wedges of course! i'm not the type who wears heels. =)
Rabu, 29 September 2010
Minggu, 19 September 2010
DEDICATED ENTRY TO 'LOVE' WHO COMMENTED IN MY CHATBOX
Hi 'love' in the chatbox!
Are you waiting for my new entry??? u like keep tracking with my stories and updates of myself?
Okay, i'll update as rajin as i can especially for u ok. lol
Are you waiting for my new entry??? u like keep tracking with my stories and updates of myself?
Okay, i'll update as rajin as i can especially for u ok. lol
First and foremost,
thanks for keep increasing my unique visitor which means increasing my money in NUFFNANG.
Secondly, i did said in the chatbox I know u because your ip add keep
appeared in my statistic. Great! and your location is in KULIM nearby the lake & TAMAN KENARI
cuz I found it already.
Should i proceed it to the right authorities? Cuz u keep disturbing in my personal blog.
I didn't invite you to read at my blog.
Maybe it seems attractive for you.
Maybe you like the way i spend my money,
i bought branded stuffs and travelled here and there?
Maybe maybe maybe..
I know your favourite page is INI PEREMPUAN HOT BIKIN MALU, right?
Did you bookmarked it? Thanks darling.
Again, u nak vommit ke kat blog i?
Nampak sangat yang u ni jealous dengan i kan?
Kenapa? Nampak sangat u ni jenis busuk hati. Kesian orang yg sekeliling u..
Are you married? If you do so,
hubby you tak mampu ke nak afford lebih dari yg i mampu?
You ni jenis muka kemek macam pinggan ke? asyik nak jealous dengan i jer.
Alahai, kalau u nak sangat jadi macam i, do drop email at rarerunic@gmail.com
Tanya je ape yang u nak tanya.. Mane nak tahu kan, nak tanya i beli baju kat mane ke, kasut kat mane ke, my own goods kat mane mane ke atau
u nak barang i, u nak buat collection ke, or u nak MANDREM i ke, email je.
i'll reply sooner. i tahu u ni peminat i.
Haa... dah lama u tak jenguk blog i kan? Baru - baru ni je u lawat kan? 2 hari lepas kan?
Thanks btw.
Anyway dear stupid love.
if i really 'know' 'you', maybe you were that stupid woman,
i just wanna ask and tell you.
if you were not that 'you', then ignore it. =D
to ASK : IS YOUR KURUNG RAYA 50% OFF?
to TELL : YOUR KURUNG RAYA FOR DIZ YEAR EXACTLY LIKE MY MUM!
UNFORTUNATELY, my mum bought it last year which when it was NEW ARRIVAL, NO DISCOUNT.
HAHAHAHA!!!
Did you having a good budget? At least, don't drop your pride down to my ass. haha.
You're working couple right? Buy your clothes which NEW ARRIVAL lah. No need to buy at LONGWAN either.
You can afford it such as
MISS SELFRIDGE, LIZ CLAIBORNE, MNG & FOREVER 21(the cheepest),
TOPSHOP, LEVI'S, JOSEPH..
Do upgrade your camera; picture quality too. Buruk sangat la.
Anyway u rasa sakit hati ke? Kalau ye, email je i.
I ok, i suka kot, dapat peminat yg fanatik macam u. lol.
Takpun lagi senang, u call jer i, u ada number hp i kan?
or u can get from anybody. =P
U rasa u lawa ke? Haha, boleh blah.
Sumpah lawak giler muka 'u' ala - ala kemek macam pinggan.
Agak - agak u ni jenis gampang tak?
Memang i kata kat u, i tak tengok diri i.
Tapi lantaklah, dah orang nak busuk hati dengan i.
I peduli ape kan? Mak tak kisah pung..
Serius u ni nampak miskin gila!
Dah tu nampak kampung habis! Agak - agak la kan, baby t yang u ada
yang pakai sendat nak mampus tu cuma ada sehelai jer ke?
Sebab i tengok asyik dok pakai yang sama jer.
