Did you know Windows Application able to run in Linux base operating system?
The answer is YES. There is application can support that, it’s call Wine.
Wine is Windows API open source project where make you can operate windows application in Linux base. It’s like have little Windows in your Linux System. API wine 100% not used Microsoft code but using Windows DLL.
Wine is not only for Linux, but you can also operate to MAC, FreeBSD and Solaris.
So if you want to running windows application in your Linux, or MAC, this is the best solution to that.
Download this application
9/18/2008
AJAX
Ajax (synchronous JavaScript and XML), is a group interrelated web development techniques used for creating interactive web applications or rich internet applications. With Ajax, web applications can retrieve data from the server synchrounously in the background without interfering with the display and behavior of the existing page.
This innovation was used for build website since 2005, actually ajax is not a new programming language, but a technique for creating better, faster, and more interactive web applications. With AJAX, your JavaScript can communicate directly with the server, using the JavaScript XMLHttpRequest object. With this object, your JavaScript can trade data with a web server, without reloading the page.
Actually Ajax is based on the following web standards:
- JavaScript
- XML
- HTML
- CSS
The web standards used in AJAX are well defined and supported by all major browsers. AJAX applications are browser and platform independent
Well, with Ajax I could be able to build website faster and more user-friendly.
This innovation was used for build website since 2005, actually ajax is not a new programming language, but a technique for creating better, faster, and more interactive web applications. With AJAX, your JavaScript can communicate directly with the server, using the JavaScript XMLHttpRequest object. With this object, your JavaScript can trade data with a web server, without reloading the page.
Actually Ajax is based on the following web standards:
- JavaScript
- XML
- HTML
- CSS
The web standards used in AJAX are well defined and supported by all major browsers. AJAX applications are browser and platform independent
Well, with Ajax I could be able to build website faster and more user-friendly.
9/16/2008
INTERNET THREATS
In World Wide Webs (www) there is to many threats, they hide in computer system and would be able to harm your computer, it’s very annoying….
Virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document. Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or be present on a diskette or CD.
Spam is unsolicited e-mail on the Internet. (E-mail that wanted is sometimes referred to as ham). From the sender’s point-of-view, spam is a form of bulk mail, often sent through e-mail distribution lists. To the receiver, it usually seems like junk e-mail.
Bot is the term that describes a remote control program loaded on a computer, usually after a successful invasion, that is often used for nefarious purposes. Several bots can be combined into a botnet, a network of compromised machines that can be remotely controlled by the attacker. Botnets in particular pose a severe threat to the Internet community, since they enable an attacker to control a large number of machines. Attackers primarily use them for attacks against other systems, mass identity theft, or sending spam
DDos (Distributed Debnial of Service) is a form of an attack by multitude of compromised systems attacking a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users
Spyware is actually any technology that aids in gathering information about a person or organization without their knowledge. On the internet ( where it is sometimes called spybot or tracking software), spyware is programming that is put in someones’s computer to secretly gather information about the user and relay it to advertisers or other interested parties. Spyware can get in a computer as software virus or as the results of installing a new program.
Malware ( for “malicious software”) is any program or file that is harmful to a computer user. Thus, malware includes computer viruses, worms, Trojan Horses, and also spyware programming that gathers information about a computer user without permission.
Phishing is an e-mail froud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. Typically the messages appear to come from well known and trustworthy websites. Web sites that are frequently spoofed by phishers include PayPal, Ebay, MSN, Yahoo, BestBuy and America Online. A phishing expedition, like the fishing expedition it’s named for, is a speculative venture: the phisher puts the lure hoping to fool at least a few of the prey that encounter the bait.
Spoofing activity is to deceive for the purposes of gaining access to someone else’s resources (for example, to fake an Internet address so that one looks like a certain kind of Internet user)
E-mail Spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations.
IP Spoofing, also known as IP address forgery or a host file hijack, is a hijacking technique in which a cracker masquerades as a trusted host to conceal his identity, spoof a web site, hijack browsers, or gain access to a network. Here’s how it works: The hijacker obtains the IP address of legitimate host and alters packet headers so that the legitimate host appears to be the source. When IP spoofing is used to hijack a browser, a visitor who types in the URL ( Uniform Resource Locator) of a legitimate site is taken to a fraudulent web page created by the hijacker.
Virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document. Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or be present on a diskette or CD.
Spam is unsolicited e-mail on the Internet. (E-mail that wanted is sometimes referred to as ham). From the sender’s point-of-view, spam is a form of bulk mail, often sent through e-mail distribution lists. To the receiver, it usually seems like junk e-mail.
Bot is the term that describes a remote control program loaded on a computer, usually after a successful invasion, that is often used for nefarious purposes. Several bots can be combined into a botnet, a network of compromised machines that can be remotely controlled by the attacker. Botnets in particular pose a severe threat to the Internet community, since they enable an attacker to control a large number of machines. Attackers primarily use them for attacks against other systems, mass identity theft, or sending spam
DDos (Distributed Debnial of Service) is a form of an attack by multitude of compromised systems attacking a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users
Spyware is actually any technology that aids in gathering information about a person or organization without their knowledge. On the internet ( where it is sometimes called spybot or tracking software), spyware is programming that is put in someones’s computer to secretly gather information about the user and relay it to advertisers or other interested parties. Spyware can get in a computer as software virus or as the results of installing a new program.
Malware ( for “malicious software”) is any program or file that is harmful to a computer user. Thus, malware includes computer viruses, worms, Trojan Horses, and also spyware programming that gathers information about a computer user without permission.
Phishing is an e-mail froud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. Typically the messages appear to come from well known and trustworthy websites. Web sites that are frequently spoofed by phishers include PayPal, Ebay, MSN, Yahoo, BestBuy and America Online. A phishing expedition, like the fishing expedition it’s named for, is a speculative venture: the phisher puts the lure hoping to fool at least a few of the prey that encounter the bait.
Spoofing activity is to deceive for the purposes of gaining access to someone else’s resources (for example, to fake an Internet address so that one looks like a certain kind of Internet user)
E-mail Spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations.
IP Spoofing, also known as IP address forgery or a host file hijack, is a hijacking technique in which a cracker masquerades as a trusted host to conceal his identity, spoof a web site, hijack browsers, or gain access to a network. Here’s how it works: The hijacker obtains the IP address of legitimate host and alters packet headers so that the legitimate host appears to be the source. When IP spoofing is used to hijack a browser, a visitor who types in the URL ( Uniform Resource Locator) of a legitimate site is taken to a fraudulent web page created by the hijacker.
Making Website easily with joomla
I learned and founded joomla its about 3 years ago, because of Joomla my website project finished more faster and better. I can’t believe how many time wasted if I build a website with PHP without Joomla.
The question is what is Joomla?
Joomla is a free open source content management system for publishing content on the Internet. Open Source that’s mean 100% free. Languages base of Joomla is PHP. Don’t worry if you don’t have skill about PHP, because Joomla makes user doesn’t need to write down the script. Only Install and the simple Site ready to use (Amazing Huh….). I learned Joomla its about 1 weeks before I starting build my site. Joomla is quite simple to use, so then its not make so many time to learn.
Component & Modules
The other basic things about Joomla is Component & Modules. With component and modules you will be able to inserted any script packet where interact with Joomla. All you need to is searching for Component / Modules that suitable with your Site. There are too many component/modules that you will be able to download from internet, actually from www.joomla.org.
Are you beginner of making a website?, don’t worry about that. Just try Joomla and you should be like pro.
Next time I will be talk more deeper about Joomla….
The question is what is Joomla?
Joomla is a free open source content management system for publishing content on the Internet. Open Source that’s mean 100% free. Languages base of Joomla is PHP. Don’t worry if you don’t have skill about PHP, because Joomla makes user doesn’t need to write down the script. Only Install and the simple Site ready to use (Amazing Huh….). I learned Joomla its about 1 weeks before I starting build my site. Joomla is quite simple to use, so then its not make so many time to learn.
Component & Modules
The other basic things about Joomla is Component & Modules. With component and modules you will be able to inserted any script packet where interact with Joomla. All you need to is searching for Component / Modules that suitable with your Site. There are too many component/modules that you will be able to download from internet, actually from www.joomla.org.
Are you beginner of making a website?, don’t worry about that. Just try Joomla and you should be like pro.
Next time I will be talk more deeper about Joomla….
Langganan:
Postingan (Atom)