(a.@)
admin : http://www.noor.myebiz.com.my/wp-admin
blog : http://noor.myebiz.com.my/
domain : http://Slim-ekin-bodycare.com.my
012180565

http://www.eguide.com.my/ListMe.asp?ctyCode=MY&key=
http://www.slideshare.net/fsearch/slideshow?q=pemasaran+internet&searchfrom=header
Labels: 0 comments | edit post
Cara mengira guna rumus anding
Rumus Anding

0 -- 0 = 0
1 -- 1 = 1
0 -- 1 = 0
1 -- 0 = 0

Contoh :
1) Diberi nombor-nombor yang berikut :
192 . 168 . 1 . 64
255 . 255 . 255 . 192
Penyelesaiannya : -

Langkah 1 :
192 . 168 . 1 . 64 (Tukar ke dalam bentuk binary spt dibawah)
1100 0000 . 1010 1000 . 0000 0001 . 0100 0000

255 . 255 . 255 . 192
(Tukar ke dalam bentuk binary spt dibawah)
1111 1111 . 1111 1111 . 1111 1111 . 1100 0000

Langkah 2 :
Tambahkan kedua-dua nombor yang sudah ditukar kepada binary tadi..

1100 0000 1010 1000 0000 0001 0100 0000
11 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 +
-------------------------------------------------------------------
1100 0000 1010 1000 0000 0001 0100 0000
-------------------------------------------------------------------

Langkah 3 :

Tukar jawapan yang ditambah tadi kepada decimal :
1100 0000 . 1010 1000 . 0000 0001 . 0100 0000 (Jawapan tadi)
192 . 168 . 1 . 64

Jawapannya : 192 . 168 . 1 . 64
Contoh Pengiraan Dalam Networking
Soalan-soalan :

1) 192 . 168 . 1 . 12/29
29 = 1111 1000
i) Bilangan Host = 2^3 ii) Bilangan network = 2^5
= 8 - 2 = 32

= 6
iii) Subnet mask = 1111 1000
= 128 + 64 + 32 + 16 + 8
= 248

iv) Network Address = 192 . 168 . 1 . 8
Broadcast Address = 192 . 168 . 1 . 15


2) 192 . 168 . 1 . 250/26
26 = 1100 0000
i) Cari bilangan host = 2^6 ii) Cari bilangan network = 2^2
= 64 - 2 = 4

= 62
iii) Subnet mask = 1100 0000
= 128 + 64

= 192
iv) Network Address = 192 . 168 . 1 . 192
Broadcast Address = 192 . 168 . 1 . 255


3) 192 . 168 . 1 . 87/27
27 = 1110 0000
i) Cari bilangan host = 2^5 ii) Cari bilangan network = 2^3
= 32 - 2 = 8

= 30
iii) Cari subnet mask = 1110 0000
= 128 + 64 + 32

= 224
iv) Network Address = 192 . 168 . 1 . 64
Broadcast Address = 192 . 168 . 1 . 95
 
Valid / Invalid And specify their class 1)
1) 126 . 100 . 1 . 1 = Valid (Class A)

2) 192 . 168 . 254 . 0 = Invalid (Class C)

3) 204 . 204 . 7 . 0 = Invalid (Class C)

4) 201 . 100 . 11 . 5 = Valid (Class C)

5) 192 . 5 . 5 . 5 = Valid (Class C)

6) 205 . 7 . 256 . 11 = Invalid (Class C)

7) 300 . 10 . 100 . 13 = Invalid

8) 0 . 1 . 2 . 3 = Invalid

9) 255 . 223 . 100 . 101 = Invalid (Class E)

10) 253 . 252 . 254 . 255 = Invalid
(Class E)


11) 1 . 1 . 1 . 1 = Valid
(Class A)

12) 160 . 1 . 1 . 258 = Invalid (
Class B)
Cara mengira bilangan host dan network
1) 10 . 0 . 0 . 0 / 15
Class A = 255 . 0 . 0 . 0
i) Bilangan Host = 255 . 0 . 0 . 0
1111 1111 . 1111 1110 . 0000 0000 . 0000 0000
= 2^17
= 131072 - 2

= 131070
ii) Bilangan Network = 2^7
= 128

2) 128 . 3 . 0 . 0 / 30
30 = 1111 1100
i) Bilangan Host = 2^2 ii) Bilangan Network = 2^6
= 4 - 2
= 64
= 2


3) 192 . 168 . 1 . 0 / 27
27 = 1110 0000
i) Bilangan Host = 2^5 ii) Bilangan Network = 2^3
= 32 - 2
= 8
= 30


