tag:blogger.com,1999:blog-3928124536386636352024-02-29T06:43:29.812+07:00Farel's BlogUnknownnoreply@blogger.comBlogger44125tag:blogger.com,1999:blog-392812453638663635.post-13616343631147125782012-06-26T15:20:00.000+07:002012-06-26T15:20:18.619+07:005 Important applications for Computers and SmartphonesThere are millions of applications used to support day-to-day activities. But sometimes, there is a confusion to choose the right application and find useful.<br />
<br />
Reporting from Techradar, Monday (25/06/2012) This site has collected an average application is considered to be useful every day, either on computer or smartphone. These five applications are:<br />
<br />
<b>1. Picasa</b> (PC and Mac): Picasa is considered as one of the required application.<br />
The software automatically organizes images found on the face in a photo album and to tag photos with a good degree of accuracy.<br />
<br />
Even with a high degree of accuracy, Picasa can correctly identify the faces in the photographs was 30 years old.<br />
<br />
<b>2. Dropbox</b> (PC, Mac, IOS, Android, and BlackBerry): This application is very useful<br />
when you save the file on your home computer while you are out to work. Dropbox is very easy to use to share files that are too large to email, such as music albums.<br />
<br />
But the functionality Dropbox does not end with that function. By installing this software, you can create a folder and fill it with files and folders you want to share.<br />
<br />
The service also has an online synchronization, so you can access it from anywhere with an internet connection.<br />
<br />
<b>3. Chrome applications</b> (PC and Mac): Chrome is not just for browsing, but also<br />
have the store features a full application that is packaged to download add-ons. Google Chrome is very interested in promoting as one of the very program you want to download.<br />
<br />
So you can find games and other productivity applications, such as Listhings. The good news from the app store, most of which are free to use the application.<br />
<br />
<b>4. Evernote</b> (IOS, Android, and WP7): Work that requires daily prduktif<br />
plan and structure. Evernote is a useful part of the software that works like a digital notepad, which not only "capture" of words but also images and sound.<br />
<br />
<b>5. Google Docs</b> in the smartphone (IOS, Android, and WP7): This application is useful when<br />
You are in an important meeting and would like mengibah important documents. Although there are many applications such as Mirosoft Office, but Google Docs is considered easy to use.<br />
<br />
Keep in mind, you should be online if you want to save and synchronize documents. Still, it can open and edit documents that already exist in the offline position. To use this free application, it takes a Google account.Unknownnoreply@blogger.com9tag:blogger.com,1999:blog-392812453638663635.post-47467165268276155612012-06-25T15:17:00.000+07:002012-06-25T15:17:37.810+07:00Game Paling MenyeramkanGame dapat memicu beragam reaksi dari para pemainnya. Merasa bangga ketika berhasil mempertahankan benteng bersama rekan atau mungkin terpacu adrenalinnya ketika balapan dengan kecepatan tinggi. Namun, tak ada yang mampu memancing emosi sehebat game horor.<br />
Pernahkan Anda mengalami bulu kuduk Anda merinding ketika memainkan sebuah game? Atau mungkin merasa ada yang bergerak di belakang Anda? Semua itu dapat terjadi ketika memainkan game horor.<br />
Berikut beberapa game paling mengerikan yang pastinya mampu menantang keberanian Anda.<br />
<br />
<b>1. Resident Evil (1996)</b><br />
Bila Anda berpikir film Resident Evil yang dibintangi Milla Jovovich sudah mengerikan, jangan sampai Anda memainkan game ini. Game yang disebut survival horror ini mampu membuat pemainnya selalu waspada.<br />
Ketika Anda merasa berjalan di lorong yang aman, seekor anjing zombie melompat masuk melalui kaca dan menerkam Anda! Banyak gamer yang mengaku spontan melempar controller PlayStation mereka ketika anjing itu muncul.<br />
<br />
<b>2. F.E.A.R (2005)</b><br />
Pada awalnya game ini terlihat seperti game action shooter biasa. Musuh muncul dan peluru beterbangan. Namun, secara tidak disangka terlihat bayangan berkelebat melewati lorong di depan Anda.<br />
Ketika Anda tiba di sana, ternyata tidak ada siapapun. Ketika Anda menengok ke belakang, seorang anak perempuan berlumuran darah menerkam Anda! Inilah horor psikologis yang dimiliki game ini. Sepanjang permainan Anda akan terus dihantui oleh ”penampakan” yang mencekam.<br />
<br />
<b>3. Silent Hill (1999)</b><br />
Film Silent Hill yang pernah digarap oleh Hoywood tidak bisa dibandingkan mengerikannya game ini. Ketika Anda berada di tengah kota mati yang diliputi kabut tebal dan satu-satunya pertanda ada musuh di dekat Anda adalah suara distorsi radio, apakah Anda akan tenang? Terus terang, suara itu justru membuat keadaan semakin mencekam! Belum lagi ditambah dengan suara sirene yang mengubah kota menjadi penuh darah!<br />
<br />
<b>4. Fatal Frame II: Crimson Butterfly (2003)</b><br />
Bayangkan diri Anda berada di desa terpencil yang tidak tersentuh teknologi. Tidak ada kendaraan, jalanan aspal, bahkan listrik. Kemudian, desa tersebut terkena kutukan yang membuat arwah gentayangan. Itulah yang terjadi di Fatal Frame II. <br />
<br />
Anda akan melewati malam penuh kengerian melalui mata seorang gadis kecil bernama Mio. Ia tidak bisa membunuh hantu dengan menggunakan senjata apapun kecuali sebuah kamera tua. Ya, kamera tua. Mio harus memotret hantu untuk mengusirnya. Terdengar lucu? Anda tidak akan berpikir begitu bila memainkannya langsung.<br />
<br />
<b>5. Amnesia: The Dark Descent (2010)</b><br />
Menurut <a href="http://van-tech.blogspot.com/">Farel's</a>, inilah game yang paling mengerikan. Game horor diatas semuanya memiliki satu kesamaan – musuhnya dapat diserang dengan senjata. Akan tetapi, tidak demikian dengan Amnesia. Game ini tidak memberikan Anda satu senjata pun untuk mempertahankan diri! Anda hanya memiliki satu lentera yang menerangi daerah sekitar saja. Lebih mengerikannya lagi, Anda selalu dikejar oleh sesuatu yang haus darah. <br />
<br />
Kegelapan, ketidakberdayaan, teror, dan suara yang mencekam akan terus mengikuti perjalanan Anda. Banyak gamer yang menyerah di tengah jalan ketika memainkannya akibat tidak tahan dengan kengerian yang terus mencekam.Unknownnoreply@blogger.com221tag:blogger.com,1999:blog-392812453638663635.post-33434531873076496362012-06-24T10:21:00.001+07:002012-06-24T10:21:38.791+07:00Beda Layar LCD dan AMOLED di PonselDengan semakin meluasnya penggunaan layar sentuh berukuran besar sebagai perangkat input utama pada perangkat mobile, kualitas tampilan pun menjadi makin penting karena menentukan kenyamanan pengguna dalam memakai gadget yang bersangkutan.<br />
<br />
Berbagai istilah seperti AMOLED, IPS, dan Retina display digunakan sebagai embel-embel teknologi layar perangkat tertentu untuk menarik pembeli. <br />
<br />
Namun, secara umum terdapat 2 jenis layar utama yang dipakai pada kebanyakan perangkat mobile, yaitu LCD dan AMOLED. <br />
<br />
<b>LCD</b><br />
LCD atau Liquid Crystal Display telah digunakan sebagai layar berbagai macam perangkat selama berpuluh-puluh tahun, mulai dari monitor komputer, layar smartphone, sampai jam tangan.<br />
<br />
Sesuai namanya, layar LCD menggunakan medium kristal cair yang diselipkan diantara beberapa panel kaca atau material transparan lain. <br />
<br />
Ketika dilihat dari jarak sangat dekat, tampak unit-unit pixel berwarna merah, hijau, dan biru yang menyusun tampilan gambar pada layar LCD.<br />
<br />
Beberapa layar LCD menggunakan teknologi In-Plane Switching atau IPS untuk meningkatkan kualitas reproduksi warna dan sudut pandang optimal yang lebih luas. Layar "Retina Display" milik iPhone 4/4s misalnya, adalah layar LCD dengan teknologi IPS yang memiliki resolusi tinggi.<br />
<br />
Layar LCD mampu mereproduksi warna dengan sangat realistik, tetapi memerlukan lampu penerang tambahan (backlight) karena tidak menghasilkan cahaya sendiri.<br />
<br />
Beberapa perangkat populer yang menggunakan layar LCD: iPhone 4/4s, iPad, dan HTC One X<br />
<br />
<b>AMOLED</b><br />
Teknologi layar AMOLED atau Active Matrix Organic Light Emitting Diode sebenarnya juga sudah ada sejak lama, sejarahnya membentang hingga ke dekade 50-an.<br />
<br />
Belakangan, layar tipe ini ramai diterapkan di perangkat-perangkat gadget karena memiliki beberapa kelebihan dibanding LCD seperti tidak memerlukan lampu backlight dan memiliki tingkat kontras yang lebih tinggi.<br />
AMOLED terbuat dari lapisan polimer organik tipis yang menyala ketika dialiri listrik. Karena konstruksinya yang sederhana, layar AMOLED bisa dibuat sangat tipis. <br />
<br />
Kebanyakan layar AMOLED memiliki struktur pixel yang disebut "pentile display", di mana dua sub-pixel merah dan biru berukuran lebih besar dan ditempatkan diantara dua sub-pixel berwarna hijau yang berukuran normal. Dengan kemikian, susunan pixel-nya menjadi' Red-Green-Blue-Green (RGBG), bukan Red-Green-Blue seperti pada LCD.<br />
<br />
Keuntungan dari "pentile display" adalah sebuah layar AMOLED bisa dibuat seterang layar konvensional dengan hanya sepertiga jumlah sub-pixel yang biasanya diperlukan. <br />
<br />
Kekurangannya, dikarenakan oleh ukuran sub-pixel merah dan biru yang lebih besar, layar jadi terlihat "grainy" atau tampak seperti memiliki resolusi rendah, walau sebenarnya tidak demikian.<br />
<br />
Layar AMOLED biasanya sulit dilihat di bawah pancaran cahaya matahari langsung, tetapi teknologi Super AMOLED Plus dari Samsung yang tidak menggunakan "pentile display" telah memberi peningkatan dalam hal ini. <br />
<br />
Beberapa perangkat-perangkat populer yang menggunakan layar AMOLED: Samsung Galaxy S series, Nokia Lumia 900, and HTC One S.<br />
<br />
Keputusan di Tangan Anda<br />
Baik LCD maupun AMOLED memiliki kelebihan dan kelemahan masing-masing. Saat ini, kedua jenis layar sudah mampu menghasilkan tampilan berkualitas sangat tinggi. Kualitas tampilan pun bervariasi antar produk dan merk, walaupun menggunakan jenis layar yang sama.<br />
<br />
Satu-satunya cara untuk menentukan jenis layar mana yang sesuai dengan selera adalah dengan memegang perangkat dan melihat sendiri tampilan layarnya. <br />
<br />
Anda akan dengan mudah mengetahui layar mana yang memberikan viewing angle, kontras, dan reproduksi warna yang paling cocok untuk kebutuhan setelah memakai perangkat yang bersangkutan selama beberapa menit.Unknownnoreply@blogger.com2tag:blogger.com,1999:blog-392812453638663635.post-85335946471142202302012-06-23T20:34:00.000+07:002012-06-23T20:34:47.091+07:00Facebook Bidik Gamer Kelas BeratGamer yang biasa memainkan Diablo III, World of Warcraft atau sejenisnya memang tidak dapat terpuaskan dengan game yang selama ini ditawarkan Facebook. Melihat hal ini, facebook siap berbenah dengan menghadirkan game yang lebih berkualitas dan menantang.<br />
<br />
Selama ini Facebook memang hanya menawarkan puluhan game kasual, sebut saja Mafia Wars, Poker, Angry Birds, FarmVille dan sejenisnya. Jumlah pengguna yang memainkan game tersebut memang sudah menyentuh angka jutaan, namun sayangnya sebagian besar bukanlah gamer yang suka memainkan game kelas berat.<br />
