Ads

Ads

Friday, October 19, 2012

The Happiness




To me happiness is when I can create smiles on my family's and buddies' face for the things I do.

Happiness to me is when my family smile for the things I have for them proud to of.

Happiness to me is when my buddies smile for the little help I do for them.

To sacrifice or to hurt myself, it sounds stupid.But if it can make them smile, I will because at least when I'm old enough and about to die,I will never regret the life I had.I have made my loved ones smile.


Babak Cinta-Tengku Adil Kord

Intro
D


Verse
                                     
          D                             Bm
Engkaulah cahaya dalam hidup yang penuh kegelapannya
           Em                            Gm
Rasa kesakitan dalam dada menghilang pabila kau berada..

        D                        Bm
Cintamu kepada aku tak pernah ku rasa sebegitu
               Em                           Gm
Engkau meringankan hati ini, engkau menenangkan jiwa sepi



Chorus

             D                          Bm
Aku ingin menjadi pembuka, hatimu yang sekian lamanya
               Em          Gm
Terkunci kerna slalu terluka
              D
Ku ingin menjadi penutupnya .



Verse 2

        D                           Bm
Ku tahu kau disakiti, hatimu sedang kau melindungi
             Em                       Gm
Percayakan pada cinta ini, relakan ia berterbang tinggi ...


Chorus

             D                          Bm
Aku ingin menjadi pembuka, hatimu yang sekian lamanya
               Em         Gm
Terkunci kerna slalu terluka
              D                                Bm
Ku ingin menjadi penutupnya, babak tentang pencarian cinta
            Em           Gm
Aku untukmu sepanjang hayat


Bridge

Bm    D        G     A
Aku juga merasa ketakutan mencinta
Bm      D         Em Bb C  D   Bb    C    A
Percayakan pada kita oohhh...



Chorus


             D                           Bm
Aku ingin menjadi pembuka, hatimu yang sekian lamanya
               Em         Gm
Terkunci kerna slalu terluka
            D                                 Bm
Ku ingin menjadi penutupnya, babak tentang pencarian cinta
            Em           Gm
Aku untukmu sepanjang hayat
             D                            Bm
Aku ingin menjadi pembuka, hatimu yang sekian lamanya
               Em        Gm
Terkunci kerna slalu terluka


Outro

D A G    Gm  Bm  A G   Gm
Ooohhh...   oohhh... Oohhh... oohhh

Friday, October 12, 2012

Terima Kasih-Iamneeta

Saturday, September 29, 2012

TOP 10 THE MOST HORRIBLE VIRUSSES EVER MADE

**I do not own the contets.Taken from other websites for sharing purpose only.

10.Melissa

In the spring of 1999, a man named David L. Smith created acomputer virus based on a Microsoft Word macro. He built the virus so that it could spread through e-mail messages. Smith named the virus "Melissa," saying that he named it after an exotic dancer from Florida.
Rather than shaking its moneymaker, the Melissa computer virus tempts recipients into opening a document with an e-mail message like "Here is that document you asked for, don't show it to anybody else." Once activated, the virus replicates itself and sends itself out to the top 50 people in the recipient's e-mail address book.
The virus spread rapidly after Smith unleashed it on the world. The United States federal government became very interested in Smith's work -- according to statements made by FBI officials to Congress, the Melissa virus "wreaked havoc on government and private sector networks" [source: FBI]. The increase in e-mail traffic forced some companies to discontinue e-mail programs until the virus was contained.
After a lengthy trial process, Smith lost his case and received a 20-month jail sentence. The court also fined Smith $5,000 and forbade him from accessing computer networks without court authorization [source:BBC]. Ultimately, the Melissa virus didn't cripple the Internet, but it was one of the first computer viruses to get the public's attention.
9.ILOVEYOU
A year after the Melissa virus hit the Internet, a digital menace emerged from the Philippines. Unlike the Melissa virus, this threat came in the form of a worm -- it was a standalone program capable of replicating itself. It bore the name ILOVEYOU.
The ILOVEYOU virus initially traveled the Internet by e-mail, just like the Melissa virus. The subject of the e-mail said that the message was a love letter from a secret admirer. An attachment in the e-mail was what caused all the trouble. The original worm had the file name of LOVE-LETTER-FOR-YOU.TXT.vbs. The vbs extension pointed to the language the hacker used to create the worm: Visual Basic Scripting [source: McAfee].
According to anti-virus software producer McAfee, the ILOVEYOU virus had a wide range of attacks:
  • It copied itself several times and hid the copies in several folders on the victim's hard drive.
  • It added new files to the victim's registry keys.
  • It replaced several different kinds of files with copies of itself.
  • It sent itself through Internet Relay Chat clients as well as e-mail.
  • It downloaded a file called WIN-BUGSFIX.EXE from the Internet and executed it. Rather than fix bugs, this program was a password-stealing application that e-mailed secret information to the hacker's e-mail address.
Who created the ILOVEYOU virus? Some think it was Onel de Guzman of the Philippines. Filipino authorities investigated de Guzman on charges of theft -- at the time the Philippines had no computer espionage or sabotage laws. Citing a lack of evidence, the Filipino authorities dropped the charges against de Guzman, who would neither confirm nor deny his responsibility for the virus. According to some estimates, the ILOVEYOU virus caused $10 billion in damages 

