Sunday, November 22, 2009

Indonesia ferry sinks off Sumatra

map of region

Almost 300 people have been pulled from the sea after a ferry sank off the coast of Sumatra in Indonesia, officials say.

But four people were killed and officials said many more remained missing after the accident, which happened early on Sunday. Officials blamed the incident on bad weather and high waves. It appears that the ferry, which reportedly had a capacity of 273 people, was overloaded when it sank. According to its manifest, 240 people were on board the Dumai Express 10 ferry when it sailed.But Indonesia's sea transport director-general, Sunaryo, called the disparity between the manifest and reality "large" and described it as "a classic case" of rule-breaking. He said rescue efforts were being hampered by bad weather. "The waves are as high as six metres, it's difficult for small ships to reach the location," he told a news conference in Jakarta. 'Traumatised' The Dumai Express 10 was travelling from Batam island to Dumai in Riau, Sumatra, when it sank.Officials said it rolled over before capsizing about 90 minutes into its voyage.RECENT MARITIME DISASTERS

11 Jan 2009: At least 232 people - possibly many more - die as ferry sinks off Sulawesi

11 July 2007: Passenger ship with 70 on board sinks off eastern Indonesia

22 Feb 2007: At least 42 die as ferry catches fire

30 Dec 2006: More than 400 lost as ferry sinks between Borneo and Java

7 July 2005: About 200 die as ferry sinks off eastern Indonesia

Indonesia's public transport perils

Rescue efforts were aided by the fact that the ferry went down in the busy Malacca Straits between Indonesia and Malaysia.

According to Sunaryo, 292 people were picked up by nearby boats. The total number of people on board the vessel remains unknown.

Officials said rescue efforts would continue until dark and then resume in the morning.

A navy spokesman said it was not clear whether anyone was still inside the ferry, which was now completely submerged.

"We're not sure if anyone is trapped in the ferry. Those who have been rescued are traumatised," Iskandar Sitompul said.

Another ferry, the Dumai Express 15, was reported to have run aground in bad weather as it travelled between Batam and Moro islands.

All 278 passengers and crew on board were said to be safe.

Ferry accidents linked to over-crowding and poor vessel maintenance kill hundreds of passengers in Indonesia each year.

The country's large population is spread out over 17,000 islands and relies on ships and ferries to travel around.

In the last three years, at least 800 people have been killed in ferry accidents in Indonesia.

Wednesday, November 18, 2009

How to bypass web filters

There are several occasions where you will be at a public to How to bypass web filters
terminal, and require access to a particular website that is blocked for some reason or another. How to bypass these restrictions is a very common question, and will be covered here.

Lets pretend for a moment that the Internet is made up of 26 websites, A-Z. The web filter blocks your browser from accessing sites X-Z, but not sites A-W. Simply make the browser think you’re going to A-
W. There are a variety of ways to do this:

Proxy Servers:
This is a list of http proxies. These sites may not be up forever, so you may need to search for “free http proxy” or “public proxy servers” or other similar terms.

Proxy server lists:
http://www.aliveproxy.com
http://www.multiproxy.org
http://www.publicproxyservers.com/index.html
http://www.tehbox.com/proxy
http://www.proxz.com
http://www.proxy4free.com/index.html
http://free-proxies.com

Now that you have a list of proxies, you would open IE (internet explorer) and click on Tools > Internet Options > Connections > LAN Settings > Advanced. Enter the address and port of one of the servers from the list in the proper area (http) and make sure the “use a proxy server for your LAN” option is selected. Remember to replace the proxy and port at your terminal to the original when you're done.

*Note: Some proxies listed may not work, and this method may decrease your surfing speed. By trying various entries, you’ll find one that works, or works faster.

The infamous translation trick:
Go to a web page translation site and use their services to “translate a page to English” thus accessing the blocked page through their trusted site.

You’ll notice that several translation sites are blocked, but by using less popular ones, this method can still be effective. Here is a list of some translation services. Again, these sites may not be up forever, so you may need to search for them.

http://babelfish.altavista.com
http://world.altavista.com
http://translation.langenberg.com
http://freetranslation.com/web.thm

Url Scripting:

Url scripting is the easiest method. It works on a select few web filters and is based on the same principal as the translation trick. By typing and address like “www.yahoo.com@www.restricted_site.com the filter will not go into effect as it recognizes the trusted site (in this case yahoo.com)

Other tricks:
Simply open the command prompt and type:
Ping restricted.com ? restricted.com obviously being the restricted site
At this point you can take down the IP address (ex. 216.109.124.73) and enter it into the browser. If access to the command prompt is also restricted, see “How to bypass restrictions to get to the command prompt.” If this article has been taken from information leak, then know that it involves anything from opening the browser, selecting view > source, then saving it as X.bat and opening it to opening a folder or browser and typing in the location of cmd.exe depending on the OS. I will not go into further, as this a completely different topic.

Use https://restrictedsite.com as referring to it as a secured site may confuse the filter.

Note: These are ancient methods that many new filters defend against, but still may be applicable in your situation. If not, a little history never hurt anyone.

Web based Proxies:
Another one of the easier, yet effective methods include web based proxies. These are simple in the fact that you just enter the restricted address and surf! Some of these have some restrictions, like daily usage limits, etc but you can also use another proxy (perhaps one that sucks, like a text only) to bypass their restrictions as well. Here is a list of some:

http://proxify.com]http://proxify.com
http://www.anonymizer.com/index.cgi]http://www.anonymizer.com/index.cgi
http://www.guardster.com/]http://www.guardster.com/
http://anonymouse.ws/anonwww.html]http://anonymouse.ws/anonwww.html
http://www.the-cloak.com/login.html]http://www.the-cloak.com/login.html
https://www.megaproxy.com/freesurf]https://www.megaproxy.com/freesurf
http://www.anonymizer.ru]http://www.anonymizer.ru
https://nadaily.com/cgi-bin/nph-proxyb.cgi]https://nadaily.com/cgi-bin/nph-proxyb.cgi
http://www.userbeam.de/cgi-bin/nph-userbeam.cgi]http://www.userbeam.de/cgi-bin/nph-userbeam.cgi
http://www.free2.surffreedom.com/nph-free.cgi]http://www.free2.surffreedom.com/nph-free.cgi

Proxy Programs:
There are many proxy programs that allow you to surf anonymously that are more or less based on the same topics we’ve covered here. I’ve added them just to cover the topic thoroughly:

http://www.hotscripts.com/Detailed/28480.html]http://www.hotscripts.com/Detailed/28480.html
http://www.inetprivacy.com/a4proxy/anonymous-grc.htm]http://www.inetprivacy.com/a4proxy/anonymous-grc.htm
http://www.orangatango.com/home/index.ie.html]http://www.orangatango.com/home/index.ie.html
http://www.steganos.com]http://www.steganos.com
http://www.anonymization.net]http://www.anonymization.net ? toolbar that requires admin rights to install

Making your own CGI proxy server:

Making your own proxy server may come in handy, but I personally find that simply uploading a txt file/w a list of proxies to a free host makes for a much easier and headache free solution. If you don’t know PERL, there is code out there to help you set it up. Check out these sites for more info:

http://httpbridge.sourceforge.net]http://httpbridge.sourceforge.net
http://www.jmarshall.com/tools/cgiproxy]http://www.jmarshall.com/tools/cgiproxy
http://www.manageability.org/blog/stuff/open-source-personal-proxy-servers-written-in-java/view]http://www.manageability.org/blog/stuff/op...en-in-java/view

Admin Access:
When all else fails, you can simply take over the PC and alter or delete the damn filter. This method varies according to the OS (operating system) you are dealing with. Please see “Hacking Windows NT” for more information. If this tutorial has been taken from information leak, then I will go as far as to say it involves booting the PC in another OS, copying the SAM file and cracking it using a program like Sam inside or LC5 rather than start a whole new topic within one.