4) 11 . 0 . 0 . 0 / 12
Class A = 255 . 0 . 0 . 0
i) Bilangan Host = 2^20 ii) Bilangan Network = 2^4
= 1048576 - 2 = 16
= 1048574
5) 13 . 0 . 0 . 0 / 30
i) Bilangan Host = 2^2 ii) Bilangan Network = 2^6
= 4 - 2 = 64
= 2


6) 130 . 11 . 0 . 0 / 22 Class B = 255 . 255 . 0 . 0
i) Bilangan Host = 2^10 ii) Bilangan Network = 2^6
= 1024 - 2 = 64
= 1022


7) 132 . 9 . 0 . 0 / 18
Class B = 255 . 255 . 0 . 0
i) Bilangan Host = 2^14 ii) Bilangan Network = 2^2
= 16384 - 2 = 4
= 16382


8) 6 . 0 . 0 . 0 / 9
Class A = 255 . 0 . 0 . 0
i) Bilangan Host = 2^23 ii) Bilangan Network = 2^1
= 8388608 - 2 = 2
=
8388606
TCP/IP, SUBNET N IP ADDRESS



PROTOKOL
Protokol dalam istilah pengertian perkataan ialah satu tatacara. Dalam istilah perkomputeran dan rangkaian, protokol ialah tatacara ataupun bahasa komunikasi yang digunakan bagi membolehkan satu-satu rangkaian itu berkomunikasi.
Dalam membolehkan satu rangkaian itu berkomunikasi, beberapa protokol rangkaian dicipta. Antara protokol yang sering digunakan dan sentiasa dibangunkan ialah TCP/IP.
TCP/IP (Transmit Computer Protocol/Internet Protocol) seolah-olah satu landasan yang menghubungkan satu rangkaian dengan rangkaian lain dengan mengenali sistem pernomboran yang dikenali sebagai IP Address. IP Addres lebih mirip seperti alamat kediaman anda. Contoh simulasi IP Address dalam protokol TCP/IP
Seperti seorang posmen menghantar surat, surat anda akan sampai pada alamat penerima yang anda tulis pada surat tersebut.
Dengan penggunaan TCP/IP pada sistem rangkaian, paket data yang dihantar pada satu-satu penerima, paket tersebut akan melalui 7 lapisan OSI untuk dipaparkan pada komputer penerima.
TERPERINCI TCP/IP
Alamat-alamat IP ini ditentukan dan dipantau oleh satu badan bebas, IANA (Internet Assigned Numbers Authority). Daripada ketentuan ini, terdapat beberapa kelas IP telah dispesifikasikan kepada Kelas-Kelas IP, dan antara yang digunakan ialah daripada Kelas A, B, dan C.
Terdapat satu alamat ip yang tidak termasuk dalam susunan ini, iaitu 127. Alamat ini digunakan untuk tujuan ujilari rangkaian, 127.0.0.1
Berikut adalah contoh penggunaan IP address mengikut kelas
Merujuk kepada carta kelas di atas:-
Bilangan network ialah bilangan rangkaian yang mampu dibuat pada satu-satu masa.
Bilangan subnet pula ialah bilangan pecahan daripda ranagkain-rangkaian itu.
Bilangan host ialah bilangan pengguna dalam setiap rangkaian tersebut.
Sebagai contoh:- kita ambil IP address daripada kelas A. Bilangan rangkaian yang mampu dilaksanakan ialah sejumlah 126 dengan 16,777,214 pengguna dalam setiap rangkaian, iaitu 1:16,777,214.
Pada ruangan subnet, 255.0.0.0 mewakili maksima IP Address yangDIBENARKAN diguna pakai pada setiap komputer. Range ataupun keluasan bagi satu-satu IP Address ialah daripada 1 hingga ke 254. Contoh: 10.1.1.1 hingga 10.x.x.x hingga 126.254.254.254
SUBNET
SUBNET ialah satu mekanisma pengiraan yang digunakan dalam sistem rangkaian bagi memecahkan rangkaian dalam kelas-kelas IP address bagi tujuan keselamatan maupun pembahagian kumpulan-kumpulan kerja. Subnet dalam IP address adalah terdiri daripada NETWORK ID DAN HOST.

