One of my earlier blog post in the internet world. It might just as well contain some interesting information that of your interest. Please enjoy and give a comment for all your feedbacks.
Tuesday, December 13, 2005
The Cubatron
meaning to be that the LED display will make an 3D object using some ethernet something like that ..
the link is
http://www.nw.com/nw/projects/cubatron/
Thursday, December 08, 2005
DropSend | Email large files easily and securely
http://www.dropsend.com/
Tuesday, December 06, 2005
SeanGreasley.com - Free Downloadable Tutorials!
This is the website i found that provide free downloadble tutorial on all kinds of programming language
such as:
C++
Visual Basic
SQL
3D
HTML
Java
thanks to Sean Greasley for the tutorial :D
Wednesday, November 30, 2005
EvilLyrics - Development - Lyrics search plugin
This was kinda cool....
http://www.evillabs.sk/evillyrics/development.php
Monday, October 24, 2005
Why I won't be buying HP Compaq Laptops ?
WAllaa .. i had been using it for sometimes (1 year ++ to be exact)... Something happen to my Baby. suddenly, the LCD display goes dimmed and hard to be seen. I thought i will have a major motherboard problem at first... later i test it on my dad's monitor. Gosh, there is stilll display on the monitor. THerefore, i suspected that it will not be the matter with the motherboard and may be due to the display itself.
So, i did some googling on the internet and found that this matter is called as the backlight malfunction ~~~ erm .. something like that. Happier when i search in ebay that 1 backlight will just cost me bout RM 100 ++ good news ...
Muahahahaa
The next morning i called up Compaq and tell them bout my problem and asked what is the price for compaq's backlight. I am damn surprise that the customer service guy tell me that in Compaq's laptop, there are no such thing as changing the backlight alone but instead it had to be done to the whole LCD module. First, i am not that sure bout what that guy tell me so i go to the laptop repair shop and hope that they can solve this problem for me. However, that guy also said that this is what normally happen to Compaq and HP's laptop the LCD, the backlight and the cable is bundled together and damn hard to change 1 component only. ---- the price for this is RM 2500 for the LCD itself
Reason, I will not buy HP Compaq laptop:
- althought that the price is kinda resonable but they give us hard to fix and hard to find parts.
- they only give 1 year warranty (normally, according to what i see until now), my guess the part is not that durable.
- had some problem with the battery, there are even cases with HP laptop where the battery exploded. see this http://www.geek.com/news/geeknews/2005Oct/gee20051017032772.htm
- expensive parts
- Hard to repair, tried to unscrew the casing and it was complicated .
Wednesday, September 21, 2005
Post Examination Fever
Planned to take external courses (may be take Java programming or CCNA test), but i am surely will be very busy helping my dad .. Hee ..anyway, Now i can have sometime off from all the hectic life of University life. Sure will be very happy when i don't need to do assignment and have to face the ridiculous test for a couple of months.
But the thing that i am sure is that .. will spend more time with my family and will meet my "OLD" friends that most of them is in University and overseas now. If not may be will not have the opportunity to hang around with them already.
Looking forward for the New Harry Potter movie ..
15 October may be will be going back to school to take my Java programming certificate examination.
Sunday, August 28, 2005
Is your son a Hacker? ? - the symptom
Most American families use trusted and responsible Internet Service Providers, such as AOL. These providers have a strict "No Hacking" policy, and take careful measures to ensure that your internet experience is enjoyable, educational and above all legal. If your child is becoming a hacker, one of his first steps will be to request a change to a more hacker friendly provider.
I would advise all parents to refuse this request. One of the reasons your son is interested in switching providers is to get away from AOL's child safety filter. This filter is vital to any parent who wants his son to enjoy the internet without the endangering him through exposure to "adult" content. It is best to stick with the protection AOL provides, rather than using a home-based solution. If your son is becoming a hacker, he will be able to circumvent any home-based measures with surprising ease, using information gleaned from various hacker sites.
