Israel threatens to attack 'Rachel Corrie' relief ship


According to news reports, Israel is pressuring the government of Ireland to order the ship "Rachel Corrie," which is carrying humanitarian aid to the Gaza Strip, to change course and dock at the Israeli port of Ashdod--or face the same fate as the freedom flotilla.

In an attempt to justify its actions to the international community, the Israeli army on Thursday released footage showing that it was the flotilla activists that had started assaulting Israeli soldiers.

Meanwhile, in Turkey, thousands of citizens celebrated the safe return of 527 Turkish activists from Israel, while angry protests continued to be staged all over the country.

The New York Times reported that Turkey's role as guardian of the rights of Palestinians has denigrated Arab countries and thrown Egypt, Jordan and Saudi Arabia--the biggest allies of the West--on the defensive.

The Guardian, for its part, reported that Egyptian President Hosni Mubarak was torn between siding with the Arabs and safeguarding his country's interests with neighboring Israel.

In a related development, Arab diplomats called for activating Arab League resolutions and urging the UN Security Council to indict Israel for its recent actions.

In Cairo, 50 activists and public figures on Thursday submitted a note to the attorney-general requesting the arrest of Israeli Prime Minister Binyamin Netanyahu and his defense minister Ehud Barak on war crimes charges for their involvement in the freedom flotilla massacre.

Translated from the Arabic Edition.

Worlds Antique Typewriter










Brief History of Bibi Fatima Real Pictures

I got a really great information and pictures i want to share with you.

A Brief History Of Bibi Fatima (a.s)’s life:

Birth:

Bibi Fatimah Zehra [SA] the only daughter of the Holy Prophet Mohammed [PBUH]
of Islam, was born in Mecca on 20th jumada ‘th-thaniyah 18 B.H.
The good and noble lady Khadijah and the Apostle Of Allah
bestowed all their natural love, care and devotion on
their lovable and only child Fatimah, who in her turn was extremely
fond of her parents.

Character:

The Princess of the House of the Prophet, was very intelligent,
accomplished and cheerful. Her sermons, poems and sayings serve,
as an index to her strength of character and nobility of mind.
Her virtues gained her the title “Our Lady of Light”. She was tall,
slender and endowed with great beauty, which caused her to be called
” az-Zahra’ ” (the Lady of Light). She was called az-Zahra’
also because her light used to shine among those in heaven.

Marriage:

After arriving in Medina, she was married to Hazrat Ali A.S,
in the first year after Hijrah, and she gave birth to three sons
and two daughters. Her children, Hasan, Husayn, Zaynab and Umm Kulthum
are well-known for their piety, goodness and generosity. Their
strength of character and actions changed the course of history.
The Holy Prophet [PBUH] said, “Fatimah SA is a piece of my heart”.
He would go out to receive his daughter whenever she came from
her husband’s house. Every morning on his way to the Mosque,
he would pass by Fatimah’s house and say, “as-Salamu ‘alaykum ya ahli
bayti ‘n-nubuwwah wa ma’dani ‘r-risalah” (peace be on you O the
Household of Prophethood and the Source of Messengership).

The Best Woman:

Fatimah is famous and acknowledged as the “Sayyidatu nisa’i ‘l-’alamin”
(Leader of all the women of the world for all times) because
the Prophethood of Muhammad would not have been everlasting
without her. The Prophet is the perfect example for men,
but could not be so for women. For all the verses revealed in
the Holy Qur’an for women, Fatimah is the perfect model, who
translated every verse into action. In her lifetime, she was a
complete woman,being Daughter, Wife and Mother at the same time.
As a daughter, she loved her parents so much, that she won their
love and regard to such an extent that the Holy Prophet used to rise,
whenever she came near him. As a wife, she was very devoted.
she never asked Hazrat ‘Ali (A.S) for anything in her whole life.
As a mother, she cared for and brought up wonderful children;
they have left their marks on the face of the world, which
time will not be able to eraze.























World's Longest Eyelashes Beauty

This is really different and unique thing i found on internet, i think it should be
in world record.
the word longest Eyelashes, i dont know how she can hold on there eyes, and how she can see with these eyelashes or may be jut of time she put this on her eyes.
however this really great thing....... that's why i am sharing with you...








Word No1 Bad Help Line PTCL

Hi,
Friends how are you. i want to share something with you. The Word Bad Service of Help Lin
and DSL Service of PTCL. i am sick of this service. Every time when i dial 1218 for the complaint
of DSL Service i need to wait more than 30 to 40 min. I dont know what should i dot for this
service.

Any one have any idea what i do. when we dial helpline we need to listen advertisement 30 to 40 min of PTCL.

i just upgrade my dls service from 2mb to 4mb. i the billing section ptcl change my billing
form 2mb to 4mb but, they did not upgarde my dls package the dsl speed still 2mb.
this is not happend with me first time.
last time i downgrade my service frm 4mb to 2mb after 1month they take to downgrade my service.