Thursday, November 12, 2009

Call of Duty Modern Warfare 2 VGA performance

Call of Duty Modern Warfare 2 was released now developed by Infinity Ward and published by Activision this is the sixth installment in the series and a direct sequel to Call of Duty 4: Modern Warfare.
Modern Warfare 2 to be just as hardware friendly as its predecessor despite the numerous engine enhancements. In our graphics card performance evaluation we'll be testing a large range of previous and current generation GPUs, both mainstream and high-end chips from the GeForce 9600GT and Radeon 3000 series, to the recently launched Radeon HD 5000 GPUs, dual GPU cards from Nvidia and ATI, and even a Radeon HD 5770 Crossfire setup to make up for a total of 19 different GPU configurations.

Call of Duty Modern Warfare 2


Call of Duty Modern Warfare 2 VGA performance

Wednesday, November 11, 2009

Obama Promises Executors Will Pay actions

obama U.S. President Barack Obama to lead a memorial ceremony for the victims of the shooting action on the military base Fort Hood, Texas, USA. Obama promised to pay the principal shooting of his actions. It was mentioned by Obama in front of about 15 thousand soldiers and their families at Fort Hood. Obama, who wore a black dress, accompanied by U.S. first lady, Michelle Obama. "On what he has done, we know that the killers will face justice in this world and the next," Obama said. "This is wartime. But Americans are not dying on the battlefield overseas. They were killed in an early American homeland, in the heart of the community of this great American," Obama said as quoted by AFP news agency on Wednesday (11/11/2009 ). "This is a fact that makes this tragedy even more painful, even more incomprehensible," he said. A total of 12 U.S. soldiers and a civilian were killed in mass shooting actions at Fort Hood last week. Death action was carried out Major Nidal Hasan, a military psychiatrist. U.S. Men's Palestinian descent had coma after being shot in the incident. But now he has regained consciousness and could speak. The man mentioned having links with Islamic militants, Anwar al-Aulaqi is now in Yemen but the mosque is the spiritual leader of the Dar al-Hijrah in Falls Church, Virginia, USA. Hasan went to the mosque in 2001. Al-Aulaqi reportedly met with members of Al Qaeda, including two hijackers in the September 11, 2001 in the United States.

DRIVING DIRECTIONS, MOVIE TIX, & EVEN THE CHEAPEST GAS – ALL ON YOUR SMARTPHONE

Windows Mobile® + Live Search
Step 1: Go to http://wls.live.com with any mobile phone to download the FREE Live Search Mobile app.
Step 2: Click Download and then follow the install process — this will vary depending on your phone.
Step 3: When you want to use the application, select Start, then Live Search.
Step 4: In the top box, enter what you’re searching for, and in the second box, enter where you’re searching. Select “Choose a new location” to enter in a new street address or city, such as Boston.
Step 5: Hit the Speak button and speak your search into the phone. Say “Italian restaurants,” for example, and after confirming what you said, Live Search will return a list of Italian restaurants in the Boston area.
Step 6: Your results will be sorted by distance. Click on the list for details. Then click “Directions to Here” or use the location as a landmark with “Search Near Here.”
Step 7: Confirm that the start and end locations are accurate, then click Route to get going.
Step 8: Live Search will give you turn-by-turn directions and even take you through each turn on the map.
Step 9: If you don’t know what area you want to search in, click Categories on the Live Search homepage to browse types of restaurants, such as Italian or pizza.
Step 10: You can even select Traffic to load Live Search Maps with Boston traffic from Traffic.com, or hit Gas Prices to see a ranking of gas stations from cheapest to most expensive.

Tuesday, November 10, 2009

AVG Technologies Names Acting Chairman of Board Dale Fuller to Permanent Role

Appointment Key to Next Phases of Growth for Anti-Virus Software Company

AVG Technologies, developers of the world’s most popular free anti-virus software, today announced that Dale Fuller, who was tapped as acting director in March 2009, has been confirmed as permanent Chairman of the Board.
Fuller has served on the AVG board of directors since October 2008 and has extensive previous board experience which includes stints at McAfee, Borland, Webgistix, Krugle, Phoenix Technologies, Guidance Software and Quest Aircraft Company. Fuller has a strong track record of successfully starting and leading companies through critical business growth. Prior to joining AVG, Dale served as interim CEO and board member for McAfee, one of the world’s largest dedicated security technology companies. While at McAfee, the company experienced sizeable growth in shareholder value and revenue. In his new role, Fuller will help prepare the company and investors for its next phase of growth.
“The current Board and executive management team has pushed AVG to deliver consistently record-breaking revenues, and so as we anticipate a public offering for the company we wanted to solidify key leadership roles,” said JR Smith, CEO of AVG Technologies. “I look forward to Dale’s continued strategic guidance as AVG moves into its next phase of growth.”
AVG’s board is now comprised of members from Enterprise Investors, TA Associates, Benson Oak and Intel Capital.
Keep in touch with AVG

Threat Info and top threats

Downadup/Conficker worm

First version of this worm is known from December 2008. Nowadays it has 300+ several variants. More information could be found in Virus Lab Blog.
January 22, 2009


I-Worm/Nuwar

Propagation method of new Nuwar variant is still similar to its precedessors. Spammed mails with link in IP format directs users to the worm web pages where the users are prompted to download one of the worm files with the name funny.exe. Names of other downloadable files are kickme.exe and foolsday.exe. AVG detects this threat as I-Worm/Nuwar.R.
March 31, 2008


I-Worm/Nuwar

New Nuwar variant spreading method is similar to Nuwar.L last month propagation. Spammed emails are brief containing link in IP format to currently working pages with worm. Compromised page code is changed and and as a result user is prompted to download file with worm. Downloaded filename is valentine.exe it's about 110 - 130kB long and it's detected by AVG as I-Worm/Nuwar.N
February 14, 2008


I-Worm/Nuwar

We have a new wave of spammed mail messages containing link directing users to website where the worm could be downloaded. Emails contains short text and IP address of currently working pages with worm. In this case downloaded filename is withlove.exe and it's about 115kB in size. Websites and worm files changes every few minutes. AVG detects withlove.exe as I-Worm/Nuwar.L.
February 14, 2008

FACEBOOK MEET MY MUSIC Zune® + Zune Social

Step 1: Zune Social is a social network built around music. To get started, open the Zune software on your PC and click on Social at the top.
Step 2: This will open your Zune Social page -you might have to sign in using your Live ID.
Step 3: You’ll see your Zune card that has recently played songs, most played artists, and more. This is perfect for exploring someone’s music tastes and discovering new bands.
Step 4: Below your Zune card, you’ll see a link to your “zune.net profile” — click on it to get to your full profile page on Zune Social. You can always go to Zune Social by logging in at http://social.zune.net.
Step 5: Once you’re on your full profile page, click on Picture, Background and Status at the top of your Zune card. Click on Invite Friends to send email invites to your friends so you can connect on Zune Social and start sharing.
Step 6: Below your Zune card, you’ll see a link to Zune Gadgets. Here you can install your Zune card on your Facebook profile so your friends can see your recently played songs and favorite artists, listen to clips, and even buy the tracks they like. You can also grab some code to put your Zune card onto your Windows Live Space or MySpace profile.
Step 7: Rock.

