Tuesday, December 13, 2005

The Cubatron

here is a nice Led project that will make the Led in 3D form.

meaning to be that the LED display will make an 3D object using some ethernet something like that ..

the link is
http://www.nw.com/nw/projects/cubatron/

Thursday, December 08, 2005

DropSend | Email large files easily and securely

Here is one website that offer free uploading of huge files 1 gig ... that was pretty alot man .. beside that we still have yousentit.com

http://www.dropsend.com/

Tuesday, December 06, 2005

SeanGreasley.com - Free Downloadable Tutorials!

Freebies Tutorial for Newbies

This is the website i found that provide free downloadble tutorial on all kinds of programming language
such as:
C++
Visual Basic
SQL
3D
HTML
Java

thanks to Sean Greasley for the tutorial :D

Wednesday, November 30, 2005

EvilLyrics - Development - Lyrics search plugin

I saw this website recommending on lyric plugin. It will download the lyric from internet and then display it out in a textbox, so when the song is sang we can look on the lyrics ..

This was kinda cool....


http://www.evillabs.sk/evillyrics/development.php

Monday, October 24, 2005

Why I won't be buying HP Compaq Laptops ?

Last time, I thought that i had make a good choice to purchase one of the Compaq laptop (now known as HP-Compaq). I thought Compaq is a well reknown brand in computer area, therefore,i thought that my Presario 2100 laptop will be pretty okay ....

WAllaa .. i had been using it for sometimes (1 year ++ to be exact)... Something happen to my Baby. suddenly, the LCD display goes dimmed and hard to be seen. I thought i will have a major motherboard problem at first... later i test it on my dad's monitor. Gosh, there is stilll display on the monitor. THerefore, i suspected that it will not be the matter with the motherboard and may be due to the display itself.

So, i did some googling on the internet and found that this matter is called as the backlight malfunction ~~~ erm .. something like that. Happier when i search in ebay that 1 backlight will just cost me bout RM 100 ++ good news ...

Muahahahaa

The next morning i called up Compaq and tell them bout my problem and asked what is the price for compaq's backlight. I am damn surprise that the customer service guy tell me that in Compaq's laptop, there are no such thing as changing the backlight alone but instead it had to be done to the whole LCD module. First, i am not that sure bout what that guy tell me so i go to the laptop repair shop and hope that they can solve this problem for me. However, that guy also said that this is what normally happen to Compaq and HP's laptop the LCD, the backlight and the cable is bundled together and damn hard to change 1 component only. ---- the price for this is RM 2500 for the LCD itself

Reason, I will not buy HP Compaq laptop:
  1. althought that the price is kinda resonable but they give us hard to fix and hard to find parts.
  2. they only give 1 year warranty (normally, according to what i see until now), my guess the part is not that durable.
  3. had some problem with the battery, there are even cases with HP laptop where the battery exploded. see this http://www.geek.com/news/geeknews/2005Oct/gee20051017032772.htm
  4. expensive parts
  5. Hard to repair, tried to unscrew the casing and it was complicated .
That is the experience i had with Compaq, and hope to share my story with you guys. Make a better choise and ask the sales person more on the parts of the laptop that you are going to purchase.

Wednesday, September 21, 2005

Post Examination Fever

Finally, I am off from official education.. Don't need to go to school anymore. The most is after 3 month. Don't know what to do with the holiday. Sigh sigh

Planned to take external courses (may be take Java programming or CCNA test), but i am surely will be very busy helping my dad .. Hee ..anyway, Now i can have sometime off from all the hectic life of University life. Sure will be very happy when i don't need to do assignment and have to face the ridiculous test for a couple of months.

But the thing that i am sure is that .. will spend more time with my family and will meet my "OLD" friends that most of them is in University and overseas now. If not may be will not have the opportunity to hang around with them already.

Looking forward for the New Harry Potter movie ..

15 October may be will be going back to school to take my Java programming certificate examination.

Sunday, August 28, 2005

Is your son a Hacker? ? - the symptom

1. Has your son asked you to change ISPs?

Most American families use trusted and responsible Internet Service Providers, such as AOL. These providers have a strict "No Hacking" policy, and take careful measures to ensure that your internet experience is enjoyable, educational and above all legal. If your child is becoming a hacker, one of his first steps will be to request a change to a more hacker friendly provider.