Miskin sangat ke? Beli la yang baru. lol.
dah la, makin 'beramas mesra' dengan u, the more good deeds in vice versa i'll get.
bhahaha..
anyway 'love', i wish u selamat hari raya.
ubah - ubah la perangai u yang gak kurang ajar, tak sedar diri orang kampung tu.
u tak sedar yang orang yang lebih tua dari you, dekat dengan you, pun ada
yang tak suka you.
you ingat semua orang suka you ke?
dah la u ni jenis tak reti respect orang lebih tua dari u.
kalau yang muda, apatah lagi,
lagi la u ni perasan bagus kan? bhaha.lol.
kalau dah murah, memang lah macam tu,
tak reti nak respect orang.
u ni ala - ala merak sombong or kaduk naik junjung?
i prefer kaduk naik junjung.
u're nobody pon.. sape bapak u, keje ape? hebat sangat ke?
i tengok u ni macam minah kampung kena KUTIP TEPI JALAN JER.
dah lah. buang masa aku jer. T___T
tido lagi bagus.
take good care love, jaga dalam kain u dulu yer. =D
Computer Networking Fundamentals
A computer netting is a group of two or more computers with imparting between them through a middle. The imparting middle can be through radio waves, wires, infrared, optical fibers etc.
Computer netting is an whole part of our diurnal lives, with the most significant thinking principle being that of imparting. The use of computer networking is to divide wealth like fax machines, printers, modems, files etc., and its other uses are database server, computer server, email, chatter, internet etc. The computer to which the wealth are attached is called the server and the other computers that entranceway the dependence are called clients. In mate-to-mate computer networks there are no servers.
The sharing of fax machines, printers, and modems amongst many computers and users restore the operational take away from. A database on a computer netting is a very significant applying as it supplies and runs many significant premises and jobs. Emails and chats can be used for instant imparting and sending of files on a computer netting.
The computer networks are classified, depending upon the dimensions, as Local Area Networks (LAN), Wide Area Networks (WAN), Metropolitan Area Networks (MAN) and Personal Area Networks (PAN). The topology (topology is the way the computer networks and netting wealth are joined) of the networking can be classified as Bus netting, Ring netting and Star netting.
The networking hardware basically consists of wiring, netting cards and a hub. Computer netting cards are required so that one computer can conceive what the other computer is “talking”. netting cards have a single MAC apply to to prove to be the same computers on a computer netting. Hubs join all the computers in the netting. Hubs can also be used to join to other hubs to augment the dimensions of the computer netting. Two computers can be joined using Ethernet cards or phone lines or ability lines for imparting, with hardware kits available at roughly a take away from of $100.
As the count of computers in an work or a domicile increases, so do the count of cables, so wireless networking is a viable disconnection. In wireless networking radio transreceivers or infrared signals are used to impart between computers and devices. Examples of wireless networking contain Wi-fi and Bluetooth technology, though there may be safety issues involved in wireless networking. However there definitely is a stronger precedence towards wireless networking in the present age among consumers.
Computer networks have added a new extension to the 21st hundred. Today the cyber creation is much faster and wider than the substantial creation. This has all been made possible due to computer networks. Computer networks have revolutionized calling, imparting, go on foot, exploration, defense, companionship and almost all human endeavors. The development of computer networks has helped the technological circular motion take a big bound forward.
Jumat, 17 September 2010
Giving your Computer investing invest Protection against Online Threats and Intrusions
Gone are the days when libraries and other notice centers are the best preferences when looking for of moment notice. With the appearing and disclosure of computer a whole applications as well as of Internet technology, acquiring notice is not anymore a daunting labor to do. You can now passage-way the notice that you will need within just a few clicks of your computer catch mice and a few strokes of your computer keyboard. Furthermore, you are not just conduct a sole library of notice. In circumstance, the Internet contains more than the notice amplitude of all existing libraries in the nature combined! That is how of great size the amplitude of the Internet is in articles of agreement of holding notice on various subjects of touch.