Network ID dan Host ID dalam Kelas A,B dan C
KELAS A
Network ID
Host ID
10
1
1
1
255
0
0
0

KELAS B
Network ID
Host ID
128
1
1
1
255
255
0
0

KELAS C
Network ID
Host ID
192
1
1
1
255
255
255
0
Subnet (Pecahan Network) dalam satu kumpulan IP biasanya dipanggil SUBNET MASK. Subnet mask biasanya wujud pada setiap setting ip address pada semua Operating System, (windows95/98/Me/Xp/2000) Server maupun client. Mari kita rujuk fungsi SUBNET ini melalui beberapa kes penyelesaian.
Kes 1:
Anda dikehendaki untuk membina satu set rangkaian setempat (LAN) di satu Kementerian, dengan 100 pengguna IP address dalam satu kumpulan kerja daripada set IP Address 10.1.1.0. Semua pengguna mampu untuk berkomunikasi antara satu sama lain samada dengan perkongsian fail maupun pencetak.
Penyelesaian:
Setkan pada 100 komputer pengguna dengan IP Address dengan menggunakan IP Address daripada KELAS A:
Komputer Pennguna
IP Address
Subnetmask
Komputer 1
10.1.1.1
255.0.0.0
Komputer 2
10.1.1.2
255.0.0.0
seterusnya
10.1.1.3 -- 10.1.1.100
255.0.0.0
Kes 2:
Daripada 100 pengguna ini, anda dikehendaki untuk memecahkan rangkaian ini kepada DUA kumpulan kerja bagi memudahkan pihak pengurusan mengenal-pasti penggunaan IP Address pada kedua-dua kumpulan kerja ini. Kumpulan kerja itu ialah: (A) Unit Perumahan sebanyak 50 pengguna komputer dan (B) Unit Sosial sebanyak 50 pengguna
Penyelesaian.
Kumpulan
IP Address
Subnetmask
Unit Perumahan
10.1.1.1 hingga 10.1.1.50
255.0.0.0
Unit Sosial
10.1.2.1 hingga 10.1.2.50
255.0.0.0
Dengan memecahkan IP address ini kepada 10.1.1.1 hingga 10.1.1.50 dan 10.1.2.1 hingga 10.1.2.50, DUA set kumpulan rangkaian kecil telah dibuat daripada satu rangkaian yang besar tadi.
Dalam kedua-dua kes ini tadi, IP Address daripada KELAS Adigunakan.Walaupun rangkaian ini telah dipecahkan kepada DUA kumpulan, namun keseluruhan pengguna komputer ini masih mampu untuk berkomunikasi antara satu sama lain, disebabkan HOST ID keduanya masih dalam lingkungan boleh ubah. Apa pun penggunaan pernomboran daripada 1 hingga 254 di dalam HOST ID ini, kesemua komputer yang disambungkan pada rangkaian akan mampu berkomunikasi.
Kes 3
Pihak pengurusan Kementerian telah membuat keputusan untuk memecahkan lagi kumpulan kerja itu tadi agar komputer-komputer Unit Perumahan dan Unit Sosial untuk TIDAK BERKOMUNIKASI antara satu sama lain. Anda dikehendaki untuk menyelesaikan kes ini TANPA membabitkan sebarang kos pembelian peralatan.
Penyelesaian
Kumpulan
IP Address
Subnetmask
Unit Perumahan
10.1.1.1 hingga 10.1.1.50
255.0.0.0
Unit Sosial
11.1.1.1 hingga 11.1.1.50
255.0.0.0
Dalam kes ke 3 ini, dengan menukar Netwok ID kepada sebarang pernomboran selain daripada 10 akan akan memecahkan rangkaian kepada satu rangkaian lain. Dengan kaedah ini, Unit Perumahan dan Unit Sosial dalam kementerian ini akan terputus hubungan rangkaian setempat.
Dalam standard piawaian IP Address dan Subnet, sebarang perubahan pada Network ID dalam satu set IP Address dalam satu-satu rangkaian akan memecahkan rangkaian tersebut kepada satu sistem rangkaian lain.
PUBLIC DAN PRIVATE IP ADDRESS
Dalam menentukan penggunaan IP Address dalam satu-satu rangkaian, terdapat beberapa amalan yang lazimnya digunakan, iaitu penggunaanPublic IP Address dan Private IP Address.
Tujuan penggunaannya adalah untuk memudahkan pengecaman dan pengendalian IP address samada untuk kegunaan dalaman (Private IP Address) ataupun bagi kegunaan antarabangsa(Public IP Address) mengikut tata-susun daripada ISP (Internet Service Provider) dalam sesebuah negara.
Berikut adalah jadual pembahagian Private IP Address mengikut Kelas.
KELAS A10.x.x.x Hingga 10.255.255.255
KELAS B172.16.0.0 Hingga 172.31.255.255
KELAS C192.168.0.0 Hingga 192.168.255.255
DYNAMIC IP ADDRESS (DHCP -Dynamic Host Computer Protocol)
Istilah ini membawa maksud secara praktiknya dimana, dalam satu rangkaian terdapat satu SERVER yang akan membahagikan IP Address kepada kesemua komputer yang dirangkaikan. Dalam konfigurasi server pula, biasanya haruslah mempunyai kemampuan untuk memberikan perkhidmatan ini.
Apabila komputer pengguna 'Log-On' ke server, server akan mengaktifkan satu IP Address khusus untuk komputer tersebut mengikut tempoh tertentu.
Katakan dalam satu rangkaian yang mempunyai 20 komputer dengan satu DHCP server, dan pada DHCP server tersebut telah dikonfigurasikan perkhidmatan DHCP dengan set IP Address 10.10.1.1 hingga 10.10.1.25. Setiap pengguna yang 'log-on' padanya akan mendapat mungkin 10.10.1.2 sebagai set ip addressnya secara automatik, dan seterunya kepada komputer kedua hinggalah komputer yang terakhir.
Akibat Cinta DUNIA
“Rasulullah pernah bersabda kepada para sahabat, “Akan datang suatu masa, umat lain akan memperebutkan kamu, ibarat orang-orang yang lapar memperebut makanan dalam hidangan”. Lalu sahabat bertanya, “Apakah kerana pada waktu itu jumlah kami hanya sedikit, ya Rasulullah?” Kemudian beliau menjawab: “Bukan, bahkan sesungguhnya jumlah kamu pada waktu itu banyak, tetapi kamu ibarat ghatsa (buih) yang terapung-apung di atas air bah. Dan di dalam jiwamu tertanam AL-WAHN.” Lalu sahabat bertanya lagi, “Apakah yang dimaksud dengan al-Wahn, ya Rasulullah?” Beliau menjawab: “Iaitu CINTA DUNIA & TAKUT MATI.” (Riwayat Abu Dawud)