more tips and tricks

way for Pull Music Off Your ZUNE ONTO YOUR Xbox 360 Xbox 360® + Zune®

Monday, November 9, 2009

POWERPOINT 2007 WILL SAVE YOUR GRADE

Microsoft® Office PowerPoint® 2007
Step 1: In PowerPoint 2007, write out the outline for your slide as bullet points in a text box.
Step 2: Select the text box containing the list and click “Convert to Smart Art.”
Step 3: Every time you hover over a type of Smart Art, PowerPoint will convert your list into that format, so that without even clicking a button you can see what your list will look like as a block list, a radial list, a cycle, a picture list, a gear, a funnel, a vertical equation, and about 50 other types of charts and diagrams.
Step 4: You can then select from pre-set color combinations and effects to make your slide even sexier.
Step 5: Impress professors who think you spent hours making your presentation look professional.

Sunday, November 8, 2009

Become a Call of Duty VIP

Become a Call of Duty VIP at CharlieOscarDelta.com
Call of Duty® 4: Modern Warfare™, the new action-thriller from the award-winning team at Infinity Ward, the creators of the Call of Duty® series, delivers the most intense and cinematic action experience ever.
Armed with an arsenal of advanced and powerful modern day firepower, players are transported to treacherous hotspots around the globe to take on a rogue enemy group threatening the world. As both a U.S Marine and British S.A.S. soldier fighting through an unfolding story full of twists and turns, players use sophisticated technology, superior firepower and coordinated land and air strikes on a battlefield where speed, accuracy and communication are essential to victory.
The epic title also delivers an added depth of multiplayer action providing online fans an all-new community of persistence, addictive and customizable game play.
Become a Call of Duty® VIP with access to exclusive assets and information at www.charlieoscardelta.com
SANTA MONICA, Calif., Nov 05, 2009 /PRNewswire-FirstCall via COMTEX News Network/ -- Activision Blizzard, Inc. (Nasdaq: ATVI) today announced better-than-expected financial results for the third quarter 2009.

YOUR 25 GIGS OF HOME AWAY FROM HOME Windows Live™ Sky drive

Post files on your Sky Drive so you, your friends, or everyone on Earth can access them anywhere. 25 GB of storage is nothing to sneeze at, either.
Step 1: Already have a Live ID? (Your hotmail.com or live.com email address will work, as will the email address you use for Windows Live Messenger, for Zune Social, or for Xbox Live.) If not, go to live.com and get one.
Step 2: Log in at live.com or hotmail.com. Click over to your Spaces section (where you can blog or keep an online profile), and under Spaces you’ll see Sky Drive.
Step 3: If you want to be able to share files with friends, click on Shared Folder, give the folder a name, and add the email address of people you want to have access. When you’re done, hit “Create Folder.” You can always add more people later.
Step 4: Now you can literally drag & drop files into the Sky Drive or click “browse” to upload files the old-fashioned way.
Step 5: You can also create private folders, for files you want to be able to access from any PC, or public folders, for files you want anyone to be able to access when you send them the link.

more tips and tricks:

way for Pull Music Off Your ZUNE ONTO YOUR Xbox 360 Xbox 360® + Zune®

Saturday, November 7, 2009

TURN YOUR PC INTO A DVR & MUCH MORE

Windows® Media Center
There’s a lot that you can enjoy with Windows Media Center, including photos, music, videos, and online entertainment. With the addition of a TV tuner, your PC turns into a powerful DVR allowing you to watch and record your favorite TV shows and movies at your convenience.
Step 1: Some PCs come with a TV tuner card, but if yours doesn’t, you can go out to your favorite electronics store and pick up a USB TV tuner.*
Step 2: Make sure your TV tuner card is connected to a TV signal or cable outlet.
Step 3: Open Windows Media Center from the Start Menu or Desktop Shortcut. Access Tasks >> Settings >> TV >> TV Signal.
Step 4: You’ll set your preferences and download the electronic programming guide, where you can easily control what you want to watch. Search for a TV show by title, keyword, category, actor or director, and with a click of a button, you can record just one show or the entire series to watch whenever you want.
Step 5: If you’re not going to make it home to record your favorite show, you can even schedule your recordings over your Internet connection with MSN Remote Record.**
Step 6: To find out more about all the cool stuff you can do with Windows Media Center, including enjoying your PC’s entertainment on the different TVs around your living space, go to www.windows.com/mediacenter. Visit www.windowsmediacenter.com/campustour to learn more about Windows Media Center.
*Playback and recording features require an integrated or external TV tuner. Supports up to two (2) analog TV tuners for local
channels via over-the-air signal in all supported regions subject to Windows Vista compatibility with local TV standards; **Available in US and Canada only. Internet service fees may apply.

Sync Hotmail with Your Mobile Phone

Windows Mobile® + Hotmail®
Step 1: Go to Start, then Messaging, then Email. Select “Set up a new account.”
Step 2: follow the instructions and enter your Hotmail login and password to add an email account to your Smartphone. This works with most email providers and will even work with your school account if POP3 or IMAP are supported.
Step 3: When the setup process finishes, your email will load onto your phone. This may take a few minutes.
Step 4: Whenever you want to check your email, select Start, then Messaging, then Email and select this account to see your messages or send new ones.
Step 5: You can set up multiple email accounts to sync to your phone, or sync your phone and Outlook to Hotmail (or another email service), or even sync your phone to Outlook on your PC.

more tips and tricks:

way for Pull Music Off Your ZUNE ONTO YOUR Xbox 360 Xbox 360® + Zune®

Friday, November 6, 2009

USE OFFICE LIVE WORKSPACE TO COLLABORATE ON GROUP PROJECTS

Microsoft® Office + Microsoft Office Live Workspace
Office Live Workspaces allows your group project partners to keep all your materials in one central place, manage joint calendars & task lists, and even make changes to the same document at the same time.
Step 1: Start by going to http://workspace.office.live.com and signing in using your Windows Live ID (any email address can be set up as a Live ID, or you can register a new @live.com or @hotmail.com email address).
Step 2: C lick on the “New Workspace” button on the left panel and select a type. For a group project, the Classes, Projects, and Study Group templates may be particularly useful.
Step 3: Click “Add Document” to add the project report that your team is working on.
Step 4: You can even open documents directly out of your Workspace, make edits in Office 2003 or 2007, and save the document back to your Workspace with one click. Click “Edit” to open a document, and you’ll be prompted to install the Office Live Add-In for Office.
Step 5: You can also view Word, PowerPoint, and Excel files without having Office installed on your PC by clicking and opening them inside Internet Explorer.
Step 6: Once you have the Add-In installed, Word, Excel, and PowerPoint will be able to sign into your workspace, open documents stored there, edit them, and save them back again.
Step 7: Share your Workspace with your classmates by clicking “Share” at the top right of the Workspace and entering their email addresses along with a message. Office Live will send them an email invitation so they can log in and view the files.
Step 8: Now you can all work from the same copy of the document. Even more powerful is the ability to send emails to the whole group with one click and create a joint calendar and task list.
Step 9: Using Shared View, you and your teammate can edit the same document at the same time. Click “Share” to download Shared View and start collaborating in real-time.

way for Pull Music Off Your ZUNE ONTO YOUR Xbox 360 Xbox 360® + Zune®

Pull Music Off Your ZUNE ONTO YOUR Xbox 360
Xbox 360® + Zune®

Step 1: Plug your Zune into your PC and load up on music. The Zune Pass gives you all-you-can-eat music for $14.99/month.