THIS IS BADEST (GANDI TAREEN) Service of our Pakistan number one Company situation.

any one have any comment please write

iphone 4 vs HTC EVO 4G

Iphone 4 vs HTC EVO 4G

02 July Prize bonds Results 15000


Prize bonds List

Mikrotik Load Balancing two GW DSL

Mikrotik Load Balancing

October 25, 2007 by gustOmO dirdjOwidjOjO

Setting Mikrotik ini mengambil dari blog mas Dwi Nanto dan MikroTik Wiki, dan telah disesuaikan sebagaimana perlunya ….

modem 1
101.101.11.11
|
|
101.101.11.12
——– MIkrotik Load Balancing — 192.168.0.1 — hub — Client
101.101.12.12
|
|
modem 2
101.101.12.11

Pc-Router Speknya
– Dual P-III – 800Mhz
– Memory 64Mb
– IDE Flash Disk 1 Gb

Konfigurasinya

1. Interface Konfigurasi

/ interface ethernet
set Modem1 name=”Modem1″ mtu=1500
mac-address=00:10:4B:0D:95:02 arp=enabled
disable-running-check=yes auto-negotiation=yes
full-duplex=yes cable-settings=default
speed=100Mbps comment=”" disabled=no

set Lan name=”Lan” mtu=1500
mac-address=00:0D:88:B2:7D:50 arp=enabled
disable-running-check=yes auto-negotiation=yes
full-duplex=yes cable-settings=default
speed=100Mbps comment=”" disabled=no

set Modem2 name=”Modem2″ mtu=1500
mac-address=00:13:46:2C:DE:13 arp=enabled
disable-running-check=yes auto-negotiation=yes
full-duplex=yes cable-settings=default
speed=100Mbps comment=”" disabled=no

2. Ip Address Konfigurasi

/ ip address
add address=192.168.0.1/24 network=192.168.0.0
broadcast=192.168.0.255
interface=Lan comment=”" disabled=no

add address=10.10.1.2/24 network=10.10.1.0
broadcast=10.10.1.255
interface=Modem1 comment=”" disabled=no

add address=10.10.2.2/24 network=10.10.2.0
broadcast=10.10.2.255
interface=Modem2 comment=”" disabled=no

3. Routing IP

/ ip route
add dst-address=0.0.0.0/0 gateway=10.10.2.1 scope=255
target-scope=10 routing-mark=odd
comment=”" disabled=no

add dst-address=0.0.0.0/0 gateway=10.10.1.1 scope=255
target-scope=10 routing-mark=even
comment=”" disabled=no

add dst-address=0.0.0.0/0 gateway=10.10.1.1 scope=255
target-scope=10 comment=”" disabled=no

4. Mangle Marking Paket

/ ip firewall mangle
add chain=prerouting in-interface=Lan
connection-state=new nth=1,1,0
action=mark-connection new-connection-mark=odd
passthrough=yes comment=”Load Balancing” disabled=no

add chain=prerouting in-interface=Lan
connection-mark=odd action=mark-routing
new-routing-mark=odd passthrough=no
comment=”" disabled=no

add chain=prerouting in-interface=Lan
connection-state=new nth=1,1,1
action=mark-connection new-connection-mark=even
passthrough=yes comment=”" disabled=no

add chain=prerouting in-interface=Lan
connection-mark=even action=mark-routing
new-routing-mark=even passthrough=no
comment=”" disabled=no

add chain=postrouting out-interface=Lan
dst-address=192.168.0.2 action=mark-packet
new-packet-mark=operator-down passthrough=no

5. Buat rule nat-masquerade untuk network 192.168.0.0/24 [IP - Firewall - Nat]

/ ip firewall nat
add chain=srcnat src-address=192.168.0.0/24
action=masquerade

add chain=srcnat connection-mark=odd action=src-nat
to-addresses=10.10.2.2 to-ports=0-65535

add chain=srcnat connection-mark=even action=src-nat
to-addresses=10.10.1.2 to-ports=0-65535

6. Setting DNS

/ ip dns set
primary-dns=202.134.1.10 secondary-dns=202.134.0.155
allow-remote-requests=yes cache-size=4096KiB
cache-max-ttl=1w cache-used=90KiB
Ads by Google

Excel TipsTricks Conditional Formatting

Conditional Formatting
In Excel 2000, 2002, 2003

the contents of the cell or b) a formula (which can simply refer to another cell)
Format based on the cell’s
contents

1. Select the cells you want to format (remember you can hold Ctrl to
select contiguous ranges).

2. Choose Format Conditional Formatting.

3. Choose Cell Value Is from the drop-down list.

4. Use the text boxes and drop down lists to create your condition.

5. Click the format button and set the format to apply when the
condition is true.

6. Close the Format dialog box. Click Add if you want to apply more
than one condition to this range of cells. If not, click OK.
Format based on a formula 1. Select the cells you want to format (remember you can hold Ctrl to
select contiguous ranges).

2. Choose Format Conditional Formatting.

3. Choose Formula Is from the drop-down list.

4. Enter an = symbol.

5. Create a formula that evaluates to either True or False. When
creating the formula, create it for the first row and column in the
selected range. You’ll probably need to delete at least one $ from
the cell references.

6. Click the Format Button and set the format to apply when the
condition is true.

MS Excel Worksheets Tips Tricks

Worksheets

Renaming sheets
Double-click the sheet tab and type a name of up to 32 characters.
Spaces, hyphens, and underscores are allowed in worksheet names.
Press Enter when finished.

Coloring sheet tabs
Excel 2002/2003 Only
Right-click the sheet tab and choose Tab Color from the shortcut menu.
Select a color.

Moving worksheets in a
workbook

Drag the sheet tab to a new location.
Copying a worksheet in a

workbook
Hold Ctrl and drag the sheet tab to a new location.

Moving and copying
between workbooks
Right-click the sheet tab and choose Move or Copy to open the dialog
box.

Navigating between sheets Right-click the navigation buttons and select the sheet you want to
move to OR

Press Ctrl+PgDn to move to the next sheet; Ctrl+PgUp to move to the
previous sheet; Ctrl+Tab to move to the next open workbook.