Because of the broad availability of the Internet, it is not just considered to be the notice superhighway alone, but it is now one of the best profession opportunities to flinch with. There are many jobless individuals who found themselves earning more than the wages of incorporated executives. The Internet is flooded with hundreds of ways to acquire hundreds, if not thousands of dollars every month. There you have Internet marketing, affiliate marketing, online advertising, online shopping, online auctions, and others. In circumstance, there are traditionary profession ventures that switched to Internet-based profession, thus increasing their revenues by several percent more.
It is gigantic to do profession with the Internet. However, along with the expansion of Internet-based businesses as well as the tell of websites sacrifice different online-based services come the expansion of online threats and various disruptions that can convey Internet-based businesses to a stop short. Strong viruses and self-destructing programs are circulating around the Internet, which is not beneficial for individuals and groups who rely on the Internet for their careful search and profession activities.
Fortunately, there are online companies that collect for use safety for Internet users, such as online-based entrepreneurs to house their computer investing invest against the danger and jeopardy of unwanted intrusions by hackers and venom programmers. One of which is the Bellsouth Premium Internet safety, which offers services that eliminates the danger and jeopardy of online threats and unwanted disruptions such as the following:
• Free technical bear up;
• Round the clock (24/7) Internet safety and substantial-duration alerts for any unwanted intruding;
• Automatic software updates;
• Detailed safety statistics and occurrence logs; and
• Convenient billing for services acquired from Bellsouth.
One of their Internet safety packages that is of the people to Bellsouth clients is the Premium Internet safety Suite that includes the following heaven-kissing-side face services:
• The Bellsouth Anti-Spyware Program, which detects and eliminates a broad rank of Spyware and other superfluous tracking software;
• The Bellsouth Anti-venom Software, which clears and protects your computer against worms, viruses, and disadvantageous elements that may corrupt your computer a whole; and
• The Bellsouth Firewall Software, which buckler your computer a whole from unjustified passage-way.
Getting Bellsouth-provided Internet safety services will make secure that your Internet-based profession is protected against different threats that may mischief your computer a whole, causing your online profession to deliberate down or even close up down its agency. The currency that you will part with for these Internet safety services is nothing compared to hundreds or peradventure thousands of dollars wasted because of these online threats pathetic your computer a whole. With Bellsouth Internet safety services, you are certain of a well-rounded profession as well as careful search activities.
Rabu, 15 September 2010
Do you know who use the network?
The essence (common to many individual things and represented by a general term) of reading email while lounging by the loch of messaging, body or earnest while doing the laundry, or lounging in the hot tub listening to your MP3 group is appealing to all of us.
The bigger question at hand is moving up or moving of identity theft. If your act is reticulated or decussated confident, individual plants, on your wireless device is electronically protected. The Latitude meanly symmetry for an act of Amazon could have given your proximity and drain of a council due to a hacker reckless!
Almost every incorporated city in which "WiFi" is for the use of all drivers War "and" war "Chalkers act. Who are these families to walk or push through the city with wireless equipment built-in search of missing protected. The "Chalkers", then they be in their name, marking curbs and other items of integers with no private with chalk so that others can more easily meet with the act and the achievement reticulated or decussated.
Not all drivers of war "are hackers, of course. Many naively wants to use the act uninhibited reticulated or decussated, but the danger is high if you do not learn to defend themselves. You can usually find some 'advice on how rampant to defend the act or saltire cross-linked on the website of the manufacturer of your router, or by a peer in controlling the expression of a brief as a "wireless home confident."
Beyond the substantial pernicious, there are also your neighbors who may meet with the network for the event and take pleasure in poking his nose into your business and the avenue of access to the Internet will act quickly to slow the reticulated or decussated by train.
Many companies use low-priced, feature equipment for their home networks. With security straitened often found on small networks of employment, anyone with a basic perception of the access road can access embedded perceptual and local buyers.
