Posts

Showing posts from 2010

Israel threatens to attack 'Rachel Corrie' relief ship

Image
According to news reports, Israel is pressuring the government of Ireland to order the ship "Rachel Corrie," which is carrying humanitarian aid to the Gaza Strip, to change course and dock at the Israeli port of Ashdod--or face the same fate as the freedom flotilla. In an attempt to justify its actions to the international community, the Israeli army on Thursday released footage showing that it was the flotilla activists that had started assaulting Israeli soldiers. Meanwhile, in Turkey, thousands of citizens celebrated the safe return of 527 Turkish activists from Israel, while angry protests continued to be staged all over the country. The New York Times reported that Turkey's role as guardian of the rights of Palestinians has denigrated Arab countries and thrown Egypt, Jordan and Saudi Arabia--the biggest allies of the West--on the defensive. The Guardian, for its part, reported that Egyptian President Hosni Mubarak was torn between siding with...

Worlds Antique Typewriter

Image

Brief History of Bibi Fatima Real Pictures

Image
I got a really great information and pictures i want to share with you. A Brief History Of Bibi Fatima (a.s)’s life: Birth: Bibi Fatimah Zehra [SA] the only daughter of the Holy Prophet Mohammed [PBUH] of Islam, was born in Mecca on 20th jumada ‘th-thaniyah 18 B.H. The good and noble lady Khadijah and the Apostle Of Allah bestowed all their natural love, care and devotion on their lovable and only child Fatimah, who in her turn was extremely fond of her parents. Character: The Princess of the House of the Prophet, was very intelligent, accomplished and cheerful. Her sermons, poems and sayings serve, as an index to her strength of character and nobility of mind. Her virtues gained her the title “Our Lady of Light”. She was tall, slender and endowed with great beauty, which caused her to be called ” az-Zahra’ ” (the Lady of Light). She was called az-Zahra’ also because her light used to shine among those in heaven. Marriage: After arriving in Medina, she was married to Hazrat Ali...

World's Longest Eyelashes Beauty

Image
This is really different and unique thing i found on internet, i think it should be in world record. the word longest Eyelashes, i dont know how she can hold on there eyes, and how she can see with these eyelashes or may be jut of time she put this on her eyes. however this really great thing....... that's why i am sharing with you...

Word No1 Bad Help Line PTCL

Hi, Friends how are you. i want to share something with you. The Word Bad Service of Help Lin and DSL Service of PTCL. i am sick of this service. Every time when i dial 1218 for the complaint of DSL Service i need to wait more than 30 to 40 min. I dont know what should i dot for this service. Any one have any idea what i do. when we dial helpline we need to listen advertisement 30 to 40 min of PTCL. i just upgrade my dls service from 2mb to 4mb. i the billing section ptcl change my billing form 2mb to 4mb but, they did not upgarde my dls package the dsl speed still 2mb. this is not happend with me first time. last time i downgrade my service frm 4mb to 2mb after 1month they take to downgrade my service. THIS IS BADEST (GANDI TAREEN) Service of our Pakistan number one Company situation. any one have any comment please write

iphone 4 vs HTC EVO 4G

Iphone 4 vs HTC EVO 4G

02 July Prize bonds Results 15000

Image
Prize bonds List

Mikrotik Load Balancing two GW DSL

Mikrotik Load Balancing October 25, 2007 by gustOmO dirdjOwidjOjO Setting Mikrotik ini mengambil dari blog mas Dwi Nanto dan MikroTik Wiki, dan telah disesuaikan sebagaimana perlunya …. modem 1 101.101.11.11 | | 101.101.11.12 ——– MIkrotik Load Balancing — 192.168.0.1 — hub — Client 101.101.12.12 | | modem 2 101.101.12.11 Pc-Router Speknya – Dual P-III – 800Mhz – Memory 64Mb – IDE Flash Disk 1 Gb Konfigurasinya 1. Interface Konfigurasi / interface ethernet set Modem1 name=”Modem1″ mtu=1500 mac-address=00:10:4B:0D:95:02 arp=enabled disable-running-check=yes auto-negotiation=yes full-duplex=yes cable-settings=default speed=100Mbps comment=”" disabled=no set Lan name=”Lan” mtu=1500 mac-address=00:0D:88:B2:7D:50 arp=enabled disable-running-check=yes auto-negotiation=yes full-duplex=yes cable-settings=default speed=100Mbps comment=”" disabled=no set Modem2 name=”Modem2″ mtu=1500 mac-address=00:13:46:2C:DE:13 arp=enabled disable-running-check=yes auto-negotiation=yes full-duplex=yes...

