HP Desktop Dual Core Branded Malaysia

Special Promotion for Malaysian Peoples

HP Desktop DC-5800 HP Desktop Dual Core 2.0 Ghz
Ram 1GB
Hdd 80GB
DVD Writer
Keyboard
Mouse
Power Cables
Windows 7, MS Office, Ant
ivirus Every thing.

Best Price for Full Package Only RM360


Contact 0143250919
Email imrance@gmail.com
Muhammad Imran
2nd Floor, Lowyat Plaza, KL, Malaysia


LCD Monitor Lenovo/IBM

ThinkVision L1952p

Promotion price Rm 269

Lenovo Monitor ThinkVision L1952p
Resolution of 1440x900 2448MB6

Brightness: 250 cd/m2
Contrast ratio: 1000:1

VGA, DVI-D, DisplayPort connections

Kensington Lock slot support for security
Original Power Code
Box Pack 1 year Warranty
Our Price is 295Rm Only
Online Market Price 600+



Contact 0143250919
Email imrance@gmail.com
Muhammad Imran
2nd Floor, Lowyat Plaza, KL, Malaysia

Mac Book Pro 15 Inch Cheapest Price



Mac Book Pro New Box Pack


15-inch: 2.4 GHz
2.4GHz quad-core
Intel Core i7
4GB 1333MHz
750GB 5400-rpm1
Intel HD Graphics 3000

AMD Radeon HD 6770M with 1GB GDDR5
Built-in battery (7 hours)


Cheapest Price
of Mac Book
Rm 6390 Malaysia
Contact 0143250919
Email imrance@gmail.com

Toshiba Qosmio X7753D Gaming Laptop for Sale

Toshiba Qosmio X7753D Gaming Laptop

For Sale *New Box Pack* Very Best Offer

Contact Us: 0143250919 Email= imrance@gmail.com

Best Offer 4850 Rm Malaysia

Qosmio X775-3DV78 Laptop Specifications

Performance

Processor*
Intel® Core™ i7-2630QM processor
Operating System*
Genuine Windows 7 Home Premium (64-bit)*
Graphics Engine*
NVIDIA® GeForce® GTX 560M (3D vision)*
Graphics Memory*
1.5GB GDDR5 discrete graphics memory

Memory and Storage

Memory*
8GB DDR3 1333MHz memory
Hard Drive*
1.25TB: 500GB (7200rpm, Hybrid 4GB Serial ATA) + 750GB (5400rpm, Serial ATA)
Optical Drive*
Blu-ray Disc™ Rewriteable (RE) and DVD SuperMulti drive with Labelflash®*

Audio and Video

Display Size
17.3" widescreen
Display Type*
FHD TruBrite® TFT LED Backlit Display (3D ready, 120Hz)*
Display Resolution
Supports 1080p content*, 1920x1080, 16:9 aspect ratio
3D Package
NVIDIA® 3D VISION™ Kit (glasses, USB 2.0 type A to 5-pin mini-B cable)
Note: 3D Vision IR emitter embedded in display bezel
Audio
Headphone jack (stereo), harman/kardon® stereo speakers, Microphone input port with Sleep and Music, Built-in microphone

Communication

Webcam
Webcam with Face Tracking Technology
Wireless LAN*
Wi-Fi® Wireless networking (802.11b/g/n)
Bluetooth
Bluetooth® V3.0 + HS
Modem*
No Modem port
LAN
10/100/1000 Ethernet LAN

Power

AC Adapter
180W (19V x 9.5A) Auto-sensing,100-240V AC Adapter
Battery
Li-Ion (47Wh, 8-Cell)
Battery Life*
Up to 2.5 hours

Expansion

PC Express Slot
No PC Express Slot
SmartCard Reader
No SmartCard Reader slot
Media
Memory Card Reader
USB Ports*
3-USB (2.0), 1-USB (3.0) port with USB Sleep and Charge*
HDMI
HDMI-CEC (Regza Link™)

Software, Support and Security

Security and Protection
HDD Recovery, Multiple-Level Password Utilities, Password Security, TOSHIBA Supervisor Password Utility, Security Cable Lock Slot
Software*
Microsoft® Office Starter 2010 (Reduced functionality Word® and Excel® with advertising)*, TOSHIBA Hard Drive Impact Sensor (3D sensor)*, TOSHIBA Face Recognition*, Toshiba Online Backup (30-day trial subscription), TOSHIBA Blu-Ray™ Player, TOSHIBA Resolution+® Upconvert Plug-in for Media Player, WildTangent® Game Console, TOSHIBA HDD Protection, TOSHIBA App Place, Microsoft® Silverlight™, TOSHIBA Bulletin Board™, TOSHIBA Service Station, Norton Internet Security™ 2011 (30-day trial), TOSHIBA Recovery Disk Creator, TOSHIBA Web Camera Application, TOSHIBA HDD/SSD Alert, TOSHIBA BookPlace™, TOSHIBA Media Controller, TOSHIBA PC Health Monitor, TOSHIBA Disc Creator, Waves MaxxAudio® 3, Microsoft® Windows Live Essentials including Photo Gallery, Messenger, Mail, Writer and Movie Maker, Microsoft® Windows Media Player 12, Hard disc (HDD) recovery, TOSHIBA ReelTime™, TOSHIBA eco Utility™, Google® Chrome
Standards
EPEAT™ Gold, RoHS Compliant*, Energy Star Qualified
Standard Limited Warranty*
1-Yr Parts and Labor, 1-Year Battery