Suatu keadaan yang nyata di hadapan kita sekarang, bahawa jumalah umat Islam sangat banyak. Di dunia ini, satu million dari lima million penduduk bumi adalah Muslim. Tetapi kita saksikan bahawa jumlah yang banyak belum membawa umat ini keluar dari kesulitan-kesulitan nya. Inilah rupanya yang diungkapkan Rasulullah dalam hadis di atas. Patutlah kiranya kita semua, umat Islam meneliti ke dalam, seberapa jauh kiranya kita sudah terjangkiti penyakit al-Wahn tersebut, penyakit cinta dunia dan takut akan kematian. Tentunya ini tak lepas dari kesalahan pandangan umumnya masyarakat Muslim terhadap kehidupan dunia. Mengapa sampai cinta pada dunia dan takut mati? Tentu ini kerana memandang bahwa dunia ini adalah tempatnya segala kesenangan, dan kematian adalah pemutus kesenangan tersebut. Sungguh suatu cara pandang yang sesat dan keliru.

Dunia Dalam Pandangan Allah

Pada suatu kesempatan lain, Rasulullah SAW memasuki sebuah pasar yang kanan dan kirinya ramai dipadati manusia. Ketika itu beliau melewati seekor anak kambing cacat yang telah menjadi bangkai. Tidak seorangpun mengacuhkan atau tertarik melihatnya. Lantas Rasulullah SAW bertanya kepada para sahabat, “Siapa yang mahu membeli kambing ini dengan harga satu dirham?” Sahabat menjawab, “Sedikitpun, kami tidak menginginkannya.” Beliau bertanya sekali lagi, “Apakah kalian mahu jika anak kambing ini keberikan kepada kalian?” Sahabat menjawab, “Demi ALLAH, kalaupun anak kambing itu hidup, kami tidak akan menerimanya kerana cacatnya, maka bagaimana kami mahu menerimanya setelah menjadi bangkai?”

Mendengar itu Rasulullah SAW berkata, “Demi ALLAH, pandangan dunia itu lebih hina dalam pandangan ALLAH daripada bangkai kambing cacat ini dalam pandangan kalian.”

Bagaimana Mestinya Kita Memandang Dunia

Tirmidzi meriwayatkan, dari Abdullah bin Mas’ud ra berkata: “Rasulullah SAW tidur di atas tikar dan ketika bangun berbekaslah tikar itu pada belakangnya, lalu kami bertanya, “Ya Rasulullah, bagaimana seandainya kami buatkan untukmu tilam yang lunak?” Beliau bersabda, “Untuk apa dunia ini bagiku? Aku di dunia ini bagaikan seorang musafir, berhenti sebentar di bawah pohon, kemudian pergi meninggalkannya.”