Pakistan Educaion ALL BISE Links

ALL Pakistan Educational Board Links

BISE, Rawalpindi
BISE Lahore
BSE Karachi
BIE Karachi
BISE Gujranwala
BISE Bahawalpur
BISE Multan
BISE Peshawar
BISE Sargodha
BISE Sukkur
BISE Faisalabad
Ministry of Education
IBCC
HEC


schadenfreude refreshes the parts other beers cannot reach

How to Mikrotik Load Balancing

Mikrotik Load Balancing

October 25, 2007 by gustOmO dirdjOwidjOjO

Setting Mikrotik ini mengambil dari blog mas Dwi Nanto dan MikroTik Wiki, dan telah disesuaikan sebagaimana perlunya ….

modem 1
100.100.1.1
|
|
100.100.1.2
——– MIkrotik Load Balancing — 192.168.0.1 — hub — Client
100.100.2.2
|
|
modem 2
100.100.2.1


1. Interface Configuration

/ interface ethernet
set Modem1 name=”Modem1″ mtu=1500
mac-address=00:10:4B:0D:95:02 arp=enabled
disable-running-check=yes auto-negotiation=yes
full-duplex=yes cable-settings=default
speed=100Mbps comment=”" disabled=no

set Lan name=”Lan” mtu=1500
mac-address=00:0D:88:B2:7D:50 arp=enabled
disable-running-check=yes auto-negotiation=yes
full-duplex=yes cable-settings=default
speed=100Mbps comment=”" disabled=no

set Modem2 name=”Modem2″ mtu=1500
mac-address=00:13:46:2C:DE:13 arp=enabled
disable-running-check=yes auto-negotiation=yes
full-duplex=yes cable-settings=default
speed=100Mbps comment=”" disabled=no

2. Ip Address Konfigurasi

/ ip address
add address=192.168.0.1/24 network=192.168.0.0
broadcast=192.168.0.255
interface=Lan comment=”" disabled=no

add address=10.10.1.2/24 network=10.10.1.0
broadcast=10.10.1.255
interface=Modem1 comment=”" disabled=no

add address=10.10.2.2/24 network=10.10.2.0
broadcast=10.10.2.255
interface=Modem2 comment=”" disabled=no

3. Routing IP

/ ip route
add dst-address=0.0.0.0/0 gateway=10.10.2.1 scope=255
target-scope=10 routing-mark=odd
comment=”" disabled=no

add dst-address=0.0.0.0/0 gateway=10.10.1.1 scope=255
target-scope=10 routing-mark=even
comment=”" disabled=no

add dst-address=0.0.0.0/0 gateway=10.10.1.1 scope=255
target-scope=10 comment=”" disabled=no

4. Mangle Marking Paket

/ ip firewall mangle
add chain=prerouting in-interface=Lan
connection-state=new nth=1,1,0
action=mark-connection new-connection-mark=odd
passthrough=yes comment=”Load Balancing” disabled=no

add chain=prerouting in-interface=Lan
connection-mark=odd action=mark-routing
new-routing-mark=odd passthrough=no
comment=”" disabled=no

add chain=prerouting in-interface=Lan
connection-state=new nth=1,1,1
action=mark-connection new-connection-mark=even
passthrough=yes comment=”" disabled=no

add chain=prerouting in-interface=Lan
connection-mark=even action=mark-routing
new-routing-mark=even passthrough=no
comment=”" disabled=no

add chain=postrouting out-interface=Lan
dst-address=192.168.0.2 action=mark-packet
new-packet-mark=operator-down passthrough=no

5. Buat rule nat-masquerade untuk network 192.168.0.0/24 [IP - Firewall - Nat]

/ ip firewall nat
add chain=srcnat src-address=192.168.0.0/24
action=masquerade

add chain=srcnat connection-mark=odd action=src-nat
to-addresses=10.10.2.2 to-ports=0-65535

add chain=srcnat connection-mark=even action=src-nat
to-addresses=10.10.1.2 to-ports=0-65535

6. Setting DNS

/ ip dns set
primary-dns=202.134.1.10 secondary-dns=202.134.0.155
allow-remote-requests=yes cache-size=4096KiB
cache-max-ttl=1w cache-used=90KiB

JNCIS-ES pre-accessment questions exam

JNCIS-SEC: Pre-assessment Exam

)what are the common elements that JUNOS Software with enhanced services uses for a flow’s first and subsequent packets? C

Select the best answer then click the forward arrow to submit

A) zones, policy, servie ALG’s and NAT
B) route, policy, NAT,and SCREEN options
C) NAT, SCREEN options, and services ALG’s
D) fast-path processing, route, NAT, and services ALG’s

2)Regarding a route-based versus policy-based IPSec VPN, which statement is true? D

Select the best answer then click the forward arrow to submit

A) A route-based VPN generally uses more resources than a policy-based VPN
B) A route-based VPN cannot have a deny action in a policy;a policy-based VPN can have a deny action in a policy.
C) A route-based VPN uses a policy referencing the IPSec VPN; a policy-based VPN policy does not use a policy referencing the IPSec VPN.
D) A route-based VPN can support OSPF across the tunnel; a policy-based VPN cannot support OSPF across the tunnel.

3)What is the default behavior if incoming transit traffic does not match any configured security policy? B
Select the best answer then click the forward arrow to submit

A) Default policy is applied and the traffic is looged.
B) Default policy is applied and the traffic is dropped.
C) The device checks the junos-global policy list and traffic is permitted or denied accordingly.
D) The device checks the host-inbound-traffic service list and traffic is permitted or denied accordingly.