2. Are you finding programs on your computer that you don't remember installing?
Your son will probably try to install some hacker software. He may attempt to conceal the presence of the software in some way, but you can usually find any new programs by reading through the programs listed under "Install/Remove Programs" in your control panel. Popular hacker software includes "Comet Cursor", "Bonzi Buddy" and "Flash".
The best option is to confront your son with the evidence, and force him to remove the offending programs. He will probably try to install the software again, but you will be able to tell that this is happening, if your machine offers to "download" one of the hacker applications. If this happens, it is time to give your son a stern talking to, and possibly consider punishing him with a grounding.
3. Has your child asked for new hardware?
Computer hackers are often limited by conventional computer hardware. They may request "faster" video cards, and larger hard drives, or even more memory. If your son starts requesting these devices, it is possible that he has a legitimate need. You can best ensure that you are buying legal, trustworthy hardware by only buying replacement parts from your computer's manufacturer.
If your son has requested a new "processor" from a company called "AMD", this is genuine cause for alarm. AMD is a third-world based company who make inferior, "knock-off" copies of American processor chips. They use child labor extensively in their third world sweatshops, and they deliberately disable the security features that American processor makers, such as Intel, use to prevent hacking. AMD chips are never sold in stores, and you will most likely be told that you have to order them from internet sites. Do not buy this chip! This is one request that you must refuse your son, if you are to have any hope of raising him well.
4. Does your child read hacking manuals?
If you pay close attention to your son's reading habits, as I do, you will be able to determine a great deal about his opinions and hobbies. Children are at their most impressionable in the teenage years. Any father who has had a seventeen year old daughter attempt to sneak out on a date wearing make up and perfume is well aware of the effect that improper influences can have on inexperienced minds.
There are, unfortunately, many hacking manuals available in bookshops today. A few titles to be on the lookout for are: "Snow Crash" and "Cryptonomicon" by Neal Stephenson; "Neuromancer" by William Gibson; "Programming with Perl" by Timothy O'Reilly; "Geeks" by Jon Katz; "The Hacker Crackdown" by Bruce Sterling; "Microserfs" by Douglas Coupland; "Hackers" by Steven Levy; and "The Cathedral and the Bazaar" by Eric S. Raymond.
If you find any of these hacking manuals in your child's possession, confiscate them immediately. You should also petition local booksellers to remove these titles from their shelves. You may meet with some resistance at first, but even booksellers have to bow to community pressure.
5. How much time does your child spend using the computer each day?
If your son spends more than thirty minutes each day on the computer, he may be using it to DOS other peoples sites. DOSing involves gaining access to the "command prompt" on other people's machines, and using it to tie up vital internet services. This can take up to eight hours. If your son is doing this, he is breaking the law, and you should stop him immediately. The safest policy is to limit your children's access to the computer to a maximum of forty-five minutes each day.
6. Does your son use Quake?
Quake is an online virtual reality used by hackers. It is a popular meeting place and training ground, where they discuss hacking and train in the use of various firearms. Many hackers develop anti-social tendencies due to the use of this virtual world, and it may cause erratic behaviour at home and at school.
If your son is using Quake, you should make hime understand that this is not acceptable to you. You should ensure all the firearms in your house are carefully locked away, and have trigger locks installed. You should also bring your concerns to the attention of his school.
7. Is your son becoming argumentative and surly in his social behaviour?
As a child enters the electronic world of hacking, he may become disaffected with the real world. He may lose the ability to control his actions, or judge the rightness or wrongness of a course of behaviour. This will manifest itself soonest in the way he treats others. Those whom he disagrees with will be met with scorn, bitterness, and even foul language. He may utter threats of violence of a real or electronic nature.
Even when confronted, your son will probably find it difficult to talk about this problem to you. He will probably claim that there is no problem, and that you are imagining things. He may tell you that it is you who has the problem, and you should "back off" and "stop smothering him." Do not allow yourself to be deceived. You are the only chance your son has, even if he doesn't understand the situation he is in. Keep trying to get through to him, no matter how much he retreats into himself.