8.The Klez Virus

The Klez virus marked a new direction for computer virusses, setting the bar high for those that would follow. It debuted in late 2001, and variations of the virus plagued the Internet for several months. The basic Klez worm infected a victim's computer through an email message, replicated itself and then sent itself to people in the victim's address book. Some variations of the Klez virus carried other harmful programs that could render a victim's computer inoperable. Depending on the version, the Klez virus could act like a normal computer virus, a worm or a Trojan horse. It could even disable virus-scanning software and pose as a virus-removal tool .

Shortly after it appeared on the Internet, hackers modified the Klez virus in a way that made it far more effective. Like other viruses, it could comb through a victim's address book and send itself to contacts. But it could also take another name from the contact list and place that address in the "From" field in the e-mail client. It's called spoofing -- the e-mail appears to come from one source when it's really coming from somewhere else.
Spoofing an e-mail address accomplishes a couple of goals. For one thing, it doesn't do the recipient of the e-mail any good to block the person in the "From" field, since the e-mails are really coming from someone else. A Klez worm programmed to spam people with multiple e-mails could clog an inbox in short order, because the recipients would be unable to tell what the real source of the problem was. Also, the e-mail's recipient might recognize the name in the "From" field and therefore be more receptive to opening it.
7.Code Red and Code Red II
The Code Red and Code Red II worms popped up in the summer of 2001. Both worms exploited an operating systemvulnerability that was found in machines running Windows 2000 and Windows NT. The vulnerability was a buffer overflow problem, which means when a machine running on these operating systems receives more information than its buffers can handle, it starts to overwrite adjacent memory.
The original Code Red worm initiated a distributed denial of service (DDoS) attack on the White House. That means all the computers infected with Code Red tried to contact theWeb servers at the White House at the same time, overloading the machines.
A Windows 2000 machine infected by the Code Red II worm no longer obeys the owner. That's because the worm creates a backdoor into the computer's operating system, allowing a remote user to access and control the machine. In computing terms, this is a system-level compromise, and it's bad news for the computer's owner. The person behind the virus can access information from the victim's computer or even use the infected computer to commit crimes. That means the victim not only has to deal with an infected computer, but also may fall under suspicion for crimes he or she didn't commit.
While Windows NT machines were vulnerable to the Code Red worms, the viruses' effect on these machines wasn't as extreme. Web servers running Windows NT might crash more often than normal, but that was about as bad as it got. Compared to the woes experienced by Windows 2000 users, that's not so bad.
Microsoft released software patches that addressed the security vulnerability in Windows 2000 and Windows NT. Once patched, the original worms could no longer infect a Windows 2000 machine; however, the patch didn't remove viruses from infected computers -- victims had to do that themselves.

6.Nimda
Another virus to hit the Internet in 2001 was the Nimda (which is admin spelled backwards) worm. Nimda spread through the Internet rapidly, becoming the fastest propagating computer virus at that time. In fact, according to TruSecure CTO Peter Tippett, it only took 22 minutes from the moment Nimda hit the Internet to reach the top of the list of reported attacks [source: Anthes].
The Nimda worm's primary targets were Internet servers. While it could infect a home PC, its real purpose was to bring Internet traffic to a crawl. It could travel through the Internet using multiple methods, including e-mail. This helped spread the virus across multiple servers in record time.
The Nimda worm created a backdoor into the victim'soperating system. It allowed the person behind the attack to access the same level of functions as whatever account was logged into the machine currently. In other words, if a user with limited privileges activated the worm on a computer, the attacker would also have limited access to the computer's functions. On the other hand, if the victim was the administrator for the machine, the attacker would have full control.
The spread of the Nimda virus caused some network systems to crash as more of the system's resources became fodder for the worm. In effect, the Nimda worm became a distributed denial of service (DDoS) attack.
5.SQL SLAMMER/SAPPHIRE
In late January 2003, a new Web server virus spread across the Internet. Many computer networks were unprepared for the attack, and as a result the virus brought down several important systems. The Bank of America's ATM service crashed, the city of Seattle suffered outages in 911 service and Continental Airlines had to cancel several flights due toelectronic ticketing and check-in errors.
The culprit was the SQL Slammer virus, also known as Sapphire. By some estimates, the virus caused more than $1 billion in damages before patches and antivirus software caught up to the problem. The progress of Slammer's attack is well documented. Only a few minutes after infecting its first Internet server, the Slammer virus was doubling its number of victims every few seconds. Fifteen minutes after its first attack, the Slammer virus infected nearly half of the servers that act as the pillars of the Internet.
The Slammer virus taught a valuable lesson: It's not enough to make sure you have the latest patches and antivirus software. Hackers will always look for a way to exploit any weakness, particularly if the vulnerability isn't widely known. While it's still important to try and head off viruses before they hit you, it's also important to have a worst-case-scenario plan to fall back on should disaster strike