Excel TipsTricks Conditional Formatting

Conditional Formatting In Excel 2000, 2002, 2003 the contents of the cell or b) a formula (which can simply refer to another cell) Format based on the cell’s contents 1. Select the cells you want to format (remember you can hold Ctrl to select contiguous ranges). 2. Choose Format Conditional Formatting. 3. Choose Cell Value Is from the drop-down list. 4. Use the text boxes and drop down lists to create your condition. 5. Click the format button and set the format to apply when the condition is true. 6. Close the Format dialog box. Click Add if you want to apply more than one condition to this range of cells. If not, click OK. Format based on a formula 1. Select the cells you want to format (remember you can hold Ctrl to select contiguous ranges). 2. Choose Format Conditional Formatting. 3. Choose Formula Is from the drop-down list. 4. Enter an = symbol. 5. Create a formula that evaluates to either True or False. When creating the formula, create it for the first row and column in th...

MS Excel Worksheets Tips Tricks

Worksheets Renaming sheets Double-click the sheet tab and type a name of up to 32 characters. Spaces, hyphens, and underscores are allowed in worksheet names. Press Enter when finished. Coloring sheet tabs Excel 2002/2003 Only Right-click the sheet tab and choose Tab Color from the shortcut menu. Select a color. Moving worksheets in a workbook Drag the sheet tab to a new location. Copying a worksheet in a workbook Hold Ctrl and drag the sheet tab to a new location. Moving and copying between workbooks Right-click the sheet tab and choose Move or Copy to open the dialog box. Navigating between sheets Right-click the navigation buttons and select the sheet you want to move to OR Press Ctrl+PgDn to move to the next sheet; Ctrl+PgUp to move to the previous sheet; Ctrl+Tab to move to the next open workbook.

Pakistan Educaion ALL BISE Links

ALL Pakistan Educational Board Links BISE, Rawalpindi BISE Lahore BSE Karachi BIE Karachi BISE Gujranwala BISE Bahawalpur BISE Multan BISE Peshawar BISE Sargodha BISE Sukkur BISE Faisalabad Ministry of Education IBCC HEC schadenfreude refreshes the parts other beers cannot reach

How to Mikrotik Load Balancing

Mikrotik Load Balancing October 25, 2007 by gustOmO dirdjOwidjOjO Setting Mikrotik ini mengambil dari blog mas Dwi Nanto dan MikroTik Wiki, dan telah disesuaikan sebagaimana perlunya …. modem 1 100.100.1.1 | | 100.100.1.2 ——– MIkrotik Load Balancing — 192.168.0.1 — hub — Client 100.100.2.2 | | modem 2 100.100.2.1 1. Interface Configuration / interface ethernet set Modem1 name=”Modem1″ mtu=1500 mac-address=00:10:4B:0D:95:02 arp=enabled disable-running-check=yes auto-negotiation=yes full-duplex=yes cable-settings=default speed=100Mbps comment=”" disabled=no set Lan name=”Lan” mtu=1500 mac-address=00:0D:88:B2:7D:50 arp=enabled disable-running-check=yes auto-negotiation=yes full-duplex=yes cable-settings=default speed=100Mbps comment=”" disabled=no set Modem2 name=”Modem2″ mtu=1500 mac-address=00:13:46:2C:DE:13 arp=enabled disable-running-check=yes auto-negotiation=yes full-duplex=yes cable-settings=default speed=100Mbps comment=”" disabled=no 2. Ip Address Konfigurasi / ip ...

JNCIS-ES pre-accessment questions exam

JNCIS-SEC: Pre-assessment Exam )what are the common elements that JUNOS Software with enhanced services uses for a flow’s first and subsequent packets? C Select the best answer then click the forward arrow to submit A) zones, policy, servie ALG’s and NAT B) route, policy, NAT,and SCREEN options C) NAT, SCREEN options, and services ALG’s D) fast-path processing, route, NAT, and services ALG’s 2)Regarding a route-based versus policy-based IPSec VPN, which statement is true? D Select the best answer then click the forward arrow to submit A) A route-based VPN generally uses more resources than a policy-based VPN B) A route-based VPN cannot have a deny action in a policy;a policy-based VPN can have a deny action in a policy. C) A route-based VPN uses a policy referencing the IPSec VPN; a policy-based VPN policy does not use a policy referencing the IPSec VPN. D) A route-based VPN can support OSPF across the tunnel; a policy-based VPN cannot support OSPF across the tunnel. 3)What is the defa...