Jadi, begitulah kiranya kita harus memandang dunia ini. Tak lebih dari pondok kecil dalam perjalanan yang panjang. Sungguh bodoh kalau kita samapai terpaku di pondok itu sehingga melupakan perjalanan panjang yang jadi tujuan kita. Jelaslah bahawa segenap aktiviti kita di muka bumi ini harusnya diarahkan untuk akhirat kita, yang kekal abadi. Seperti pernah dinyatakan oleh ulam besar kita, Bapa HAMKA semasa hidupnya, “Hidup yang sesungguhnya itu baru dimulai pada saat kita mati.”

Disabdakan lagi oleh Rasulullah SAW dalam analogi lain: “Dunia ini bagaikan penjara bagi orang mukmin dan bagaikan syurga bagi orang-orang kafir.”

Dalam Surah al-Hadid 57: 20, ALLAH berfirman: “Ketahuilah, bahwa sesungguhnya kehidupan dunia itu hanyalah permainan dan suatu yang melalaikan, perhiasan dan bermegah-megah antara kamu serta berbangga-bangga tentang banyaknya harta dan anak, seperti hujan yang tanam-tanamannya mengagumkan para petani; kemudian tanaman itu menjadi kering dan kamu lihat warnanya kuning kemudian menjadi hancur. Dan di akhirat (nanti) ada azab yang keras dan ampunan dari Allah serta keredhaan-Nya. Dan kehidupan dunia ini tidak lain hanyalah kesenangan yang menipu.”

Agar Tidak Tertipu Oleh Kehidupan Dunia

Memang manusia diciptakan denagan fitrah cenderung terhadap kesenangan dunia, dan ini boleh meningkat menjadi kecintaan. Itu merupakan ketentuan ALLAH SWT, “Dijadikan indah pada (pandangan) manusia kecintaan kepada apa-apa yang diingini, yaitu: wanita-wanita, anak-anak, harta yang banyak dari jenis emas, perak, kuda pilihan, binatang-binatang ternak dan sawah ladang. Itulah kesenangan hidup di dunia dan di sisi Allah-lah tempat kembali yang baik (surga).” (Surah Ali Imran 3: 14)

Tetapi, jika kecenderungan ini tidak dikendalikan, maka tumbuhlah ,ifat tamak pada manusia, sehingga seperti dikatakan Rasul, apabila diberi dua lembah penuh berisi emas, pasti ia akan mengkehendaki lagi lemabha ketiga yang penuh berisi emas. Inilah yang harus diatur dan diarahkan. ALLAH tidak melarang manusia untuk menikmati dunia ini, tetapi ada batas-batas yang harus dipatuhi, sebagaimana firmannya:
“Dan carilah pada apa yang telah dianugerahkan Allah kepadamu (kebahagiaan) negeri akhirat, dan janganlah kamu melupakan bahagianmu dari (kenikmatan) duniawi dan berbuat baiklah (kepada orang lain) sebagaimana Allah telah berbuat baik kepadamu, dan janganlah kamu berbuat kerusakan di (muka) bumi. Sesungguhnya Allah tidak menyukai orang-orang yang berbuat kerusakan.” (Surah al-Qashash 28: 77)

Apakah kira batasan-batasan tersebut? Mari kita lihat…
Pertama, tidak menjadikan dunia sebagai tujuan hidup.
“Dan sesungguhnya Kami menempatkan kamu di atas bumi ini dan Kami jadikan untuk kamu di atas bumi itu penghidupan buat kamu, tetapi sedikit sekali di antara kamu yang bersyukur.”
Untuk apa kita dihidupkan di bumi ini? Dalam banyak ayat, dinyatakan ALLAH bahawa manusia diberikan kehidupan, “ …untuk Kami uji siapa paling baik amalnya”.

Bagi seorang Muslim, dunia bukanlah suatu tujuan hidup, melainkan hanyalah sekadar alat atau jambatan untuk menuju tujuan hidup yang kekal abadi, iaitu kehidupan akhirat kelak. Bahkan dalam hadith, Rasulullah menyatakan bahawa keikhlasan pun dapat ternoda, dijelaskannya: “Yang mencampuri keikhlasan itu adalah kerakusan terhadap dunia dan mengumpul-ngumpulka nnya.”

Kedua, tidak berlebihan-lebihan dengan dunia.
ALLAH telah menyatakan dengan jelas tentang kecenderungan manusia ini, “dan kamu mencintai harta benda dengan kecintaan yang berlebihan.” (Surah al-Fajr 89: 20)

Maka Islam mengatur sikap seorang Muslim terhadap kehidupan dunia, iaitu mempergunakan secara secukupnya untuk keperluan diri dan keluarga, asal tidak berlebihan dan bermewah-mewahan kerana perkara itu akan melalaikan kita. Firman-Nya: “Al hakumut takaatsur.” (bermegah-megah telah melalaikan kamu).