Physical Description

Inputs and Controls
CD/DVD Buttons (Play/Pause, Stop, Prev Track, Next Track), Volume Control (Up & Down), Touch pad pointing device with multi touch control, Mute button, Media button, TOSHIBA eco utility™ (Energy-saving mode), Premium Raised Tile LED backlit Keyboard with 10-Keypad (black)
Weight*
Starting at 7.5lbs.
Color
Fusion® X2 Finish in Red Horizon



Libya & QADDAFI FACTS THAT CANT BE DENIED

I know Every Body, Every Pakistani Wish If They Had Control on Pakistan Atomic Bumb & Missiles, Ghori I, II Hataf, All.

Libya & QADDAFI ...FACTS THAT CANT BE DENIED


1. There is no electricity bill in Libya; electricity is free
for all its citizens.

2. There is no interest on loans, banks in Libya are
state-owned and loans given
to all its citizens at 0% interest by law.

3. Home considered a human right in Libya –
Gaddafi vowed that his parents
would not get a house until everyone in Libya had a
home. Gaddafi’s father has
died while him, his wife and his mother are still living
in a tent.

4. All newlyweds in Libya receive $60,000 Dinar (US$
50,000 ) by the government
to buy their first apartment so to help start up the
family.

5. Education and medical treatments are free in
Libya. Before Gaddafi only 25%
of Libyans are literate. Today the figure is 83%.

6. Should Libyan
s want to take up farming career,
they would receive farming
land, a farming house, equipments, seeds and
livestock to kick- start their farms
– all for free.

7. If Libyans cannot find the education or medical
facilities they need in Libya,
the government funds them to go abroad for it –
not only free but they get US
$2, 300/mth accommodation and car allowance.

8. In Libyan, if a Libyan buys a car, the government
subsidized 50% of the price.

9. The price of petrol in Libya is $0. 14 per liter.

10. Libya has no external debt and its reserves
amount to $150 billion – now
frozen globally.

11. If a Libyan is unable to get employment after
graduation the state would
pay the average salary of the profession as if he or
she is employed until
employment is found.

12. A portion of Libyan oil sale is, credited directly to
the bank accounts of all
Libyan citizens.

13. A mother who gave
birth to a child receive US
$5 ,000

14. 40 loaves of bread in Libya costs $ 0.15

15. 25% of Libyans have a university degree

16. Gaddafi carried out the world’s largest irrigation
project, known as the Great
Man-Made River project, to make water readily
available throughout the desert
country.
American Friend Ship
Result After American Friend Ship

I know Every Body, Every Pakistani Wish If They Had Control on Pakistan Atomic Bumb & Missiles, Ghori I, II Hataf, All.

All Missiles and Atom Bomb will Drop on American and NATO Terrorist

Naturally Allah Name Written on Bread Miracle

Naturally Allah Name Written on Bread, Today Morning my Wife make Roti (Bread) and see the Miracle, Subhan Allah

24kg motton eating in 3 hours Faisalabad Pakistan

Islamic Dua Sighting Moon Aftar Dua




Darood Sharif ka Tohfa Islamic Darood










Osama is Alive American Fake Operation in Abbotabad

Photo Evidence by American Forces is FAKE Operation in Abbotabad



Osama Bin Laden is ALIVE see Proof

Osama Bin Laden is Alive with Proof


Who is the maker of Taliban

Who is the maker of Taliban

America is the maker of Taliban from the start and still he is making Taliban. In Start he support Taliban and Usama Bin Laden against Russia. When he get the result and break the Russian federation.

When American fulfill his desires then he don’t need any more Taliban support. He Attack on Afghanastan. In this attack million of Muslims where killed by American forces and the result is same he make more Taliban and Antiamerican. In Afghanastan attack Musharaf Government support America. This is big mistake by musharaf Government After support the Suicide Attack start in Pakistan.

All the American media hide the truth from innocent American peoples. Actually the main target of America and Israel are Muslim Countries one by one Afghanistan, Iraq, Libya, and now the next target is Yaman, Sham and all other Muslim Countries in American list.

Now through Drown Attack he is making more Taliban and anti American form Wazirastan (Pakistan).

