Posts

Showing posts from 2011

HP Desktop Dual Core Branded Malaysia

Image
Special Promotion for Malaysian Peoples HP Desktop DC-5800 HP Desktop Dual Core 2.0 Ghz Ram 1GB Hdd 80GB DVD Writer Keyboard Mouse Power Cables Windows 7, MS Office, Ant ivirus Every thing. Best Price for Full Package Only RM360 Contact 0143250919 Email imrance@gmail.com Muhammad Imran 2nd Floor, Lowyat Plaza, KL, Malaysia LCD Monitor Lenovo/IBM ThinkVision L1952p Promotion price Rm 269 Lenovo Monitor ThinkVision L1952p Resolution of 1440x900 2448MB6 Brightness: 250 cd/m2 Contrast ratio: 1000:1 VGA, DVI-D, DisplayPort connections Kensington Lock slot support for security Original Power Code Box Pack 1 year Warranty Our Price is 295Rm Only Online Market Price 600+ Contact 0143250919 Email imrance@gmail.com Muhammad Imran 2nd Floor, Lowyat Plaza, KL, Malaysia

Mac Book Pro 15 Inch Cheapest Price

Image
Mac Book Pro New Box Pack 15-inch: 2.4 GHz 2.4GHz quad-core Intel Core i7 4GB 1333MHz 750GB 5400-rpm1 Intel HD Graphics 3000 AMD Radeon HD 6770M with 1GB GDDR5 Built-in battery (7 hours) Cheapest Price of Mac Book Rm 6390 Malaysia Contact 0143250919 Email imrance@gmail.com

Toshiba Qosmio X7753D Gaming Laptop for Sale

Image
Toshiba Qosmio X7753D Gaming Laptop For Sale *New Box Pack* Very Best Offer Contact Us: 0143250919 Email= imrance@gmail.com Best Offer 4850 Rm Malaysia Qosmio X775-3DV78 Laptop Specifications Performance Processor * Intel® Core™ i7-2630QM processor Operating System * Genuine Windows 7 Home Premium (64-bit) * Graphics Engine * NVIDIA® GeForce® GTX 560M (3D vision) * Graphics Memory * 1.5GB GDDR5 discrete graphics memory Memory and Storage Memory * 8GB DDR3 1333MHz memory Hard Drive * 1.25TB: 500GB (7200rpm, Hybrid 4GB Serial ATA) + 750GB (5400rpm, Serial ATA) Optical Drive * Blu-ray Disc™ Rewriteable (RE) and DVD SuperMulti drive with Labelflash® * Audio and Video Display Size 17.3" widescreen Display Type * FHD TruBrite® TFT LED Backlit Display (3D ready, 1...

Libya & QADDAFI FACTS THAT CANT BE DENIED

Image
I know Every Body, Every Pakistani Wish If They Had Control on Pakistan Atomic Bumb & Missiles, Ghori I, II Hataf, All. Libya & QADDAFI ...FACTS THAT CANT BE DENIED 1. There is no electricity bill in Libya; electricity is free for all its citizens. 2. There is no interest on loans, banks in Libya are state-owned and loans given to all its citizens at 0% interest by law. 3. Home considered a human right in Libya – Gaddafi vowed that his parents would not get a house until everyone in Libya had a home. Gaddafi’s father has died while him, his wife and his mother are still living in a tent. 4. All newlyweds in Libya receive $60,000 Dinar (US$ 50,000 ) by the government to buy their first apartment so to help start up the family. 5. Education and medical treatments are free in Libya. Before Gaddafi only 25% of Libyans are literate. Today the figure is 83%. 6. Should Libyan s want to take up farming career, they would receive farming land, a farming house, equipments, seeds and liv...

Naturally Allah Name Written on Bread Miracle

Image
Naturally Allah Name Written on Bread, Today Morning my Wife make Roti (Bread) and see the Miracle, Subhan Allah

24kg motton eating in 3 hours Faisalabad Pakistan

Image

Islamic Dua Sighting Moon Aftar Dua

Image

Darood Sharif ka Tohfa Islamic Darood

Image

Osama is Alive American Fake Operation in Abbotabad

Image
Photo Evidence by American Forces is FAKE Operation in Abbotabad

Osama Bin Laden is ALIVE see Proof

Image
Osama Bin Laden is Alive with Proof

Who is the maker of Taliban

Who is the maker of Taliban America is the maker of Taliban from the start and still he is making Taliban. In Start he support Taliban and Usama Bin Laden against Russia. When he get the result and break the Russian federation. When American fulfill his desires then he don’t need any more Taliban support. He Attack on Afghanastan. In this attack million of Muslims where killed by American forces and the result is same he make more Taliban and Antiamerican. In Afghanastan attack Musharaf Government support America. This is big mistake by musharaf Government After support the Suicide Attack start in Pakistan. All the American media hide the truth from innocent American peoples. Actually the main target of America and Israel are Muslim Countries one by one Afghanistan, Iraq, Libya, and now the next target is Yaman, Sham and all other Muslim Countries in American list. Now through Drown Attack he is making more Taliban and anti American form Wazirastan (Pakistan).

Mumbai attacker Ajmal Kasab pleading BHAGWAN

Image
"Bhagwan mujhay maaf nahi karay ga". Is he even a muslim? Listen to his and Police officer's accent, they are same. KPK, GB, Sindh, Baluchistan, Punjab, this accent is NOT found in Pakistan, take my words.

if Pakistani are Taliban who are you Indians

Image
See the Real Face of Indian media, Pakistan have one case and India have several cases but no international media can see this what happening in india.

Signature Engine AIC Atomic ARP meta Engine

1.1.1.1 Signature Engine A signature engine is a part of the IPS that is designed to support many signatures in a specific category. Every engine has a set of factors that have acceptable ranges or sets of values. IPS 6.0 consist of the following signature engines: AIC (Application Inspection of Control) Engine that provides by analysis of web traffic. The AIC engine provides control over HTTP sessions to prevent harmful traffic of the HTTP protocol. It has the ability of administ rative control over different software, such as instant messaging etc . AIC can also be used to inspect FTP (File Transfer Protocol) traffic and control the commands being issued. There are two AIC engines: F AIC FTP F AIC HTTP Atomic Engine these engines are now combined i nto two engines with more than one level selection. Layer 3 and Layer 4 attributes can also be combined w ithin one signature, such as IP and TCP. Atomic ARP Engine is used to i nspec...

Signature Detection protect network against attacks

1.1.1.1 Signature Detection Protecting the network against known attacks . Attackers often attack networks through tried and tested techniques from previously successful methods. These threats have been analyzed by network security engineers and a listed profile, or specific signature has been created. Signature detection methods examine network by looking for the threat’s fingerprint inside the network traffic and matching against an internal database of known attacks. Once an attack signature is determined, the security device delivers an attack response, mostly in a form of simple alarm or alert. Success in preventing these threats depends on the minute database of attack signatures, compiled from previous records. The drawback to systems on signature detection is clear: they can only detect threats for which there is a defined signature. If signature detection methods are employed to protect networks, the network is protected against known attacks only. 1.1.1...