8. Is your son obsessed with "Lunix"?
BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called "xenix", which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the "mp3" program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a telephone.
Your son may try to install "lunix" on your hard drive. If he is careful, you may not notice its presence, however, lunix is a capricious beast, and if handled incorrectly, your son may damage your computer, and even break it completely by deleting Windows, at which point you will have to have your computer repaired by a professional.
If you see the word "LILO" during your windows startup (just after you turn the machine on), your son has installed lunix. In order to get rid of it, you will have to send your computer back to the manufacturer, and have them fit a new hard drive. Lunix is extremely dangerous software, and cannot be removed without destroying part of your hard disk surface.
9. Has your son radically changed his appearance?
If your son has undergone a sudden change in his style of dress, you may have a hacker on your hands. Hackers tend to dress in bright, day-glo colors. They may wear baggy pants, bright colored shirts and spiky hair dyed in bright colors to match their clothes. They may take to carrying "glow-sticks" and some wear pacifiers around their necks. (I have no idea why they do this) There are many such hackers in schools today, and your son may have started to associate with them. If you notice that your son's group of friends includes people dressed like this, it is time to think about a severe curfew, to protect him from dangerous influences.
10. Is your son struggling academically?
If your son is failing courses in school, or performing poorly on sports teams, he may be involved in a hacking group, such as the infamous "Otaku" hacker association. Excessive time spent on the computer, communicating with his fellow hackers may cause temporary damage to the eyes and brain, from the electromagnetic radiation. This will cause his marks to slip dramatically, particularly in difficult subjects such as Math, and Chemistry. In extreme cases, over-exposure to computer radiation can cause schizophrenia, meningitis and other psychological diseases. Also, the reduction in exercise may cause him to lose muscle mass, and even to start gaining weight. For the sake of your child's mental and physical health, you must put a stop to his hacking, and limit his computer time drastically.
I encourage all parents to read through this guide carefully. Your child's future may depend upon it. Hacking is an illegal and dangerous activity, that may land your child in prison, and tear your family apart. It cannot be taken too seriously.
[source : http://www.adequacy.org/public/stories/2001.12.2.42056.2147.html]
Thursday, August 11, 2005
Quote of the day
Wednesday, July 20, 2005
Sun Online Traning
http://www.sun.com/training/team/online/index.html
The company Id should be MY156029 - this is to get the free account registered under my University's account.
Try to register a id here.
yo .. free lunch .. :D
Sunday, July 17, 2005
SAm Walton
Sam Walton, the founder of Wal-Mart, grew up poor in a farm community in rural Missouri during the Great Depression. The poverty he experienced while growing up taught him the value of money and to persevere.
After attending the University of Missouri, he immediately worked for J.C. Penny where he got his first taste of retailing. He served in World War II, after which he became a successful franchiser of Ben Franklin five-and-dime stores. In 1962, he had the idea of opening bigger stores, sticking to rural areas, keeping costs low and discounting heavily. The management disagreed with his vision. Undaunted, Walton pursued his vision, founded Wal-Mart and started a retailing success story. When Walton died in 1992, the family's net worth approached $25 billion.
Today, Wal-Mart is the world's #1 retailer, with more than 4,150 stores, including discount stores, combination discount and grocery stores, and membership-only warehouse stores (Sam's Club). Learn Walton's winning formula for business.
Rule 1: Commit to your business. Believe in it more than anybody else. I think I overcame every single one of my personal shortcomings by the sheer passion I brought to my work. I don't know if you're born with this kind of passion, or if you can learn it. But I do know you need it. If you love your work, you'll be out there every day trying to do it the best you possibly can, and pretty soon everybody around will catch the passion from you — like a fever.