I would advise all parents to refuse this request. One of the reasons your son is interested in switching providers is to get away from AOL's child safety filter. This filter is vital to any parent who wants his son to enjoy the internet without the endangering him through exposure to "adult" content. It is best to stick with the protection AOL provides, rather than using a home-based solution. If your son is becoming a hacker, he will be able to circumvent any home-based measures with surprising ease, using information gleaned from various hacker sites.

2. Are you finding programs on your computer that you don't remember installing?

Your son will probably try to install some hacker software. He may attempt to conceal the presence of the software in some way, but you can usually find any new programs by reading through the programs listed under "Install/Remove Programs" in your control panel. Popular hacker software includes "Comet Cursor", "Bonzi Buddy" and "Flash".

The best option is to confront your son with the evidence, and force him to remove the offending programs. He will probably try to install the software again, but you will be able to tell that this is happening, if your machine offers to "download" one of the hacker applications. If this happens, it is time to give your son a stern talking to, and possibly consider punishing him with a grounding.

3. Has your child asked for new hardware?

Computer hackers are often limited by conventional computer hardware. They may request "faster" video cards, and larger hard drives, or even more memory. If your son starts requesting these devices, it is possible that he has a legitimate need. You can best ensure that you are buying legal, trustworthy hardware by only buying replacement parts from your computer's manufacturer.

If your son has requested a new "processor" from a company called "AMD", this is genuine cause for alarm. AMD is a third-world based company who make inferior, "knock-off" copies of American processor chips. They use child labor extensively in their third world sweatshops, and they deliberately disable the security features that American processor makers, such as Intel, use to prevent hacking. AMD chips are never sold in stores, and you will most likely be told that you have to order them from internet sites. Do not buy this chip! This is one request that you must refuse your son, if you are to have any hope of raising him well.

4. Does your child read hacking manuals?

If you pay close attention to your son's reading habits, as I do, you will be able to determine a great deal about his opinions and hobbies. Children are at their most impressionable in the teenage years. Any father who has had a seventeen year old daughter attempt to sneak out on a date wearing make up and perfume is well aware of the effect that improper influences can have on inexperienced minds.

There are, unfortunately, many hacking manuals available in bookshops today. A few titles to be on the lookout for are: "Snow Crash" and "Cryptonomicon" by Neal Stephenson; "Neuromancer" by William Gibson; "Programming with Perl" by Timothy O'Reilly; "Geeks" by Jon Katz; "The Hacker Crackdown" by Bruce Sterling; "Microserfs" by Douglas Coupland; "Hackers" by Steven Levy; and "The Cathedral and the Bazaar" by Eric S. Raymond.

If you find any of these hacking manuals in your child's possession, confiscate them immediately. You should also petition local booksellers to remove these titles from their shelves. You may meet with some resistance at first, but even booksellers have to bow to community pressure.

5. How much time does your child spend using the computer each day?

If your son spends more than thirty minutes each day on the computer, he may be using it to DOS other peoples sites. DOSing involves gaining access to the "command prompt" on other people's machines, and using it to tie up vital internet services. This can take up to eight hours. If your son is doing this, he is breaking the law, and you should stop him immediately. The safest policy is to limit your children's access to the computer to a maximum of forty-five minutes each day.

6. Does your son use Quake?

Quake is an online virtual reality used by hackers. It is a popular meeting place and training ground, where they discuss hacking and train in the use of various firearms. Many hackers develop anti-social tendencies due to the use of this virtual world, and it may cause erratic behaviour at home and at school.

If your son is using Quake, you should make hime understand that this is not acceptable to you. You should ensure all the firearms in your house are carefully locked away, and have trigger locks installed. You should also bring your concerns to the attention of his school.

7. Is your son becoming argumentative and surly in his social behaviour?

As a child enters the electronic world of hacking, he may become disaffected with the real world. He may lose the ability to control his actions, or judge the rightness or wrongness of a course of behaviour. This will manifest itself soonest in the way he treats others. Those whom he disagrees with will be met with scorn, bitterness, and even foul language. He may utter threats of violence of a real or electronic nature.

Even when confronted, your son will probably find it difficult to talk about this problem to you. He will probably claim that there is no problem, and that you are imagining things. He may tell you that it is you who has the problem, and you should "back off" and "stop smothering him." Do not allow yourself to be deceived. You are the only chance your son has, even if he doesn't understand the situation he is in. Keep trying to get through to him, no matter how much he retreats into himself.