<br />
Game kelas berat yang dimaksud adalah, game yang hadir dengan kualitas grafis memukau, alur cerita yang sedikit rumit namun menarik, serta mampu menghadirkan permainan yang menantang. Nah, Facebook pun kabarnya segera menghadirkan game seperti itu.<br />
<br />
Untuk menciptakan game tersebut, jejaring social tersebut telah bekerjasama dengan Wooga dan Kixeye, perusahaan yang diklaim mampu menghadirkan game sekelas Diablo III atau World of Warcraft dalam platform Facebook.<br />
<br />
"Tim ini (Wooga dan Kixeye) akan fokus mengembangkan game hardcore, game yang benar-benar berkualitas sehingga bisa mendorong intensitas bermain yang luar biasa," kata Matt Wyndowe, Games Product Manager Facebook, seperti dikutip dari Game Industry, Sabtu (23/6/2012). <br />
<br />
Selain itu Wyndowe juga menginformasikan bahwa nantinya akan lebih banyak game jenis Massively Multiplayer Online (MMO) dengan kualitas terbaik di dalam Facebook. Tentunya dengan tambahan elemen sosial ala situs jejaring sosial tersebut.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-392812453638663635.post-11218196788078530972012-06-22T12:50:00.001+07:002012-06-22T13:12:58.007+07:00Xperia P, Xperia U, dan Xperia Sola kini Hadir di IndonesiaUntuk melakukan rebranding dan terlepas dari bayang-bayang Ericsson, Sony semakin gencar menghadirkan smartphone Android di Indonesia. Sampai dengan Juni tahun ini, setidaknya telah ada empat smartphone Android yang telah masuk ke Indonesia.<br />
<br />
Tiga diantaranya adalah Xperia P, Xperia U, dan Xperia Sola yang telah resmi diluncurkan pada Kamis (21/6/2012) kemarin. Sebelumnya, Sony telah meluncurkan Xperia S pada bulan April lalu.<br />
<br />
Menurut Hanny Sanjaya , Manager Pemasaran Komunikasi Sony Mobile Communications Indonesia, Indonesia termasuk salah satu negara yang menjadi prioritas Sony. "Langkah ini sekaligus mengedukasi masyarakat tentang smartphone Sony," tambahnya.<br />
<br />
Sony menjual Xperia P dengan harga Rp 4.299.000, Xperia U Rp 2.749.000 dan Xperia Sola Rp 3.199.000.<br />
<br />
Berikut spesifikasi dari ketiga smartphone terbaru dari Sony tersebut.<br />
<br />
Sony Xperia P<br />
<br />
- Prosesor dual core STE U8500 1GHz<br />
- RAM 1GB<br />
- Sistem operasi Android 2.3 Gingerbread (dapat upgrade Android 4.0)<br />
- Memori internal 16GB<br />
- Layar 4 inci beresolusi 540 x 960 pixel<br />
- Kamera 8MP dengan LED flash, kamera depan VGA<br />
- Baterai 1305mAh<br />
- Konektivitas GSM, 3G HSPA, jack audio 3,5mm, MicroHDMI, MicroUSB, GPS, Wi-Fi, Bluetooth, NFC Support, DLNA<br />
- Pilihan warna merah, silver, dan hitam<br />
- Dimensi 122x59.5x10.5mm<br />
- Harga Rp 4.299.000<br />
<br />
Sony Xperia U<br />
<br />
- Prosesor dual core STE U8500 1GHz<br />
- RAM 512MB<br />
- Sistem operasi Android 2.3 Gingerbread (dapat upgrade Android 4.0)<br />
- Layar 3.5 inci beresolusi 854x480 pixel<br />
- Memori internal 8GB<br />
- Kamera 5MP dengan LED flash, kamera depan VGA<br />
- Baterai 1290mAh<br />
- Konektivitas GSM, 3G HSPA, jack audio 3,5mm, MicroUSB, GPS, Wi-Fi, Bluetooth, DLNA<br />
- Pilihan warna hitam dan putih<br />
- Dimensi 122x54x12mm<br />
- Harga Rp 2.749.000<br />
<br />
Sony Xperia Sola<br />
<br />
- Prosesor dual core STE U8500 1GHz<br />
- RAM 512MB<br />
- Sistem operasi Android 2.3 Gingerbread (dapat upgrade Android 4.0)<br />
- Layar 3.7 inci beresolusi 480x854 pixel<br />
- Memori internal 8GB<br />
- Kamera 5MP dengan LED flash, tidak ada kamera depan<br />
- Baterai 1320 mAh<br />
- Konektivitas GSM, 3G HSPA, jack audio 3,5mm, MicroHDMI, MicroUSB, GPS, Wi-Fi, Bluetooth, NFC Support, DLNA<br />
- Pilihan warna hitam, putih dan merah<br />
- Dimensi 116x59x9.9mm<br />
- Harga Rp 3.199.000.Unknownnoreply@blogger.com2tag:blogger.com,1999:blog-392812453638663635.post-13274736941115035012012-06-22T06:39:00.000+07:002012-06-22T06:39:27.229+07:00Windows Phone 7.8 Comes with a New DesignWindows Phone 8 may not be present in handheld devices Windows Phone (WP) that exist today. But WP handheld devices available today, will get some new features.<br />
<br />
Given the name of WP 7.8, the hardware will have to adopt the initial screen (Start Screen) as found in WP 8. Users will be able to access a variety of things through Live Tiles.<br />
<br />
TechRadar proclaimed on Thursday (6/21/2012), this version utilizes the entire width of the screen. So, there would be no arrow indicating the direction to open more applications.<br />
<br />
With more space, users can put more tiles. Current can be made in three different sizes. There is also a small-sized tiles to place a variety of applications.<br />
<br />
Smaller tiles are useful for applications that do not contain too much important information. Just as those found in standard tile sizes, each application can have an extra large tiles to load more details.<br />
<br />
Unfortunately, there is still no information about when WP7.8 was released. But now, Microsoft is reportedly in discussions with operators and vendors handheld device, about the planned trials of this technology.Unknownnoreply@blogger.com6tag:blogger.com,1999:blog-392812453638663635.post-32202877910734953302012-04-22T21:58:00.000+07:002012-04-22T21:58:35.520+07:00"Developer" Indonesia Welcomes NASA ChallengeU.S. space agency, NASA, officially opened the International Space Apps Challenge competition in Indonesia.<br />
<br />
With this, NASA challenged the application developer (developer) Indonesia to create an application that has to do with outer space.<br />
<br />
The event was opened by the Deputy Ambassador to the U.S. Embassy to Indonesia, Ted Osius, in america @ Pacific Place Mall Jakarta, Saturday (04/21/2012). The hope, the application that created NASA and later may help scientists solve global problems.<br />
<br />
Although applications from Indonesia related to outer space is relatively rare, but NASA believes Indonesia developer can create useful applications.<br />
<br />
"I see the technology community in Jakarta is quite strong, especially when the company is rapidly emerging application developers," said Ali Llewellyn, Open Governent Kompas.com Analyst in an interview with NASA.<br />
<br />
There are about 30 application developers who join the competition. Began Saturday afternoon until Sunday (21 and 22 April), they will compile the code (coding) for applications in the office DailySocial technology blog, West Jakarta.<br />
<br />
The developers claim, will make an application for computer equipment, mobile or web-based.<br />
<br />
They will present an application made before the jury. U.S. Embassy to Indonesia and DailySocial as the organizer, would provide an opportunity for developers to revise their applications in order to really be ready to use.<br />
<br />
According to Erna Sri Adiningsih, The Center for Aerospace Information Studies and Institute of Aeronautics and Space Agency (LAPAN), this event will add to the network LAPAN of outer space activities conducted younger generation.<br />
<br />
"As long as it still relies on software LAPAN from abroad for the development of space science. Who knows with this show will show up the young seedlings are interested in developing software space," please Erna.Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-392812453638663635.post-38444541671339490492012-04-09T16:46:00.002+07:002012-04-09T16:46:50.343+07:00The Future of Cloud Computing in Mobile phonesMobile data access via smartphones grew rapidly in Indonesia. The condition is believed to be new business opportunities for the development of value added services (VAS) in mobile phone technology by relying on cloud computing.<br />
<br />
This was stated by Indonesian initiator Cloud Forum (ICF) True Prasetya. Of various statistics put forward by a number of research bodies, potential cloud on the mobile device will grow large.<br />
<br />
"Mobile cloud should be adopted to develop the VAS in the future. Therefore, access to internet, particularly social media via mobile devices is huge," he told detikINET, Monday (04/09/2012).<br />
<br />
Citing research firm Gartner said in 2015 that later connections in the world of mobile data services is expected to grow to 7.4 billion stable connection with a revenue of USD 552 billion.<br />
<br />
Gartner also predicted that by 2014 there will be more than 70 billion mobile application download from the app store (app store) every year.<br />
<br />
Other institutions, Informa Telecoms & Media said the value of data services and VAS in the world is predicted to reach USD 340 billion.<br />
<br />
"Indonesia is one of 15 states that encourage pertumubuhan and VAS data services in the world by 36% until 2014," he said.<br />
<br />
While Frost & Sullivan revealed in 2011 and there are 67 million mobile users who connect to the data, and could be 167 million in 2016 in Indonesia.<br />
<br />
A total of 109 million is projected will be connected using a smartphone, while 22 million use the tablet.<br />
<br />
In 2011, the data connection is initiated by a 3G-based mobile phone by 15% to 20%, and will increase to 25% to 30% in 2012. 2.5 G mobile phone market is still dominated by 62%, while 2G phones continue to show a decline.<br />
<br />
In 2015 Frost & Sullivan predicted by the value of digital content businesses reach USD 780 million while the ecosystem enabler of about USD 378 million.<br />
<br />
True to explain, the condition was an opportunity for the development of Mobile VAS that had been mistakenly considered to Premium SMS.<br />
<br />
"VAS in the era of data instead of SMS Premium. However, developing a VAS in the era of data that there are some obstacles," he explained.<br />
<br />
The obstacles are varied operating platform owned devices, memory and storage limitations of the device, and a wide variety of display device capabilities, the ability to support mobile browser, type the availability to connect to the server, and the target market of VAS applications or content.<br />
<br />
He suggested, in order to overcome these obstacles mobile cloud should be adopted to develop the VAS in the future.<br />
<br />
Mobile Apps cloud is believed to give Native Client on the Device, web-based applications access through the device, and faster Internet access via mobile.<br />
<br />
According to him, cloud mobile technology can simplify all of the data from mobile devices to be transferred to the cloud. Next, make sure the same platform, and integrate with the internet and social media to increase market acceptance.<br />
<br />
"If it easier to run mobile cloud service and content developers in making VAS products. Whether it's platform, content, and infrastructure. Development VAS will also be faster, cheaper, and the edges are more productive because of increased turnover," he said.<br />
<br />
On the end user, the mobile cloud existing practice when referring to Facebook, Dropbox, and others. However, for the platform does not exist because operators have not moved to open Application Programming Interface (API).<br />