Rule 2: Share your profits with all your associates, and treat them as partners. In turn, they will treat you as a partner, and together you will all perform beyond your wildest expectations. Remain a corporation and retain control if you like, but behave as a servant leader in your partnership. Encourage your associates to hold a stake in the company. Offer discounted stock, and grant them stock for their retirement. It's the single best thing we ever did.
Rule 3: Motivate your partners. Money and ownership alone aren't enough. Constantly, day by day, think of new and more interesting ways to motivate and challenge your partners. Set high goals, encourage competition, and then keep score. Make bets with outrageous payoffs. If things get stale, cross-pollinate; have managers switch jobs with one another to stay challenged. Keep everybody guessing as to what your next trick is going to be. Don't become too predictable.
Rule 4: Communicate everything you possibly can to your partners. The more they know, the more they'll understand. The more they understand, the more they'll care. Once they care, there's no stopping them. If you don't trust your associates to know what's going on, they'll know you really don't consider them partners. Information is power, and the gain you get from empowering your associates more than offsets the risk of informing your competitors.
Rule 5: Appreciate everything your associates do for the business. A paycheck and a stock option will buy one kind of loyalty. But all of us like to be told how much somebody appreciates what we do for them. We like to hear it often, and especially when we have done something we're really proud of. Nothing else can quite substitute for a few well-chosen, well-timed, sincere words of praise. They're absolutely free — and worth a fortune.
Rule 6: Celebrate your success. Find some humor in your failures. Don't take yourself so seriously. Loosen up, and everybody around you will loosen up. Have fun. Show enthusiasm — always. When all else fails, put on a costume and sing a silly song. Then make everybody else sing with you. Don't do a hula on Wall Street. It's been done. Think up your own stunt. All of this is more important, and more fun, than you think, and it really fools competition. "Why should we take those cornballs at Wal-Mart seriously?"
Rule 7: Listen to everyone in your company and figure out ways to get them talking. The folks on the front lines — the ones who actually talk to the customer — are the only ones who really know what's going on out there. You'd better find out what they know. This really is what total quality is all about. To push responsibility down in your organization, and to force good ideas to bubble up within it, you must listen to what your associates are trying to tell you.
Rule 8: Exceed your customer's expectations. If you do, they'll come back over and over. Give them what they want — and a little more. Let them know you appreciate them. Make good on all your mistakes, and don't make excuses — apologize. Stand behind everything you do. The two most important words I ever wrote were on that first Wal-Mart sign: "Satisfaction Guaranteed." They're still up there, and they have made all the difference.
Rule 9: Control your expenses better than your competition. This is where you can always find the competitive advantage. For twenty-five years running — long before Wal-Mart was known as the nation's largest retailer — we've ranked No. 1 in our industry for the lowest ratio of expenses to sales. You can make a lot of different mistakes and still recover if you run an efficient operation. Or you can be brilliant and still go out of business if you're too inefficient.
Rule 10: Swim upstream. Go the other way. Ignore the conventional wisdom. If everybody else is doing it one way, there's a good chance you can find your niche by going in exactly the opposite direction. But be prepared for a lot of folks to wave you down and tell you you're headed the wrong way. I guess in all my years, what I heard more often than anything was: a town of less than 50,000 population cannot support a discount store for very long.
=====
[adopted from : http://www.powerhomebiz.com/vol76/walton.htm]
Saturday, July 16, 2005
MySql installation
Unfortunately, there is an error occur where the MySql service cannot start and come out with an error message "error 1067".. trying uninstall and install again for many many times .. But the problem still cannot resolve. So, i tried the steps below:
1) uninstalling all the MySql services and using the add and remove in control panel.
2) delete all files that had previously created by MySql
3) check the register files and see if there is still something installed in the system.
4) stop and remove the installed MySql service.
5) reinstall again .. and then IT works ..
gosh .
p.s. Don't set the password for the root user.
