Tuesday, April 20, 2010

(dll) Double Execution or Remote Script Execution?
- Unicode Compression (ISO/IEC) MPEG-2 & Frame Rate between Unicode Compression (ISO/IEC) MPEG4 & Frame Rate
- \\::1 (Unicode Engine)
- Bypass ">"
- %20 bypass 0 distingused as O then Unicode looking for 1 equal HTML %2025 or &'nbsp;($.125)
- Shift is one of the computer scancode or order for cpu intterupt (distingused)

Video Compression Technology

At its most basic level, compression is performed when an input video stream is analyzed and information that is indiscernible to the viewer is discarded. Each event is then assigned a code - commonly occurring events are assigned few bits and rare events will have codes more bits. These steps are commonly called signal analysis, quantization and variable length encoding respectively. There are four methods for compression, discrete cosine transform (DCT), vector quantization (VQ), fractal compression, and discrete wavelet transform (DWT).

Discrete cosine transform is a lossy compression algorithm that samples an image at regular intervals, analyzes the frequency components present in the sample, and discards those frequencies which do not affect the image as the human eye perceives it. DCT is the basis of standards such as JPEG, MPEG, H.261, and H.263. We covered the definition of both DCT and wavelets in our tutorial on Wavelets Theory.

Vector quantization is a lossy compression that looks at an array of data, instead of individual values. It can then generalize what it sees, compressing redundant data, while at the same time retaining the desired object or data stream's original intent.

Fractal compression is a form of VQ and is also a lossy compression. Compression is performed by locating self-similar sections of an image, then using a fractal algorithm to generate the sections.

In computing, multitasking is a method by which multiple tasks, also known as processes, share common processing resources such as a CPU. In the case of a computer with a single CPU, only one task is said to be running at any point in time, meaning that the CPU is actively executing instructions for that task. Multitasking solves the problem by scheduling which task may be the one running at any given time, and when another waiting task gets a turn. The act of reassigning a CPU from one task to another one is called a context switch. When context switches occur frequently enough the illusion of parallelism is achieved. Even on computers with more than one CPU (called multiprocessor machines), multitasking allows many more tasks to be run than there are CPUs.

Operating systems may adopt one of many different scheduling strategies, which generally fall into the following categories:

In multiprogramming systems, the running task keeps running until it performs an operation that requires waiting for an external event (e.g. reading from a tape) or until the computer's scheduler forcibly swaps the running task out of the CPU. Multiprogramming systems are designed to maximize CPU usage.
In time-sharing systems, the running task is required to relinquish the CPU, either voluntarily or by an external event such as a hardware interrupt. Time sharing systems are designed to allow several programs to execute apparently simultaneously. The expression 'time sharing' was usually used to designate computers shared by interactive users at terminals, such as IBM's TSO, and VM/CMS
In real-time systems, some waiting tasks are guaranteed to be given the CPU when an external event occurs. Real time systems are designed to control mechanical devices such as industrial robots, which require timely processing.


Electromagnatic Radiation

Astronaut Cooking Book - http://www.eecs.berkeley.edu/~lazzaro/sa/book/tut/index.html

Malaysia, Japan advance partnership in energy security

Monday, April 19, 2010

By Fauziah Ismail in Tokyo, Japan

MALAYSIA and Japan are to jointly undertake some 20 projects under the Japan-Malaysia Cooperation Initiative for Environment and Energy to further advance cooperation between both countries in the two areas.

Of the total, 11 will be environment-based while the remaining nine are for energy conservation and renewable energy.

Under the Initiative, Japan will assist Malaysia in the drafting a master plan and a concrete action plan to promote a waste reduction policy. It will also support the establishment of a recycling system of waste and electronics in Malaysia. Japan is noted as an advanced nation for recycling system of waste and electronics recycle services with its Home Appliance Recycling Law.


Electromagnatic Radiation

Noise cancellation technology is a growing field that capitalizes on the combination of disparate technological advancements. The purpose of the technology is to cancel or at least minimize unwanted sounds. Modern lives seem full of all sorts of noisenoisenoise, some of which are dangerous to our ears. In fact, many people, especially those who live and work in cities, have very little quiet time during the day.