Mumbai attacker Ajmal Kasab pleading BHAGWAN

"Bhagwan mujhay maaf nahi karay ga". Is he even a muslim? Listen to his and Police officer's accent, they are same. KPK, GB, Sindh, Baluchistan, Punjab, this accent is NOT found in Pakistan, take my words.

if Pakistani are Taliban who are you Indians

See the Real Face of Indian media, Pakistan have one case
and India have several cases but no international media
can see this what happening in india.


Signature Engine AIC Atomic ARP meta Engine

1.1.1.1 Signature Engine

A signature engine is a part of the IPS that is designed to support many signatures in a specific category. Every engine has a set of factors that have acceptable ranges or sets of values.

IPS 6.0 consist of the following signature engines:

AIC (Application Inspection of Control) Engine that provides by analysis of web traffic. The AIC engine provides control over HTTP sessions to prevent harmful traffic of the HTTP protocol. It has the ability of administrative control over different software, such as instant messaging etc. AIC can also be used to inspect FTP (File Transfer Protocol) traffic and control the commands being issued.

There are two AIC engines:

F AIC FTP

F AIC HTTP

Atomic Engine these engines are now combined into two engines with more than one level selection. Layer 3 and Layer 4 attributes can also be combined within one signature, such as IP and TCP.

Atomic ARP Engine is used to inspects Layer 2 ARP protocol. The Atomic ARP engine is quite different because mostly engines are based on Layer 3 IP protocol. They inspect IP protocol packets and are associated Layer 4 transport protocols.This engine has an option to specify values to match for fields in the IP and Layer 4 headers.

Flood Engine Detects ICMP and UDP floods directed at specific users and networks.

There are two Flood engines:

F Flood Host

F Flood Net

Meta Engine is used to describe events that occur in a related manner within a certain time interval. This engine processes events and alerts instead of packets.

Multi String Engine is used to inspects Layer 4 transport protocols and data by matching several strings for one specific signature.

This engine inspects the following categorizes

F Stream based TCP

F single UDP

F ICMP packets

Normalizer Engine is used to configure how the IP and TCP normalizer operates and provides general configuration for signature events related to the IP and TCP normalizer. It has the ability to enforce RFC compliance.

Service Engine is used to deal with certain specific protocols. Service engine has the following protocol categorizes:

F DNS is used to inspects DNS (TCP and UDP) traffic.

F FTP is used for the inspection of FTP traffic.

F Generic has a function to decode custom service and payload.

F Generic Advanced Analyzes traffic flow based on the mini-applications that are written to check the packets.

F H225 is used for the inspection of VoIP traffic.

State Engine is designed for Stateful searches of strings in protocols such as SMTP.

The state engine consists of the hidden configuration document that is used to define the state transitions so new state definitions can be delivered in a upcoming or updated signature.

String Engine is used to search on Regex strings based on ICMP, TCP, or UDP protocol.

There are three different String engines:

F String ICMP

F String TCP

F String UDP.

Sweep Engine is used to analyze sweeps from a single host (ICMP and TCP), from destination ports (UDP and TCP).

Traffic Anomaly Engine is used for the inspection UDP, TCP, and other traffic for worms or viruses.

Traffic ICMP Engine is used to analyze protocols, such as DDOS. There are only two such type of signatures with configurable parameters.

Trojan Engine is used to analyze traffic from different protocols like UDP. Users are not able to configure these engines.

Signature Detection protect network against attacks

1.1.1.1 Signature Detection

Protecting the network against known attacks.

Attackers often attack networks through tried and tested techniques from previously successful methods. These threats have been analyzed by network security engineers and a listed profile, or specific signature has been created. Signature detection methods examine network by looking for the threat’s fingerprint inside the network traffic and matching against an internal database of known attacks. Once an attack signature is determined, the security device delivers an attack response, mostly in a form of simple alarm or alert.

Success in preventing these threats depends on the minute database of attack signatures, compiled from previous records. The drawback to systems on signature detection is clear: they can only detect threats for which there is a defined signature. If signature detection methods are employed to protect networks, the network is protected against known attacks only.

1.1.1.2 Anomaly Detection

Protecting against unknown attacks.

Anomaly detection techniques are required when hackers find out new security weaknesses and run to develop the new weakness. After that there are no existing threat signatures. For example Code Red virus which could not be sensed through an existing signature. To identify these first strikes, IDS can use anomaly detection methods, in which network traffic is compared with a baseline to recognize irregular and harmful behavior. These anomaly methods are looking for numerical abnormalities in the data, as well as protocol doubts and application activity.

1.1.1.3 Denial of Service (DoS) Detection

Protecting against network and system overload.

DoS and Distributed DoS attacks deny legal users access to serious network services. Attackers achieve this by inducting attacks that consume network bandwidth or host processing cycles or other network resources. DoS attacks is causing some of the biggest brands to let down users and investors as Web sites became unreachable to users and partners sometimes for up to whole day. IDS manufactured goods often compare current traffic activities with adequate normal activity to detect DoS attacks, while normal traffic is distinguished by a set of pre-programmed entries. This can guide to false alarms being missed due to the attack traffic is below the threshold.