Finally .... its alive
Tuesday, July 12, 2005
Visual Web Developer 2005 Express Edition
However, it will need Windows service pack 2 to complete the installation ..
try to click on this link ..
http://www.asp.net/Default.aspx?tabindex=0&tabid=1
Thursday, June 23, 2005
Dark Eye Circle
THE BASIC FACTS
The skin under the eyes is the thinnest on the body. The many blood vessels in this area can show through the delicate skin, contributing to the appearance of dark under-eye circles, especially if the vessels become dilated. Fat pads surround the eyes, and the muscles that enclose the upper and lower eyelids hold the fat pads (and skin) in place. As we age, skin and muscle lose elasticity, which can result in sagging around the eyes.
Dark circles can be caused by several factors:
* Genetics Darkness under the eyes runs in families and is more prominent on fair skin.
* Lack of sleep Poor-quality sleep causes blood vessels to become more visible through the skin.
* Sun exposure can trigger "age spots" around the eyes and weaken the skin, which can contribute to dark circles.
* Increased fluid retention The blood vessels under the eyes can become engorged and dilated (dietary salt and smoking are common causes).
* Aging causes the fat pad below the eye to thin, producing a sunken appearance.
* Extreme weight loss also can cause this sunken look.
SIMPLE SOLUTIONS
To reduce the appearance of dark circles, Beauty Rx:
1. Get at least eight hours of uninterrupted sleep every night. Sleep with your head slightly elevated (when you're lying flat, gravity causes fluid to collect in your lower eyelids, which may create shadows).
2. Moisturize the area with an eye cream containing nourishing antioxidants that help protect the skin, such as green-tea and grapeseed extracts, and vitamins C, E and K (Dr. Brandt's own Skincare Lineless Eye Cream, $60; sephora.com, contains vitamins and green-tea extract).
3. Cover up with a yellow-based concealer.
4. See a dermatologist. He or she can tell you if engorged blood vessels are the culprit; if so, lasers can shrink them for up to $300 per area.
COPYRIGHT 2005 Weider Publications
COPYRIGHT 2005 Gale Group
Monday, April 25, 2005
Think outside the BOX
...Imagine two rooms. Between these two rooms is a solid brick wall.
We, as human being have been conditioned to believe that this wall
keeps us from moving from one room to the other. From the moment each
of us were born, we have been taught that we cannot move between these
rooms. We have been made to think according to predefined rules. We
think… in a box. Boxthinkers. Hacking - by any definition - is the art
of thinking outside of that box. To creatively formulate new,
unconventional ways to do things... Dennis Ritchie (the creator of C),
Linus Torvalds, the people at Xerox who invented the mouse. All became
who they were for thinking outside the box. Kevin Mitnick, Kevin
Paulson - accomplished the legendary computer and phone system break-
in they did for not being boxthinkers... Computer hacking does require
an amount of technical knowledge. That's why you're reading this.
That's why we are here. Arguably more important, though, is
creativity. Resourcefulness, and an open mind. When shown a brick
wall, know that it is possible to get into the other room - all you
have to do is figure out how....
Respect, X_bodo_X
Monday, April 11, 2005
The World's Most Hunted Hacker
Feb. 21, 2000
We're seeing the actions of apparent vandals--not hackers--who are using tools that hackers developed. No hacker I've ever heard of would do anything remotely resembling these attacks. I mean, it's not as though they have to "get root" on Yahoo's servers to do these things. Unless these people are extremely skilled, they'll be caught quite quickly. If these actions have economic gain as their motive, the perpetrators may have the resources to avoid arrest much longer.
If I could talk with the people carrying out these disruptions, I'd tell them that their actions just aren't the cool thing to do; these attacks aren't impressive. They require no sophistication. They are analogous to throwing paint remover on cars driving down the street, and they're getting a bunch of people angry. I've learned a very painful lesson--avoid any contact with the criminal-justice system, because it's a system that's stacked completely in favor of the prosecution.
If the terms of my release permitted me to do so, I'd tell the people running the sites that were hit three things, all of which they may have done by now: 1) use a network-monitoring tool to analyze the packets being sent to determine their source, purpose and destination; 2) place your machines on different subnetworks of the larger network in order to present multiple defenses; and 3) install software tools that use packet filtering on the router or fire wall to reject any packets from known sources of denial-of-service traffic.