<br />
"Because it's open API to open access to the back office operator sepertibilling, subs authentication, charging, customer care, and more. Operators still fear security problems security and fraud management," he concluded.Unknownnoreply@blogger.com4tag:blogger.com,1999:blog-392812453638663635.post-8351524878743875932012-04-07T18:55:00.000+07:002012-04-07T18:55:53.191+07:00Android Threatened by New MalwareSecurity researchers have discovered a <a href="http://van-tech.blogspot.com/2011/12/dorkbotbx-and-characteristics-of.html">new malware</a> that threatens the <a href="http://van-tech.blogspot.com/2012/03/optimizing-your-android-tablet.html">Android</a> operating system. This malware allows hackers to install software without having to seek approval from the user.<br />
<br />
According to the Principal Engineer and Mobile Security Specialists Lookout Tim Wyatt, new malware is called Legacy Native or known Lena. He also explained the current Lena attacked only a few users.<br />
<br />
"Lena was originally entered disguised as legitimate applications and trying to trick the user to activate the payload. The trick is to take advantage of the Super User feature in the Android operating system that has been rooted, "he explained.<br />
<br />
Proclaimed Computing, Friday (04/06/2012) malware threats can only be avoided by very advanced users. However, his new variety known as "gingerbreak", allowing root access on devices that adopt Android Gingerbread and Honeycomb, so it does not depend on the mobility of users.<br />
<br />
The good news is, malware that has not appeared in Google's Android Market or Play. So, this is different from previous malware infection like DroidDream. On the other hand, this malware can attack the device when users download applications outside the Android Market or google Play.<br />
<br />
Wyatt gives some tips on prevention, so that <a href="http://van-tech.blogspot.com/2012/03/optimizing-your-android-tablet.html">Android</a> users stay safe:<br />
<br />
A. Always be alert to things that are not reasonable, such as telephone bills, SMS, network activation or activity applications that run when the device is locked.<br />
<br />
2. Always check the permissions to request an application<br />
<br />
3. Just download the application via a trusted source such as Google's Android Market or Play<br />
<br />
4. Download security software for your device, to detect any application that is downloaded in order to stay safe.<br />
<br />
<br />
<br />
source : techno.okezone.comUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-392812453638663635.post-76620137593227572192012-04-04T16:40:00.000+07:002012-04-04T16:40:57.425+07:005 World's Most Expensive GadgetsMany gadgets are made luxury version with exorbitant prices. Hardly makes sense that only the wealthy who could afford to have it.<br />
<br />
Most of these fancy gadgets are designed by the designers. He was covered with jewels or rare items that make it so exclusive and exceptional high-priced.<br />
<br />
Here are 5 gadgets that get the most expensive category in the world, as quoted from Industry Leaders Magazine:<br />
<b><br />
Chopard hours - USD 25 Million</b><br />
Hard to believe, at the name of the 201-carat Chopard on sale-$ 25 million or in the range of Rp 229 billion. No doubt, this is the hour at the most expensive in the world.<br />
<br />
What makes the exorbitant price of diamond jewelry is so much embedded as a decoration at this hour. On it there are three rather large diamond-shaped heart. And around the body is still a lot of smaller diamonds.<br />
<b><br />
iPad 2-Gold History - USD 8.1 Million</b><br />
Designed by British designer, Stuart Hughes, iPad 2 is clearly not the same as regular appearances with iPad 2 sold in the market. The price alone reached $ 8.1 million or in the range of USD 74 billion.<br />
<br />
The back of the iPad 2 is coated with 24 carat gold weighing 2 pounds. Then the front frame made of Ammolite, 75 million year old rocks. To make it more exclusive, a bone Tyranosaurus Rex 65 million years old are also embedded in the stone. Coupled with a 8.5 carat diamond attach in the home.<br />
<br />
<b>Diamond Rose iPhone4 - USD 8 Million</b><br />
4 that the iPhone is sold at a price of USD 8 million or around Rp 71 billion. Again the designer is Stuart Hughes who is specialized in designing gadget looks very luxurious.<br />
<br />
Phone 4 is sprinkled with more than 500 grains of diamond. Then there are two rather large diamond in the home, both are worth USD 6.4 million. While the Apple logo on the back of the phone is decorated with a 53 point diamond.<br />
<br />
<b>PrestigeHD Supreme Rose-USD 2.3 Million</b><br />
PrestigeHD Supreme Rose Edition is a high definition television at a price out of the ordinary. With a tag of USD 2.3 million or in the range of USD 21 billion, only the very wealthy who can afford or intend to have it.<br />
<br />
Television is also designed Stuart Hughes is the outer frame is made with 28 kilograms of gold. There is also coated with diamond. While the frame is made with alligator leather.<br />
<br />
<b>Laptop Luvaglio $ 1 Million</b><br />
This Luvaglio laptop portable computer seems to be the most expensive in the world today. It costs about $ 1 million or if dirupiahkan equivalent to Rp 9 billion.<br />
<br />
Laptop made this British company has a 17 inch wide screen. Specification is actually normal, not quite stand out compared to middle-class laptop sold today. Which makes it expensive is the laptop is made by hand and decorated with rare diamonds in the body.<br />
<br />
<br />
source : inet.detik.comUnknownnoreply@blogger.com1tag:blogger.com,1999:blog-392812453638663635.post-17457254985027967292012-03-12T20:41:00.001+07:002012-03-13T21:53:46.480+07:00Optimizing Your Android TabletIn the midst of modern society are versatile and practical, as now, the need for the world of telecommunications is vital, especially those accustomed to the mobile life.<br />
<br />
Now, they are no longer looking for a phone that is only able to play songs. Smartphone, Tablet to the much sought after to be able to support their daily activities. Ranging from social media features, push mail, to devices that support the Office software (Word, Excel, Power Point, etc.).<br />
<br />
Given the growing reality of now, presence-based Tablet with Android operating system is becoming a trend and booming.<br />
<br />
If you belong to one Android users who still do not recognize your Android Tablet in depth, it's worth listening tips that we present below, so you can optimize existing features.<br />
<br />
<b><br />
1. Android Market</b><br />
If we use the Android-based Tablet, we will be pampered with the many free applications available on Android Market.<br />
<br />
But we need an email from Google to be able to access it. If you do not have, you can sign up through gmail account. The manufacturing process is quite easy: you just fill in some of the requested information personal data and account name and its password.<br />
<br />
Alternatively, a special Samsung smartphones and tablets, are available a variety of applications to optimize your tablet at the Samsung Apps. Visit http://www.samsung.com/id/samsung-apps/index.do for the application of your choice.<br />
<br />
<b>2. We subscribe to the Internet</b><br />
Once connected to a Google server, your tablet will continue to use the data to update a variety of applications including push mail and social media. And of course, it will drain you faster pulse. The solution, you can subscribe to packages provided by internet service provider. Carriers usually give preference based on time (daily / weekly / monthly) and the amount of data.<br />
<br />
<b>3. Using Application Cleaner</b><br />
Applications can be cleaner alternatives to maximize the performance of your Android. Because the application is automatically cleaner capable of removing all the cache and history at a certain time interval, also delete all the records search and browser history navigation.<br />
<br />
Cleaning the cache will help improve the performance of your Android tablet. In addition, the battery life also becomes longer. Application examples Cleaner you can download the 1Tap Cleaner, and Cache Cleaner App. Both can be obtained for free on Android Market.<br />
<br />
<b>4. Securing Mobile Phone</b><br />
Tablet Android certainly has a touch screen, making it risky if you do not lock your tablet. The solution, you can use the screen lock function by making a gesture (patterns) specific, or can also write down a password to protect it.<br />
<br />
You can find this feature in the settings, submenus, location, and security. After that, select set the screen lock. You can specify your own type of security that will be used. If this protection feature is still not, you can download other similar applications from the Android Market.<br />
<br />
<b>5. Underclock feature</b><br />
Complaints as a wasteful use of battery frequently voiced Android users. To reduce this effect, you can try the underclock feature which can be accessed directly from the menu. Its function is to lower the processor speed of your Android. If earlier you are in the Android Processor 1GHz speed, after at-will underclock to 800 Mhz. No need to worry about Android tablet drastically reduced performance, because when you're not running heavy applications, this one features a perfect solution to conserve battery use.<br />
<br />
It's Time to Tab<br />
As one of the Tablet Android market leader, Samsung proves its existence in the tablet computer with access to all segments of the existing tablets. Ranging from sailing 7-inch tablet, 10.1 inches, up to 8.9 inches.<br />
<br />
Not strange indeed if the tablet PC Samsung is the best selling tablet computers in Indonesia. Android OS plus a charming form yangdigunakannya make a lot of people chasing him.<br />
<br />
It's time to Tab! Please visit www.samsung.com / id or via mobile phone in m.samsung.com / id. Also get the latest info from the family of Samsung Galaxy Tab in http://www.facebook.com/SamsungMobileIndonesia community.<br />
<br />
<br />
source : lipsus.kompas.comUnknownnoreply@blogger.com6tag:blogger.com,1999:blog-392812453638663635.post-75405287764829875412012-03-10T10:07:00.000+07:002012-03-10T10:07:21.924+07:00Corsair Vengeance K90, Real Keyboard For Real GamersOutside the industry memory, Corsair seems more serious work on the gamer. Call it a Vengeance K90 keyboard designed specifically for MMORPG gamers.<br />
<br />
No doubt if many players require special software to play. For example, a mouse with a special sensitivity rate, or keyboard that has some special buttons to various functions.<br />
<br />
Well, that's what makes computer accessories vendor in droves to spend their flagship product. One Corsair, which had previously been successfully spawned a variant of the memory, power supply, and audio devices for gamers.<br />
<br />
<b>Sturdy and Attractive Design</b><br />
<br />
