Skip to main content

Posts

Showing posts from July, 2009

Utilizing PHP-GD To Make Captcha

As the first security door, made captcha to prevent brutal action from a robot. How do I create one? Find out more here. Re-typing a line of random characters for reasons of security seems to be mandatory that you must do when making the registration process for membership online. Not only in the registration form online, similar things can be encountered during the process online transactions in which the transmitted data is data that is crucial. Random character string that you need to reset the type is known by the term captcha. Captcha is made with the assumption that only men can see the whole picture and identify the characters shown for a reset. This is to prevent the brutal actions carried out auto-generated by script or robot system in disarray a website. Programmer website utilizing GD library in PHP script that converts them to create a line of random characters into an image. This article will discuss how to make a captcha system by using GD library functions. About PHP-GD

Test Processor: Intel Core i7 Extreme 965, 3200 MHz

Array processor from Intel's is using Nehalem microarchitecture the naming Bloomfield core processor Extreme Edition. As with our previous test processor, this processor has 4 cores. The difference of the clock is much higher, that is each has a core clock 3200 MHz. Indeed, this processor is not the highest line of Bloomfield core, because there is still Intel Core i7 Extreme 975 with a 3330 MHz clock. Additional features, such as using 45 nm manufacturing, Intel QuickPath Interconnect (QPI), which replaces the FSB, 32 KB L1 cache per core, 256KB L2 cache per core, and 8 MB L3 Cache combined core, and supports SSE4.2 and Special SSE4.1 processor to Intel Core i7 Extreme 965 has not locked multipliersyang (unlocked) separately for memory and core. From several sources that we get, core clock is able to be increased to 5 GHz, while the memory is able to be increased up to DDR3-2000 MHz. Power consumption required by this processor is (TDP) 130 Watt. Quite interesting to see if the sp

Processor Test: Intel Core 2 Extreme QX6800, 2933 MHz

Test result on Intel Core 2 Extreme QX6800, 2933 MHz Core processor is given the name of the xe Kentsfield (which indicates Extreme Edition) Processor has 4 cores that each have a 2933 MHz clock. Processor is the highest line of Kentsfield core which is usually the model number naming QX6xx0 While the mainstream classroom, usually used for Kentsfield naming model number Q6xx0. Both Kentsfield and kentsfield xe L2 caches have the same, that is 4 MB. Power consumption that is used is different between each type of processor, usually the higher the type of processor (and clock), then the larger the maximum power is needed. For example the maximum power consumption (TDP) required for Kentsfield QX6800 is 130 Watt. From test results we got, especially for testing sintetic - they are our focus for this test - the results obtained are quite bai. Because the application benchmark PCMark and 3DMark Vantage vatage that requires a higher source, the effect also on the test results. While testing

Free Security Tool

Before you spend money to purchase expensive security products, first try the following free tool. Crime that did not stop making PC security industry, which continues to be sought. The tool you use to protect the system relies heavily on the system you use, you are not financial. But for the ordinary home or business, a number of free security products is sufficient. Almost all of the products listed here offer a paid version with more features. Many users eventually upgrade, where it is that makes the company can offer the product free. AVG Anti-virus Free Edition No need to doubt, is probably the AVG anti-virus software free the most popular. He protects your system from viruses and spyware. Initially, free version of AVG running with the stable and effective. However, with the majunya crime, AVG started a little behind, but he remains a reliable product if you combine them with other products (especially Malwarebytes and Spybot - Search and Destroy) Do not just depend on AVG. Combi

The Sims 3: Best Genre Simulation

For the simulation genre, it seems nothing is able to rival series The Sims. Games print this fenomenal success since the first released. With a very adictif gameplay, this game successfully entrap many, children begin to adults, both men and women. Now after two sekuel passed plus various expansion pack is enough, The Sims series continue to third. For the faithful fans, sekuel in three of the development are expected to have a means and not just a ekspansion next. In this case, Electronic Arts seems to be able to read enough loyal fans wish this game. Development of significant visible from possibility your Sims explore the environment. Yup, this time the Sims 3 features introduce the open environment. So your character is not simply move from one place to another in a jiffy. You now can the road, greet neighbors, greet people along the way, and more. This is what makes this game more alive and more fun. Gameplay itself is not much different from previous series. You can create your

Data Access With SharePoint Query

Accessing SharePoint data directly into the SharePoint database is not difficult. How...? In general, we access the data through the SharePoint Web Service or the object model provided by SharePoint. At the time this article, the author invites the reader how to access the data directly into the SharePoint database through query Starting in the Database Query SharePoint Site Firstly, set the SharePoint Site that we want to do the testing. For this purpose, we will use the data that made the CMS consists of a lot of SharePoint content such as document, list, or other. You can use your own data. Obtaining Data Web Site in SharePoint We can obtain a list on a web site on SharePoint Webs table. By using the query as follows. select id, title, description from webs We will get some of the web site in SharePoint, and we also see the value "CMS" in the title. This is an application that we will focus on this article Retrieving Data Content Each SharePoint site will have the data