4) which command determines if snmpd is running? D
Select the best answer then click the forward arrow to submit

A) user@host> show system cpu|match snmpd
B) user@host> show system log|match snmpd
C) user@host> show system snmp|match snmpd
D) user@host> show system processes|match snmpd

5)you want to configure a policy that allows traffic to a particular host.
which step must you perform before committing a configuration with thw policy? C
Select the best answer then click the forward arrow to submit

A)Define a static route to the host
B)Ensure that the router can ping the host
C)Define an address book entry for the host.
D)Ensure that the router has an ARP entry for the host.

6)Which statement accurately describes suspicious packet attacks? D
Select the best answer then click the forward arrow to submit

A)Suspicious packet attacks are a form of DoS attacks and are used to bypass firewalls.
B)Suspicious packet attaks are used in OS probes to learn the traget’s operating system.
C)Suspicious packet attacks involve ICMP echo requests and UDP flood overloading the targets.
D)Suspicious packet attacks involve specially crafter packets, which could involve SYN fragments, bad IP options, unknown protocols, ICMP abnormalities, or IP packet fragments.

7) Which two policy actions are valid? A D
Select all of the correct answers then click the forward arrow to submit

A)NAT
B)ALG application.
C)IP options setting.
D)firewall authentication

8) which configuration keyword ensures that all-in progress sessions are re-evaluated upon committing a policy change? A
Select the best answer then click the forward arrow to submit

A)policy-rematch;
B)policy-evaluate;
C)rematch-policy;
D)evaluate-policy;

9) Which two statements regarding symmetric key encryption are true? B C
Select all of the correct answers then click the forward arrow to submit

A)The same key is used for encryption and decryption
B)It is commonly used to create digital certificate signatures.
C)It uses two keys:one for encryption and a different key for decryption.
D)An attacker can decrypt data if the attacker captures the key used for encryption

10) Which security of functional zone name has special significance to the JUNOS software with enhanced services? D
Select the best answer then click the forward arrow to submit

A)self
B)trust
C)untrust
D)junos-global

11)Which two statements are true about policy-based destination NAT? A C
Select all of the correct answers then click the forward button to submit

A) It also supports PAT.
B) It supports one-to-many translations.
C) It requires you to configure a securirty zone.
D) It requires you to configure an address in the junos-global zone.

12) Which packet type would match the session in the table entry? D
user@host>show security flow session Session ID: 1495, Policy name:default-permit/7, Timeout;
1778
in:172.19.51.162/52071—> 10.1.10.10/23;tcp, if : ge-0/0/0.0
Out: 10.10.10.10/23 —> 172.19.51.162/52071;tcp, if:ge-0/0/3.0
Select the best answer then click the forward arrow to submit

A) ESP packet from 172.19.51.162 to 10.1.10.10
B) ICMP packet from 172.19.51.162 to 10.1.10.10
C) HTTP packet from 172.19.51.162 to 10.1.10.10
D) Telnet packet from 172.19.51.162 to 10.1.10.10

13) Which interface is used to Config Sync, RTO Sync, and forwarding traffic between the devices in a cluster?D
Select the best answer then click the forward arrow to submit

A) the sp interface
B) the reth interface
C) the fxp1 and fxp0 interfaces
D) the fab0 and fab1 interfaces.

14) Which VRRP interface configuration option allows the router to respond to ICMP echo requestes sent to the VRRP addresses?D
Select the best answer then click the forward arrow to submit

A) allow-ping;
B) allow-data;
c) accept-ping;
d) accept-data;

15)How do you group interfaces with similar security requirements?A
Select the best answer then click the forward arrow to submit

A) zones
B) policies
C) address book
D) NAT configuration

16) Which three security concerns can be addressed by a tunnel mode IPSec VPN secured by ESP?A B C
Select the best answer then click the forward arrow to submit

A) data integrity
B) data confidentiality
C) data authentication
D) outer IP header confidentiality
E) outer IP header authentication.

17) which statement is true?A
Select the best answer then click the forward arrow to submit

A) A logical interface can be assigned to a functional zone.
B) A security zone must contain two or more logical interaces.
C) A logical interface can be assigned to multiple security zones.
D) A logical interface can be assigned to a functional zone and a security zone simultaneously.

18) which two statements are true about overflow pools? B,D
Select the best answer then click the forward arrow to submit

A) Overflow pools do not support PAT.
B) overflow pools can be used only when source NAT with PAT is configured.
C) Overflow pools can be used only when source NAT without PAT is configured.
D) overflow pools can contain the interface IP address or separate IP addresses.

19)Host A opens a Telent connection to Host B. Host A then opens another Telnet connection to Host B. These connections are the only communication between Host A and Host B. The security policy configuration permits both connections.

How many sessions exist between Host A and Host B? B

Select the best answer then click the forward arrow to submit.

A) 1
b) 2
C) 3
D) 4

Mikrotik Signal Strength after Setup

Mikrotik as ap Bridge Advanced Setting

Mikrotik as ap bridge wireless setting

Mikrotik As AP Bridge TX Power

How to Copy and Paste in InDesign?

A. Copy and Paste
Naturally, you can copy frames and their content, together or separately, from within InDesign and paste elsewhere within InDesign. You can copy type from the middle of a story and paste it, too. I won’t waste your time talking about something as academic as that. I would like to spend a few paragraphs discussing what can and can’t be copied into InDesign from other applications and some of the things to watch out for when doing that.