Sementara dalam ayat yang lain dinyatakan: “Makanlah di antara rezeki yang baik yang telah Kami berkan kepadamu, dan jangalah melampaui batas padanya, yang menyebabkan kemurkaan menimpamu. Dan barangsiapa ditimpa oleh kemurkaan-Ku, maka sesungguhnya binasalah dia.” (Surah Thaha 20: 21).

Rasulullah SAW pun pernah bersabda: “Kami adalah kaum yang tidak makan sebelum merasa lapar dan bila kami makan tak pernah kekenyangan.” (Riwayat Bukhari & Muslim).

Ketiga, tidak bersifat kikir dan bakhil.
Sebaliknya, ALLAH memuji hamba-Nya yang mejauhi kikir dalam firman-Nya, “Dan orang-orang yang apabila membelanjakan (harta), mereka tidak berlebih-lebihan, dan tidak (pula) kikir, dan adalah (pembelanjaan itu) di tengah-tengah antara yang demikian.” (Surah al-Furqan 25: 67)

Keempat, mengutamakan kesederhanaan dan berikap qanaah.
Dari Abu Hurairah, diriwayatkan bahawa Rasulullah SAW bersabda: “Lihatlah orang yang di bawahmu, dan jangan melihat orang yang di atasmu, kerana yang demikian itu lebih baik, supaya kamu tidak meremehkan nikmat yang dikurniakan ALLAH kepadamu” (Riwayat Bukhari & Muslim)

Mari kita mengambil teladan pada Nabi Yusuf as., dia mendapat kepercayaan dari Raja Mesir untuk mengatur seluruh kekayaan negara, tetapi dia sendiri hampir tiap hari berpuasa. Ketika orang bertanya, dia menjawab, “Aku takut kenyang dan melupakan orang yang lapar.”

Zuhud, Pola Hidup Rasulullah s.a.w Dan Para Sahabatnya

Zuhud, bererti menjauhi hal-hal yang bersifat materi, atau senangnya, pola hidup sederhana. Dengan pola hidup zuhud inilah, para sahabat menjalani kehidupannya. Bila kita merasakan kehidupan akhirat dan tidak terpukau oleh kehidupan dunia, seperti para sahabat, maka kita akan terbebas dari hidup yang menyesakkan. Kita akan memiliki cara pandang baru terhadap dunia. Jika kita merasa sesak, sedih, murung, gelisah, pedih, dirisaukan oleh orang banyak masalah nyata ataupun khayal, maka dengan zuhud kita dapat melaluinya.

Secara ringkas, zuhud bererti meletakkan kebahagiaan bukan pada dunia dan keduniaan, Zuhud memiliki ciri-ciri:
tidak menggantungkan kebahagiaan hidup pada apa yang dimiliki.
kebahagiaan seorang yang zuhud tidak terletak pada hal-hal material, melainkan pada hal-hal spiritual.

Zuhud bukanlah bererti meninggalkan dunia dan kenikmatan duniawi, melainkan tidak meletakkannya pada darjat yang tertinggi, seperti dinyatakan Rasulullah, “Bukanlah zuhud itu mengharamkan yang halal, bukan pula menyia-nyiakan harta, tetapi zuhud dalam dunia itu ialah engkau tidak memandang apa yang ada di tanganmu itu lebih diperlukan dari apa yang ada di sisi ALLAH SWT.”

Buah lain dari zuhud adalah mendekatkan hati kita kepada ALLAH dan manusia, begitupun sebaliknya, ALLAH pun mencintai kita, dan hati manusia pun akan dekat kepada kita. Diriwayatkan oleh Ibnu Majah, bahawa seorang lelaki pernah mendatangi Rasulullah dan bertanya, “Wahai Rasulullah, tunjukilah aku pada suatu amal yang bila aku kerjakan, aku dicintai ALLAH dan dicintai manusia.” Lalu Rasulullah bersabda, “Zuhudlah kamu akan dunia, pasti ALLAH mencintaimu. Zuhudlah engkau akan apa yang ada pada manusia, pasti manusia mencintaimu.”
ReFOG KeyLogger : Xpress way of Hacking

 

Who Is It Refog KeyLogger?

Parents worldwide use Refog Keylogger to look after their family members, teenage kids and spouses. Refog Keylogger has everything that’s included into the Free Keylogger, and adds a few valuable features that make Refog Keylogger ideal for family use. Not only can it intercept keystrokes, in addition, the computer surveillance tool logs full screenshot history of what was happening on your PC. It can also record all Web sites visited by your family members, and log all applications they used.