8. Is your son obsessed with "Lunix"?

BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called "xenix", which was written by Microsoft for the US government. These programs are used by hackers to break into other people's computer systems to steal credit card numbers. They may also be used to break into people's stereos to steal their music, using the "mp3" program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as "telnet", which is used by hackers to connect to machines on the internet without using a telephone.

Your son may try to install "lunix" on your hard drive. If he is careful, you may not notice its presence, however, lunix is a capricious beast, and if handled incorrectly, your son may damage your computer, and even break it completely by deleting Windows, at which point you will have to have your computer repaired by a professional.

If you see the word "LILO" during your windows startup (just after you turn the machine on), your son has installed lunix. In order to get rid of it, you will have to send your computer back to the manufacturer, and have them fit a new hard drive. Lunix is extremely dangerous software, and cannot be removed without destroying part of your hard disk surface.

9. Has your son radically changed his appearance?

If your son has undergone a sudden change in his style of dress, you may have a hacker on your hands. Hackers tend to dress in bright, day-glo colors. They may wear baggy pants, bright colored shirts and spiky hair dyed in bright colors to match their clothes. They may take to carrying "glow-sticks" and some wear pacifiers around their necks. (I have no idea why they do this) There are many such hackers in schools today, and your son may have started to associate with them. If you notice that your son's group of friends includes people dressed like this, it is time to think about a severe curfew, to protect him from dangerous influences.

10. Is your son struggling academically?

If your son is failing courses in school, or performing poorly on sports teams, he may be involved in a hacking group, such as the infamous "Otaku" hacker association. Excessive time spent on the computer, communicating with his fellow hackers may cause temporary damage to the eyes and brain, from the electromagnetic radiation. This will cause his marks to slip dramatically, particularly in difficult subjects such as Math, and Chemistry. In extreme cases, over-exposure to computer radiation can cause schizophrenia, meningitis and other psychological diseases. Also, the reduction in exercise may cause him to lose muscle mass, and even to start gaining weight. For the sake of your child's mental and physical health, you must put a stop to his hacking, and limit his computer time drastically.

I encourage all parents to read through this guide carefully. Your child's future may depend upon it. Hacking is an illegal and dangerous activity, that may land your child in prison, and tear your family apart. It cannot be taken too seriously.

[source : http://www.adequacy.org/public/stories/2001.12.2.42056.2147.html]

Thursday, August 11, 2005

Quote of the day

A smile costs nothing, but gives much. It enriches those who receive, without making poorer those who give, it takes but a moment, but the memory of it sometimes lasts for ever.

Wednesday, July 20, 2005

Sun Online Traning

sign in to the sun learning center.

http://www.sun.com/training/team/online/index.html

The company Id should be MY156029 - this is to get the free account registered under my University's account.

Try to register a id here.

yo .. free lunch .. :D

Sunday, July 17, 2005

SAm Walton

i got this stuff interesting stuff from the internet... it is nice

Sam Walton, the founder of Wal-Mart, grew up poor in a farm community in rural Missouri during the Great Depression. The poverty he experienced while growing up taught him the value of money and to persevere.

After attending the University of Missouri, he immediately worked for J.C. Penny where he got his first taste of retailing. He served in World War II, after which he became a successful franchiser of Ben Franklin five-and-dime stores. In 1962, he had the idea of opening bigger stores, sticking to rural areas, keeping costs low and discounting heavily. The management disagreed with his vision. Undaunted, Walton pursued his vision, founded Wal-Mart and started a retailing success story. When Walton died in 1992, the family's net worth approached $25 billion.

Today, Wal-Mart is the world's #1 retailer, with more than 4,150 stores, including discount stores, combination discount and grocery stores, and membership-only warehouse stores (Sam's Club). Learn Walton's winning formula for business.

Rule 1: Commit to your business. Believe in it more than anybody else. I think I overcame every single one of my personal shortcomings by the sheer passion I brought to my work. I don't know if you're born with this kind of passion, or if you can learn it. But I do know you need it. If you love your work, you'll be out there every day trying to do it the best you possibly can, and pretty soon everybody around will catch the passion from you — like a fever.

Rule 2: Share your profits with all your associates, and treat them as partners. In turn, they will treat you as a partner, and together you will all perform beyond your wildest expectations. Remain a corporation and retain control if you like, but behave as a servant leader in your partnership. Encourage your associates to hold a stake in the company. Offer discounted stock, and grant them stock for their retirement. It's the single best thing we ever did.