InDesign’s drawing tools are perfect for most common drawing tasks. When you need something a little more robust, however, haul out Illustrator. When you do that, you have a choice: Save the Illustrator file and place it into InDesign as an asset, or simply copy the artwork from Illustrator and paste into InDesign. Both methods works, and each has its pros and cons. InDesign understands vector paths and basic shapes about as well as Illustrator, and, more importantly, InDesign is wise enough to recognize when something—in this case, Illustrator—is more knowledgeable than itself. Take, for instance, live effect 3D objects created in Illustrator. InDesign is a page layout application; it has no concept of 3D space beyond x and y coordinates and basic stacking order.

Draw a path in Illustrator, apply a 3D Revolve effect to spin the path into a vase or ashtray, and the path remains infinitely editable (because it’s a nondestructive effect in Illustrator). InDesign, however, doesn’t have a 3D Revolve effect, has no concept of lighting—three-dimensional or otherwise—and just doesn’t get it. Consequently, you might expect that copying the 3D object from Illustrator and pasting into InDesign would result in just the original path, sans 3D, in InDesign. Fortunately, if that’s what you expected, you’d be wrong.


In Figure A, you can see three versions of an urn. In Illustrator, I drew a relatively simple path (highlighted on the left) and revolved it into a 3D urn. This is a live effect—I can change the path at any time and the 3D Revolve effect will update the three-dimensional shape to match my changes. The center version is the same object copied from Illustrator and pasted into InDesign. Notice how it looks identical? What really happened is that the 3D effect was converted to flat paths, maintaining the object’s appearance by sacrificing the reality. If I ungrouped the paths in InDesign, I’d be left with hundreds of little slivers, which you can see as individual paths in the picture on the right. That one is the object copied in InDesign and pasted back into Illustrator. The ability to edit the 3D shape easily is gone; if I needed to change the shape or color of the urn, I’d have to spend hours doing it. In this case, I’d re-create the object from scratch, hoping I remembered or could re-create the exact 3D Revolve settings, light source positions, and so on. Odds are, it would take me less than five minutes to re-create the urn; with something complicated, though, I could be looking at hours or days worth of redrawing time just because I thought copy and paste would be faster initially.


There’s the pro and the con: You can copy native objects from Illustrator and have them become native objects in InDesign—no rasterization. Draw a couple of rectangles or stars in Illustrator, paste them into InDesign, and you can edit their paths further there. You can also change their colors and transparency, move around the constituent objects in a group pasted in, and so on. However, if you get something InDesign doesn’t understand—like the 3D urn— InDesign will make it understandable and could thereby reduce or eliminate your ability to later edit the object.

If it takes more than 1 minute to draw in Illustrator, I’ll save the AI file and place it rather than copy and paste to InDesign. I would much rather retain editability of a drawing than worry about managing one more external asset.
The same is true of Photoshop images. While you can copy and paste from Photoshop to InDesign, and it’s great for little bits here and there, you lose a lot. The first to go is transparency; pasted images are flattened onto a white background. Not even InDesign’s Object>Clipping Path>Option command will get rid of the white. The same is true if you drag one or more layers from Photoshop and drop them into InDesign. Other things to watch out for include transparency—Illustrator transparency flattens upon paste or drag into InDesign—and color. Both Illustrator and Photoshop support color models InDesign does not, like Web-Safe RGB, HSL, and Grayscale. The latter will become tints of process black (the K in CMYK), while the former two will convert to the RGB color space. Spot colors survive unless they’re from a library InDesign doesn’t have, such as Visibone2, in which case they’re-converted to the nearest match CMYK process values. Simple Illustrator gradients—linear, radial— will convert to InDesign gradients and may be edited after paste, but more complicated ones or gradient meshes become individual vector paths in InDesign (think of the urn). Illustrator patterns become embedded EPS images and are no longer editable.

Objects or elements coming into InDesign via paste or drag and drop will be permanently converted, whereas placed assets only appear within InDesign using that application’s supported color models; the actual colors and spaces will survive unchanged inside the external assets and thus through to output. This can also be a gotcha: An image saved in HSL (Hue, Saturation, Luminosity) will look RGB in the layout, enticing you to forget that the asset is not RGB, and may later cause problems with a RIP that doesn’t know how to convert from HSL. Preflight and Package for Print will pick up on the color space and alert you, though, so keep an eye on those.

Text from nearly any application—including Photoshop and Illustrator—can be pasted into (or from) InDesign, though, by default, text will lose its formatting upon paste. Back on the Clipboard Handling pane of InDesign’s Preferences, you can change that behavior by toggling the setting for When Pasting Text and Tables from Other Applications to All Information instead of the default Text Only.

Other Flavours of Paste
No, I don’t mean to discuss the chunky white bottled paste we found so delicious as pre-nap snack in kindergarten. I mean Paste without Formatting, Paste Into, and Paste in Place. They aren’t strictly for getting assets into InDesign, but at this point in the discussion, they are relevant. When the Clipboard Handling preference is changed to preserve formatting, swatches, styles, and so forth on pasted text, there is a way to override it and paste unformatted text per instance.
This same method is very helpful for copying and pasting from one place or document in InDesign to another.