Step 2: Setup wireless syncing for your Zune: This isn’t absolutely necessary, but lets you do really cool stuff. In the Zune program on your PC, click Settings, then Device, then Wireless Sync, and enter your home wireless network name and password.

Step 3: To DJ a party off your Zune, plug your Zune into your Xbox 360 using the same USB cable you use to plug it into a PC.

Step 4: Turn on your Xbox 360, go to the Media area of the Xbox Dashboard, and select Music, Pictures, or Video.

Step 5: Find the play list you want and press play. Use Wireless Sync to take requests on the fly: Take requests, download them onto your PC, and then sync wirelessly so songs get added to your Zune while it's connected to the Xbox.

Step 1: Go to your PC and grab the song from the Zune Marketplace.

Step 2: Then, on your Zune, go to Settings, then Wireless, then Sync. The new song will now be on your Zune and you can find it with your Xbox.

Step 3: For more information, go to http://www.Xbox.com/en-US/ support/ system use/ Xbox360/digital media/Zune.htm

Note: Other media players will work for DJing a party, too, but you won’t necessarily be able to download new songs wirelessly.

Thursday, November 5, 2009

What is Auto Run Worm

What is AutoRun Worm?

(Description):

90% of the computers connected to the Web are infected.

AutoRun is a Worm application distinguished by its mode of proliferation. Once contracted, the worm copies executable commands in the Windows and System folders. It also copies an autorun command into every resident drive, all the way to J. The file, autorun.inf, will launch the worm every time that drive or partition is opened. Additionally, AutoRun tries to protect itself by disabling the Task Manager.
The worm's secondary objective is to simply search all of the resident drives for any file ending in the extension, .mp3. Once it finds them, the application summarily deletes them. Expectedly, AutoRun is set to run on Startup.

AutoRun Characterstics

  • Disables programs / system

  • Installs without user consent

  • Inadequate uninstall procedures

  • Insufficient privacy disclosure and consent

  • Uses excessive system resources

How Do I Get Rid of AutoRun worm?
To avoid the unnecessary risk of damaging your computer, we highly recommend you use a good spyware cleaner/remover to automatically detect and remove AutoRun and other spyware on your PC.

  1. Run a scan to detect and remove any AutoRun infection.
  2. Restart your PC and run another scan for any remaining traces of AutoRun

AutoRun Manual Removal Instructions
Note: This AutoRun manual removal process is difficult and you run the risk of destroying your computer. We highly recommend you use the AutoRun automatic removal tool

Find and Remove AutoRun registry keys:
Find and Remove AutoRun registry values:
Find and Delete AutoRun Files:
Find and Stop AutoRun Processes:

you can see all here

What is a Worm?
Worms are classified by their propensity to duplicate themselves. Trojans and Viruses don't do this, but a worm is adept at making so many versions of itself that it's hard to remove. Due to their prolific nature, worms can propagate themselves over the Internet and over a LAN without a specific command from the malicious programmer. Moreover, worms do not have to infect a file as a Virus does, so, like a Trojan, a worm can be downloaded with a legitimate program that can still function properly and independently. Email attachments, instant message attachments, FTP file shares and p2p file shares are all easy carriers for worms, which is why a user must exercise caution when dealing with any of these.

Like their non-propagating cousins, Trojans, worms usually have a variety of tasks that include opening up vital data to theft, launching popups and other advertising (adware), hijacking browsers, and spying on user activities (spyware).

download update windows 7 in 2009

windows 7 update can download here

windows 7 update Security Updates: October 2009 (includes Windows 7*)

  • October 2009, 4240MB
    Security Updates: June-September 2009 (excludes Windows 7*)
  • September 2009, 700MB
  • August 2009, 1773MB
  • July 2009, 219MB
  • June 2009, 600MB
  • Wednesday, November 4, 2009

    Kamasutra Positions

    education sex
    1. Union of Bee 
    Kama sutra Positions The woman assoit on the penis of its partner, him even sited and ahead unfolded legs. The woman can then be and vertically come being pressed on the hands and the legs. The man accompanies the movement by raising it by the buttocks or the thighs.
    Alternative: The man can place back at the wall for a better support. The woman can kneel instead of sitting down in order to be able to lean more easily ahead and to change the angle of inclination of the vagina. 
    The More


    • The woman controls better the penetration depth that in the other positions with penetration by behind

    Where | what is the G-Spot location?

    lesson makes wife husband

    The G-Spot
    Introduction
    I get a ton of questions all of the time about "The G-Spot", like "What is it?", "Where is it?", "How do I stimulate it?". Well I am going to answer all of those questions in this guide to G-spot stimulation and I am even going to go one step further and cover the phenomenon of female ejaculation as it is very closely related to and for most women (but not all) caused by direct stimulation of the G-Spot. My goal with this manual is to inform, educate, excite and motivate you. This manual is written for both men and women and to be shared with your partner or lover.
    For men you will learn:

    • How to find your partners G-spot.
    • How to stimulate your partners G-spot manually with your fingers.
    • Thrusting techniques and positions for G-spot stimulation during intercourse.
    • How give your lover a mind blowing G-spot orgasm.
    • How to give your lover a wild squirting female ejaculatory orgasm.
     For women you will learn:

      • How to become more in touch with your sexuality.
      • How to take responsibility for your own sexual pleasure.
      • How to get your lover to do what you want and need him to sexually satisfy you.
      • About supercharging sexual supplements and herbs that will increase your sex
      • drive and give you stronger and more powerful orgasms.
      • How to strengthen your sexual muscles, which will give you a tighter vagina,
      • more powerful orgasms, and increase your orgasmic capacity.
      • Exercises to become orgasmic, multi-orgasmic and increase your orgasmic capacity.
      • How to locate and stimulate your G-spot during self-stimulation exercises.

    download windows xp update in October and September 2009

    update windows xp download here windows xp update in October and September

    Description
    these download are Microsoft's 2009 monthly security updates for Windows XP. You will need to also download the 2008 patches - see the Windows section for a complete listing. The list starts from the most recent and goes backwards down the page. Each item includes the official Microsoft Knowledge Base number - starting with the KB - so you can look them up at Microsoft's site if needed. Clicking a link will start that patch's file download.
    Really important stuff to read first
    the patches is only for the Windows XP operating system. You must install Service Pack 3 and the 2008 updates first. Optional updates, drivers, hot fixes and critical releases for Internet Explorer, Media Player, Office or other Microsoft products are not included here and must be downloaded separately. For important information about patching your system