Rule 3: Motivate your partners. Money and ownership alone aren't enough. Constantly, day by day, think of new and more interesting ways to motivate and challenge your partners. Set high goals, encourage competition, and then keep score. Make bets with outrageous payoffs. If things get stale, cross-pollinate; have managers switch jobs with one another to stay challenged. Keep everybody guessing as to what your next trick is going to be. Don't become too predictable.

Rule 4: Communicate everything you possibly can to your partners. The more they know, the more they'll understand. The more they understand, the more they'll care. Once they care, there's no stopping them. If you don't trust your associates to know what's going on, they'll know you really don't consider them partners. Information is power, and the gain you get from empowering your associates more than offsets the risk of informing your competitors.

Rule 5: Appreciate everything your associates do for the business. A paycheck and a stock option will buy one kind of loyalty. But all of us like to be told how much somebody appreciates what we do for them. We like to hear it often, and especially when we have done something we're really proud of. Nothing else can quite substitute for a few well-chosen, well-timed, sincere words of praise. They're absolutely free — and worth a fortune.

Rule 6: Celebrate your success. Find some humor in your failures. Don't take yourself so seriously. Loosen up, and everybody around you will loosen up. Have fun. Show enthusiasm — always. When all else fails, put on a costume and sing a silly song. Then make everybody else sing with you. Don't do a hula on Wall Street. It's been done. Think up your own stunt. All of this is more important, and more fun, than you think, and it really fools competition. "Why should we take those cornballs at Wal-Mart seriously?"

Rule 7: Listen to everyone in your company and figure out ways to get them talking. The folks on the front lines — the ones who actually talk to the customer — are the only ones who really know what's going on out there. You'd better find out what they know. This really is what total quality is all about. To push responsibility down in your organization, and to force good ideas to bubble up within it, you must listen to what your associates are trying to tell you.

Rule 8: Exceed your customer's expectations. If you do, they'll come back over and over. Give them what they want — and a little more. Let them know you appreciate them. Make good on all your mistakes, and don't make excuses — apologize. Stand behind everything you do. The two most important words I ever wrote were on that first Wal-Mart sign: "Satisfaction Guaranteed." They're still up there, and they have made all the difference.

Rule 9: Control your expenses better than your competition. This is where you can always find the competitive advantage. For twenty-five years running — long before Wal-Mart was known as the nation's largest retailer — we've ranked No. 1 in our industry for the lowest ratio of expenses to sales. You can make a lot of different mistakes and still recover if you run an efficient operation. Or you can be brilliant and still go out of business if you're too inefficient.

Rule 10: Swim upstream. Go the other way. Ignore the conventional wisdom. If everybody else is doing it one way, there's a good chance you can find your niche by going in exactly the opposite direction. But be prepared for a lot of folks to wave you down and tell you you're headed the wrong way. I guess in all my years, what I heard more often than anything was: a town of less than 50,000 population cannot support a discount store for very long.

=====

[adopted from : http://www.powerhomebiz.com/vol76/walton.htm]

Saturday, July 16, 2005

MySql installation

I first i had installed MySql 4.1 in my computer ..

Unfortunately, there is an error occur where the MySql service cannot start and come out with an error message "error 1067".. trying uninstall and install again for many many times .. But the problem still cannot resolve. So, i tried the steps below:

1) uninstalling all the MySql services and using the add and remove in control panel.
2) delete all files that had previously created by MySql
3) check the register files and see if there is still something installed in the system.
4) stop and remove the installed MySql service.
5) reinstall again .. and then IT works ..

gosh .

p.s. Don't set the password for the root user.

Finally .... its alive

Tuesday, July 12, 2005

Visual Web Developer 2005 Express Edition

Try to install this one to develop a web application basedon the visual studio programming ..

However, it will need Windows service pack 2 to complete the installation ..
try to click on this link ..
http://www.asp.net/Default.aspx?tabindex=0&tabid=1

Thursday, June 23, 2005

Dark Eye Circle

THE BASIC FACTS

The skin under the eyes is the thinnest on the body. The many blood vessels in this area can show through the delicate skin, contributing to the appearance of dark under-eye circles, especially if the vessels become dilated. Fat pads surround the eyes, and the muscles that enclose the upper and lower eyelids hold the fat pads (and skin) in place. As we age, skin and muscle lose elasticity, which can result in sagging around the eyes.