FEATURES :

Invisible and Undetectable

Unlike Free Keylogger that always displays an icon beside system clock, Refog Keylogger can run completely undetected and fully invisible. Even computer-savvy teenagers won’t be able to tell whether it’s running without knowing your Master Password, nor can they stop or uninstall the monitor.

Family-Friendly

Refog Keylogger is ideal for family use. Download your copy, double-click to install, set your Master Password and leave it - Refog Keylogger will do the rest completely automatically. You can leave it running 24x7 with zero maintenance.

Zero Maintenance with Automatic Updates

Refog Keylogger requires no regular maintenance. It can even update itself automatically by periodically checking for a new version, downloading and installing updates the moment they are released. Regular automatic updates help ensure optimal performance and tightest security of your PC.

What’s Recorded

Refog Keylogger logs all key presses and keystrokes typed on your PC, and saves any text pasted from the clipboard. Thanks to periodic screen captures, you will have access to fully illustrated usage history of your PC. Refog Keylogger can also, track Web sites and resources visited by your family members, and log all applications launched on your computer.

Protected with Master Password

Your Master Password is always required to make changes to Refog Keylogger. No one can uninstall, block or circumvent Refog Keylogger monitoring without knowing your password. Without the password, it’s even impossible to tell whether or not Refog Keylogger is running!

Download Your Copy

Download your free evaluation copy of Refog Keylogger today and see what your family members do online and offline. Refog Keylogger works great with all modern Windows OS releases: Windows XP®, Windows Vista®, Windows 7®.
Labels: 1 comments | edit post
Folder Guard : Secure Ur File in Public PC
 
Folder Guard® is a powerful computer security software that you can use to control access to files, folders, and other Windows resources, such as Control Panel, Start Menu, and so on. You can use Folder Guard to lock your personal files and folderswith passwords, to stop other users from peeking into your records. You can even completely hide your private folders from virtually all applications, and such folders would remain invisible until you enter a valid password. You can also protect sensitive system files from modification or destruction, disable access to the removable drives, restrict access to Control Panel, and more.

Why should you choose Folder Guard:


Folder Guard lets you password protect your files and folders.

You can protect with password virtually any folder or file, allowing only the authorized users to open the protected files or folders. You can protect an unlimited number of files and folders, each with its own password, or you can use the Master Password of Folder Guard to unprotect them all at once.

Folder Guard can hide your personal folders from other users.

You can set up Folder Guard to hide your private folders (or make them appear empty). The folder would be hidden from virtually any program, including Windows Explorer, Office, MS-DOS programs, etc.

Folder Guard can restrict access to Control Panel, Start Menu, Desktop, etc.

You can set up Folder Guard to allow only certain users to change the computer settings with Control Panel, while denying that to other users. You can control access to various settings of Start Menu, Desktop, Taskbar, and other Windows resources. You can remove the Run and Search commands on the Start menu, hide specific drives, lock the Internet settings, and more.

Folder Guard can protect access to the floppy, CD-ROM and other removable drives

You can configure Folder Guard to allow or deny access to the removable drives, restricting the user's ability to run or install unauthorized programs on your computer.

Folder Guard is suitable for a wide range of the computer security tasks.

You can stop other users of your computer from peeking into your personal files. You can protect the system files and folders from destruction by cyber-vandals. You can allow specific users to run a program while deny it to others. You can allow users to use the removable drives to store their documents while prevent them from running unauthorized programs from the removable disks. The possibilities are endless:How to:

Folder Guard protects your files without encrypting them.

There is no risk of losing your documents if you lose your encryption key: with Folder Guard all your files remain intact, without modification of any kind.

Folder Guard lets you quickly enable or disable the protection via a "hot key".

You can choose a specific keyboard combination as the hot key of Folder Guard, to be able to quickly enable or disable the protection of your computer. Of course, the "hot key" is protected with your password, too, only you can use it!

Folder Guard can operate in the "stealth mode".

You can set up Folder Guard to operate in the stealth mode, to hide its own files and shortcuts from being seen by other users. You would still be able to control Folder Guard via the "hot key".

Folder Guard supports easy recovery in case of emergency.

If you forget your password, or experience other problems, simply use theEmergency Recovery Utility (free download) to quickly restore access to your protected folder.

Folder Guard works with drives of any format.

If your computer can handle it, Folder Guard can protect it. You don't have to format your hard drive with the NTFS file system: Folder Guard can protect files and folders on both NTFS and FAT/FAT32 disks.

Folder Guard runs on a wide range of Windows platforms.

From Windows 2000 to Windows XP to Windows 7 and later, with all service packs and hotfixes, all are supported by Folder Guard.

Folder Guard is easy to use.

Folder Guard sports one of the most intuitive user interfaces, that makes it easy to use for both novice users and computer professionals.