On the Edit menu is the Paste without Formatting command. Instead of using Cmd+V/Ctrl+V to execute a normal paste, use Cmd+Shift+V/Ctrl+Shift+V to paste text without any formatting. Pasted text will then take on the attributes assigned to the frame or surrounding text, including style, formatting, color, and so on. Just below that command is Paste Into, which is a nifty command to know when you want to accomplish one of these tasks:

> Paste one container (with or without content) inside another container
> Move or copy an image (or text) from one frame to another without having to go through a fresh place routine
>Clip or mask a group of objects by pasting into a frame in the shape of the desired mask

Next is Paste in Place. Copy an object, then choose Paste in Place to put a duplicate directly above, and perfectly aligned with, the original (there is no Paste Behind as in Illustrator). Also, less obvious, is that Paste in Place doesn’t so much paste one copy atop the original as it does paste the copy in the exact same place as the original. Huh? Six of one thing, half dozen of the other. No, it’s not the same thing. Copy an object. Now, go to the next page. Paste with a standard Cmd+V/Ctrl+V. What happens? The pasted object shows up dead center of the document window. Change your view— scroll around, zoom—and paste once more; again, the object is dead center of the document window. Now, paste in place instead. The copy is pasted at the exact same coordinates as its original, the source from which the copy was made. The advantage to using Paste in Place instead of a standard Paste (or Edit >Duplicate for that matter) is that it does almost the same thing, but there’s no need to also manually position the copy. You can run through an entire document, blindly using the paste in place keyboard shortcut, and know that the object is inserted in the exact same position on every page
You might also like: i get this Tutorial from
http://profesorazii.blogspot.com

Types Of Detection CCNP

1.1.1 Types Of Detection

1.1.1.1 Signature Detection
Protecting the network against known attacks. Attackers often attack networks through tried and tested techniques from previously successful methods. These threats have been analyzed by network security engineers and a listed profile, or specific signature has been created. Signature detection methods examine network by looking for the threat’s fingerprint inside the network traffic and matching against an internal database of known attacks. Once an attack signature is determined, the security device delivers an attack response, mostly in a form of simple alarm or alert.

Success in preventing these threats depends on the minute database of attack signatures, compiled from previous records. The drawback to systems on signature detection is clear: they can only detect threats for which there is a defined signature. If signature detection methods are employed to protect networks, the network is protected against known attacks only.

1.1.1.2 Anomaly Detection
Protecting against unknown attacks.
Anomaly detection techniques are required when hackers find out new security weaknesses and run to develop the new weakness. After that there are no existing threat signatures. For example Code Red virus which could not be sensed through an existing signature. To identify these first strikes, IDS can use anomaly detection methods, in which network traffic is compared with a baseline to recognize irregular and harmful behavior. These anomaly methods are looking for numerical abnormalities in the data, as well as protocol doubts and application activity.

1.1.1.3 Denial of Service (DoS) Detection
Protecting against network and system overload.
DoS and Distributed DoS attacks deny legal users access to serious network services. Attackers achieve this by inducting attacks that consume network bandwidth or host processing cycles or other network resources. DoS attacks is causing some of the biggest brands to let down users and investors as Web sites became unreachable to users and partners sometimes for up to whole day. IDS manufactured goods often compare current traffic activities with adequate normal activity to detect DoS attacks, while normal traffic is distinguished by a set of pre-programmed entries. This can guide to false alarms being missed due to the attack traffic is below the threshold

Top ten Security Tips for Network

Ten Security Tips

1. Require or encourage workers to choose passwords that are difficult to judge.
2. Workers should change passwords every three months.
3. Make sure your virus protection subscription up to date.
4. Educate workers about the security risks of electronic mail attachments.
5. Implement a comprehensive and complete network security solution.
6. Assess your security regularly.
7. When a worker leaves a company, remove immediately that employee’s network access.
8. If you allow employees to work from home then provide a secure server for remote traffic.
9. Make sure that your Web server software is up to date.
10. It is no recommended that you run unnecessary network services.

Types of IDS IPS CCNP

1.1 Types of IDS/IPS
The following are the types of IDS/IPS
1.1.1 Network Based

It performs packet sniffing and evaluates network traffic to recognize and prevent from suspicious activity. They are typically placed inline mode as a network firewall. They receive packets, examine them, decide if they should be permitted, and allow satisfactory packets to pass through.

Figure 2- 3 Network based IPS

1.1.2 Host-based

It is similar to network-based , apart from that a host-based product senses the characteristics of a single host and the events occurring within that host, similar to sensing network traffic (only for that specific host), system logs, running processes, file access and modification etc.

Cost Accounting B.Com Paper 2010



Economics of Paksitan GuessPaper

Money Banking Finance B.Com Paper


Yahoo Messenger Signin Problem

Yahoo Messenger recently change the setting
previous version of yahoo messenger not signing. Peoples facing
the yahoo messenger signing problem.
if you are facing this problem just Upgrade Yahoo messenger in
YAHOO 10.