If you are unable to trust the reticulated or decussated act alone, there are companies acknowledge that they do for you. To scrutinize the pages limited fawn or questioning in your collection vicinage should prepare a computer professional help and get your local seized again
Jumat, 10 September 2010
protecting your computer the best way to Kaspersky Internet Security
Internet is one of the most useful tools ever invented. It allows people to communicate at a very fast and very cheap. With the Internet, people have been able to communicate through instant messaging, e-mail and VoIP for free or at a very low price compared to traditional phones.
The Internet has also allowed Airways again to do business. Not only are companies now able to provide better services to their customers, but they can now reach the world and present their products or services and get more potential customers.
With the internet, will now be able to do almost everything right the comfort of your home. You can go buy groceries online, you can buy shirts and pants through websites, and you can even play multiplayer online with your friends without having to leave the comfort of your own home.
The accessibility of the Internet offers so many advantages. It literally connects people anywhere in the world. However, the Internet also has its disadvantages. Since you do business or to purchase items online, you leave your personal and financial information in your computer. You may think that your information is kept safe in your computer's hard drive but you should think again.
There are people who know how to develop programs to access your computer illegally. These people are called hackers. They develop viruses, spyware, adware and other malicious programs just to harass and steal from people using the Internet. Once these programs into your computer, all files in your computer can be accessed by these hackers. They will be able to know everything about your computer and steal your identity they can.
It is a fact that many people have lost a lot of money because of hackers. They did not know where these people have access to their personal and financial information. The computer is a good source, especially if it is always connected to the internet and has no adequate security software to protect against these malicious programs.
You can easily compare to leave the house open with all your credit cards, financial information, and personal information inside. These people can easily enter your home and get all the information and use it to steal money from you.
For this reason, you will need a form of security, especially if you use internet on a regular basis. What you need is a program called Internet Security to be installed on your computer. A program called Kaspersky internet security developer.
The Kaspersky Internet Security is a program widely known and most widely used Internet security in the market today. This is a very popular and effective program that can effectively detect and prevent harmful programs from entering your computer. With this software, you will be able to protect themselves from identity thieves and malicious programs circulating on the Internet.
Here are some of the key benefits and key features of the latest Kaspersky Internet Security software that the computer must have:
• Protection against all Internet threats
• Firewall for extra protection
• updated the virus definition
• effective antivirus software
• Free Technical Support
• Protection against network attacks and system hijacking
• Programmable spam filtering system
• System rollback
• Pop-up Blocker Software
These are some of the things you need to install on your computer and the latest software Kaspersky Internet Security has them all. So next time you are considering installing a program to protect your PC, you should consider Kaspersky Internet Security.
The Internet has also allowed Airways again to do business. Not only are companies now able to provide better services to their customers, but they can now reach the world and present their products or services and get more potential customers.
With the internet, will now be able to do almost everything right the comfort of your home. You can go buy groceries online, you can buy shirts and pants through websites, and you can even play multiplayer online with your friends without having to leave the comfort of your own home.
The accessibility of the Internet offers so many advantages. It literally connects people anywhere in the world. However, the Internet also has its disadvantages. Since you do business or to purchase items online, you leave your personal and financial information in your computer. You may think that your information is kept safe in your computer's hard drive but you should think again.
There are people who know how to develop programs to access your computer illegally. These people are called hackers. They develop viruses, spyware, adware and other malicious programs just to harass and steal from people using the Internet. Once these programs into your computer, all files in your computer can be accessed by these hackers. They will be able to know everything about your computer and steal your identity they can.
It is a fact that many people have lost a lot of money because of hackers. They did not know where these people have access to their personal and financial information. The computer is a good source, especially if it is always connected to the internet and has no adequate security software to protect against these malicious programs.
You can easily compare to leave the house open with all your credit cards, financial information, and personal information inside. These people can easily enter your home and get all the information and use it to steal money from you.
For this reason, you will need a form of security, especially if you use internet on a regular basis. What you need is a program called Internet Security to be installed on your computer. A program called Kaspersky internet security developer.