The first impression of this product is its shape look stunning. Large, eccentric color, and lots of foreign keys that makes me curious to try.<br />
<br />
In addition it also turns the keyboard feels heavy when held. It is felt when the keyboard is removed from the packaging which is also great.<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEvYmzFX-d9ZVltuZs1QqQ6OAuRm8O_PZRn4rowAdzGsPqcy1N5vQLgTrw9zVrYXCqOdbvpPplkqd97xCq2wTNH_E7fOU9pa38pm3mOmFMAzW1rRJSDco2keiV4OsBTgkjrYMhJrtDC6zL/s1600/pic+a.jpg" imageanchor="1" style=""><img border="0" height="175" width="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEvYmzFX-d9ZVltuZs1QqQ6OAuRm8O_PZRn4rowAdzGsPqcy1N5vQLgTrw9zVrYXCqOdbvpPplkqd97xCq2wTNH_E7fOU9pa38pm3mOmFMAzW1rRJSDco2keiV4OsBTgkjrYMhJrtDC6zL/s320/pic+a.jpg" /></a></div><br />
As noted, it turns out almost all the top Corsair K90 coated aluminum. Apparently this is what makes this product feels heavy but seem sturdy and look cool.<br />
<br />
But that's just on the top only. At bottom, this product sepereti keyboard in general, is made of black plastic material with 'legs' to make it higher.<br />
<br />
Other enhancements are included in the sales package is a buffer wrist. For linking, the user need only rotate the screw is there on both sides. Quite easily and make the keyboard more comfortable to use.<br />
<br />
This keyboard looks even more attractive when used in indoor low light, such as gamers play in a room without a beacon.<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhptzOM8abvL86CTXxlS_jLpFPbXjL2zTwmh2Wf57f5e5t_V3g5hg1RA-rrHDE29tkh7h_aOlOnQrA4f62gmmaptCe-zAWAsEEJb-MMej1FXCLQz_CVHR6TPbsgIEi_7V3-_Bc0OlinE41z/s1600/pic+b.jpg" imageanchor="1" style=""><img border="0" height="213" width="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhptzOM8abvL86CTXxlS_jLpFPbXjL2zTwmh2Wf57f5e5t_V3g5hg1RA-rrHDE29tkh7h_aOlOnQrA4f62gmmaptCe-zAWAsEEJb-MMej1FXCLQz_CVHR6TPbsgIEi_7V3-_Bc0OlinE41z/s320/pic+b.jpg" /></a></div><br />
The light blue colored backlit keyboard looks adorn almost all the keys. Brightness level can be adjusted up to 3 levels through the buttons provided.<br />
<br />
<b>Suitable For MMORG Game Lovers</b><br />
<br />
But outside the looks are attractive, Corsair Vengeance K90 plus it has a functional value, especially for gamers lovers of massively multiplayer online game role-playing game (MMORPG).<br />
<br />
Yes, if viewed from the features offered Vengeance K90 seemed appropriate to play the kind of game. This can be seen with the addition of 18 dedicated buttons on the left.<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgp5NWI5GIGPIv2Y5L317HKWSqzWL4UYazEiaicO8Mx-xk1_PuBjyoMjZ5JrXRu5IIVbi8Ft40t9bNZ14vsOg0H-4XC640NRaI0e1eYsNy2Vjd_NEkrFLnkbaouTw-kmBjsmXUFyaQ3QSM_/s1600/pic+c.jpg" imageanchor="1" style=""><img border="0" height="290" width="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgp5NWI5GIGPIv2Y5L317HKWSqzWL4UYazEiaicO8Mx-xk1_PuBjyoMjZ5JrXRu5IIVbi8Ft40t9bNZ14vsOg0H-4XC640NRaI0e1eYsNy2Vjd_NEkrFLnkbaouTw-kmBjsmXUFyaQ3QSM_/s320/pic+c.jpg" /></a></div><br />
Function of 198 keys can be changed in accordance with the wishes of users, for example, for some key combinations are often used in MMORPG games.<br />
<br />
In total there are 54 functions that can be embedded and stored in memory that already exists on this keyboard. Yes, Vengeance K90 does have onboard memory for this requirement.<br />
<br />
In addition to the row of buttons, Vengeance K90 also has some additional buttons that, for the backlit lights are on the right. In total there are 3 levels of brightness that can be used.<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpybqpfZyshQRgiRN219p5Jp5E3q9g03gNLciy9Q03mYVCCTr6fmn0zsSPkIbD-mmlh0aIkYy1r2mRQUxOE9xVUG1XJB5m6Pjz_51gCW6Xp4ekIqxq6niHeLeWLGXeLpGyjBK4uvWnfk3j/s1600/pic+d.jpg" imageanchor="1" style=""><img border="0" height="244" width="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpybqpfZyshQRgiRN219p5Jp5E3q9g03gNLciy9Q03mYVCCTr6fmn0zsSPkIbD-mmlh0aIkYy1r2mRQUxOE9xVUG1XJB5m6Pjz_51gCW6Xp4ekIqxq6niHeLeWLGXeLpGyjBK4uvWnfk3j/s320/pic+d.jpg" /></a></div><br />
Then the 'lock' to lock all buttons, then there scroling dio side bar to adjust the volume and several other commonly used keys for music player.<br />
<br />
Well, with an attractive design and appearance of an eccentric, no doubt again if the product is capable of memcuri attention of gamers.<br />
<br />
Features that offer equally great, a row of buttons provided enough help when gamers are being fought in cyberspace. Unfortunately all keyboard functions can not be directly used.<br />
<br />
In the sales package, Corsair does not include installation CD. So users must download some additional software on the sites listed in the manual Corsair K90.<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_3mG8kJl9e70uRfkHua6KhIta5FA69wsjTxxI9Z8NcS9F24fnA-QN6ZJgQ5NVEUYFbkWVygUSu3My52pXEzXIGFlTcDACzxNIHgkTcpYjhs3170Gj88zLe-WzkiUAIg7xRazBn3Ujz1a7/s1600/pic+e.jpg" imageanchor="1" style=""><img border="0" height="238" width="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_3mG8kJl9e70uRfkHua6KhIta5FA69wsjTxxI9Z8NcS9F24fnA-QN6ZJgQ5NVEUYFbkWVygUSu3My52pXEzXIGFlTcDACzxNIHgkTcpYjhs3170Gj88zLe-WzkiUAIg7xRazBn3Ujz1a7/s320/pic+e.jpg" /></a></div><br />
In addition, although it was soft but almost all the keys on the Corsair K90 quite noisy when in use. Interested? Gamers who want to have these products should make up for it with a range of Rp 1,225,000.<br />
<br />
<b>Pros:</b><br />
+ Cool design<br />
+ Many of the features<br />
<br />
<b>Disadvantages:</b><br />
- Does not include software<br />
- Some of the noisy<br />
<br />
<br />
source : inet.detik.comUnknownnoreply@blogger.com4tag:blogger.com,1999:blog-392812453638663635.post-52758576515125614642012-02-19T15:11:00.000+07:002012-02-19T15:11:09.152+07:00Good news: Mass Effect 3 It can be sampledFinally, gamers can already taste the Mass-effect 3. Although still in demo form, but from here the player can feel like what the embryo bakalnya later.<br />
<br />
In Mass Effect 3 gamers will be back playing with the primary mission Shepard took over the Earth from alien colonies called The Reaper.<br />
<br />
Quoted from Neoseeker, Wednesday (02/15/2012), the current demo Mass Effect 3 for the computer is worth trying and can be downloaded via the site owned by Electronic Arts. While the version of the PlayStation 3 and Xbox 360 is scheduled to follow soon.<br />
<br />
Does not vary much with the original version to be released later in March 2012, in this demo players can play and convert Shepard looks at will.<br />
<br />
But to play the demo size is 2.1 GB, it's good gamer attention to computer specs are needed, among others:<br />
<br />
Minimum Spec:<br />
<br />
OS - Windows XP SP3/Vista SP1, Win 7<br />
CPU - 1.8 GHz Intel Core 2 Duo (equivalent AMD CPU)<br />
RAM - 1 GB for XP / 2GB RAM for Vista / Win 7<br />
Disc Drive - 1x speed<br />
Hard Drive - 2.5 GB of free space<br />
Video - 256 MB * (with Pixel Shader 3.0 support)<br />
* Supported chipsets: NVIDIA 7900 or better; ATI X1800 or better. Please note That NVIDIA GeForce 9300, 8500, 8400, and 8300 are below minimum system requirements, as are AMD / ATI Radeon HD3200, HD3300, and HD4350. Updates to your video and sound card drivers may be required.<br />
Sound - DirectX 9.0c compatible<br />
DirectX - DirectX 9.0c August 2009 (included)<br />
<br />
<br />
Recommended Spec:<br />
<br />
OS - Windows XP SP3/Vista SP1, Win 7<br />
CPU - 2.4 GHz Intel Core 2 Duo (equivalent AMD CPU)<br />
RAM - 2 GB for XP / 4GB RAM for Vista / Win 7<br />
Disc Drive - 1x speed<br />
Hard Drive - 2.5 GB of free space<br />
Video - AMD / ATI Radeon HD 4850 512 MB or Greater, NVidia GeForce 9800 GT 512 MB or Greater<br />
Sound - DirectX 9.0c compatible<br />
<br />
How my friend? when to try?<br />
<br />
<br />
source : inet.detik.comUnknownnoreply@blogger.com2tag:blogger.com,1999:blog-392812453638663635.post-83872670010867146612012-02-15T22:52:00.000+07:002012-02-15T22:52:09.999+07:00Watch out! Whitney Houston Clickjacking Death Threat...For the umpteenth time, world events didompleng cyber criminals to act. This time-related death of Whitney Houston who used to spread false messages on Facebook and Twitter clickjacking.<br />
<br />
Security firm Trend Micro revealed that the perpetrator to lure potential victims with news, pictures, and videos related to Whitney's death. Yet behind it, ready diinfeksikan malicious file.<br />
<br />
A similar incident happened when the death of Steve Jobs, Moammar Ghadafi and Amy Winehouse.<br />
<br />
For the case of Whitney mendomppleng this, Trend Micro claims to have found evidence of infiltration clickjacking two deaths in the name of the high voiced singer.<br />
<br />
First, Trend Micro indicating cyber criminals have spread false Whitney Houston video on Facebook. In wall posts, the video is titled "I cried watching this video. RIP Whitney Houston".<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdRCKuc5LILV-pblDSsdvMdQpsGBO7-b221R06EvEor26Ky78BqxvifVBHBZHlAk-Ritl-CY20rPZxIgdlWuHV8n8Ax7giEhGflopKJL9hr6fc0ZmHohmeIwM4UX5N1OqaWEm_FYO9SwHb/s1600/Whitney_diagram_1.jpg" imageanchor="1" style=""><img border="0" height="320" width="310" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdRCKuc5LILV-pblDSsdvMdQpsGBO7-b221R06EvEor26Ky78BqxvifVBHBZHlAk-Ritl-CY20rPZxIgdlWuHV8n8Ax7giEhGflopKJL9hr6fc0ZmHohmeIwM4UX5N1OqaWEm_FYO9SwHb/s320/Whitney_diagram_1.jpg" /></a></div><br />
When you click the video link will be redirected to the survey page. After conducting an investigation into the domains involved, Trend Micro has found 101 scams survey on the same IP address.<br />
<br />
Second, Trend Micro also find tweets with links that utilize hazardous hashtag # RIPWhitneyHouston, the trend worldwide. Where in the hashtag is inserted links that direct users to click on the Twitter site that supposedly free wallpaper Whitney.<br />
<br />
"But once clicked, a window pop up asking the user to download a ringtone from Whitney Houston to leave a personal phone number," said Trend Micro, in a statement on Wednesday (02/15/2012).<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsn511u7BBTf2QI4ZfQvsF9BXM-A2SEw14dNueKrrvwP1cUP1L_wLKn5l_shxanK5bh7_5S2vNDBym393uKsjJm4bcEptjzqKDxcF7alG1qYIZnxx2P-IzxkDFjuwwIMEoF3u2jGbW7qsC/s1600/whitney_diagram_2_1.jpg" imageanchor="1" style=""><img border="0" height="320" width="310" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsn511u7BBTf2QI4ZfQvsF9BXM-A2SEw14dNueKrrvwP1cUP1L_wLKn5l_shxanK5bh7_5S2vNDBym393uKsjJm4bcEptjzqKDxcF7alG1qYIZnxx2P-IzxkDFjuwwIMEoF3u2jGbW7qsC/s320/whitney_diagram_2_1.jpg" /></a></div><br />
Trend Micro added that this incident shows that the profile virus attacks and has now changed dramatically - from the global outbreak in a sophisticated and targeted attacks.<br />
<br />
Recognizing that the technique is less effective past, now cybercriminals are constantly coming up with new techniques to trick users and infect.<br />
<br />
"They continue to release new threat variants, increasing the speed of threat, and using the threat as a random attack, steal data through malware, and botnets as well as into the social media pages (Facebook and Twitter)," he concluded.<br />