DOWNLOAD

Mikrotik Web Proxy with Nat Setting



Open Blocked Web Site in any Country

How to Open Blocked Web Site Like Youtube, if any web site blocked in any Country
by using proxy address you can open web site in your country i have some sample proxy address
free for you. use it and enjoy it Thanks


061244235034.static.ctinets.com:3128
112.65.135.54:8080
114.143.12.28:8080
118.175.12.178:3128
118.228.148.52:3128
118.98.169.50:80
119.147.113.116:80
119.167.219.78:80
119.180.24.12:8080
119.245.230.164:80
119.62.128.38:80
119.70.40.101:8080
119.70.40.102:8080
121.10.120.214:80
121.14.158.76:80
121.30.255.38:8080
122.139.57.46:80
122.139.60.102:8080
122.224.33.10:80
122.224.33.4:80
125.64.96.21:8008
147.91.193.101:80
173-203-206-253.static.cloud-ips.com:80
174.142.104.57:3128
174.142.24.201:3128
174.142.24.203:3128
174.142.24.205:3128
174.142.24.206:3128
187.51.150.2:8080
189.115.161.205.static.gvt.net.br:8080
189.3.177.146:8080
189.3.47.146:3128
189.3.50.34:3128
196.12.52.2:80
196.38.158.197:80
201.45.216.115:3128
201.73.223.150:8080
202.51.105.10:3128
202.51.107.37:8080
203.190.113.110:80
204.114.12.157:80
204.114.12.157:8080
204.114.12.158:80

221.214.208.17:3128
221.214.27.252:808
221.214.27.253:808
221.238.17.245:8080
221.9.255.117:80
222.124.195.150:3128
222.161.137.199:8080
222.162.105.110:8080
222.169.11.234:8080
41.190.16.17:8080
58.147.174.170:8080
58.19.176.200:8080
58.240.237.32:80
58.246.200.114:80
60.49.248.190:3128
61.155.220.243:80
61.155.220.244:80
61.4.82.245:80
62.1.110.245:80
66.76.90.0:8080
74.115.1.10:80
74.115.1.11:80
74.115.1.12:80
74.115.1.13:80
77-21-21-112-dynip.superkabel.de:80
79-172-227-245.dominet.hu:8080
80.74.114.58:80
80.74.164.4:3128
82.137.195.138:8080
85.214.23.36:3128
87.238.173.224:80
91.203.240.114:8080
91.203.240.74:8080
93.174.81.194:3128
93.191.57.2:8080
adsl55157.4u.com.gh:8080
bhe201062130009.res-com.wayinternet.com.br:3128
campus.mines-nantes.fr:80
digsys198-154.pip.digsys.bg:80
digsys199-154.pip.digsys.bg:80
fizica-c-75.phys.uaic.ro:3128
flux.boursier.com:80
h197.113.56.24.cable.rstb.jetbroadband.com:80
ip-174-142-104-57.static.privatedns.com:3128
ip-174-142-24-201.static.privatedns.com:3128
ip-174-142-24-202.static.privatedns.com:3128
ip-174-142-24-203.static.privatedns.com:3128
ip-174-142-24-204.static.privatedns.com:3128
ip-174-142-24-205.static.privatedns.com:3128
ip-174-142-24-206.static.privatedns.com:3128
ip56-212.cbn.net.id:80
j-int.g-lan.eu:8080
mail.imcolmedica.com.co:80
mail.ocb.com.vn:80
mail2.p3b-sumatera.co.id:80
maxwww.math.uni-magdeburg.de:80
miql.desktop.com.br:80
mx0.bghost.info:8080
netblk-41-215-180-130.iconnect.zm:8080
pftoo.ackley.net:3128
projects.juh-nrw.de:80
rinjani.mail2.p3b-sumatera.co.id:80
router-margi-wifi.pilsfree.net:8080
s69-163-32-201.in-addr.arpa.static.dsn1.net:80
stanga1.cmonjour.com:80
static-ip-209-239-120-248.inaddr.intergenia.de:3128
viaom-f0-3-7-gacc02.rce.embratel.net.br:3128
vs245191.vserver.de:80

Classifying Network Security Threats CCNP

Classifying Network Security Threats

Network security threats can be classified into four broad terms:

1.1.1.1 Unstructured Threats

These initiate mostly from non familiar users by using easy existing hacking applications from the Internet. Some of the users in this class are inspired by malicious target but most are encouraged by the academic challenges are known as script kiddies. They are not the most experienced users, or programmers but they have the time and courage.

Trojan horse can be explained as software that executes a game on the user’s system. While the user is playing the game, it mails a copy of itself to every client in the user’s contact book. Then other clients get the game and play it, in this case, the Trojan horse spreads.[5]

1.1.1.2 Structured Threats

These initiate from users that are motivated and technically competent than script kiddies. They capable of understanding network systems design and the threat of those systems. They have the ability to create hacking scripts that can penetrate those network systems. A user who presents a structured threat basically targets a desired destination or group. These threats are involved with the major fraud and theft cases that are reported to law enforcement society. These hackers are appointed by organized crime and industry competitors etc.

1.1.1.3 External threat

These initiate from individuals working outside the company, who cannot gain authorized access to the systems or network. They usually gain access to network from the Internet or dialup access servers.

1.1.1.4 Internal threats
These threats start off from individuals who have approved access to the network. These clients either have an account on a server or can gain physical access to the network. This threat may arise from dissatisfied employees. The majority of security incidents come from internal threats.

Basic Types of Attacks Network Attacks

Basic Types of Attacks
Attack (Single Packet Attack)
Atomic Attack (Multi Packet Attack)
Types of Network Attacks

Attacks

Reconnaissance is basically an unauthorized user access to acquire the knowledge of network system devices, applications running on those systems, and the weakness of those systems. This phenomenon is also known as information gathering and, it often precedes a real access or Denial of Service (DoS) attack.

1.1.1.2 Access Attacks

Access is a wide terminology that explains to the ability of a certain source to connect to a specific destination. When a destination has been aimed, the intruder will attempt to use some application to trap the victim. This attack can come in the form of unauthorized data recovery or system access. Through this attack hacker can install software on computer which can be used later infect he can perform any action he want.