As others have noted, the distributed nature of these attacks makes any defense far more difficult. It has also been apparent that the victims haven't been forthcoming in sharing their experience. This is quite unfortunate, as the best hope of stopping these attacks rests in sharing information about their technical nature, timing and origins. The scattered approach we're witnessing, I might point out, is a distinct contrast to the tightly coordinated efforts used to find and arrest me.
With history as our guide, we can expect that the government will use this event to push through legislation authorizing digital wiretapping without court orders, to outlaw encryption that the government cannot crack and to track the location of cell-phone users without their knowledge. They'll push laws that eliminate individual rights in exchange for more government "protection" against cybercrime.
Mitnick spent 4 1/2 years in pretrial detention before pleading guilty to wire and computer fraud. The opinions expressed here are for informational purposes only and should not be construed as technical advice of any kind.
Saturday, April 09, 2005
SwordFish
U.S. Release Date: 6/8/01 (wide)
Running Length: 1:38
MPAA Classification: R (Violence, profanity, nudity, sex)
Theatrical Aspect Ratio: 2.35:1
Seen at: Ritz East, Philadelphia
Cast: John Travolta, Hugh Jackman, Halle Berry, Don Cheadle, Vinnie Jones, Camryn Grimes, Sam Shepard, Zach Grenier
Director: Dominic Sena
Producers: Joel Silver, Jonathan D. Krane, Paul Winze
Screenplay: Skip Woods
Cinematography: Paul Cameron
Music: Christopher Young
U.S. Distributor: Warner Brothers

This is a great movie on Hacker. virus creating and hijack computer.
Operation TakeDown
Producer: John Thompson, Brad Weston
Screenwriter: David Newman, Leslie Newman, John Danza, Howard A. Rodman
Stars: Skeet Ulrich, Russell Wong, Angela Featherstone, Donal Logue, Christopher McDonald, Master P, Tom Berenger, Jeremy Sisto, Amanda Peet
MPAA Rating: R
Year of Release: 2000

For this film review, we begin with a history lesson. Kevin Mitnick stands as probably the most famous, the most notorious, and the most successful computer hacker of all time. After nearly 15 years of hacking (alternating with jail and probation time), he was finally apprehended for the last time in 1995, for a collection of tech crimes. and was released from prison in early 2000. (The story of his questionably legal incarceration is itself enough material for a book and a movie.) I interviewed Mitnick shortly after his release; today he's a computer security consultant (though he's not allowed to touch a computer as a term of his release).
Track Downwas produced shortly before Mitnick's release amid much controversy. Mitnick, as you might expect, is a cause celebre among the hacker community, while he's been vilified by the corporate and legal communities. The story of his long career as a hacker was the subject of two major books -- The Fugitive Game, written mainly from Mitnick's point of view, and Takedown, written by the man who captured him. The latter book (widely dismissed by the hacker community as propaganda) got optioned by Miramax, and against all odds, the Kevin Mitnick story became a movie, starring Skeet Ulrich as Mitnick and Russell Wong as Tsutomu Shimomura, the man who "captured" Mitnick and the co-author of Takedown.
But the story doesn't stop with the completion of the film, as Miramax never released it theatrically. (The making of the film was itself subject to a guerrilla documentary called Freedom Downtime, available here.) The film sat on shelves for nearly five years before getting a new (and rather lame) title and a direct-to-DVD release.
And here it is.
Track Down, if it had no basis in fact at all, wouldn't be much of a movie. It'd be the kind of thing you'd see on Showtime after hours, only the computer viruses and worms would come to life somehow. Thank God the film sticks to the guts of Mitnick's life -- although every company and character name (aside from Mitnick and Shimomura) is changed -- without ridiculously delving into the impossible. Sadly, though, the actual exploits of Mitnick are unrecognizable here among all the poetic license the filmmakers and screenwriters have taken. It's nearly impossible to figure out what company Mitnick is trying to hack, break into, or con. The facts are confused beyond hope of recognition. I can't imagine what someone unfamiliar with the proceedings is going to make of this.