<br />
<br />
source : inet.detik.comUnknownnoreply@blogger.com1tag:blogger.com,1999:blog-392812453638663635.post-21634803925725152572012-02-13T20:07:00.000+07:002012-02-13T20:07:47.528+07:00Death of Whitney Houston, Drugs Evidence of CrueltyWhitney Houston's death would be sad news for his fans worldwide. Moreover, Houston is known gait fantastic voice is a renowned star of world-class unrivaled. Unfortunately, his departure is tragic because the alleged influence of drugs be a very regrettable.<br />
<br />
Houston was found dead by her boyfriend Ray J at the Beverly Hilton Hotel, California, on Saturday (11/2) at 03:45 local time Sunday (12/2) morning Indonesian time. He reportedly died at the age of 48 years. Until this news was revealed, there is no certainty the cause of death of Whitney by police investigating the case. But allegedly, due to the tragic departure of illegal drugs consumed. During his life, Houston admitted that she was a user of cocaine, marijuana and heroin. Cigarettes and alcohol are also a 'best friend' for him.<br />
<br />
Houston's departure was once again reminded the maysarakat around the country how bad drugs are already outlawed it can entrap users into the dark life, even death is not your terhormat.Agar not entangled in it, know the following things about drugs .<br />
<br />
In his book entitled "Family Health Guide", Dr Mirriam Stoppard explains the facts based on inspection of illicit drugs.<br />
<br />
1) The work of these drugs harm the user's body, but the severity of damage while the drug is working to give feelings of pleasure when used.<br />
<br />
2) When you tried it once, then stop using drugs was not always a realistic goal.<br />
<br />
3) Although outlawed, the use of the substance in medicine does not always mean abuse. Because these drugs are actually for some immediate interest for purposes of treatment.<br />
<br />
4) The danger for young children who want to try it, use a single drug will lead to the use of other more dangerous drugs.<br />
<br />
5) Unfortunately, knowing the risks of using drugs does not mean it can prevent young people try drugs.<br />
<br />
Here are some drugs that need to be aware of. Get to know more in order for you to know the deadly consequences for your life.<br />
<b><br />
Heroin</b><br />
<br />
Depressant drug that dulls the brain and body and relieve pain. This drug is highly addictive. There are three forms of heroin: brown heroin (which should not be injected), white, and pharmaceutical heroin, which easily lead to overdose.<br />
<br />
Sometimes brown heroin dissolved in vinegar or lemon juice and can cause vision problems if injected. Blisters and open wounds can result from heavy use of heroin. When the withdrawal, user suffers addiction, panic attacks, cramps, nausea, and diarrhea.<br />
<b><br />
Cocaine</b><br />
<br />
Powerful stimulants that cause feelings of euphoria and comfort. This drug is highly addictive. Long-term users can become psychotic. Inhalation of these drugs can injure your nostrils.<br />
<br />
Inject cocaine is very dangerous because it is at risk of overdose. Mixing it with heroin is also very dangerous. Most of the cocaine sold to users in the form of powder mixed with glucose, lactose, and even drugs. The content of the lowest is 30 per cent cocaine.<br />
<b><br />
Marijuana</b><br />
<br />
Marijuana causes users to feel the emotional overload. Users are becoming more widely spoken (nag) and think that they are more 'understanding' of the world. All it often feels very funny to them.<br />
<br />
Most of the long-term heavy users suffering from panic attacks, atmoshpere changes (mood) and was accused of overkill. Mixing cannabis with amphetamines or ecstasy can cause severe dehydration and other problems a case of a heart attack. There are three forms of cannabis: herbal (dried leaves, resin and cannabis oil [hashish]).<br />
<br />
<b>Ecstasy</b><br />
<br />
Ecstasy releases a chemical modifier mood (mood), such as serotonin and L-Dopa, which induce a feeling of love and friends. This drug is also hallucinogenic. Ecstasy can cause the body to overheat, resulting in a deadly heat stroke.<br />
<br />
This drug can also interfere with blood flow in the brain, causing stroke, as well as cause kidney and liver failure is fatal.<br />
<b><br />
Amphetamines</b><br />
<br />
Stimulant that can make you more agile and alert. Users have become very fussy and can stay awake for hours. You can still feel the effect until 12 hours after use. Amphetamines can cause heatstroke and jantjng attack. Liver and kidneys are failing that will arise when you inject him with alcohol. Injecting drugs are very dangerous because the heart is unable to cope with the surprise.<br />
<br />
<br />
source : health.okezone.comUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-392812453638663635.post-90304035690067159552012-01-30T08:59:00.000+07:002012-01-30T08:59:23.264+07:00Health Benefits of MusicYou know the music? Like music? Like the first song of my childhood, I like music, you like music, all the world like music. In today's world, music has been growing very rapidly. Music is not only used for entertainment, but also used for various other purposes. Music has been widely used as therapy to cope with various symptoms of depression and anxiety. Apparently, there are many other health benefits of music. The amount of this benefit is still unexplored by researchers.<br />
<br />
Dr. Petr Janata, a neuroscientist at the University of California, as reported by brainready.com, Monday (1/30/2012) states, "There's something about music and engaging in musical activities that seem very stimulating for the brain and body. Singing songs favorite with family and friends, playing in a band or dancing to music can also strengthen ties with other people. "<br />
Here are some health benefits of music.<br />
<b><br />
Improve the ability of the brain</b><br />
<br />
There are several studies that show how music can enhance brain function. In one study, a clinical psychologist Charles Emery of Ohio State University studied the effects of music on people who listen to them for regular exercise.<br />
<br />
Emery and his team tested 33 men and women who were in the final weeks of cardiac rehabilitation programs. Each participant was tested for the ability to mentally after exercising without music and exercising with music.<br />
<br />
The result, on average, participants received scores more than doubled when listening to music after a workout without listening to music than after exercise. The selected music is Vivaldi's "The Four Seasons".<br />
<br />
Previous studies by other scientists suggests that music helps patients with lung disease to mental abilities may work better.<br />
<br />
Emery thought the same benefits can be gained by listening to all kinds of music, not just classical music. He theorized that the "Four Seasons" can stimulate mental performance because of its complexity forcing the brain to regulate nerve transmission.<br />
<br />
"But other types of music may work better for some people. I do not think there is anything special on the music of Vivaldi or classical music that would trigger an increase in brain function," Emery said.<br />
<br />
<b>Improve intelligence</b><br />
<br />
Several other studies have illustrated that listening to music is a business that is more complex than it seems. The human brain to sort out the tone, timing, and sequencing of sound to understand the music.<br />
<br />
Believed that the frontal lobes of the brain is stimulated and activated when listening to music. Because the area is part of the brain associated with higher mental functions such as abstract thinking or planning.<br />
<br />
Frances Rauscher, a psychologist at the University of Wisconsin at Oshkosh and her colleagues found that listening to Mozart's music can enhance people in the field of mathematical reasoning and spatial abilities.<br />
<br />
In fact, mice that run mazes faster and more accurately after hearing Mozart. According to Rauscher, Mozart piano sonata seems to stimulate the activity of three genes involved in nerve cell signals in the brain.<br />
<br />
Listening to music is one way of listening to music passively to obtain benefits for the brain. But a more stimulating brain activity and even increase IQ is playing or writing music.<br />
<br />
Children six years old who were given music lessons when compared to drama lessons or no extra instruction received 2-3 points in his IQ scores.<br />
<br />
Rauscher also found that after getting music lessons for two years, pre-school children scored better on spatial reasoning tests than those following the computer lessons. But the benefits may not be the same for adults.<br />
<br />
<b>Reducing pain</b><br />
<br />
Some studies have found that listening to music can reduce pain. Other studies have shown that music can be beneficial for patients with heart disease by reducing blood pressure, heart rate and anxiety.<br />
<br />
Music therapy has also been shown to lift the spirits of patients with depression. Create your own music, either playing musical instruments or singing, can have therapeutic effects as well.<br />
<br />
When listening to or involved in the music that makes happy, relaxed, contemplative, the body will have the effect of deep relaxation such as sleep, warm baths, and lower overall stress levels.Unknownnoreply@blogger.com5tag:blogger.com,1999:blog-392812453638663635.post-14607551260646955592012-01-25T14:59:00.000+07:002012-01-25T14:59:30.198+07:00Recognize Triggers PainThe pain can not be seen, but when we feel it, it's hard to think of something other than pain. Actually, pain is a signal that our body needs attention.<br />
<br />
"Most doctors only prescribe drugs to mask pain. The best solution is actually eradicate the problem," says Jacob Teitelbaum, author of Real Cause, Real Cure.<br />
<br />
If you experience chronic pain that had lasted about six months or acute pain caused by injury or excessive movement, should avoid the use of continuous pain relief. Consider the following six triggers pain.<br />
<br />
1. The anger<br />
<br />
Save your anger could actually lead to feelings of pain in his back. In studies, people who choose to bury his anger at having more pressure on the muscles along the spine.<br />
<br />
2. Incorrect posture<br />
<br />
The use of computers that are too long without a balanced posture can cause pain. Although sitting quietly is not an exertion of physical activity, attitude turns static for a long time would disrupt the flow of blood and lymph nodes so that the muscles become tense and stiff.<br />
<br />
4. The smart phone<br />
<br />
Thanks to the smart phones, we are now more easily connect with friends and looking for the latest information. However, smart phones, it is also a culprit of pain. This is especially if you are used to "hold" by phone pinned between shoulder and ear so that both hands free to perform other work.<br />
<br />