    October 2009

  • KB973525 - Update Rollup for ActiveX Kill Bits
  • KB974571 - Windows CryptoAPI Could Allow Spoofing
  • KB975467 - Local Security Authority Subsystem Service Could Allow Denial of Service
  • KB969059 - Indexing Service Could Allow Remote Code Execution
  • KB975254 - FTP Service for Internet Information Services Could Allow Remote Code Execution
  • KB958869 - GDI+ Could Allow Remote Code Execution
  • KB971486 - Windows Kernel Could Allow Elevation of Privilege
  • KB953297 - Microsoft .NET Common Language Runtime Could Allow Remote Code Execution ( for .NET Framework 1.1 Service Pack 1)
  • KB974417 -Microsoft .NET Common Language Runtime Could Allow Remote Code Execution (for Framework .Net 2 Service Pack 1 and .NET Framework 3.5 SP 1)
    September 2009
  • KB968816 - Windows Media Format Could Allow Remote Code Execution
  • KB956844 - DHTML Editing Component ActiveX Control Could Allow Remote Code Execution

  • Monday, November 2, 2009

    Program dumping cartridges for Epson inkjet printers

    CARTRIDGE TOOLS

    Draft Cartridge Tools group of enthusiasts established and the product is completely free. Description principles of
    the program, chipovannyh types of cartridges for Epson inkjet printers can be found on the website creators of the
    program.
    First, you need to collect the cartridge device to connect to the port LPT scheme below:

     

    Draft Cartridge Tools

    Notes to the scheme:
    At Three withdrawal of food (7, 8, 9) - This is more than enough for any chip and frequency.
    Conclusions nutrition 7-8-9 connected with the withdrawal of 12 (entrance); of this ligament is defined number
    LPT port and the availability of the device.
    Conclusion 10 - check that the chip: if the chip is, at this withdrawal should be a logical zero.
    Conclusion 11 - Type Definition chip: for new types - is 0, old - high; respectively conclusion either land or do not
    connect.
    Base desirable to connect with the transistor emitter resistor across k Ohm 33-56.

    The program does not guarantee 100% efficiency programs and are not responsible for possible material or moral
    damage caused by the software. You use the product at their own risk.
    All settings in the program are carried out automatically, when properly collected scheme will all work without any
    problems.

    PES 2010 DOWNLOAD GAME

    pes 2010 PES 2010 focuses on enhancing the excitement of matches between players, making for a truly challenging experience that will constantly test the player. Intuitive zonal defending will cover spaces and players need to look constantly for new ways to attack. PES 2010 focuses on being a real football simulation, as it requires both strategic play and quick reactions, as in real life. In addition to key out-field elements, goalkeepers are more versatile and with abilities matching those of modern shot-stoppers. The game's referees have also been reworked, with smarter AI elements allowing them to make more balanced calls during matches.
    PES 2010 has undergone a major visual revamp, with its celebrated player likenesses and animations now even closer to those of real-life players including live player expressions to be depicted with an improved lighting system which differentiates between various conditions! Stadium detail is also massively improved, with the grass and other in-stadium elements finely depicted.
    1. Unrar.
    2. Burn or mount the image.
    3. Install the game, use any of the following keys when asked for a serial:
    xREL-xREL-xREL-xREL
    4. Copy over the cracked content.
    5. Play the game.
    6. Support the software developers. If you like this game, BUY IT!

    download this game

    Opera New Browsing beater speed

    opera new Opera 10 has dozens of new features, but here are three things that will make your Web browsing better:
    Use Opera Turbo to turn your sluggish network connection into a broadband beast.
    Enjoy Visual Tabs. Just drag the handle underneath the tabs to reveal thumbnails of your open Web pages.
    Use Opera Link to keep your Opera browsers synchronized everywhere.

     

    More things to check out
    Intuitive, sleek design

    Renowned designer Jon Hicks created an entirely new look for Opera 10. It is easier than ever to use Opera and to discover new features that will make your browsing better.
    New in Speed Dial

    Open a new tab, click the configure button and choose to display from 4 to 25 favorite Web sites for quick access. You can also add a custom background so that you feel right at home.
    See how others use Opera

    My Opera is a blog and photo sharing community for you and your friends. Join today and get 1GB of free space and a personal page where you can blog and share photos. At My Opera you can also view your synchronized Opera browser content such as bookmarks, notes and Speed Dial.

    download opera here

    Thursday, October 29, 2009

    Science fiction|writer|visionary|Sir Arthur C. Clarke

    Sir Arthur C. Clarke Remembering Sir Arthur C. Clarke
    source: ITU News
    Science fiction writer and visionary Sir Arthur C. Clarke died on 19 March 2008 in Colombo, Sri Lanka, at the age of 90. He was born on 16 December 1917 in Minehead, Somerset in the United Kingdom and moved to Sri Lanka; then called Ceylon, in 1956.
    The international telecommunication community will remember Sir Arthur for making popular the concept of using the geostationary orbit for communications.
    In October 1945, Clarke published in the British magazine Wireless World a technical paper entitled „Extra-terrestrial Relays-Can Rocket Stations Give World-wide Radio Coverage?“ The paper established the feasibility of artificial satellites as relay stations for Earth based communications. Clarke predicted that one day communications around the world would be possible via a network of three geostationary satellites spaced at equal intervals around the Earth‘s equator.
    Nearly two decades later, in 1964, Syncom 3 became the first geostationary satellite to finally fulfil Clarke’s prediction. Later that year, Syncom 3 was used to relay television coverage of the Summer Olympic Games in Tokyo to the United States — the first television transmission over the Pacific Ocean. Now, there are hundreds of satellites in orbit and providing communications to millions of people around the globe. In 1954, Clarke had also proposed using satellites in meteorology. Today, we cannot imagine predicting the weather without using dedicated meteorological satellites. Looking back on these developments, in his book How the World Was One — Beyond the Global Village, published in 1992, Clarke wrote: „Sometimes I’m afraid that you people down on Earth take the space stations for granted, forgetting the skill and science and courage that went to make them. How, often do you stop to think that all your long-distance
    phone calls, and most of your TV programmes are routed through one or the other of the satellites? And how often do you give any credit to the meteorologists for the fact that weather forecasts are no longer the joke they were to our grandfathers, but are dead accurate ninety-nine percent of the time?“
    Clarke wrote more than 80 books involving science, and science fiction. His short story The Sentinel served as the basis for Stanley Kubrick’s 1968 film 2001: A Space Odyssey. His other famous works include The Exploration of Space, The Promise of Space, The Fountains of Paradise, his semi-autobiographical novel Glide Path, and Childhood‘s End. Before his death, Clarke had just reviewed the manuscript of his latest novel, The Last Theorem.