Mikrotik Signal Strength after Setup

Image

Mikrotik as ap Bridge Advanced Setting

Image

Mikrotik as ap bridge wireless setting

Image

Mikrotik As AP Bridge TX Power

Image

How to Copy and Paste in InDesign?

Image
A. Copy and Paste Naturally, you can copy frames and their content, together or separately, from within InDesign and paste elsewhere within InDesign. You can copy type from the middle of a story and paste it, too. I won’t waste your time talking about something as academic as that. I would like to spend a few paragraphs discussing what can and can’t be copied into InDesign from other applications and some of the things to watch out for when doing that. InDesign’s drawing tools are perfect for most common drawing tasks. When you need something a little more robust, however, haul out Illustrator. When you do that, you have a choice: Save the Illustrator file and place it into InDesign as an asset, or simply copy the artwork from Illustrator and paste into InDesign. Both methods works, and each has its pros and cons. InDesign understands vector paths and basic shapes about as well as Illustrator, and, more importantly, InDesign is wise enough to recognize when something—in this c...

Types Of Detection CCNP

1.1.1 Types Of Detection 1.1.1.1 Signature Detection Protecting the network against known attacks. Attackers often attack networks through tried and tested techniques from previously successful methods. These threats have been analyzed by network security engineers and a listed profile, or specific signature has been created. Signature detection methods examine network by looking for the threat’s fingerprint inside the network traffic and matching against an internal database of known attacks. Once an attack signature is determined, the security device delivers an attack response, mostly in a form of simple alarm or alert. Success in preventing these threats depends on the minute database of attack signatures, compiled from previous records. The drawback to systems on signature detection is clear: they can only detect threats for which there is a defined signature. If signature detection methods are employed to protect networks, the network is protected against known attacks on...

Top ten Security Tips for Network

Ten Security Tips 1. Require or encourage workers to choose passwords that are difficult to judge. 2. Workers should change passwords every three months. 3. Make sure your virus protection subscription up to date. 4. Educate workers about the security risks of electronic mail attachments. 5. Implement a comprehensive and complete network security solution. 6. Assess your security regularly. 7. When a worker leaves a company, remove immediately that employee’s network access. 8. If you allow employees to work from home then provide a secure server for remote traffic. 9. Make sure that your Web server software is up to date. 10. It is no recommended that you run unnecessary network services.

Types of IDS IPS CCNP

1.1 Types of IDS/IPS The following are the types of IDS/IPS 1.1.1 Network Based It performs packet sniffing and evaluates network traffic to recognize and prevent from suspicious activity. They are typically placed inline mode as a network firewall. They receive packets, examine them, decide if they should be permitted, and allow satisfactory packets to pass through. Figure 2- 3 Network based IPS 1.1.2 Host-based It is similar to network-based , apart from that a host-based product senses the characteristics of a single host and the events occurring within that host, similar to sensing network traffic (only for that specific host), system logs, running processes, file access and modification etc.

Cost Accounting B.Com Paper 2010

Image

Economics of Paksitan GuessPaper

Image

Money Banking Finance B.Com Paper

Image

Yahoo Messenger Signin Problem

Image
Yahoo Messenger recently change the setting previous version of yahoo messenger not signing. Peoples facing the yahoo messenger signing problem. if you are facing this problem just Upgrade Yahoo messenger in YAHOO 10. DOWNLOAD

Mikrotik Web Proxy with Nat Setting

Image

Open Blocked Web Site in any Country

How to Open Blocked Web Site Like Youtube, if any web site blocked in any Country by using proxy address you can open web site in your country i have some sample proxy address free for you. use it and enjoy it Thanks 061244235034.static.ctinets.com:3128 112.65.135.54:8080 114.143.12.28:8080 118.175.12.178:3128 118.228.148.52:3128 118.98.169.50:80 119.147.113.116:80 119.167.219.78:80 119.180.24.12:8080 119.245.230.164:80 119.62.128.38:80 119.70.40.101:8080 119.70.40.102:8080 121.10.120.214:80 121.14.158.76:80 121.30.255.38:8080 122.139.57.46:80 122.139.60.102:8080 122.224.33.10:80 122.224.33.4:80 125.64.96.21:8008 147.91.193.101:80 173-203-206-253.static.cloud-ips.com:80 174.142.104.57:3128 174.142.24.201:3128 174.142.24.203:3128 174.142.24.205:3128 174.142.24.206:3128 187.51.150.2:8080 189.115.161.205.static.gvt.net.br:8080 189.3.177.146:8080 189.3.47.146:3128 189.3.50.34:3128 196.12.52.2:80 196.38.158.197:80 201.45.216.115:3128 201.73.223.150:8080 202.51.105.10:3128 202.51.107.37:8080...