The facts aside (and it's impossible to dispute the facts in Track Down, because there's no attempt to be accurate at all), Track Down is simply not a very good movie. Director Joe Chappelle has the unenviable task of helming this mess, having formerly directed a scant few films -- including Halloween 6 and Hellraiser 4 -- that couldn't have presented much of a challenge at all. With Track Down he must have found himself in a huge mess, stuck with a highly technical and convoluted plot and rising stars to coddle. You can almost hear him saying, "Ah, fuck it, let's just put a car chase in here." Mitnick's final hack is given the full Hollywood treatment as he attacks Shimomura's computer while the FBI closes in on his apartment building -- gasp! The pacing is stupid from both a pure storytelling and a historical point of view, though some of Mitnick's work as a social engineer will be of interest to those unfamiliar with the techniques.
Ulrich doesn't resemble Mitnick, though he manages to capture his cocky essence, and Wong's only resemblance to the long-locked Shimomura is the fact that he's Japanese. The supporting cast -- including Donal Logue as a heavily reimagined compatriot of Mitnick's and a scary as hell Angela Featherstone.(playing Shimomura's girlfriend) -- are hit and miss.
Ultimately the film will be of interest only to computer history enthusiasts, and then only as a curiosity. Some will find it laughable, others will find it insulting. I find it primarily a waste of time.
Just see the "Most famous Hacker" on earth in action.......
The Hitch
U.S. Release Date: 2/11/05 (wide)
Running Length: 1:56
MPAA Classification: PG-13 (Sexual situations, profanity)
Theatrical Aspect Ratio: 2.35:1
Cast: Will Smith, Eva Mendes, Kevin James, Amber Valletta, Julie Ann Emery
Director: Andy Tennant
Producers: James Lassiter, Will Smith, Teddy Zee
Screenplay: Kevin Bisch
Cinematography: Andrew Dunn
Music: George Fenton
U.S. Distributor: Columbia Pictures

Just think this movie is so so so funny.
Watch it and you wil love it .
Wednesday, March 30, 2005
Song
Just follow the link below to check it out .. k ..
http://www.geocities.com/burnerbyte/byte
Wednesday, March 23, 2005
The Gift Truth is Here ~~!
Monday, March 21, 2005
Professional Guitarist
Sunday, March 20, 2005
My Sifu

This is My dear friend, How En aka "Guitar Sifu"
Hehe .. my sifu is still struggling on the chord though ...
However, he is a real good Guitarist. My favourite song from him would be;
- Tears in Heaven
- Romance
- Some Song from Westlife. etc.
Actually, all of that song is plucking type of song ... some strumming also not bad... Erm . may be are real Great...
May be will try to upload some of his song here .. try and listen ..
ByteSurfer copyright®2005
Friday, March 18, 2005
Monday, March 14, 2005
Genting
And later today I will be going out with my brother’s camera and take some picture. Hopefully also …
It’s already night.. Just now took the camera out. Unfortunately, just have the opportunity to snap some picture of my brother and parents only and then …. Kachak Battery low.
Too bad.. Me plan to have burger later tonight. And carry on with my assignment … now watch guess guess guess … kind funny la the show ..
Sunday, March 13, 2005
Mom's visit
Back to my mom. She come to KL and have a night at my place. she was awake the whole night and says that KL is damn hot. Then today my dad call the air-condition people and fix a aircond.. was kinda cool lol.. all this aircond stuff make my room really messy. i think i will not be feeling so hot laio ... yahoo ...