In the long run, these habits will cause tension on the neck, shoulders and even wrists. Ceramic by using the earphones if you intend to talk in a rather long time.<br />
<br />
5. Thinking bad<br />
<br />
Catasthorphing, or to believe the situation is worse than the reality of stress not only add flavor but also disrupt a person's ability to cope with everyday life. Various studies have linked catastrophizing with increased perception of pain.<br />
<br />
"Emotion and pain are processed in the same brain area. So if we are stressed or anxious, naturally we will also feel the physical pain," said Andrew Bertagnolli, head board member of the American Chronic Pain Association.<br />
<br />
6. Lack of sleep<br />
<br />
Our body produces growth hormone when we're sleeping. This hormone is necessary for tissue repair cells damaged at the same time overcome the pain. Because it's people who suffer from insomnia triples risk of chronic pain.<br />
<br />
<br />
<br />
<br />
<br />
source : kompas.comUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-392812453638663635.post-41735033008329760802011-12-25T21:08:00.000+07:002011-12-25T21:08:22.846+07:00Causes your Concentration DifficultConcentration is an easy word to pronounce, but difficult to implement. Each person must have experienced situations where it is difficult to concentrate. This condition can happen to anyone regardless of age status. Young and old alike can experience it. Actually, what caused it, here are some reasons why your mind is easy floating along the advice of experts:<br />
<br />
1. Low hormone levels<br />
<br />
The mind is easily dispersed signals that you may be deficient in vitamins or hormones, particularly if accompanied by unusual fatigue. Dr Orford, Expert Staff of the Mayo Clinic, Preventive Medicine Division, in Scottsdale said, "If there is a deficiency in thyroid hormones, so it slows down your metabolism, thereby reducing blood flow and function of cells in different parts of the brain."<br />
<br />
Suggestion: Make an appointment with your doctor to simply consult. After that, make a list every time there is a change of health problems to help detect the source of problems related to concentration problems.<br />
<br />
2. Hormones have been damaged<br />
<br />
Kimberly Pearson, MD, a psychiatrist at Massachusetts General Hospital Center, Women's Mental Health stated that it is difficult to concentrate is the most common complaint of women experiencing perimenopause.<br />
<br />
Tip: If other signs pointing to the perimenopause (hot flashes, night sweats, vaginal dryness), to consider short-term hormone replacement therapy.<br />
<br />
"Most women who've done it feels like to get back his memory," he said.<br />
<br />
3. Influence of drugs<br />
<br />
Some medications such as anti-depressants can affect your mood (mood) and concentration when you decide to stop taking them. Antihistamines, for example, sedatives can trigger drowsiness long enough.<br />
<br />
Suggestion: Write down all the medications you're taking and ask your doctor, whether any of the medicines that can cause concentration problems.<br />
<br />
4. Cigarette<br />
<br />
Besides damaging the general health, the effects of smoking can also affect your concentration power. The more and longer you smoke, gray matter in the brain more quickly lost. In fact, when trying to quit smoking, you will have trouble concentrating, said Christopher Kahler, Ph.D., of Brown University.<br />
<br />
"This is a common complaint smokers. But, you will be getting more benefit psychologically if you stop smoking," he said.<br />
<br />
Tip: The more happy you feel when trying to quit, the more likely you are to succeed, says Kahler. The point is how you can do to improve mood (mood).<br />
<br />
5. Unhealthy eating<br />
<br />
What you eat have a major impact on mental clarity, said Laura Middleton, PhD, assistant professor of kinesiology at the University of Waterloo in Ontario. Poor eating habits increase the risk of disease, such as obesity, hypertension, high cholesterol, and other diseases that can impair cognitive function and lead to obesity, making it more difficult to stay active, which is important for brain health.<br />
<br />
Advice: "If it's good for the heart and cardiovascular system, then it is also good for the brain," said Middleton, who advised to adhere to the principles of the Mediterranean diet (a diet high in fish, vegetables, and low in saturated fats and processed foods).<br />
<br />
6. Busy<br />
<br />
The work is sedentary all day behind a desk or behind the wheel of a car should not be considered good. The work tends to persist and do not involve physical activity can affect your mind. In order to keep the mind sharp, you have to keep moving. Exercise can increase the production of substances that slow the formation of plaques triggers Alzheimer's disease.<br />
<br />
"Need a few weeks to be able to feel the benefits. But, after that you will experience positive changes quickly," said Middleton.<br />
<br />
Suggestions: Perform cardiovascular activity for 30 minutes with a period of 3-5 times a week. "If you can do it for an hour, that's good," said Middleton, who also urged to include weight training. Middleton and colleagues found evidence that by being active throughout the day can help keep your mind sharp.<br />
<br />
7. Anxiety disorder<br />
<br />
Excessive anxiety can cause you trouble concentrating. Because, with a restless mood, a person usually becomes hyper-vigilant with the surrounding environment.<br />
<br />
Tip: If you can not concentrate because it was too worried, stop doing the job and do something fun to remove the tension in your head, says Susan Nolen-Hoeksema, PhD, professor of psychology department at Yale. Try to go for a walk, trying new recipes, or play with friends.<br />
<br />
<br />
<br />
<br />
Sources: kompas.comUnknownnoreply@blogger.com8tag:blogger.com,1999:blog-392812453638663635.post-49980852165994108292011-12-10T19:27:00.000+07:002011-12-10T19:27:30.282+07:00DorkBot.Bx and Characteristics of the Infected PCAs has become a schedule, beginning of each year and the end of the year, the makers of malware is usually 'release newest product' form of malware variants that have new ways of infecting computers. It also occurs at the end of this year where a new malware being intensively spread this month.<br />
<br />
This malware is detected as Trojan.Generic.KD.440xxx or W32.Dorkbot.Bx. If the previous ones spread BitCoinMiner trojans and trojan variant Kolab, this variant is the 'new incarnation' of BitCoinMiner trojan trojan that uses methods Kolab. This is a group of trojan / backdoor designed to steal information or data of computer users, especially matters related to personal financial data, which is associated with internet banking. Just like trojans BitCoinMiner, DorkBot.Bx variant also has the ability to record information / data relating to personal data such as usernames, passwords, credit cards, and others. Not only that, the computer that is infected with a trojan was used as a tool for solving participated blocks BitCoin cryptography using BitCoin account of the owner of the trojan.<br />
That was a bit of information about DorkBot.Bx, now we need to know how the characteristics of the computer has been infected by this malware. Here are some characteristics of the infected computer DorkBot.Bx:<br />
<br />
1. CPU 100%<br />
<br />
DorkBot.Bx will make the CPU becomes sluggish. Shows the percentage of CPU usage 100%. This is because the activities of trojans that attempt to break the cryptographic block BitCoin and actively trying to make sending data.<br />
<br />
2. Wasteful of bandwidth<br />
<br />
Not only is making a slow computer where the CPU usage to 100%, another thing to note is the activity of Internet bandwidth. This is because the result of trojans DorkBot.Bx makes your bandwidth to be extravagant.<br />
<br />
3. Hiding a folder on a USB drive or removable disk<br />
<br />
Not different from its predecessor, BitCoinMiner trojan, trojan DorkBot.Bx was also doing the same thing is to hide the folders on the USB or removable disk and create a shortcut similar false name of the folder. It seems the trend shortcut also inspire trojan DorkBot.Bx<br />
<br />
4. Connecting to Server BitCoin<br />
<br />
Trojan DorkBot.Bx attempt to connect to Server BitCoin to perform cryptographic delivery BitCoin blocks malware authors use the account on BitCoin. This is advantageous because the manufacturer can quickly and easily perform cryptographic blocks BitCoin through the help of computers already infected.<br />
<br />
5. Connect to IRC / Remote Server<br />
<br />
Trojan DorkBot.Bx also attempt to connect to IRC / Remote Server for the delivery of computer users BitCoin information required by the malware authors.<br />
<br />
6. Downloading files malware<br />
<br />
In order to simplify the action, trojans DorkBot.Bx also to download some specific malware files from IRC / Remote Server in order to stay updated and are not easily recognizable by the antivirus. Files of different malware is what sometimes makes it difficult to detect the presence of antivirus trojan DorkBot.Bx.<br />
<br />
7. Downloading files Certificate Authority (CA)<br />
<br />
Basically, the Certificate Authority (CA) is used in online payment transactions such as banks, PayPal, and thousands of other sites that use the SSL protocol. By downloading the file CA, malware makers want to ensure that victims of infected computers already have updated so that CAs can transact safely BitCoin.<br />
<br />
8. Transfer data have been obtained<br />
<br />
The main objective of the trojan DorkBot.Bx is getting information from the user's computer that is infected.<br />
<br />
9. Open various ports<br />
<br />
DorkBot.Bx Trojan also opens various ports on the victim's computer to be able to easily connect to the IRC / Remote Server, and perform various actions with impunity.<br />
<br />
10. Adopting Facebook Chat<br />
<br />
This method is probably the most common users. DorkBot.Bx provide a URL link that has been converted into a short, so users will be easily fooled. If the link is opened, then the user will download a file using the file name and icon are quite 'sexy'.<br />
<br />
Another characteristic is to modify the registry and create some files to infect computers. In order to directly active when the user connects the USB or removable drives, trojans DorkBot.Bx exploit security holes of Windows is Windows Icon handler that makes the shortcut from the trojan file will be active once to access the drive.<br />
<br />
Blogger Buddy, that was a bit of information about emerging DorkBot.Bx Trojan in action lately. Hope this is useful for us. Stay alert and happy blogging.<br />
<br />
<br />
<br />
<br />
Sources: detikinet.comUnknownnoreply@blogger.comtag:blogger.com,1999:blog-392812453638663635.post-28474462210846516212011-11-23T22:43:00.000+07:002011-11-23T22:43:25.671+07:00Do not Underestimate the TinglingSome people must have experienced numbness when sitting cross-legged for too long or fall asleep with his head crushed. This condition also occurs when pressure on the nerve that goes right. However, the numbness will go away when the pressure is not there anymore.<br />