    Wednesday, October 28, 2009

    The treatment of HIV infection

    Penile ulceration caused by intravenous foscarnet therapy
    The treatment of HIV infection can be largely divided into specific antiviral agents that inhibit viral replication, measures that either treat or prevent (prophylaxis) its complications – namely opportunistic infections and tumours. Major advances in the treatment of HIV infection have occurred in the last few years. This has resulted in marked falls in the reported number of new AIDS cases and deaths in the developed world since 1996. Effective antiretroviral therapy regimens which substantially inhibit HIV replication and allow sustained improvements in the immune system are the main reason for this. There are currently three classes of antiretroviral agents: the nucleoside and non-nucleoside reverse transcriptase inhibitors and the protease inhibitors. Improved formulations and new drugs are continuously being evaluated and there is increasing interest in the possible role of immunotherapy combined with antiretroviral therapy to

    all about HIV, AIDS and Virus

    HIV Virus
    Introduction
    although it is clear that HIV is the underlying cause of AIDS and AIDS related disease, its origin remains obscure. There is firm serological evidence of infection on the east and west coasts of the USA from the mid 1970s, and HIV infection in central Africa may have antedated infection in North America. Phylogenetic analysis of the HIV-1 genome has suggested an origin in chimpanzees while, in the case of HIV-2, similarity to the simian immunodeficiency virus (SIV) genome may point to an origin in sooty mangabey monkeys. In both cases the butchery and consumption of these “bush meats” has been incriminated in transmissions to the human host. Like some other RNA viruses, HIV appears to have mutated and shifted its host range and virulence, explaining how a new pathogenic retrovirus could arise in man. Its virulence may since have been amplified as a result of travel, population dislocation and promiscuous sexual contact, with rapid passage of the virus. Retroviruses are so named because their genomes encode an unusual enzyme, reverse transcriptase, which allows DNA to be transcribed from RNA. Thus, HIV can make copies of its own genome, as DNA, in host cells such as the human CD4 “helper” lymphocyte. The viral DNA becomes integrated in the lymphocyte genome, and this is the basis for chronic HIV infection. Integration of the HIV genome into host cells is a formidable obstacle to any antiviral treatment that would no just suppress but also eradicate the infection. Nevertheless, modern treatment with combinations of nucleoside analogues and protease inhibitors has transformed the prognosis for carriers of HIV, usually achieving a sustained fall in virus concentration in blood and restoration of the main target cell (CD4 lymphocyte) to near normal levels. By contrast, the inherent variability of the HIV genome and the failure of the human host to produce neutralizing antibodies to the virus, as well as technical difficulties and concerns about safety, have continued to frustrate attempts to make an effective vaccine. This must not, however, allow efforts to develop and evaluate candidate vaccines to slacken. A particular concern is that a useful candidate vaccine (probably a recombinant envelope vaccine developed in North America or Europe against the locally prevalent HIV-1 B subtype) would be ineffective in those parts of the world where other subtypes predominate. WHO estimates that in the year 2000 there are 36 million carriers of HIV worldwide, and only a small fraction of them have access to suppressive treatment. Both their contacts, their dependants and possibly they themselves would have their life prospects transformed by an effective, or even partially effective, vaccine, and successful application of antiviral treatment in developed countries should in no way be allowed to deflect attention from the necessity of developing and delivering an effective vaccine and of promoting “safe sex” behavior.
    HIV and related viruses

    Tuesday, October 27, 2009

    PC optimization tool from ccleaner

     

    CCleaner is a freeware PC optimization tool.
    It combines a system cleaner that removes unused and temporary files from your system and also a fully featured registry cleaner!
    CCleaner allows Windows to run faster, more efficiently and gives you more hard disk space.
    The best part is that it's Small, Fast and Free!

    Cleans the following Windows components:

    • Internet Explorer
      - Temporary File Cache
      - URL History
      - Cookies
      - Hidden Index.dat files
      - Last download file location
    • Firefox
      - Temporary File Cache
      - URL History
      - Cookies
      - Download manager
    • Google Chrome
    • Opera
    • Safari
    • Recycle Bin
    • Clipboard
    • Windows Temporary files
    • Windows Log files
    • Recent Documents (on the Start Menu)
    • Run history (on the Start Menu)
    • Windows XP Search Assistant history
    • Windows XP old Prefetch data
    • Windows memory dumps after crashes
    • Chkdsk file fragments

    Advanced Options allow cleaning of:

    • Menu Order cache
    • Tray Notifications Cache
    • Window Size and Location Cache
    • User Assist history
    • IIS Log Files
    • Custom Folders

    Application Cleaning:

    As well as cleaning up old files and settings left by standard Windows components, CCleaner also cleans temporary files and recent file lists for many applications. Including:
    • Firefox, Opera, Safari, Media Player, eMule, Kazaa, Google Toolbar, Netscape, Microsoft Office, Nero, Adobe Acrobat Reader, WinRAR, WinAce, WinZip and more...

    Registry Cleaning:

    CCleaner uses an advanced Registry Cleaner to check for problems and inconsistencies. It can check the following:
    • File Extensions
    • ActiveX Controls
    • ClassIDs
    • ProgIDs
    • Uninstallers
    • Shared DLLs
    • Fonts
    • Help File references
    • Application Paths
    • Icons
    • Invalid Shortcuts and more...

    Safety:

    CCleaner was designed from the ground to be safe and secure to use. It has multiple levels of checks in place to ensure that it cannot delete any useful information or documents you may still need. We also certify that it contains no Spyware or Adware.

    High Security:

    For the super cautious users we also offer secure file erasing. By overwriting the files before deleting them, making it impossible to recover the data.

    Multiple Languages:

    Thanks to the translators, CCleaner is available in 35 different languages:
    English, Albanian, Arabic, Bosnian, Bulgarian, Catalan, Chinese (Simplified), Chinese (Traditional), Czech/Slovak, Danish, Dutch, Finnish, French, Galician, German, Greek, Hebrew, Hungarian, Italian, Japanese, Korean, Lithuanian, Macedonian, Norwegian, Polish, Portuguese, Portuguese (Brazilian), Romanian, Russian, Serbian Cyrillic, Serbian Latin, Slovak, Spanish, Swedish and Turkish.

    for download

    THE STATUS OF WOMAN IN ISLAM

    By Jamal A. Badawi

    PREFACE
    woman ISLAM Family, society and ultimately the whole of mankind is treated by Islam on an ethical basis. Differentiation in sex is neither a credit nor a drawback for the sexes. Therefore, when we talk about status of woman in Islam it should not lead us to think that Islam has no specific guidelines, limitations, responsibilities and obligations for men. What makes one valuable and respectable in the eyes of Allah, the Creator of mankind and the universe, is neither one's prosperity, position, intelligence, physical strength nor beauty, but only one's Allah-consciousness and awareness (taqwa).
    However, since in the Western culture and in cultures influenced by it,
    there exists a disparity between men and women there is more need for stating Islam's position on important issues in a clear way.
    Dr. Jamal Badawi's essay, The Status of Women in Islam, was originally
    published in our quarterly journal, Al-lttihad, Vol. 8, No. 2, Sha'ban 1391/Sept 1971. Since then it has been one of our most-demanded publications. We thank Br. Jamal for permitting us to reprint his essay. We hope it will clarify many of the misconceptions.
    Anis Ahmad, Director Dept. of Education and Training MSA of U.S. and Canada P.O. Box 38 Plainfield, IN 46168 USA Jumada al Thani 1400 April 1980
    I. INTRODUCTION

    The status of women in society is neither a new issue nor is it a fully settled one. The position of Islam on this issue has been among the subjects presented to the Western reader with the least objectivity.
    This paper is intended to provide a brief and authentic exposition of what Islam stands for in this regard. The teachings of Islam are based essentially on the Qur'an (God's revelation) and Hadeeth (elaboration by Prophet Muhammad).

    Tuesday, October 20, 2009

    PES 2010 New game for windows

    2nl77mw PES 2010 centers enhancing the excitement of matches between players, making for a genuinely challenging experience that will constantly test the player. Intuitive zonal defending will cover spaces and players need to look constantly for new ways to attack. PES 2010 focuses on being a real football simulation, as it requires both strategic play and quick reactions, as in real life. In addition to key out-field elements, goalkeepers are more versatile and with abilities matching those of modern shot-stoppers. The game's referees have also been reworked, with smarter AI elements allowing them to make more balanced calls during agrees.
    PES 2010 has undergone a major visual revamp, with its celebrated player likenesses and animations now even closer to those of real-life players including live player expressions to be depicted with an improved lighting system which distinguishes between various conditions! Stadium detail is also massively improved, with the grass and additional in-stadium elements finely depicted.