Tomorrow.. i maybe will be going to Genting . and think that will be kinda boring until Jo say that was kinda cool ... :P I think will just bring my laptop there and start doing my assignment and get my head on some Programming. Suak liao .. don't wanna go into the casino or Theme park .. really don't like it ..
see how would tomorrow be .. still don't know can get hotel or not .. hopefully will get la .. may be will buy wine there.. Just can hope for a better tomorrow and finish my assignment .... so can close one file first ... :D ..Plus calculus assignment due Friday..
I AM SO SO SO PACKeD >.......
Thursday, March 10, 2005
Calculus test
Dr. Lim is the best Calculus lecturer ever. He teach really good. May be on the great part. If i am not mistaken, he's from UK leturing over there also .. He can explain till you really understand the concept and didn't like you to remember the formula one. He's dee best for now. The current lecturer (aka. "hei se hui lau ta" ; in mandarin -> boss) got knowledge but don't know how to deliver it well so we hardly get his point. Just explain dy/dx ... etc etc.
still blur...
back to the test, The test is off standard i will say cos all dee questions are all straight forward one .. don't need to think one . average, can do la . but just forget the intergration by part formula. SO , do till half way stuck .. However, last minute only i think of using simpson's rule. but everything is too late liao. no time ....
come back .. straight plug my self to my bed .... << recharge >>
Friday, March 04, 2005
AHhhhhh ~~!
Not to mention, my know-nothing, and blur-case attitude in my academic this year. So, I really have to study hard or maybe harder so that i can obtain good result in this year's Final examination .
Few testes pass by but i can't see that i am any better from last semester. I will say that i done worst than the year before. Shouldn't be so lazy. All i can blame is that the Chinese new Year come on the wrong time.
.............signing off....................
Thursday, February 24, 2005
The Day After Tomorrow
Planning to do my revision later tonight .. as i have been waking up from my mistake of delaying my work on revision, and use to entertain myself (movies, chatting etc.,) that's all the TEMPTATION given by God.
Have to change so that i can do better in acedemic part of my life. ah .. DSA - Link List .... Calculus ... Just seem to be Numbers and Character to me .. with all the characters to be a variable and unknown to me ... Calculus, the worst case, Lecture just know how to give example and ignore to teach us the proving and fail to make me understand how a particular formula works and represent. so have to study from scretch.
Hope to make a better tomorrow, by starting a better today..
signing off... ByteSurfer
Wednesday, February 23, 2005
Chap Goh Meh
What to do .. was being lazy all the while so last minute have to be extra hard working .. have learn my leasson to not to play to frequent but to study on my free time and not going on the internet wave and watch movies and so one .. just have learn my leasson .. But, i have been learning this lots of times .. However, i ain't know why i am still stuck with my nonsense thinking of not to study ..**SIGH**
Bout my dinner, I went to Wong Kok. I was hoping that it will be a good mean for me at "chap goh meh". Disappointed, it was worst than the one i can find on mamak stall and road side stall. Ha .. may be will go out and hunt something to eat a bit later tonight.
Hope will get a better day, "the day after today" hehe ..
First Timer
Actually, i am not really onto this blogging thing until my friend .. call me to read her blog ... ah just wanna give it a shot (althought that have been blogging on other place)
may be this is something like wanna log in all your daily activities .. and to kill time ..
Or may be this is just the way for some one to keep up with the current trend and really onto the TECHNOLOGY ~~!
Keep Smilng ...
.............................................................End Here.................................................
Setup Samba Server (Ubuntu)
If you want to share files between your Ubuntu and Windows computers, your best option is to use Samba file sharing. To install, first ope...
-
Director: Joe Chappelle Producer: John Thompson, Brad Weston Screenwriter: David Newman, Leslie Newman, John Danza, Howard A. Rodman Sta...
-
3D Graphics: 3Delight Free - http://www.3delight.com/index.htm Anim8or - http://www.anim8or.com/ Aqsis - http://www.aqsis.com/ Blender - htt...
-
Freebies Tutorial for Newbies This is the website i found that provide free downloadble tutorial on all kinds of programming language su...