Dark circles can be caused by several factors:

* Genetics Darkness under the eyes runs in families and is more prominent on fair skin.

* Lack of sleep Poor-quality sleep causes blood vessels to become more visible through the skin.

* Sun exposure can trigger "age spots" around the eyes and weaken the skin, which can contribute to dark circles.

* Increased fluid retention The blood vessels under the eyes can become engorged and dilated (dietary salt and smoking are common causes).

* Aging causes the fat pad below the eye to thin, producing a sunken appearance.

* Extreme weight loss also can cause this sunken look.

SIMPLE SOLUTIONS

To reduce the appearance of dark circles, Beauty Rx:

1. Get at least eight hours of uninterrupted sleep every night. Sleep with your head slightly elevated (when you're lying flat, gravity causes fluid to collect in your lower eyelids, which may create shadows).

2. Moisturize the area with an eye cream containing nourishing antioxidants that help protect the skin, such as green-tea and grapeseed extracts, and vitamins C, E and K (Dr. Brandt's own Skincare Lineless Eye Cream, $60; sephora.com, contains vitamins and green-tea extract).

3. Cover up with a yellow-based concealer.

4. See a dermatologist. He or she can tell you if engorged blood vessels are the culprit; if so, lasers can shrink them for up to $300 per area.

COPYRIGHT 2005 Weider Publications
COPYRIGHT 2005 Gale Group


Monday, April 25, 2005

Think outside the BOX

...Imagine two rooms. Between these two rooms is a solid brick wall.
We, as human being have been conditioned to believe that this wall
keeps us from moving from one room to the other. From the moment each
of us were born, we have been taught that we cannot move between these
rooms. We have been made to think according to predefined rules. We
think… in a box. Boxthinkers. Hacking - by any definition - is the art
of thinking outside of that box. To creatively formulate new,
unconventional ways to do things... Dennis Ritchie (the creator of C),
Linus Torvalds, the people at Xerox who invented the mouse. All became
who they were for thinking outside the box. Kevin Mitnick, Kevin
Paulson - accomplished the legendary computer and phone system break-
in they did for not being boxthinkers... Computer hacking does require
an amount of technical knowledge. That's why you're reading this.
That's why we are here. Arguably more important, though, is
creativity. Resourcefulness, and an open mind. When shown a brick
wall, know that it is possible to get into the other room - all you
have to do is figure out how....

Respect, X_bodo_X

Monday, April 11, 2005

The World's Most Hunted Hacker


KEVIN MITNICK

Feb. 21, 2000
Fifty-nine months in federal prison offers a certain perspective from which to view the recent disruptions in e-commerce. The person or group behind these attacks ought to consider my imprisonment and supervised release quite carefully. This is a hot story because of the targets involved, which include some of the biggest names in e-commerce. Denial-of-service attacks have been around for years, but the sexy victims in this case require the government to ensure public confidence in economic trade on the Net.

We're seeing the actions of apparent vandals--not hackers--who are using tools that hackers developed. No hacker I've ever heard of would do anything remotely resembling these attacks. I mean, it's not as though they have to "get root" on Yahoo's servers to do these things. Unless these people are extremely skilled, they'll be caught quite quickly. If these actions have economic gain as their motive, the perpetrators may have the resources to avoid arrest much longer.

If I could talk with the people carrying out these disruptions, I'd tell them that their actions just aren't the cool thing to do; these attacks aren't impressive. They require no sophistication. They are analogous to throwing paint remover on cars driving down the street, and they're getting a bunch of people angry. I've learned a very painful lesson--avoid any contact with the criminal-justice system, because it's a system that's stacked completely in favor of the prosecution.

If the terms of my release permitted me to do so, I'd tell the people running the sites that were hit three things, all of which they may have done by now: 1) use a network-monitoring tool to analyze the packets being sent to determine their source, purpose and destination; 2) place your machines on different subnetworks of the larger network in order to present multiple defenses; and 3) install software tools that use packet filtering on the router or fire wall to reject any packets from known sources of denial-of-service traffic.

As others have noted, the distributed nature of these attacks makes any defense far more difficult. It has also been apparent that the victims haven't been forthcoming in sharing their experience. This is quite unfortunate, as the best hope of stopping these attacks rests in sharing information about their technical nature, timing and origins. The scattered approach we're witnessing, I might point out, is a distinct contrast to the tightly coordinated efforts used to find and arrest me.