Wednesday, April 18, 2012

Thousand Years(Christina Perri)-Guitar Tutorial with tabs

Manage Your Income Wisely


*I do not own the contents.I've sorted from google.

Managing your money

Managing income is a big issue we face every day.No matter who you are-the poor or the rich- wrong budgetting always put you in trouble.

Some budgeting ideas

Regularly put money aside whenever you get paid. That way, you know there’s money to pay your bills. It’s also a great way to save for a goal – like a holiday. You can:
-open a separate bank account and make an automatic payment into it every time you get paid – ask your bank about this, or
-take out a set amount of money every time you get paid and leave the rest in your bank account. A good way to save but you need a lot of discipline.
-Pay off your debts as soon as you can because the longer you have a debt, the more interest you’re charged, and the more money you owe.An easy way to pay off a debt is to put a bit towards it every time you get paid (but only after you’ve paid your bills). You can organise to pay it straight from your bank account so you don’t have to think about it – and you’re not tempted to use the money for other things. Ask your bank about automatic payments.
-Only buy the things you need if you really want to pay off your debts and get closer to reaching your goals. The good thing is – when you’re closer to where you want to be you’ll be able to afford the little luxuries more and more often.
top

Talking with a budget advisor

A budget advisor is someone who can help you set up a budget for free. They can help you to:
-set up a budget
-draw up a plan for your future
-find ways to make budgeting easier
-work out how to save money and reduce debt
-get ideas on how to make more money
-deal with banks and people you owe money to
find other people who may be able to help.
-They will also offer encouragement and support as well as give you the right advice for managing your money.

When you meet your advisor, please bring these things with you so they can help you work out a budget immediately:
-details of your household income
-bank account statements
-your regular bills
-details of any money you owe such as mortgages, hire purchases and credit cards
-details of any other expenses.

Remember, a budget advisor’s job is to give you advice and support – they’re not counsellors, and they won’t control your money or give you money to pay off your debts. If you need help with these things, your advisor will be happy to give you details of people who may be able to help.

Sunday, January 15, 2012

The Sweetest Proposal Ever

This sweet proposal is made by Timothy Tiah to his beloved one,Aurey Ooi Feng Ling.At that night,Timothy with the helps of his friends gave a big surprise to his girlfriend with a romantic and unforgettable proposal.
Even the singer of A Thousand Years,Christina Perry confessed she cried as watching the video.

Check it out the video(with the lyrics below).



Heart beats fast
Colors and promises
How to be brave
How can I love when I'm afraid
To fall
But watching you stand alone
All of my doubt
Suddenly goes away somehow

One step closer

(Chorus)
I have died everyday
waiting for you
Darlin' don't be afraid
I have loved you for a
Thousand years
I'll love you for a
Thousand more

(Verse 2)
Time stands still
Beauty I know she is
I will be brave
I will not let anything
Take away
What's standing in front of me
Every breath,
Every hour has come to this

One step closer

(Chorus)
I have died everyday
[ From: http://www.metrolyrics.com/a-thousand-years-lyrics-christina-perri.html ]
Waiting for you
Darlin' don't be afraid
I have loved you for a
Thousand years
I'll love you for a
Thousand more

And all along I believed
I would find you
Time has brought
Your heart to me
I have loved you for a
Thousand years
I'll love you for a
Thousand more

One step closer
One step closer

(Chorus)
I have died everyday
Waiting for you
Darlin' don't be afraid,
I have loved you for a
Thousand years
I'll love you for a
Thousand more

And all along I believed
I would find you
Time has brought
Your heart to me
I have loved you for a
Thousand years
I'll love you for a
Thousand more

Saturday, January 14, 2012

Green Day - Holiday [Live]

FUCK YOU YOU TO ALL THE POLITICIANS.Haha..I agree with you Billie Joe!!!Dear politicians, your hands are dirty.Two holy words for the politicians.FUCK YOU!

Related Posts Plugin for WordPress, ...