The Kaspersky Internet Security is a program widely known and most widely used Internet security in the market today. This is a very popular and effective program that can effectively detect and prevent harmful programs from entering your computer. With this software, you will be able to protect themselves from identity thieves and malicious programs circulating on the Internet.
Here are some of the key benefits and key features of the latest Kaspersky Internet Security software that the computer must have:
• Protection against all Internet threats
• Firewall for extra protection
• updated the virus definition
• effective antivirus software
• Free Technical Support
• Protection against network attacks and system hijacking
• Programmable spam filtering system
• System rollback
• Pop-up Blocker Software
These are some of the things you need to install on your computer and the latest software Kaspersky Internet Security has them all. So next time you are considering installing a program to protect your PC, you should consider Kaspersky Internet Security.
Kamis, 09 September 2010
Salam 1 SYAWAL, Kita Gegar Satu Utaghaaaa! - Last Minute Shopping In Penang, Last Minute 1st Theme, Last Minute Tidoraannn-
Salam 1 Syawal...
Akhirnya kita dah jumpa pon SYAWAL untuk tahun Hijrah ni kembali...
*eh eh kenapa perlu CAPS LOCK dan highlight bila arabic words?, lol*
Okay... rindu rumah, rindu kereta, rindu boypren *oops.., eh suka la.. * rindu tok, yang paling penting...
RINDU MAKANAN! ini memang wajib CL lah yer.. konpem konpem la perut maju ke depan.. bole buat drum band untuk skolah sapa - sapa yang ada pancaragam... hahaha..
Raya tahun ni tak se heaven raya tahun sebelum - sebelum ni. Bila umoq makin bertambah, dah rasa macam tak perlu nak beli kasut 1, 2 pasang... Seluar jeans wajib ada ke, blouse or t-shirt ke 3 ,4 pasang.. Hah, dah takdak feeling feeling cam gitu dah ponn okay.
Bila umoq dah bertambah... rasa macam nak yang wajib saja. Tara wajib - wajib pun 2 helai baju raya aku kali ini aku bedai... Satu kurung moden polos putih warnanya, satu lagi cotton printed with glam beaded.. haha.. glam HARUS ada yer.. mahal nak mampoih baju ni, tapi takpa still underbudget yang abah bagi. and sepasang kasut sudah mencukupi, biasa - biasa aja...
Hurmm.. mood raya kali ni pun kureeenggg jer! Sebab on 17th balik, 20th final! Gila! Apa pun tak setadi lagi. *hantuk kepala kat dinding laju2 selama 5 minit, okay joking!*
Seriously, apa pun tak study lagi... Harap - harap raya ketiga bole start study balik and takdak setan ka, iblis ka nak kacau aku study.. ye la kann... baru sat maghrib tadi setans - setans and iblises - iblises dah terlepas dari kena rantai.. heaven la depa lani..nak pi kacau sapa pun tak taw la, yang pasti JANGAN... JANGAN YE... JANGAN KACAU AKU!
Serius aku tak suka.. sapa suka kena kacau kan? Hang suka ka? okay, kalau hang suka, hang adik beradik setans... *oopsss..* tak disengajakan! bhahaha.. okay takpa harini 1 syawal, hari bermaafan. last skali satgi baru nak mintak maap. Hahaha
cerita pasal kuih kat rumah??? Banyak sungguh kuih raya tahun ni mak aku BUAT eh takkkk... mak takkk buat tapi mak suruh pembantu dea kat lain - lain rumah yang buat. hahaha, order main tunjuk tunjuk ke? tak tunjuk dah la ni.. kuih tunjuk dah tak wujud, kuih sms pulak... order pakai sms je pun...
lebih kurang 6 - 7 jenis kuih kat umah aku.. tapi kuih kegemaran aku, TART NENAS dah habisss dah.. Aku dengan shafiq perabihh sambil gelak guling - guling atas lantai sebab tengok video arab kena sepak belakang lehaq.. hahahahaha... lawak - lawak!
sapa nak mai raya, mai hari ni sebab malam raya pertama aku balik kampung..
mak kata ada bbq kat umah tok.. heaven - heaven.. macam mana la aku nak kurus.. ishh.. dah serupa tong! grrr...