    Minimum requirements:

    Monday, October 19, 2009

    Osama Bin Laden of Other Side

    People familiar with Osama bin Laden as a fugitive terrorist bully the world. People rarely know the other side of the life of Osama.

    Osama's first wife, Najwa bin Laden reveals another reality of the person who held liable under a number of terrorist acts, including acts of terror phenomenal, blasting the building twin World Trade Center, New York, on September 11, 2001.

    As written in his book, Najwa said that Osama was a father figure who is much disciplined. Osama did not hesitate to hit her smiling so wide, until the teeth look.

    On the other hand had a penchant for gardening Osama sunflowers and consider sports car Like his first wife.

    In his house, Osama forbids the use of electronic equipment. He also ordered the boys to climb the mountain of sand in the desert without carrying water. The goal, so that the child strong.

    Not without reason Osama apply hard on his family. That decision related to Osama to get away to the Sudan, as a form of resistance in the Arab royal families who invited U.S. troops stationed there.

    Learning to sleep in the open and uncomfortable, and desert hiking, for Osama, is the way he prepares his children facing difficult and hard life.

    Najwa (then 15 years old) married to Bin Laden who was then 17 years old. The marriage produced seven sons and four daughters.

    Najwa not the only one wife. Osama has a total of six wives who are placed in separate houses in Saudi Arabia and Sudan.

    Regulations that apply to the same sixth wife, they can not use electronic equipment.

    "My father would not allow the mother to turn on air conditioners, even though the AC was installed in our apartment," said Osama and Najwa's son, Omar, as the page loaded Telegraph.

    "He also did not allow women to use the refrigerator standing in the kitchen," he added.

    However, there is one thing in which Osama boasted to his children. Osama, Omar said, good at math. Osama likes to test the speed of even counted with a calculator.

    "My father is very famous have great abilities in mathematics. Many who came to the house with a calculator and challenging his ability," added Omar.

    According to Najwa's story, he and Osama never went to the United States in 1979, after the Iranian revolution. In the U.S., Osama Abdullah met Azzan, the radical Palestinian cleric who then became his spiritual teacher.

    After that, Osama went to Afghanistan, helping insurgents against the Soviet Union. One goal to go to Afghanistan, so romantic, so he could tell his children the story of heroism in the war.

    However, when returning from Afghanistan, Osama became a rigid figure.

    In a book written by Najwa, also revealed that Osama had at least one gold-colored Mercedes car and speedboat.

    "There's nothing satisfying thing for him other than speeding in the desert, then he would leave his car and walked in the desert," he said.

    "Hobbies favorite is gardening. Planting best corn and sunflower large

    Saturday, October 17, 2009

    New WordPress 2.9

    We have been hard at work now for a few months on the new features that will be coming in WordPress 2.9, and we are nearing the time when the first beta version will be available. We’ll need your help with beta testing the new features and ironing out any bugs.

    There are a number of different ways in which you can get involved in the testing process, and there are options to suit people of all different skill sets. First of all, you can join the wp-testers mailing list to keep up to date with the testing progress and to discuss things with the other testers. Secondly, you can head over to the Trac ticketing system and either create tickets for bugs you find or use some of the useful searches to look for patches that need testing or that need someone to try and reproduce the issue.

    During the beta phase we are going to focus on the stabilization of the new features and the removal of existing bugs which are well-understood and have easily testable solutions. During this process we will not be adding any more enhancements so as to ensure that the focus is on making the 2.9 release as bug-free as possible. We will also try and have a few special bug hunt days where one or more experienced WordPress developers will be available to help people track down issues and get patches committed to fix bugs.

    To make is as easy as possible for you to get a beta testing install up and running we have put together a small WordPress plugin which makes it really easy to convert a test install of the latest release version of WordPress into a beta test install of the next up and coming release. The plugin is called WordPress Beta Tester and is available to download from WordPress Extend or can be installed using the built-in plugin installer. Please make sure you to only install this plugin on a test site, as we don’t recommend running beta versions on your normal live sites in case anything goes wrong. You can read more about the plugin in “Making it easy to be a WordPress Tester”

    We are aiming to release the first beta version of 2.9 around the end of October, once we have put the finishing touches on the new features, and then we switch to full on beta testing mode and your help and feedback will be very much appreciated. During the beta program will push out new builds for automated upgrades regularly and once we feel that a suitable level of stability has been achieves we will release a release candidate, and we hope to be able to make the final release 2.9 build available in either late November or early December.

    Friday, October 16, 2009

    Gaming Keyboard from logitech

    Years ago, we reviewed the Logitech Gaming Keyboard G11 and found that it was pretty great, except for being unfortunately large and lacking USB 2.0. The company's newest update, the Gaming Keyboard G110, certainly looks to have addressed those issues with a much slimmer base and a more efficiently compact key layout.

    Backlit LED keys can be set to red, blue, or "any shade between," meaning a veritable spectrum of purples are yours to savor. Twelve programmable G keys can store macros up to 36 characters long, and an MR button allows adding macros spontaneously, in case any new ones come to you midgame.

    On the back is a USB 2.0 hub port, along with dedicated headphone and mic jacks so gamers can also plug in their headset of choice and any other mouse, control pad, or other peripheral that comes to mind when fragging.

    The G110 comes out in November for $79.99.

    Thursday, October 15, 2009

    Latest P55 Series Motherboards from GIGABYTE

    GIGABYTE Unwraps Latest P55 Series Motherboards
    Delivering Cutting Edge Technologies that take a Mainstream Platform and Transform it to the Extreme -- 2009/09/08

    Taipei, Taiwan, September 08, 2009 – GIGABYTE Technology CO., LTD., a leading manufacturer of motherboards and graphics cards, is pleased to launch their latest generation P55 series motherboards, based on the Intel® P55 chipset, GIGABYTE P55 motherboards build upon the success of their Ultra Durable™ 3 design featuring 2oz copper PCB and deliver a host of cutting-edge features including the industry's first 24 phase VRM design, innovative Smart6™ PC management tools and Dynamic Energy Saver™ 2 power saving utilities just to name a few.

    Supporting the latest Intel® Core™ i7 and Core™ i5 processors featuring LGA 1156 socket (code named Lynnfield) GIGABYTE P55 series motherboards set a new standard in high performance computing. With the memory controller integrated directly into the processor die, GIGABYTE P55 motherboards support 2 channel DDR3 memory for blazing fast memory performance up to 2200MHz and above. Additionally, the GIGABYTE P55 Series features Intel® Turbo Boost Technology, which is able to power down idle processor cores and dynamically reroute the power to the active cores for significant performance boosts, and at the same time, maintain greater energy efficiency.
    The GIGABYTE P55 series mark another milestone for innovative GIGABYTE motherboard design, with the introduction of the world's first 24 phase power VRM design featured on the GA-P55-UD6. The innovative 24 phase power VRM has been designed and engineered to deliver fast transient response times through quick and seamless power delivery during extensive CPU loading variations. In addition, heat from the VRM is effectively reduced by spreading the load between all 24 power phases, resulting in a cooler and more stable platform.