Year 2004 Internet Wireless Speed

Cycling while talking on the phone already has risks; perhaps the exposure to the electronic non-ionizing radiation from the cellphone is harmful, too. Over at TreeHugger, we looked at the possible dangers in general from cellphones, microwaves and Wi-Fi.

The precautionary principle suggests that "when an activity raises threats of harm to human health or the environment, precautionary measures should be taken even if some cause and effect relationships are not fully established scientifically." Given the confused state of the science around this subject, perhaps we should all take a few precautionary steps. The U.K.-based magazine The Ecologist suggests a few:

1. Disable the wireless transmitter on your family's laptop computer via the software, and use a hardwired connection.

2. Remove as many microwave devices from your home as possible, and investigate wired alternatives.

3. Aim to use your cellular phone for as short a time as possible.

The Safe Wireless Initiative is much more explicit and detailed:1. Minimize all exposure and usage of wireless communication, such as cell phones, cordless phones, and Wi-Fi devices.

2. Turn off your cell phone when it's not in use and when you're sleeping. Never keep it near your head or use it to play games or watch movies.

3. Keep your cell phone at least 6-to-7 inches away from your body while it's on or when you're talking, texting, and downloading.

4. Use air-tube headsets or speaker mode when you're talking. Wireless and wired headsets still conduct radiation.

5. Never keep your cell phone in your pocket, purse, back or on your hip all day. The hip produces 80 percent of the body's red blood cells and is especially vulnerable to electromagnetic radiation (EMR) damage. Close proximity may also affect fertility.

6. Do not talk on a cell or cordless phone if you're pregnant, with a baby/small child in your arms, under 16 years of age, or while in a vehicle (that includes cars, trains, and subways). Radiation gets trapped and is higher in these closed metal zones. Minimize other EMR exposures to developing fetus via ultrasounds and Electronic Fetal Monitoring, unless absolutely necessary.

7. Replace all cordless and Wi-Fi items with wired, corded lines (such as phones, Internet, games, appliances, and other devices). The cordless phone base emits high levels of EMR-even when no one is making a call.

8. Minimize/space out computer use, sit back from your screen (flat screens are preferable). Use wired Internet connections, not Wi-Fi, especially for laptops. Keep laptops off your body and away from any metal surfaces.

9. Keep a low-EMR sleep, home, and personal zone. Move your alarm clock radio at least 3 feet from your head or use battery power-6 feet is the recommended distance from all electronic devices during sleep. Avoid waterbeds, electric blankets and metal bed frames. Futons/wood frames are better than metal-coiled mattresses and box-springs.

10. When using electric stoves, cook on back burners instead of front, as much as possible. Metals attract EMR, so keep them away from and off of the body. Use glass, cast-iron, and uncoated pans to cook with.

11. Measure EMR from wireless and wired devices with appropriate meters. To decrease exposures, install EMR filters and preventive technologies to electrical circuits, devices, and appliances.


IPV6 Problem - Teory

Positional of htmlspeacialcharacter

IPV6 Problem:
- The Network Data is upload to the computer through TCP ( then Network Data will be translate by the dll and regedit through \\::1 which cause the Network Data Stack example "<" , "[" and "|" or also calle EXO.

Another Example:

Keyboard or Scancode -> Server send a symbol 101 Scancode "@" -> Regedit \\::1 -> translator engine (Unicode or 102 International Code) -> Converted MD5 ISO Programming, it also look like "@" -> CPU Intterupt or Double Execution "Positional zero dintingused as O" Mysql EOF or BOF -> it will manfest or become another scancode example "%2025" -> it will responsewrite; twice in the webpage. In other word, the process (cpu intterput) has to be done twice because of the Alias is below the colon, zero "Positional".