Okay tadi last ramadhan, aku pi Queensbay drive pi sana first time nih mak pak aku tak ikut. Ada nida dengan adik jer.. Hahaha, dah capai tahap terrorist la ni sebab da boleh sampai Penang home alone, eh dak la! berteman... p dengan kereta kebanggaan keluarga kami la, Sang kancil. Huahuahua... (^_____^) takpa.. asal sampai sudah.
at least, aku bukan kaki kencing.. mak aku pakai sang kancil sebab kami ni bukan kaya pon! tak dok amsterdamnnnn *lol*, or new zilan kaa.. hoii *nampak bodoh sangat eja lagutu, eh lantak la*
kalau hampa - hampa yang dok amsterdam or new zealand balik kampung, ada keta Merc ke Ferrari ke Porsche ke, Maserati ke *hang taw tak ?? (^___^) mata terkebil - kebil sebab dok perelai.. kah kah kah.. * okay la bole pakai keta lagu tu sebab hampa duk obersi.. aku ni dok kat kampung ja. hahaha.
Okay berbalik kepada cerita p last minute shopping kat Qbay dgn nida, ishh fussy betoi budak ni. agak - agak la dekat 10 - 12 pasang jeans aku cari, hanya satu dea berkenan.. yg lain tu sebab besaq sangat size dea, longgaq dea pakai. haha, guraw darla..
baju dea? fuh mahai dohhh... * APA DOHH DOHH? BODOH KAA? paling tak suka tengok orang cakap doh - doh, aku tak suka, hampa suka tak pa la.. (^___^) yang aku taip tu aku perli...*
Okay nida try dekat 5-6 helai baju FOREVER 21 tu..... aku tak mampu nak beli *LOL*, tengok je la... Tapi budak ni amik 2 helai pun 200++ rupiah.. haha.. plus size pun boleh pi shopping kat sana, cuma - cuma aku nak bagi tips, 1. kena pandai cari dan... bawak kawan pi sana.. tapi jangan bawak kawan yg mata kelabu jenis tongong cakap ini mahal, itu mahal or ini tak cantik sebab dalam kepala hotak dah set negative thinking sebab MAHAL.. ke hapa.. laaa.. dah budak tu ada duit, kalau baju seribu ringgit dea mampu beli, beli je la... kita ni yg sebagai kawan, tengok and bagitaw apa closet malfunction occurs. use your eyes greatly!
bought
bought
left at shop. lol
Salam ramadhan & now selamat hari raya aidilfitri!!!
Kenapa banyak sangat perkataan okay dekat setiap perenggan, cliche! hahaha.. Okay dan sekali lagi okay.. nah, nak upload la gambaq. boring la cerita sana sini, gambaq apa pun tak dak...
tapi...
tapi...
tapi...
Gambaq baju raya tak dak la yer sehingga menyusul gambaq family raya baru aku haplot... skali gambaq aku laki bini.
*okay sekarang perasan dah kawin, kalau mak taw mesti dea penampaq laju - laju ala - ala militan jepun*
Mr Boypren raya kali ni pakai jubah hitam siap HOODED lagi.. fuhh, hensem, i loike! kah kah kah.. mesti nampak perut dea yang ganteng tu.. hahaha.. i guraw je sayang. lalalala
Mak aku? Lagi la glammmmm....!
Baju kurung 2 pasang, kaftan sepasang! huwaaaa.. aku ja yang tak dak kaftan.. oh, dea dapat heels baru, handbag baru.. woww, i zelezzzz! teringin tapi takut over budget, takpa.. nanti boleh beli lagi. hihihihihi...