With history as our guide, we can expect that the government will use this event to push through legislation authorizing digital wiretapping without court orders, to outlaw encryption that the government cannot crack and to track the location of cell-phone users without their knowledge. They'll push laws that eliminate individual rights in exchange for more government "protection" against cybercrime.

Mitnick spent 4 1/2 years in pretrial detention before pleading guilty to wire and computer fraud. The opinions expressed here are for informational purposes only and should not be construed as technical advice of any kind.

(source : Times Magazine)

Saturday, April 09, 2005

SwordFish

United States, 2001
U.S. Release Date: 6/8/01 (wide)
Running Length: 1:38
MPAA Classification: R (Violence, profanity, nudity, sex)
Theatrical Aspect Ratio: 2.35:1
Seen at: Ritz East, Philadelphia

Cast: John Travolta, Hugh Jackman, Halle Berry, Don Cheadle, Vinnie Jones, Camryn Grimes, Sam Shepard, Zach Grenier
Director: Dominic Sena
Producers: Joel Silver, Jonathan D. Krane, Paul Winze
Screenplay: Skip Woods
Cinematography: Paul Cameron
Music: Christopher Young
U.S. Distributor: Warner Brothers


SwordFish

This is a great movie on Hacker. virus creating and hijack computer.

Operation TakeDown

Director: Joe Chappelle
Producer: John Thompson, Brad Weston
Screenwriter: David Newman, Leslie Newman, John Danza, Howard A. Rodman
Stars: Skeet Ulrich, Russell Wong, Angela Featherstone, Donal Logue, Christopher McDonald, Master P, Tom Berenger, Jeremy Sisto, Amanda Peet

MPAA Rating: R


Year of Release: 2000



Kevin Mitnick

For this film review, we begin with a history lesson. Kevin Mitnick stands as probably the most famous, the most notorious, and the most successful computer hacker of all time. After nearly 15 years of hacking (alternating with jail and probation time), he was finally apprehended for the last time in 1995, for a collection of tech crimes. and was released from prison in early 2000. (The story of his questionably legal incarceration is itself enough material for a book and a movie.) I interviewed Mitnick shortly after his release; today he's a computer security consultant (though he's not allowed to touch a computer as a term of his release).

Track Downwas produced shortly before Mitnick's release amid much controversy. Mitnick, as you might expect, is a cause celebre among the hacker community, while he's been vilified by the corporate and legal communities. The story of his long career as a hacker was the subject of two major books -- The Fugitive Game, written mainly from Mitnick's point of view, and Takedown, written by the man who captured him. The latter book (widely dismissed by the hacker community as propaganda) got optioned by Miramax, and against all odds, the Kevin Mitnick story became a movie, starring Skeet Ulrich as Mitnick and Russell Wong as Tsutomu Shimomura, the man who "captured" Mitnick and the co-author of Takedown.

But the story doesn't stop with the completion of the film, as Miramax never released it theatrically. (The making of the film was itself subject to a guerrilla documentary called Freedom Downtime, available here.) The film sat on shelves for nearly five years before getting a new (and rather lame) title and a direct-to-DVD release.

And here it is.

Track Down, if it had no basis in fact at all, wouldn't be much of a movie. It'd be the kind of thing you'd see on Showtime after hours, only the computer viruses and worms would come to life somehow. Thank God the film sticks to the guts of Mitnick's life -- although every company and character name (aside from Mitnick and Shimomura) is changed -- without ridiculously delving into the impossible. Sadly, though, the actual exploits of Mitnick are unrecognizable here among all the poetic license the filmmakers and screenwriters have taken. It's nearly impossible to figure out what company Mitnick is trying to hack, break into, or con. The facts are confused beyond hope of recognition. I can't imagine what someone unfamiliar with the proceedings is going to make of this.

The facts aside (and it's impossible to dispute the facts in Track Down, because there's no attempt to be accurate at all), Track Down is simply not a very good movie. Director Joe Chappelle has the unenviable task of helming this mess, having formerly directed a scant few films -- including Halloween 6 and Hellraiser 4 -- that couldn't have presented much of a challenge at all. With Track Down he must have found himself in a huge mess, stuck with a highly technical and convoluted plot and rising stars to coddle. You can almost hear him saying, "Ah, fuck it, let's just put a car chase in here." Mitnick's final hack is given the full Hollywood treatment as he attacks Shimomura's computer while the FBI closes in on his apartment building -- gasp! The pacing is stupid from both a pure storytelling and a historical point of view, though some of Mitnick's work as a social engineer will be of interest to those unfamiliar with the techniques.