What is Positional notation?
Visit: http://en.wikipedia.org/wiki/Positional_notation

What is Numeral System?
Visit: http://en.wikipedia.org/wiki/Numeral_system

Example the Cpu Intterupt causing the spider do twice work:

Note: US Digital Millennium Copyright Act "Echo or Responsewrite" Twice

Cpu 8085 attack Cpu 8086 Reset Javascript rapishare waiting time "zero dintingused as O" ie vulnerability.

Another Example:

Scancode and Unicode Loop (IIS or Executeable Program)

- Unicode Symbol GOMplayer "Backspace or ~"
- Scancode (Keyboard or CPU Intterupt) "Shift" + "[ "+ Without Shift "]" (AB Repeat)
- Unicode Symbol "Space or Play"

The Movie become Loop just like the Google Spider US Digital Millennium Copyright Act Above.

China: Hacker Schools Become Big Business

Sunday, April 18, 2010

China: Hacker Schools Become Big Business
By Matthew Harwood
08/05/2009 - Long known as a prominent source of cyberattacks worldwide, China has seen the emergence of online training schools that teach students the skills necessary to either be a network defender or a cybercriminal.

These "hacker schools," as they're known, are also big business, generating $34.8 million last year, reports China Daily



Tun Tuah (Neolitik)

Mai Baca - 17 April 2010

Saturday, April 17, 2010

Lima kali mohon KPLI tak dilayan

SAYA kecewa dengan pengurusan Kementerian Pelajaran Malaysia (KPM) yang tidak prihatin kepada pemohon seperti saya yang memohon Kursus Perguruan Lepasan Ijazah (KPLI) sejak 2002 sehingga 2010 dan tidak pernah diberi peluang menunjukkan kemampuan saya untuk menjadi guru.

Apa yang menyedihkan tahun ini saya tidak dipanggil menduduki ujian MTest pada 13 Mac dan 27 Mac lalu (untuk calon rayuan) sedangkan ia tahun terakhir saya layak memohon kerana antara syarat layak KPLI ialah umur tidak melebihi 35 tahun pada tarikh kemasukan ke maktab perguruan.


Wahai ibu bapa, jenguklah anak di IPT

Mengapa ada yang sanggup membuang bayi? Tidakkah bayi itu harus disayangi selepas bersusah payah mengandung selama sembilan bulan.

Adakah sanggup bayi yang terhasil daripada kasih sayang dua insan itu dibiarkan diratah anjing liar atau digilis kenderaan? Manusia jenis apakah yang sanggup melakukan perbuatan keji dan kejam itu?

Itu kata saya, kata anda dan kata kita semua apabila setiap kali berita mengenai pembuangan bayi mengisi dada akhbar dan ruangan utama berita.

Berdasarkan statistik yang dikeluarkan Menteri Pembangunan Wanita, Keluarga dan Masyarakat, Datuk Seri Shahrizat Abdul Jalil, Selangor berada pada kedudukan tertinggi di negara ini dengan mencatatkan kes pembuangan bayi sepanjang lima tahun belakangan ini, iaitu sebanyak 105 kes, manakala bagi penderaan bayi dan kanak-kanak, Selangor juga merangkul kedudukan nombor satu.

Saya boleh mengandaikan mengapa Selangor begitu galak dalam kes ini, selain menjadi tumpuan belia seluruh negara bekerja mencari rezeki, negeri ini juga mempunyai jumlah pekerja asing yang tidak sedikit bilangannya. Namun begitu di negeri lain juga mempunyai bilangan kes yang begitu membimbangkan. Di Terengganu, walaupun hanya berlaku lima kes pembuangan bayi dan 168 kes penderaan bayi dan kanak-kanak, tetapi senario itu sudah cukup membimbangkan.


'Najib dianggap antara pemenang dapat temui Obama'

SIDANG Kemuncak Keselamatan Nuklear di sini menghasilkan beberapa 'pemenang' dan seorang daripada mereka ialah Perdana Menteri, Datuk Seri Najib Razak kerana diberi penghormatan berbincang secara persendirian dengan Presiden Barack Obama.

Ia pandangan Al Kamen, penulis akhbar berpengaruh The Washington Post dalam kolum ‘In The Loop’ selepas sehari sidang kemuncak itu berakhir kelmarin.