First time pakai tema - tema ni.. Mula - mula putih, pastu kelabu sebab kesian kalau beli baju melayu warna putih kat abah dah macam budak budak pi sekolah agama., tu yang tukaq pi kelabu, tapi nak kata kelabu pun tak sangat... kelabu cair nak biru - biru sikit. ah lantak la, asal abah hensommm!
last - last jadi theme : PUTIH KELABU.
Meh la nak upload gambaq, boring dah nak berletiaq.. ahh.. rindu cakap Kedah.. Apa habaq orang utaghaaa?
Hoccay, selamat hari raya semua! Maaf zahir & batin... Yang terlebih dan terkurang.. yang masin masam lagi manis..From top to toe, hair to fingernails,right to left, down to top... Enjoy raya anda yerrr!
Cara Mengaktifkan Email Pada BlackBerry

Tidak terasa perkembangan teknologi ponsel saat ini sudah berkembang semakin baik, bila anda sebagai pengguna sudah lama menggunakan teknologi ponsel, pastilah anda merasakan perkembangan tersebut. Mungkin dulu ponsel berfungsi hanya untuk telepon dan sms saja, tapi sekarang sudah banyak sekali fitur yang bisa anda gunakan pada ponsel anda. Apalagi saat ini telah ada yang namanya BlackBerry dan Android, seakan fungsi ponsel semakin sempurna saja, padahal belum tentu anda bisa memaksimalkan fitur yang ada. Nah, pada kesempatan ini saya ingin mencoba untuk memberikan info mengenai cara mengaktifkan email pada BlackBerry anda.
Hal pertama yang harus anda perhatikan :
• Silahkan reset ulang BB anda dengan cara melepas battre, lalu tekan dan tahan 2-5 detik tombol Power_On kemudian dilanjutkan kembali dengan memasukkan battre pada BB anda, tunggu sampai BB on dengan normal kembali.
• Sistem OS BlackBerry anda minimal harus versi 4.5.0 keatas, jika masih pakai OS dibawah 4.5.0 silahkan anda update terlebih dahulu.
• Anda harus memiliki paket providers BIS yang aktif, semua paket bisa.
• Aktifkan/register ulang email pada providers BIS anda, bisa melalui handheld via icon providers BIS atau via internet komputer, dan bila telah sukses providers BIS anda akan membalasnya via SMS ke handheld anda.
Cara Mengaktifkan :
• Pada BlackBerry Anda, silahkan buka folder Pesan
• Klik pesan balasan yg didapat dari providers BIS tadi
• Klik pilihan / options
• Klik pengaturan email / email setting
• Aktifkan Email HTML / enable HTML email = ya / yes
• Akan muncul pilihan download image / Download Images Automatically = ya / yes
• Selanjutnya silahkan setting TCP/APN pada mode "enable"
• Terakhir reset kembali BB anda dengan cara membuka battre.
Semoga ini bisa sedikit membantu anda bagi yang belum mengetahui cara untuk mengaktifkan email pada BB anda, jangan lupa berlangganan artikel blog ini untuk mendapatkan update artikel berikutnya.. Semoga bermanfaat :)
Sabtu, 04 September 2010
How to protect your wireless network
People have more flexile duration thanks to the wireless reticulated or decussated act. With the creation of wireless. People can now act from place of abode while caring for their pl of child or doing housework. No more force, more exchange or sale of commodities. This is the largest?
there's something you should bring to pass. Working from abiding-place while using a wireless topical territory netting (WLAN) may guide to pilfering of sentient intelligence and hacker or venom infiltration unless particular measures are taken. As WLANs fling intelligence more than radio waves, someone with a recipient in your territory may peck up the transferrence, in regular arrangement to entranceway your computer. They could burden viruses on your laptop that can be transferred to the incorporated netting when you get back to operate.
Believe it or not! Up to 75 per cent of WLAN users do not have banner safety features installed, while 20 per cent are left completely free as omission configurations are not protected, but made for users to have their netting up and running the soon as possible. It is recommended that wireless router / entranceway sharp end figure to be always done though a wired dependant.