Ulrich doesn't resemble Mitnick, though he manages to capture his cocky essence, and Wong's only resemblance to the long-locked Shimomura is the fact that he's Japanese. The supporting cast -- including Donal Logue as a heavily reimagined compatriot of Mitnick's and a scary as hell Angela Featherstone.(playing Shimomura's girlfriend) -- are hit and miss.

Ultimately the film will be of interest only to computer history enthusiasts, and then only as a curiosity. Some will find it laughable, others will find it insulting. I find it primarily a waste of time.



Just see the "Most famous Hacker" on earth in action.......

The Hitch

United States, 2005
U.S. Release Date: 2/11/05 (wide)
Running Length: 1:56
MPAA Classification: PG-13 (Sexual situations, profanity)
Theatrical Aspect Ratio: 2.35:1

Cast: Will Smith, Eva Mendes, Kevin James, Amber Valletta, Julie Ann Emery
Director: Andy Tennant
Producers: James Lassiter, Will Smith, Teddy Zee
Screenplay: Kevin Bisch
Cinematography: Andrew Dunn
Music: George Fenton
U.S. Distributor: Columbia Pictures



Just think this movie is so so so funny.

Watch it and you wil love it .

Wednesday, March 30, 2005

Wednesday, March 23, 2005

The Gift Truth is Here ~~!

The Spec of the Gift ..
Please refer below .. :

This is indeed a Toffee dear .... Definitely not a chocolate i have look into it already ...
ByteSurfer copyright®2005

The Toffee


Toffee from Hui Ching aka. Violet
ByteSurfer copyright®2005

Monday, March 21, 2005

Professional Guitarist



Presenting the pro that can handle 2 guitar; ie 12 stings with 19 bars with only 2 hand.
Imagine that .. and that will differentiate the Pros and the not..

Edited by: "My Brother"
ByteSurfer copyright®2005

Sunday, March 20, 2005

My Sifu


This is My dear friend, How En aka "Guitar Sifu"
Hehe .. my sifu is still struggling on the chord though ...

However, he is a real good Guitarist. My favourite song from him would be;
  1. Tears in Heaven
  2. Romance
  3. Some Song from Westlife. etc.

Actually, all of that song is plucking type of song ... some strumming also not bad... Erm . may be are real Great...

May be will try to upload some of his song here .. try and listen ..

ByteSurfer copyright®2005

Friday, March 18, 2005

Monday, March 14, 2005

Sleeping ... Baby . Guarded by dog


This is the Picture of the Month ...
ByteSurfer copyrightĂ‚®2005

Genting

Yesterday , I am at Genting and the atmosphere here is just the same as in KL. Just that the environment is a bit chill. Hrm. Everywhere I went all packed up with human. Have no mood even to go and have some fun. Indoor and outdoor theme park was not my taste some more .. no friends around .. so just stuck here in the room doing my assignment (with no internet connection). May be I will go to Star Buck to online … hopefully.

And later today I will be going out with my brother’s camera and take some picture. Hopefully also …

It’s already night.. Just now took the camera out. Unfortunately, just have the opportunity to snap some picture of my brother and parents only and then …. Kachak Battery low.

Too bad.. Me plan to have burger later tonight. And carry on with my assignment … now watch guess guess guess … kind funny la the show ..

Sunday, March 13, 2005

Mom's visit

Today was the third day my mom come to visit me in Kuala Lumpur. It was nice but got test this fews day. First Data Structure and Algorithms, and later Analysis and Design Information System. so so so .. tired of all this kinda test .. Just cannot take it . aiya .

Back to my mom. She come to KL and have a night at my place. she was awake the whole night and says that KL is damn hot. Then today my dad call the air-condition people and fix a aircond.. was kinda cool lol.. all this aircond stuff make my room really messy. i think i will not be feeling so hot laio ... yahoo ...

Tomorrow.. i maybe will be going to Genting . and think that will be kinda boring until Jo say that was kinda cool ... :P I think will just bring my laptop there and start doing my assignment and get my head on some Programming. Suak liao .. don't wanna go into the casino or Theme park .. really don't like it ..

see how would tomorrow be .. still don't know can get hotel or not .. hopefully will get la .. may be will buy wine there.. Just can hope for a better tomorrow and finish my assignment .... so can close one file first ... :D ..Plus calculus assignment due Friday..