Pins can also be indicative of many diseases, such as diabetes mellitus, hypertension, pinched nerves, impaired blood flow in the peripheral blood vessels, and blood disorders. There are times when those who have not known to have diabetes, tingling may be an early symptom of diabetes known.<br />
Paresthesia or numbness is often a symptom of chronic neurological disease or traumatic nerve damage. The cause is a disorder that affects the central nervous system such as stroke and mini stroke, multiple sclerosis, transverse myelitis, and encephalitis.<br />
Tumors and vascular lesions of the brain or spinal pressure can also cause paresthesia. Neurological syndromes such as carpal channel syndrome (CTS) can damage the peripheral nerves and cause paresthesia accompanied by pain.<br />
Here are a number of diseases characterized by symptoms of tingling.<br />
<br />
<b>1. Diabetes mellitus (DM)</b><br />
In patients with DM, tingling is a symptom of damage to blood vessels. As a result, blood flow in the nerve endings is reduced. This condition can be overcome by controlling blood sugar levels closely, also taking drugs such as gabapentin, vitamin B1 and B12.<br />
<b>2. Stroke</b><br />
Tingling can be a sign of a mild stroke. Usually caused by blockages in blood vessels in the brain, resulting in damage to local nerves. Other symptoms that occur: numbness half body, half body paralyzed, blind one eye, difficulty speaking, dizziness, double vision and blurred.<br />
Symptoms last a few minutes or less than 24 hours. Usually occurs during sleep or just waking up. This condition should be treated because it can develop into a severe stroke.<br />
<br />
<b>3. Heart disease</b><br />
Tingling neuropathy is not only due to pressure, but because of cardiac complications with her nerves. In patients undergoing cardiac valve surgery installation, there are blood clots that stick. Clot that can be carried by the flow of blood to the brain, causing cerebral embolic.<br />
If the blockage in the brain regions that regulate the sensory system, the patient will feel a tingling right. If the local governing motor system is also affected, the tingling will be accompanied by paralysis.<br />
<br />
<b>4. Infections of the spine</b><br />
This causes the body from the navel downwards can not be moved. Patients could not control urination. Bowel movement was difficult. This disease called myelitis (inflammation of the spinal cord). Level of recovery depends on the damage. Can recover some, but there is also a paraplegic.<br />
<br />
<b>5. Rheumatism</b><br />
This disease can cause tingling or feeling thick. In this case due to a pinched nerve at the hinge joints, such as the wrist joint, change shape. Tingling symptoms usually disappear when cured rheumatism.<br />
<br />
<b>6. Spasmofilia (tetani)</b><br />
Symptoms of tingling can also be a sign of disease spasmofilia (tetani). The disease is caused by calcium ion levels in the blood decreases. The reason is the decrease of carbon dioxide tension in the lungs. Other symptoms: leg cramps, insomnia, emotional instability, fear, weakness, headaches or migraines, and lost consciousness.<br />
<br />
<b>7. Guillain-Barre syndrome</b><br />
Tingling could be one indication of this disease. Marked symptoms of high fever, cough, and shortness of breath. Also followed by tingling and numbness. Tingling sensation usually felt in the whole body, especially on the tip of the toes and fingers due to virus attacks the peripheral nervous system.<br />
If things were not addressed, will continue to attack vital organs. As a result, the patient felt shortness of breath and was paralyzed on the entire body.<br />
<br />
<b>8. Cytomegalovirus (CMV)</b><br />
There is a tingling sensation that preceded severe flu. Tingling will increase in intensity starting from the tip of the finger, creeping up to the navel. Patients may simply feel numb or to difficulty walking, means inflammation of the spinal cord is taxable. This is due to virus attacks, typically cytomegalovirus.<br />
<br />
Bloggers, now we already know that tingling sensation should not be left alone. Let's keep the health, because health is good. If healthy, we can move comfortably, including blogging. Is it true?Unknownnoreply@blogger.com47tag:blogger.com,1999:blog-392812453638663635.post-26050601767058316212011-11-09T16:37:00.000+07:002011-11-09T16:37:25.185+07:00New Name in the Periodic Table of Chemical ElementsBlogger Friend, surely you're all familiar with chemical terms, chemistry, and so on. Especially during high school that used to sit in science class. Chemistry is arguably one of the lessons that 'maybe' less liked by students, because the chemistry lesson arguably one of the lessons are hard to understand. If that were the case, this could be bad news. Why? Due to the already complicated chemistry has now got a new comer in the periodic table of elements. There are three additional new elements were added in the periodic table of elements. These three names have been approved by the General Assembly of International Union of Pure and Applied Physics (IUPAP). Approval was committed in the meeting by the General Assembly which consists of 60 people at the Institute of Physics (IOP), London, Saturday 5 November 2011 that then. These three elements are named Darmstadtium (Ds), Roentgenium (Rg) and Copernicium (Cn), each is numbered 110, 111 and 112. <br />
<br />
Head of IOP and the Secretary General of IUPAP, Dr Robert Kirby-Harris, as quoted by the Daily Mail last Saturday said the naming of this element has been approved in consultation with physicists from around the world and we are pleased to see them introduced in the periodic table of elements. <br />
<br />
In earlier publications Saturday, LiveScience stated that the three elements of the new element called "superberat" or transuranium. This element exists only in the laboratory, not in nature, once shed quickly become another element and difficult to learn. Not much is known about that element. These three elements have long been found. However, indirect naming must be done in accordance with the agreement due to organizational scientists. Therefore, the three elements can only be added to the Periodic Table. <br />
<br />
In general, an element named after its discoverer, the place is found or the name of honor. Copernicium for example, was created February 9, 1996 under the name ununbium. The name did not change until 2009 when the existence of an element has been demonstrated. The name was taken in honor of Copernicus and Copernicus, the first scientist to claim that the Earth around the Sun. <br />
<br />
While Roentgenium found December 8, 1994 with the original name unununium. Roentgenium name then used as a tribute to the services of Wilhelm Conrad Roentgen, the scientist who detects X-rays and won the physics Nobel in 1901. <br />
Darmstadtium created by Peter Armbruster and Gottfried Munzenberg with names beginning ununnilium. The name is taken Darmstadtium conducted at the facility for the manufacture of the GSI Helmholtz Centre for Heavy Ion Research in Germany, located near the city of Darmstadt. <br />
<br />
Having succeeded in giving the names of three elements, the scientists are now trying to name the elements 114 and 116 that have been added to the periodic table of elements that last July. Its official name will soon be introduced some time to come.<br />
<br />
Source : kompasUnknownnoreply@blogger.com26tag:blogger.com,1999:blog-392812453638663635.post-33652375535365874932011-10-29T16:01:00.000+07:002011-10-29T16:01:15.153+07:00Eat Dark Chocolate = Exercising?Good news for my friends who do not like exercise. What is it? Now there is another way that 'may' is much more comfortable that the effect is not lost through exercise. Want to know? Curious? The answer is to eat chocolate. Why? Not good? we do not need to tired to exercise, do not need to be bathed in sweat, quite simply by eating chocolate. This is not true? Lest lie? First patient, do not protest! <br />
<br />
You could say that chocolate is a favorite food of all ages. Foods that this one was known to have a delicious flavor. People who do not like chocolate 'maybe' you could say 'weird'. Some time ago, a study has brought out another one for the health benefits of chocolate. Previously found a variety of chocolate's health benefits. But this is different to that before. A recent study revealed that eating dark chocolate has health benefits for our body, which is equivalent to people who do sports activities. <br />
<br />
A researcher from Wyne State University, Dr.. Moh Malek, focused his research on mitochondria. Mitochondria are the energy generation sources that produce energy in cells. In his research, he discovered the existence of a plant compound found in cocoa or cocoa called epicatechin. These compounds are able to provide stimulation to the muscles so that the response generated is similar to sports activities. Dr. Malek explained that mitochondria produce the energy used by cells in the body. The more mitochondria means the greater the energy produced. Thus, the more work that can be done by the body. <br />
<br />
This study used rats as experimental. Research conducted by Dr. Malek is using a type of cocoa epicatechin administered to rats twice a day. This is done regularly and continuously for 15 days. At the same time, other rats that underwent exercise treadmill for 30 minutes per day. From both experiments, Dr. Malek found that rats that ate only epicatechin has the same performance as a treadmill exercise rats. <br />
<br />
The researchers hope these findings can be used as an alternative to fight age-related muscle wasting. <br />
"It appears that epicatechin treatment combined with exercise can be a means to offset the aging of muscles," adds Dr. Malek. <br />
<br />
How is my friend? I am not lying, right? Now to select which one? Want sports tired, perspiring, it took the sacrifice of time or enough to eat chocolate? If I so choose both, exercise and eating chocolate ....Unknownnoreply@blogger.com10tag:blogger.com,1999:blog-392812453638663635.post-260637870452910312011-10-16T09:43:00.000+07:002011-10-16T09:43:30.571+07:00How Much We Use Brain?Basic pinhead! Such statements are usually uttered by someone who is upset face stupidity of others. In fact, as quoted by the journal Intelligence, on the basis of the results of research conducted at Virginia Commonwealth University, noted that the intelligence of a person not related to brain size has. Whether it's big or small brain size, has nothing to do with intelligence. But the brain size of this will affect the other functions. As examples of people who live in the Antarctic region in general have large brains. It is necessary to support the function of vision. As we know, in Antarctica, which is part of the north end gets very little sun exposure because the sun is rarely seen. Therefore, the weather there tends to dim. This is why they need more visibility to be able to look around than people who live in khaulistiwa.<br />