1.1.1.3 DoS Attacks

DoS is an activity when the hacker corrupts the networks, systems, or services in order to turn down the service to its desired users. It usually involves destroying the system or slowing it down. DoS attacks can also be as simple as cleaning or damaging data necessary for business. Often the action of attack simply involves running a hack, script, or tool. The attacker does not need earlier access to the target, only a way to the target. As soon as the path is recognized, adverse damage can be caused. DoS attacks are comparatively easy to set off and can be performed secretly; it is the most dangerous attack on the Internet. Distributed Denial of Service (DDoS) attack is when the source of the attack is multiple systems (usually spread across a large network) making it very tricky to find and stop the source.

Importance of Security CCNP

Importance of Security

The Internet has indeed become the largest data network, enabling and facilitating both personal and industrial communications all over world. The traffic moving over the Internet, as well as commercial networks, is developing exponentially daily. Communication is taking place via electronic mail, mobile users, telecommuters, and regional offices are using the Internet to remotely connect to their business networks, and commercial communication completed over the Internet, via the WWW (World Wide Web).

The Internet has changed and greatly expanded according to the need of business, this wide network and its linked technologies have opened the door to an increasing number of security attacks from which companies must guard them. Network attacks are more serious when they are imposed upon businesses that store sensitive data, for example personal financial or medical records, sensitive data can be lost, privacy can be violated, and many hours, or even weeks, of network downtime can arise. In spite of the costly risks of potential security violates, the Internet can be one of the secure means by which to conduct business. Such that, giving credit card information over the phone or a waiter of restaurant can be more risky than submitting the information via internet, because e-commerce transactions are protected by security devices.

Telemarketers and waiters are not always trustworthy or monitored. Still the security threat problems can be harmful to businesses. This doubt can limit the business opportunities for organizations, especially those that are completely dependable on Web based technologies. Companies must pass security policies and install security measures that not only are effective, but are also distinguished as effective. Companies must be able to communicate how they plan to protect their clients.

Chapter 2 covers the security details the view that security is a continuing process and the security includes four stages: secure, monitor, test, and improve.
There are the four categories of security threats: Structured, Unstructured, Internal, External
There are the four different categories of attack: Reconnaissance attacks, Access attacks, Denial of service attacks, Worms, viruses, and Trojan horses
Management protocols and configuration management are an important part of securing a network.

Chapter 3 then specifies the sensor is bootstrapped by using the setup command.
Moreover it covers the Full CLI features are in IDS software versions 4.0 and higher, the CLI uses syntax almost same to that of the Cisco IOS software, the CLI offers all the essential functionality to configure and supervise the sensor and the CLI provides many commands to verify configuration and system information, backing up and restoring configuration.

Chapter 4 describes the different sensor models can have multiple monitoring interfaces and all monitoring interfaces use the similar configuration. For the sensor to monitor our networks we must enable the monitoring interfaces and assign them to the default virtual sensor. For an IPS sensor to operate in inline mode, we must configure two monitoring interfaces as a pair.
We can configure the sensor to monitor the flow of data across an interface and send a notification if the flow changes. The software bypass feature ensures that data continue to flow through the IPS sensor even if the Analysis Engine ceases to function.

Chapter 5 explains the Class and Policy Mapping and different Blocking Signatures (String TCP, TCP Rest, ICMP Flood, and Attack Risk Rating)

In the end, we briefly present the conclusions from this project and also the possible future improvements and additions for better design/implementation and investigation of “Securing Converged Network Using IDS/IPS”.



Facebook and Youtube Blocked in Pakistan

This is great decision taken by Pakistan Government to Block Facebook and Youtube in Pakistan.
Justice Ejaz Ahmed Chaudhry of the Lahore High Court ordered PTA to ban facebook in Pakistan. The court directed foreign secretary to protest against the competition of blasphemous cartoons on facebook.I also request all Muslim Countries Block all the Website have data against the Muslim Communities and about Islamic Religion.

Another Website have against our muslim communities http://www.theallfaith.com
Request to PTA Please also block this website in Pakistan

Banned Websites in Pakistan Facebook youtube

PTA Block Website on Pakistani Internet.


- http://www.facebook.com
- http://www.rahimjaandehvari.blogfa.com

- http://www.rahimjaandehvari.blogfa.com
- http://balochwarna.org.modules/news/
- http://www.zrombesh.org
- http://www.balochunitedfront.org
- http://www.ostomaan.org
- http://www.bso_na.com
- http://www.balochclub.com
- http://balochestan.com
- http://www.balochistaninfo.com
- http://www.bso-na.org
- http://www.balochtawar.net/brw/
- http://oldmanclub.persianblog.com/
- http://www.al-baloushi.com/

- http://www.hazzaam.com/hazzaam.com/
- http://www.balochmedia.net
- http://www.radiobalochi.org.archives/meny_shajarehname_aks.htm
- http://www.balushunion.com
- http://www.payambaloch.persianblog.com

- http://www.balochistan.cjb.not/
- http://www.sarbaaz.com
- http://www.balouch.blogspot.com
- http://balouch.blogspot.com
- http://dochebaloch.persianblog.com

- http://www.sagaar.tk
- http://ngaran.blogfa.com


- http://www.brohi.tk
- http://www.balochistaninfo.com/balochanitawar/
- http://www.eurobaluchi.com
- http://www.balochunity.org

- http://www.asaappublicetions.com
- http://www.sindhtoday.net
- http://www.worldsindhi.org
- http://www.live365.com
- http://www.golbang.nu

Advance Accounting B.Com Past Guess Paper