I AM SO SO SO PACKeD >.......

Thursday, March 10, 2005

Calculus test

Yesterday, i have very little sleep ..Cos was worried over dee coming calculus test. Have the one i am pro in are the differentiation; chain rules hehe .. just like the proving. Limits was kinda cool also. But personally, you know what i don't like bout the subject teached in the lecture. First, the lecturer thought that we are Pros and can teach like lightning. As a consequences, we all blurred in class. Some more . they will just call us to remember the formula and didn't explain how they get this formula and why this formula. what is the alternative ways to get the answer. some more what is dee application, except we applied in the one in the book one.

Dr. Lim is the best Calculus lecturer ever. He teach really good. May be on the great part. If i am not mistaken, he's from UK leturing over there also .. He can explain till you really understand the concept and didn't like you to remember the formula one. He's dee best for now. The current lecturer (aka. "hei se hui lau ta" ; in mandarin -> boss) got knowledge but don't know how to deliver it well so we hardly get his point. Just explain dy/dx ... etc etc.
still blur...

back to the test, The test is off standard i will say cos all dee questions are all straight forward one .. don't need to think one . average, can do la . but just forget the intergration by part formula. SO , do till half way stuck .. However, last minute only i think of using simpson's rule. but everything is too late liao. no time ....

come back .. straight plug my self to my bed .... << recharge >>

Friday, March 04, 2005

AHhhhhh ~~!

Have been three days .. since i am really busy with all burdenning assignment and "unreasonable" test.. Hrm .. this is my life .. This is the life of an University student.

Not to mention, my know-nothing, and blur-case attitude in my academic this year. So, I really have to study hard or maybe harder so that i can obtain good result in this year's Final examination .

Few testes pass by but i can't see that i am any better from last semester. I will say that i done worst than the year before. Shouldn't be so lazy. All i can blame is that the Chinese new Year come on the wrong time.

.............signing off....................

Thursday, February 24, 2005

The Day After Tomorrow

It just another typical bad luck day. agian and again, got ulser on my mouth and don't know what to do. Wrote this straight i woke up from my uncomfortable sleep as the weather here is awlfully hot. (That's Malaysia)

Planning to do my revision later tonight .. as i have been waking up from my mistake of delaying my work on revision, and use to entertain myself (movies, chatting etc.,) that's all the TEMPTATION given by God.

Have to change so that i can do better in acedemic part of my life. ah .. DSA - Link List .... Calculus ... Just seem to be Numbers and Character to me .. with all the characters to be a variable and unknown to me ... Calculus, the worst case, Lecture just know how to give example and ignore to teach us the proving and fail to make me understand how a particular formula works and represent. so have to study from scretch.

Hope to make a better tomorrow, by starting a better today..

signing off... ByteSurfer

Wednesday, February 23, 2005

Chap Goh Meh

The last Chinese New year of 2005, ah just have my dinner just now .. was determined to do my revision as there are test test and test some more .. the another day .. but just don't have the mood .. however, i felt uncomfortable to not to study for it ..

What to do .. was being lazy all the while so last minute have to be extra hard working .. have learn my leasson to not to play to frequent but to study on my free time and not going on the internet wave and watch movies and so one .. just have learn my leasson .. But, i have been learning this lots of times .. However, i ain't know why i am still stuck with my nonsense thinking of not to study ..**SIGH**

Bout my dinner, I went to Wong Kok. I was hoping that it will be a good mean for me at "chap goh meh". Disappointed, it was worst than the one i can find on mamak stall and road side stall. Ha .. may be will go out and hunt something to eat a bit later tonight.

Hope will get a better day, "the day after today" hehe ..

First Timer

haha ...

Actually, i am not really onto this blogging thing until my friend .. call me to read her blog ... ah just wanna give it a shot (althought that have been blogging on other place)

may be this is something like wanna log in all your daily activities .. and to kill time ..

Or may be this is just the way for some one to keep up with the current trend and really onto the TECHNOLOGY ~~!

Keep Smilng ...

.............................................................End Here.................................................

Setup Samba Server (Ubuntu)

If you want to share files between your Ubuntu and Windows computers, your best option is to use Samba file sharing. To install, first ope...