data back after a payment of $200 –at least, that’s what the virus makers promise.

Virus SOPA ini digelar ramsonware..bila skrin pengguna yg terkena virus ni keluar seperti di dalam gambar,akan tertulis seperti ini : If you see a warning.txt or warning screen, it means your IP address was included in S.O.P.A. Black List. One or more of the following items were made from your PC: 1. Downloading or distributing audio or video files protected by Copyright Law. 2. Downloading or distributing illegal content (child porn, phishing software, etc.) 3. Downloading or distributing Software protected by Copyright Law. As a result of these infringements based on Stop Online Piracy Act (H.R. 3261) your PC and files are now blocked.

SOPA ramsonware virus.


Cara untuk membuang nya, sila rujuk di sini http://www.shahrin.my/2012/10/3-cara-untuk-membuang-virus-ramsonware.html

Lokasi lokasi sistem AES



Salam warga cg kini anda boleh berhati hati dengan kamera AES sila rujuk tempat2 kamera AES untuk elakkan anda semua disaman..klik Gambar dibawah untuk paparan jelas..