Understanding Database Structure SharePoint 2007

SharePoint 2007 is a portal application with a high flexibility. How the basic structure of the database? Let's see ... Microsoft SharePoint 2007 applications that can be said to be a very good example in building a web-based application. With a flexible design of the portal on the SharePoint 2007, it is not surprising that many people choose to switch to SharePoint or affairs for the web portal One indicator of a good application to the design of the database. If the database structure that is made regular and very futuristic, the application can be good even though this will not always depend on how the implementation of the application and how mengonsumsi database. SharePoint 2007 database can be designed so that the support for personalization so that more lives will be portalnya applications. At the time this article push to point on how the structure of the database sSharePoint 2007. Microsoft itself is not the official to give details about the structure of the database so t

Prevent Spyware

Spyware and unwanted software that can disrupt the other your privacy, bombard you with pop-up windows, slow computer, and even make a computer crash. Here are some ways to protect your computer from spyware and other software gadfly. Use a Firewall Although usually spyware and other software gadfly comes with other programs or originate from malicious websites, spyware can also be inserted into your computer by hackers. Installing a firewall or using the firewall in the Windows Vista and Windows XP can help you in the face of the hacker is Software Update One way to prevent spyware and other software is a gadfly to update all your software. Visit Microsoft Update and make sure you have downloaded all the latest security updates and other critical updates. Set Internet Explorer security settings You can set Internet Explorer security settings to control how much information you want to receive from a website. Microsoft recommends that you set the Internet zone security settings to Medi

Protect Computers With Windows Defender

With Vista, you do not need to buy a third party software to scan and eliminate spyware. Most of the professional information tekhnology agree that spyware is a big problem that the user and the business. Spyware is a type of malicious software is installed without permission or user and then collects information from the computer and send it to the creator of the spyware. Many spyware that collects information, such as web sites visited for the purpose of advertising. However, there is also a more evil and steal user passwords, credit card, or bank account number, even recording a pressure button and take a picture what the user on the computer. Some spyware programs also display unwanted ads and spyware often cause decreased performance computer There is already a legal step that is done to create some type of spyware program to be illegal, but its implementation difficult. To control this problem, you need a solution from the technology. There are many anti spyware programs availabl

Some Firefox Shortcut

Alt + B : Open the Bookmarks menu Alt + D : Select the text in the Location bar Alt + E : Opens the Edit menu Alt + F : Opens the File menu Alt + S : Opens the History Alt + H : Opens the Help menu Alt + T : Open the Tools menu Alt + V : Opening the View menu Alt + Left arrows : Move to the previous page Alt + Right arrows : Move to next page Alt + Home : Open the Home Page Alt + F4 : Close active window Backspace : Move to the previous page ESC : Stop page End : Move to the bottom of the page Home : Moving to the top of the page Ctrl +0-9 : Opening tab 1-9 Ctrl + F4 : Close active tab Ctrl + F5 : Refresh (ignore cache) Ctrl + B : Opening or closing the Bookmarks panel (can be also with Ct

Set the Setting Firefox from About: Config

One of the best things of Firefox is the flexibility and the ekstenbility. To access the internals of Firefox, open the page about: config If you are just regular Firefox user, then you may not be familiar with the about: config. Page about: config Firefox does not look like a normal page because it contains hidden configuration. He is quite powerful because it is hidden and not simply as a normal Preferences window. On page about: config, you need to know what the right or you can make everything topsy. At the time the first time open page about: config, you should receive an approval (which is actually just a warning) before proceeding. You will see a list of Firefox configuration items. Configuration that has been modified by the user with a bold set of user status. Many of the options in the configuration during installation, but you can change them as you wish. When I open the configuration page you will see a box filter which can be used to search for specific items. This makes t

Cloud Computing A New Revolution

Cloud computing is a new concept of computing distribution been used as a major revolution in the information technology world. At least in this last period, has been shown buzzword or technology terms the new Technology pliers and give a lot of hope for a breakthrough-a new breakthrough in the computer world. Gartner, a leading research institutions that research and the report is widely used by both companies as users of Technology and Technology for the purposes of commercial trade Technology (hardware, software, and implementation and outsourcing services) in its annual report, 2008, released "Gartner's Hype Cycle Special Report for 2008 "in the emerging technologies, Gartner mentions that" Cloud Computing "will reach the maturity level of about 2 to 5 years. Based on these reports, at this time Cloud Computing is still regarded as a technology buzzword. In all phases of this problem facing Technology adoption is still a big market. In other words there will