Classifying Network Security Threats CCNP

Classifying Network Security Threats Network security threats can be classified into four broad terms: 1.1.1.1 Unstructured Threats These initiate mostly from non familiar users by using easy existing hacking applications from the Internet. Some of the users in this class are inspired by malicious target but most are encouraged by the academic challenges are known as script kiddies. They are not the most experienced users, or programmers but they have the time and courage. Trojan horse can be explained as software that executes a game on the user’s system. While the user is playing the game, it mails a copy of itself to every client in the user’s contact book. Then other clients get the game and play it, in this case, the Trojan horse spreads.[5] 1.1.1.2 Structured Threats These initiate from users that are motivated and technically competent than script kiddies. They capable of understanding network systems design and the threat of those systems. They have the ability to create ...

Basic Types of Attacks Network Attacks

Basic Types of Attacks Attack (Single Packet Attack) Atomic Attack (Multi Packet Attack) Types of Network Attacks Attacks Reconnaissance is basically an unauthorized user access to acquire the knowledge of network system devices, applications running on those systems, and the weakness of those systems. This phenomenon is also known as information gathering and, it often precedes a real access or Denial of Service (DoS) attack. 1.1.1.2 Access Attacks Access is a wide terminology that explains to the ability of a certain source to connect to a specific destination. When a destination has been aimed, the intruder will attempt to use some application to trap the victim. This attack can come in the form of unauthorized data recovery or system access. Through this attack hacker can install software on computer which can be used later infect he can perform any action he want. 1.1.1.3 DoS Attacks DoS is an activity when the hacker corrupts the networks, systems, or services in order to ...

Importance of Security CCNP

Importance of Security The Internet has indeed become the largest data network, enabling and facilitating both personal and industrial communications all over world. The traffic moving over the Internet, as well as commercial networks, is developing exponentially daily. Communication is taking place via electronic mail, mobile users, telecommuters, and regional offices are using the Internet to remotely connect to their business networks, and commercial communication completed over the Internet, via the WWW (World Wide Web). The Internet has changed and greatly expanded according to the need of business, this wide network and its linked technologies have opened the door to an increasing number of security attacks from which companies must guard them. Network attacks are more serious when they are imposed upon businesses that store sensitive data, for example personal financial or medical records, sensitive data can be lost, privacy can be violated, and many hours, or even weeks, of net...

Facebook and Youtube Blocked in Pakistan

This is great decision taken by Pakistan Government to Block Facebook and Youtube in Pakistan. Justice Ejaz Ahmed Chaudhry of the Lahore High Court ordered PTA to ban facebook in Pakistan. The court directed foreign secretary to protest against the competition of blasphemous cartoons on facebook.I also request all Muslim Countries Block all the Website have data against the Muslim Communities and about Islamic Religion. Another Website have against our muslim communities http://www.theallfaith.com Request to PTA Please also block this website in Pakistan

Banned Websites in Pakistan Facebook youtube

PTA Block Website on Pakistani Internet. - http://www.facebook.com - http://www.rahimjaandehvari.blogfa.com - http://www.rahimjaandehvari.blogfa.com - http://balochwarna.org.modules/news/ - http://www.zrombesh.org - http://www.balochunitedfront.org - http://www.ostomaan.org - http://www.bso_na.com - http://www.balochclub.com - http://balochestan.com - http://www.balochistaninfo.com - http://www.bso-na.org - http://www.balochtawar.net/brw/ - http://oldmanclub.persianblog.com/ - http://www.al-baloushi.com/ - http://www.hazzaam.com/hazzaam.com/ - http://www.balochmedia.net - http://www.radiobalochi.org.archives/meny_shajarehname_aks.htm - http://www.balushunion.com - http://www.payambaloch.persianblog.com - http://www.balochistan.cjb.not/ - http://www.sarbaaz.com - http://www.balouch.blogspot.com - http://balouch.blogspot.com - http://dochebaloch.persianblog.com - http://www.sagaar.tk - http://ngaran.blogfa.com - http://www.brohi.tk - http://www.balochistanin...

Advance Accounting B.Com Past Guess Paper

Image