    Unique GIGABYTE Technologies*
    Ultra Durable™ 3
    GIGABYTE Ultra Durable™ 3 series motherboards once again lead the motherboard industry for the highest quality and most innovative motherboard design. Featuring the industry's first consumer desktop motherboard design to introduce 2 ounces of copper for both the Power and Ground layers, GIGABYTE Ultra Durable™ 3 motherboards deliver dramatically lower system temperature, improved energy efficiency and enhanced stability for overclocking.

    GIGABYTE Ultra Durable™ 3 motherboards also feature Japanese Solid Capacitors boasting 50,000 hours of operation, Ferrite core chokes with higher energy efficiency compared to the commonly used iron core chokes and Lower RDS(on) MOSFETs that features a lower resistance, which reduces power consumption and heat generation. The GIGABYTE Ultra Durable™ 3 series motherboards promises to provide the stability, reliability and longevity essential to meet the power needs of high-end processors and other components running today's most demanding applications and games.
    Smart6™ – A Smarter Way for PC System Management


    GIGABYTE Smart 6™ is designed with user-friendliness in mind, offering a combination of 6 innovative software utilities that provides an easier and smarter way for managing your system. Smart 6™ allows you to speed up your system performance, boot-up time, managing a secured platform or recovers your system easily with a click of mouse button.

    Smart QuickBoot

    Smart QuickBoot speeds up the system boot-up process and shortens the waiting time for entering the operating system, delivering greater efficiency for daily use.

    Smart QuickBoost

    Smart QuickBoost features quick and effortless CPU overclocking for novice and experienced users alike; simply click on one of three CPU performance levels, and Smart QuickBoost automatically adjusts CPU performance.


    Smart Recovery


    Smart Recovery allows users to easily roll-back system settings to a previous known working status. Users can simple select the day, week or month without prior setup of a backup time flag.

     
    Smart DualBIOS™

    Smart DualBIOS™ not only allows double protection for the motherboard with two physical BIOS ROMs, it also includes a new feature that can record important dates and passwords

    Smart Recorder
    Smart recorder monitors and records system activities such as the time when the PC was turned on/off or even when large files were copied.

    Smart TimeLock
    Smart TimeLock allows parents to schedule time limits for their children to use the PC. It makes the rules simple by being able to select different usage times for weekdays and weekends.

    Smart TPM – TPM via Bluetooth® Cell phone and USB Drive*
    GIGABYTE Smart TPM provides the industry's highest level of data protection with 2048 bit hardware encryption. A unique feature of GIGABYTE Smart TPM is that it allows users to store their digital key on a USB thumb drive. In addition, GIGABYTE Smart TPM allows users to lock and unlock their data remotely using a Bluetooth® enabled mobile phone.


    Smart DualLAN – Blistering Fast and Seamless Connectivity
    GIGABYTE Smart Dual LAN technology features intelligent LAN port auto-switching between the 2 physical Gigabit LAN chips, offering hassle-free, zero downtime, high-speed network connectivity. Experience blistering fast network data access of up to 2Gbps bandwidth transmission with Teaming enabled and enjoy added power savings with Green Ethernet


    Dynamic Energy Saver™ 2

    DES2_Advanced_P55.pngGIGABYTE Dynamic Energy Saver™ 2 incorporates a host of intelligent features that use a proprietary hardware and software design to considerably enhance PC system energy efficiency, reduce power consumption and deliver optimized auto phase-switching for the CPU, Memory, Chipset, VGA, HDD and system fans. With a simple click of a button, GIGABYTE Dynamic Energy Saver™ 2 provides exceptional power savings and the most appropriate power usage without sacrificing performance.

    Auto Green* - Automatic Power Savings
    Auto Green provides system energy savings by enabling users to turn on and off their PC remotely using their Bluetooth® enabled mobile phone. Once your phone is paired with your system, you only need to step away from your PC, and it will automatically enter S3/S4 ultra low power state, giving you an added level of power savings.


    *GIGABYTE motherboards featuring Smart TPM and Auto Green functions do not include a Bluetooth® receiver; the addition of a 3rd party Bluetooth® receiver is required.


    X.H.D. eXtreme Hard Drive – Accelerating Hard Drive Performance with Ease
    Accelerating system performance is made easy with the user-friendly GIGABYTE eXtreme Hard Drive (X.H.D.) technology, providing a quick and easy way to boost your hard drive performance simply by adding another hard drive.


    eSATA / USB Combo Connectors


    GIGABYTE provides 2-in-1 combination connector design which is capable of accepting eSATA and USB cable plugs, providing enhanced hard drive flexibility with no need for an additional power source. Easily connect your PC with external SATA storage devices and enjoy up to 3 Gb/s SATA data rates.

    Onboard Debug LEDs – Simplifying Motherboard Troubleshooting
    Embedded post code Debug LED display indicates system status to simplify motherboard troubleshooting by identifying and displaying error codes.

    Precision OV – Providing More Precise System Voltage Control
    GIGABYTE Hardware Overvoltage Control ICs featuring more voltage control options than before for the CPU North Bridge and memory. The overvoltage controllers also provide hardware linear real-time voltage control, which means there is no delay compared to the GPIO controller in past implementations. In addition, GIGABYTE's Hardware Overvoltage Controller ICs also allow for much finer voltage control, allowing power users to adjust voltage in as little increments as 20mV for better overclocking performance.

    DualBIOS™ - Patented Dual Hardware BIOS Protection
    DualBIOS™ is a GIGABYTE patented technology that automatically recovers BIOS data when main BIOS has crashed or failed. Featuring 2 physical BIOS ROMs integrated onboard, GIGABYTE DualBIOS™ allows quick and seamless recovery from BIOS damage or failure due to viruses or improper BIOS updating.


    Multi graphics ATI CrossFireX™ and NVIDIA SLI™ support


    Wanting to make sure gamers felt some multi-GPU love on the P55 platform, GIGABYTE has equipped their entire P55 series with support for both ATI CrossFireX™ and NVIDIA SLI™ multi-graphics support, delivering the ultimate in graphics performance for gaming enthusiasts who demand the highest frame rates without compromising on resolution.


    Dolby Home Theater®


    In addition, GIGABYTE has also included the powerful Dolby Home Theater® suite of audio technologies, which deliver a vivid surround sound listening experience for music, movies, and games, using two to eight speakers or any set of headphones. Designed to automatically deliver the best possible listening experience, Dolby Home Theater® includes Dolby Pro Logic IIx for maximum surround sound expansion, Dolby Headphone and Sound Space Expander for a virtualized audio experience, and Natural Bass enhancement for the richest quality sound.

    GIGABYTE P55 Series Motherboards

    GA-P55-UD6

    GA-P55-UD5

    GA-P55-UD4P

    GA-P55-UD4

    GA-P55-UD3P

    GA-P55-UD3R

    GA-P55-UD3

    GA-P55-UD3L

    GA-P55-US3L

    GA-P55M-UD4

    GA-P55M-UD2

    *Available features vary by model. Please visit the GIGABYTE website to see a complete listing of motherboard model features.

    For additional information about the GIGABYTE P55 series motherboards, please visit the GIGABYTE website at: http://www.gigabyte.com.tw/Products/Motherboard/Default.aspx