You can set your security to follow these steps:
1. Change the default administrative password on the router / access point to a password-protected.
2. Enable at least 128-bit WEP is card and access point. Change the WEP keys periodically. If the equipment does not support at least 128-bit WEP encryption, consider replacing it. Although there are problems of WEP, it represents the minimum level of security, and should be activated.
3. Change the default SSID on your router / access point to a name not easily guessed. Configure the computer device to connect to this SSID by default.
4. Setup router / access point does not broadcast the SSID. The same SSID must be configured on the client side manually. This feature may not be available on all equipment.
5. Block anonymous Internet requests or pings. On each computer with wireless network card, network connection properties must be configured to allow connection to access point networks only. Computer to computer (peer to peer) Connection should not be allowed.
Enable MAC filtering. Deny association to wireless network for unspecified MAC addresses. Mac or Physical addresses are available in the configuration of the device for connecting computer network and are physically written on network cards. When adding new wireless cards / computer to the network, their MAC addresses must be registered with the router / access point. Network router should have firewall features enabled and demilitarized zone (DMZ) feature disabled.
All computers should have a fitly configured special firewall in joining to a hardware firewall. You should also update the router / approach sharp end firmware when new versions become available. Identification of the router / approach sharp end away from strangers is also useful so that you can not reset the router / approach sharp end to neglect settings. You can also try to establish router / approach sharp end at the center of the construction rather than near windows to boundary sign coverage outside the construction.
There is no security of without fault or blemish or flaw refuge of your wireless netting, but following these suggested tips can definitely bring the peril of in all senses to attacks aimed at non-confident networks.
there's something you should bring to pass. Working from abiding-place while using a wireless topical territory netting (WLAN) may guide to pilfering of sentient intelligence and hacker or venom infiltration unless particular measures are taken. As WLANs fling intelligence more than radio waves, someone with a recipient in your territory may peck up the transferrence, in regular arrangement to entranceway your computer. They could burden viruses on your laptop that can be transferred to the incorporated netting when you get back to operate.
Believe it or not! Up to 75 per cent of WLAN users do not have banner safety features installed, while 20 per cent are left completely free as omission configurations are not protected, but made for users to have their netting up and running the soon as possible. It is recommended that wireless router / entranceway sharp end figure to be always done though a wired dependant.
You can set your security to follow these steps:
1. Change the default administrative password on the router / access point to a password-protected.
2. Enable at least 128-bit WEP is card and access point. Change the WEP keys periodically. If the equipment does not support at least 128-bit WEP encryption, consider replacing it. Although there are problems of WEP, it represents the minimum level of security, and should be activated.
3. Change the default SSID on your router / access point to a name not easily guessed. Configure the computer device to connect to this SSID by default.
4. Setup router / access point does not broadcast the SSID. The same SSID must be configured on the client side manually. This feature may not be available on all equipment.
5. Block anonymous Internet requests or pings. On each computer with wireless network card, network connection properties must be configured to allow connection to access point networks only. Computer to computer (peer to peer) Connection should not be allowed.
Enable MAC filtering. Deny association to wireless network for unspecified MAC addresses. Mac or Physical addresses are available in the configuration of the device for connecting computer network and are physically written on network cards. When adding new wireless cards / computer to the network, their MAC addresses must be registered with the router / access point. Network router should have firewall features enabled and demilitarized zone (DMZ) feature disabled.
All computers should have a fitly configured special firewall in joining to a hardware firewall. You should also update the router / approach sharp end firmware when new versions become available. Identification of the router / approach sharp end away from strangers is also useful so that you can not reset the router / approach sharp end to neglect settings. You can also try to establish router / approach sharp end at the center of the construction rather than near windows to boundary sign coverage outside the construction.
There is no security of without fault or blemish or flaw refuge of your wireless netting, but following these suggested tips can definitely bring the peril of in all senses to attacks aimed at non-confident networks.