Saturday, September 18, 2010

HomeJobStop : A Home Job Bank

HOMEJOBSTOP

This world today has made it possible to start working from home instead of communicating to the office. This is how HomeJobStop was born, as a source for home job seekers.


source : HomeJobStop

Proudly claimed as active job board specializing in telecommuting and work from home jobs. They offer an exclusive online guidebook, email update reports and more.

At Homejobstop

* You will not find an exhaustive list of ad-posting schemes, pyramid schemes, chain letters, cash gifting offers, or other well known schemes.
* You will not find commercial advertisements disguised as job ads.
* You will find a wide variety of job opportunities including freelance and contract opportunities as well as FT and PT positions in both entry-level and professional-level work.

Note from Admin

- By joining, you will receive a free copy of "Finding The Perfect Job."
- Certain fees apply to certain level.
- If you're an employer, you also can post a job in the site.
- I did some snooping around for scam report. Apparently they're none so far. They're even listed on the United States Department of State website.


Click Here To Visit HomeJobStop

Vertex42 : Spreadsheet Templates, Calculators, and Calendars

Vertex42">



Example of spreadsheet. Image source : Vertex42

- Provider of Spreadsheet Templates for Microsoft® Excel®, OpenOffice.org, and Google Docs.
- Financial Calculators include some of the most powerful and user-friendly Debt Reduction and Money Management tools.
- Huge selection of free Calendar Templates, and even some Word Templates such as Resume Templates and Business Cards.

Note from admin :

- Price vary per product.
- Absolutely huge collection of product to choose from.


CLICK HERE TO PURCHASE

Friday, September 10, 2010

'Here You Have' Virus Tries to Delete Your Security Software - PCWorld

Subject: Here you have (or “Just for you”)

Body: This is The Document I told you about, you can find it

Here. [link]

Please check it and reply as soon as possible.

Cheers,


source PCWorld

That's the example of the worm that the url will bring you to a .scr file instead of .pdf file. Then, it installs itself as CSRSS.EXE in the Windows directory, e-mails the contents of your address book and spreads through mapped drives, remote machines, and removable media. Then it attempts to download files and delete security software.

How To Avoid The Virus

1 - Golden rule, don't just click any link, even from known senders.
2 - Update your antivirus software so it will be able to handle 'Here you have' worm.
3 - If infected, disconnect from the Internet, install any latest antivirus and try to remove the worm.

Thursday, July 8, 2010

Sales! EBooks!



If you're looking for ebooks to sell, buypdfbooks is right now having sales (valid by the time this post was published) You can have ebooks at the price $29 by the price of $9 (apply to some only) So hurry now and grab your chance.


There's no need for me to remind you that you need to look for the one with resale right if you want to sell right?

Click Here To Visit The Site!

Monday, June 28, 2010

Trade Games For The Ones That You Desire



The concept of this site is to provide a place to trade your video games with any games that you desire. All you need to do is register, set a list, find a trade, trade and finally rate the trade.

Want to try? Visit Beg<>Borrow for more information. Need I remind you that trading games are only for games in original copies, not otherwise.


Happy Trading!

Wednesday, June 2, 2010

Hacking: The Art of Exploitation, 2nd Edition

Review

"Erickson presents the material in a manner that is both easy to follow and a joy to read." -- IEEE Security & Privacy, March 2004

"I highly recommend this book." -- IEEE Cipher, March 15, 2004

"This is an excellent book." -- About.com, November 2003

"This would make a great addition to any computer enthusiast's book shelf." -- Geekshelter.com, January 2004

"every Linux/Unix administrator and applications programmer can learn something from the programming section" -- UnixReview.com, June 2004

"the seminal hackers handbook" -- Security Forums, January 2004

5 stars, "One of a kind… Superb, Thrilling , Excellent Book." -- Database-Book-Reviews.com http://www.database-book-reviews.com/book_reviews/by_publisher/No_Starch/ --This text refers to an alternate Paperback edition.
Product Description

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.

The included LiveCD provides a complete Linux programming and debugging environment--all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:

* Program computers using C, assembly language, and shell scripts
* Corrupt system memory to run arbitrary code using buffer overflows and format strings
* Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening
* Outsmart common security measures like nonexecutable stacks and intrusion detection systems
* Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence
* Redirect network traffic, conceal open ports, and hijack TCP connections
* Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix

Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.

Payment Proof From Clicksia

I joined this site some time ago. Then my pc crashed, formatted and I forgot about it. It until recently I login again and realized I nearly reached payout. Wow~~~

So here's the payment proof (minimum payout is $1)




Clicksia

Friday, May 28, 2010

Biologic Bike Mount for Iphone

Product Features

* iphone bike mount. fits well with dahon bikes and most brand bicycles.
* weatherrooof, touch screen operable
* universal bracket, for most bikes.
* for iphone owners, who loves riding bike.
* does not come with iphone.

Product Description

The BioLogic Bike Mount for iPhone lets you attach your iPhone to your bike s handlebars so you can track your GPS position, your speed, or distance travelled, while you ride. The Bike Mount is a weatherproof case with a welded touch sensitive membrane so your iPhone is completely protected from the weather but fully functional. fits well with dahon bikes and most brand bicycles.

Monday, May 24, 2010

Google Got TV

Introducing, Google TV!



allow consumers to "search and watch an expanded universe of content available from a variety of sources including TV providers, the Web, their personal content libraries, and mobile applications"

as qouted in itvt

It's like Internet+TV. We get even search for particular content that we want. Plus, we can watch it in our living room.



Lets be optimistic and see the bright side, shall we?

Friday, May 21, 2010

Google Fonts API

Not really a new news but I just figure out Google Fonts API (rather late bloomer am I?) I found this in one of the tech blog, so I made a visit.


It does got me interested to find out for me. Check the Google font directory.


Just look over the list click on the font that you like and Get The Code.


You only need to place the code in your site and link the fonts via CSS. Easy as a pie.

Happy trying!

Sunday, May 9, 2010

HTML Code in Post For Blogger

As you already know, it's pretty impossible to publish html code inside our post in blogger. Therefore, you need to change the code a bit before publishing it.


You can try centricle to Encode or Decode the code.

To Insert HTML

Paste the html coding inside the box and click Encode to generate. Then copy and paste it into your post in blogger. Once you publish the post, the html code will appear correctly as you intend it.

Choose Decode for otherwise.

Happy trying!



Disclaimers


Seriously, I don't own that site and just sharing this info.

Saturday, February 6, 2010

Creating Underline Menu In Blogger



The Menu

I used coding provided by Dynamic Drive. To be more precise, you can get it here.

Search for your blog header (it would be something like "id=header" or such, it differ based on your blog coding) and paste the code under it.

Adjust the code to suit your blog better. And then you get your own menu.