Abdul Zakir, my name

Wednesday, October 11, 2006

tanpa bos adsense


Ada info baru dari google tentang Google Page Creator, sekarang udah bisa dipasangin Adsense !. Berikut ini langkah-langkah memasang adsense di google creator:
Login ke
http://www.google.com/adsense
Klik tab AdSense Setup untuk ngambil kode adsense
Copy kode dari kotak "Your AdSense code"
Login ke
Google Page Creator
Pilih halaman dimana kamu pengen iklannya muncul
klik Edit HTML
Paste kode adsense ke source code template halaman
Kemudian klik tombol "Save Changes"
Terakhir kamu harus mem-Publish halaman yang sudah di save.
Tutorial selengkapnya dan contoh bisa di lihat di
http://isnaini.googlepages.com/

untuk account baru yang belum pernah menerima pembayaran dari google adsense, status Payment Holding: Hold, artinya kamu nggak akan dikirim cek meskipun udah sampe $100 karena statusnya masih Hold atau di tahan. jadi supaya kamu dikirimin cek, status ini harus kamu ubah menjadi Payment holding: Please send my payments monthly., caranya klik tab My Account, kemudian pada bagian Payment Holding [edit], klik link [edit], beri centang pada Please send my payments monthly, Save Changes.

untuk keterangan lanjut loe bisa login ke www.isnaini.googlepages.com atau ke www.isnaini.com biar loe bisa liat2 juga yang lain.

Tuesday, October 10, 2006

Fosil Onta

Dari fosil yang baru ditemukan para peneliti Swiss, spesies onta raksasa mungkin pernah menghuni kawasan bergurun di Syria tengah sekitar 100 ribu tahun lalu. Dari kerangkanya dapat diperkirakan kalau tingginya tujuh meter dan lebar bahunya saat berdiri tegak sekitar tiga meter.
"Bisa Anda bayangkan. Ini adalah penemuan besar, sebuah revolusi dan sains," kata Profesor Jean-Marie Le Tensorer dari Universitas Basel. Sebab, belum diketahui sebelumnya bahwa onta telah hidup di daratan Timur Tengah sejak 100 ribu tahun lalu.
Tensorer yang telah menggali situs di Kworm sejak tahun 1999 mengatakan bahwa tulang pertamanya sebenarnya telah ditemukan sejak tahun 2003. Namun, baru dipastikan sebagai fosil onta raksasa setelah tulang-belulang lainnya ditemukan kemudian.
Sekelompok manusia purba sepertinya membunuh onta saat sedang minum di sebuah sumber mata air. Ini terlihat dari penemuan fosil tulang-belulang manusia berumur 100 ribu tahun di stepa sekitar mata air terdekat berikut senjata dari batu.
"Tulang tersebut mungkin seorang Homo sapiens atau manusia modern, namun dari giginya terlihat sangat tua mirip gigi Neanderthal," kata Tensorer. Ia belum dapat memestikannya sampai identifikasi tim peneliti di Swiss selesai dilakukan.
Manusia diperkirakan telah menghuni Syria sejak 1,5 juta tahun lalu. Wilayah tersebut merupakan salah satu jalur utama migrasi manusia dari Afrika ke Asia dan Eropa. Onta dan antelop adalah beberapa jensi hewan yang hidup berdampingan dengan manusia di wilayah tersebut.
Kworm adalah salah satu wilayah subur yang mengandung banyak mata air. Wilayah tersebut membentang sekitar 20 kilometer di antara dua gunung. Di situs yang pertama kali disurvai pada tahun 1960-an pernah ditemukan sisa pemukiman manusia yang berusia 1 juta tahun.

Monday, October 09, 2006

9 oktober 2006

ketika ada bencana, apakah hanya pada saat itu kita sadar???? keparat emang. dan aku benci itu. hallo tentang www.lnicommunity.net

Tuesday, October 03, 2006

symantec

Sandra E. is a human resources professional who lives in a small town in Miami, Florida. She has used a computer in her job for more than ten years. At work, her computer is maintained by her organization’s IT department, and she has never experienced any security problems with the computer in her workplace.
Sandra considers herself to be computer savvy and believes that she is at low risk of online fraud for the following reasons:
She never shops online because she doesn't want to risk exposing her credit card information, and she doesn't like the idea that data about her purchases might be stored and used to make a profile of her likes and dislikes.
She uses her home computer only for personal email with friends and family, to surf the Web for information about new developments in her field, and to do banking once a month via her bank's Web site.
Occasionally she looks other things up on the Web, but not often.
Sandra's situation seems safe enough, right?
Unfortunately, looks can be deceiving. At work one day last summer, she heard about a new Internet Explorer browser vulnerability; it was so critical that emergency patches for all work computers in her organization had been distributed by her IT department that same day. She wanted to be sure her home computer was protected too, so when she got home she went online to get more information about the vulnerability, and determine if she was protected.
Using a popular search engine, she found a Web site that offered not only information about the vulnerability, but the option to have a patch for the vulnerability downloaded automatically to her computer. Sandra read the information, but opted not to accept the download since she was taught to download information only from authorized sources. Then she went to the official Microsoft site to obtain the patch.
So, what went wrong?
Unfortunately, as Sandra was reading information about the vulnerability on the first site, the criminal who had created the Web site was taking advantage of the fact her computer actually had the vulnerability. In fact, as she was clicking "No" (to refuse the download that was being offered), unbeknownst to her the automatic installation of a small, but powerful, crimeware program was already taking place on her computer.
The program was a keystroke logger. Simultaneously, the Web site’s owner was already receiving a notification that the keystroke logger had been secretly and successfully installed on Sandra’s computer. The program was designed to covertly log everything she typed in from that moment on, and to send all of the information to the Web site owner as well. It functioned flawlessly, too - recording everything Sandra typed- every Web site she visited, and every email she sent, passing the stolen text on to the cybercriminal.
Later that evening, Sandra finished up her monthly online banking. As she logged into her personal bank account, the keystroke logger recorded those keystrokes too, including confidential information: the name of her bank, her user ID, her password, the last four digits of her Social Security number and her mother’s maiden name. The bank’s system was secure, and all the data she typed in was encrypted so no one along the route could casually discern the information. However, the key logging program was recording the information in real time - as she typed it in - before it was encrypted; thus, it was able to bypass the security that was in place.
It was just a matter of time before her bank’s name, her user ID, her password and her mother’s maiden name were in the hands of the cybercriminal. He added her name, and all of the associated information, to a long list of names of other unsuspecting users, and sold the list to someone he had met on the Internet - someone who specialized in using stolen bank information to make illegal withdrawals. When Sandra went to make a deposit the several weeks later and asked for her balance statement, she was shocked to find that her bank account was almost empty. Sandra had been the victim of a cybercrime.