Different things happen to people who live in the Micronesia region. Most of them had a relative brain size smaller. Women have smaller brains than men, about 11-12 percent. However, this does not mean men are smarter than women.<br />
"Only the brains of different buildings. Areas of the brain associated with intelligence in men with different areas of the brain associated with intelligence in women. There are at least two different brain architectures that lead to the same level of intelligence between men and women," said Prof.. Richard Haier, a consultant neuroscience at the University of California, Irvine.<br />
<br />
Need Lots of Energy<br />
<br />
Another misperception that had circulated in the community for decades is the opinion which states that most new human brain uses about 10 percent, while most of the brain has not been used or otherwise unemployed. Some experts are then denied the presumption. One of them is Barry Gordon, a neurologist from Johns Hopkins School of Medicine, in Baltimore, USA.<br />
<br />
In addition to Barry, John Henley, brain specialists from the Mayo Clinic, Rochester, Minnesota, United States stated that the evidence shows that our brain uses 100 percent, all day. When we sleep, frontal cortex areas that control high-level thinking and self-awareness, or somato sensory area which helps us to feel the surroundings remain active. In addition, he also stated that sometimes the brain that we use is no more than 10 percent, but all parts of our brain functioned every day. So no one allowed to remain unemployed. Every part of the brain has the function of each. For example, frontal lobe associated with the motor, memory, cognition, and language, and cerebral cortex that has the task of learning new information, make decisions, etc..<br />
Therefore, if every time we use every part of the brain simultaneously, it will require a lot of body energy. Most of our body's energy, about 20 percent, is allocated for normal brain function. It was meant to do other things such as walking, breathing, eating, digesting food, and other vital activities, we will lack energy.<br />
<br />
Thousand Tera<br />
<br />
Physically viewed our brain is a soft organ, mostly composed of water (78 percent), fat (10 percent), and protein (8 percent). Beyond the physical aspects, in fact many scientists are only able to open up a bit of mystery that envelops the brain. Until now, it is not clear about the dreams, the relationship between the conscious and subconscious, the relationship between brain and mind, brain and soul, the funds are still many more, including how much brain capacity we have.<br />
In an age-paced computerized, as now, the human brain is often compared to the "brain" is actually a computer that man's own creation. How hell, why even compared to homemade?<br />
In the human brain there are about 100 billion nerve cells, where one another have a connection. Experts suspect, in many connections that the data (memory) is stored. It is estimated that our brain's capacity to store terabytes of data between 1-1000 terabyte.<br />
<br />
Bloggers, in fact the most important thing is not on the size of our brains. Whether it's big or small, the most important thing is that we must love him. The trick to give him healthy food, exercise regularly, use it only for things that are positive and beneficial for others. And do not forget is to not use excessive brain. Rest when tired. The brain is also like a muscle. He also can wear out and need to relax, especially if you have to concentrate on the same task in a long time. To revive, Dr. Marc Berman suggested for a moment the streets in a city park between the trees big or look at the beautiful green gardens, rather than going into a busy shopping center.<br />
<br />
"Enjoying the natural beauty of memory will improve performance by up to 20 percent. Instead, go to crowded places instead will add to the anxiety," said researchers from the Rotman Research Institute in Toronto, Canada.<br />
<br />
Bloggers, already described?! Never force the brain. If you are tired, it breaks. Stop all activity for a moment to rest, so that fresh anymore and certainly can blog again ...Unknownnoreply@blogger.com9tag:blogger.com,1999:blog-392812453638663635.post-63043959039387917122011-10-15T01:53:00.000+07:002011-10-15T01:53:41.241+07:00Apa itu CAPTCHASaya sangat yakin bahwa Sobat Blogger pernah mendengar atau mungkin melihat / membaca kata “CAPTCHA “. Mungkin diantara Sobat Blogger ada yang bertanya-tanya, Apa itu CAPTCHA ?<br />
CAPTCHA merupakan kependekan dari Automated Public Turing test to tell Computers and Humans Apart. Istilah ini diciptakan oleh Luis von Ahn, Manuel Blum, Nicholas J. Hopper, dan John Langford pada tahun 2000. CHAPTCHA merupakan jenis respon tes yang digunakan dalam dunia komputasi yang bertujuan untuk memastikan bahwa user adalah human atau manusia, dan bukan robot. Prosesnya biasanya melibatkan sebuah server yang meminta user untuk menyelesaikan sebuah tes sederhana yang sudah diidentifikasi oleh server tersebut. Dalam hal ini, computer lain diasumsikan tidak mampu untuk memecahkan tes yang dimaksud, sehingga setiap user yang memasukkan solusi yang tepat diduga sebagai manusia. Jenis umum dari CAPTCHA mengharuskan user untuk mengetik huruf dan atau angka dari gambar terdistorsi yang muncul di layar.<br />
Mungkin ada diantara sobat blogger yang bertanya-tanya, mengapa harus menggunakan CAPTCHA? Sebenarnya apa fungi CAPTCHA? Berikut ada beberapa fungsi dari CAPTCHA.<br />
Mencegah Spam Komentar di Blog<br />
Seperti kita ketahui bersama, ada sebagian Blogger yang suka mengirimkan komentar palsu. Ini dilakukan dengan menggunakan sebuah program. Biasanya tujuannya adalah untuk meningkatkan rangking pada mesin pencari. Ini disebut sebagai spam komentar. Disinilah peran CAPTCHA diperlukan. Dengan menggunakan CAPTCHA, manusia hanya dapat memasukkan komentar di blog. Tidak perlu untuk membuat pengguna mendaftar sebelum mereka memasuki komentar.<br />
Melindungi Situs Pendaftaran<br />
Beberapa perusahaan (Yahoo, Microsoft, dll) menawarkan layanan email gratis. Sampai beberapa tahun yang lalu, kebanyakan dari layanan ini menderita jenis serangan tertentu: "bot" yang akan mendaftar untuk ribuan akun email setiap menit. Solusi untuk masalah ini adalah menggunakan CAPTCHA untuk memastikan bahwa hanya manusia yang akan memperoleh akun email. Secara umum, layanan bebas harus dilindungi dengan CAPTCHA untuk mencegah penyalahgunaan oleh program otomatis.<br />
Mencegah Serangan Kamus<br />
Selain hal diatas, CAPTCHA juga dapat digunakan untuk mencegah terjadinya serangan kamus dalam sistem sandi. Idenya sederhana: mencegah komputer dari mampu iterate melalui seluruh ruang dari password dengan mengharuskan untuk memecahkan CAPTCHA setelah sejumlah login gagal.<br />
Search Engine Bot.<br />
Worms dan Spam<br />
CAPTCHA juga menawarkan solusi yang masuk akal terhadap cacing email dan spam: ". Saya hanya akan menerima email jika saya tahu ada manusia di balik komputer lain" Beberapa perusahaan sudah memasarkan ide ini.<br />
Setelah kita mengetahui fungsinya, sekarang kita akan membahas bagaimana aplikasi CAPTCHA ke website.<br />
Jika website Anda membutuhkan perlindungan dari spammer, Anda dapat menggunakan CAPTCHA. Namun dalam penggunaanya, ada beberapa pedoman yang sangat disarankan, antara lain :<br />
Aksesibilitas<br />
CAPTCHA harus dapat diakses, CAPTCHA hanya didasarkan pada teks membaca - atau persepsi visual-tugas - mencegah robot atau mesin dari mengakses sumber daya yang dilindungi. Selain berbentuk visual, sekarang CAPTCHA juga ada yang berbentuk audio. Hal ini dilakukan untuk memudahkan bagi user tunanetra.<br />
Security Image Gambar<br />
Dari teks harus terdistorsi secara acak sebelum disajikan kepada user. Banyak implementasi CAPTCHA menggunakan teks terdistorsi, atau teks dengan hanya distorsi kecil. Implementasi ini rentan terhadap serangan otomatis yang sederhana. <br />
Keamanan Script<br />
Membangun sebuah CAPTCHA yang aman tidak mudah. Selain membuat gambar terbaca oleh komputer, sistem harus memastikan bahwa tidak ada cara mudah sekitarnya di tingkat script. <br />
Meskipun kelihatannya aman, sebuah CAPTCHA masih mempunyai celah yang mungkin masih bisa ditembus, diantaranya :<br />
Mengeksploitasi bug dalam pelaksanaan yang memungkinkan penyerang untuk sepenuhnya bypass CAPTCHA<br />
Meningkatkan perangkat lunak pengenalan karakter, atau<br />
Menggunakan murah tenaga manusia untuk proses tes.<br />
<br />
<br />
Sobat Blogger, kita sudah membahas tentang fungsi, pedoman pemasangan, sampai celah yang mungkin bisa ditembus. Semoga coretan yang sedikit dan jelek ini bisa bermanfaat bagi kita semua. Silahkan dikoreksi, dan jangan lupa tinggalkan komentar.<br />
<br />
sumber : kaskusUnknownnoreply@blogger.com11tag:blogger.com,1999:blog-392812453638663635.post-77027573239525064582011-10-12T21:16:00.001+07:002011-10-12T21:19:21.241+07:00Versi Terbaru Opera Mini 6.5 dan Opera Mobile 11.5Opera, salah satu perusahaan peramban web raksasa telah meluncurkan dua produk terbaru mereka dalam event bertajuk “Up North Web” 2011 di Holkenkollen, Oslo Norwegia, pada tanggal 11 Oktober 2011 kemarin. Dua produk terbaru ini adalah versi terbaru mobile browser, yaitu Opera Mini 6.5 dan Opera Mobile 11.5. Kedua browser tersebut sudah bisa didownload secara gratis. Bagi pengguna ponsel Android, bisa mendownload melalui m.opera.com, sedangkan untuk platform yang lainnya akan segera hadir dalam beberapa hari ke depan.<br />
Sebenarnya apa sih yang membedakan dua versi ini dengan versi terdahulu? Salah satunya adalah adanya fitur data usage. Dengan adanya data usage, pengguna bisa melacak besarnya pemakaian data saat membuka suatu situs. User bisa melihat berapa besarnya data yang dihemat oleh server Opera dari halaman situs aslinya. Seperti kita ketahui bersama, urusan hemat-menghemat data adalah salah satu kelebihan yang ditawarkan oleh opera mini dan mobile. Mungkin ini tidak penting untuk Anda yang browsing di rumah, tapi ini akan sangat terasa bagi pengguna dengan kartu SIM atau buat yang bepergian ke luar negeri dan tak punya pilihan fitur roaming yang murah.<br />
Selain adanya fitur data usage, versi terbaru ini juga mengalami beberapa perbaikan dibanding dengan versi sebelumnya. Diantaranya adalah mesin rendering Presto versi terbaru, peningkatan kemampuan jaringan, dukungan HTML5 mikro data dan juga penghematan memori untuk pemakaian JavaScript. Selain itu, untuk Opera Mobile yang terbaru sudah mendukung inline video pada Honeycomb. Khusus untuk Anda pengguna Android, versi terbaru ini akan lebih memanjakan anda. Kedua versi terbaru ini lebih terintegrasi dengan system operasi Android. User dapat mengimpor “bookmarks” dari browser bawaan Android serta membuat “shortcut” dengan hanya dengan satu langkah saja.<br />
Bagaimana Sobat? Tertarik? Silahkan download <a href="http://www.opera.com/">DISINI</a>.<br />
<br />
<br />
Sumber : kompasUnknownnoreply@blogger.com5