Folder Guard "speaks" plain English.

You don't have to be a computer professional to understand how to use Folder Guard. The Quick Start Wizard can guide you through the steps necessary to set up the password protection of your personal folders. Folder Guard Advisor warns you about situations that may require your attention and offers possible workarounds. Folder Guard User's Guide describes its commands and operation in plain English, without "pseudo-techno" or "geeky" talk. (And it does not baby-sit you either).

Folder Guard is not a toy.

Folder Guard is used by large corporations and small businesses, schools and police departments, universities and correctional facilities, libraries and hospitals (to name a few).

Folder Guard is widely used.

Hundreds of thousands of copies of Folder Guard have been downloaded by computer users from virtually all countries of the world.

Folder Guard offers the best value for the money.


Folder Guard is flexible.

Although Windows lets you restrict access to folders located on a NTFS drives, it cannot hide them. With Folder Guard, you can not only restrict access to, but also hide folders, or make them look empty. Unlike Windows, Folder Guard lets you protect only some files within a folder, and keep the rest of the files visible and accessible, if you wish. Or, you can protect files and folders each with its own individual password, and then unlock them separately from each other (Windows cannot do that).

Folder Guard can be used with other disk tools.

You can designate your anti-virus and other disk maintenance tools to be the "trusted" programs, to make them able to work with your protected disks without restrictions.

Folder Guard is extensible.

You can fine-tune the access rules to the files and folders of your computer by creating appropriate filters.

Folder Guard will save you hours of learning time.

You don't have to learn how to use the Group Policies, user groups, Access Control Lists, privileges, and other built-in security features of Windows, because Folder Guard does the hard work for you: its visual and intuitive user interface lets you manage the restrictions with ease.

Folder Guard is enterprise-ready.

For the corporate customers we offer a separate build of Folder Guard that does not require license validation over the Internet. The Folder Guard Administrator's Kit contains the installation files in both the EXE and MSI formats, allowing the system administrators to quickly deploy Folder Guard to a large number of computers. The Kit also contains a Group Policy template that you can use to automatically deliver the license key to a large number of the client computers.

Folder Guard is actively maintained.

Since its first release back in 1997, we've been continuously extending, enhancing, and improving Folder Guard. Now in version 8.2, Folder Guard gives you more power than ever.
Labels: 0 comments | edit post
BACKDOOR : ALTERNATIVE WAY OF HACKING

This time, i would like to share a new lesson of hacking..It's a backdoor. The example of backdoor program is SubSeven. A software that use to steal information and control all the authorities of other Personal Computer. Download SubSeven Sub7 Client Server Program Backdoor Full Download

By the way,Sub 7 is a backdoor trojan horse that you can connect to a victims computer. Download it at the download center.

Here our 2 tutoirlas
The first one will tell you how to use it
The second one will tell you how to give the vicitm the virus.
READ BOTH IF YOU WANT TO KNOW HOW TO USE SUB7!!!

This tutorial will include:


1) Contents of the SubSeven 2.1.5 Package
2) Explanation of the files
3) How to configure a server.exe properly using Editserver.exe
4) The features of SubSeven 2.1.5 and what they do



This package includes:

1) SubSeven.exe (CLIENT)
2) server.exe (SERVER)
3) EditServer.exe
4) ICQMAPI.DLL*

The Features of SubSeven 2.1.5


**) New Feature: under "Local Options - Advanced" section of the
client theres a button "Test on Local Machine" which runs the server
with special restrictions (accepts localhost connections only)


1) Connection:

A) IP Scanner - Scans for IPs with an open port you specify
B) Get PC Info - All PC info, including Disk Size, Space, User etc
C) Get Home Info - Gets all Home Info the vic specifies for their
Windows Registration ( not always availible)
D) Server Options - Options pertaining to removing, changing port,
updating server, etc.
E) IP Notify - Adds a new notify method or changes the current
method on the current server

2) Keys/Messages:

A) Keyboard - Open Keylogger, get offline keys, disable keyb. etc
B) Chat - Chat with the Victim
C) Matrix - Chat with the vic matrix style (black & green design)
D) Message Manager - Sends a popup message to the vic
E) Spy - ICQ, AIM, MSN, YAHOO Instant Messenger Spies
F) ICQ Takeover - displays all installed UINs on the pc, and u can
take each one over at the click of a button

3) Advanced:

A) FTP/HTTP - turns the vic into an FTP server, ready for files to
be downloaded via ur FTP client or browser
B) Find Files - searches for a specified file type or file in the
vics pc
C) Passwords - retrieves Cached, Recorded, RAS, and ICQ/AIM Passes
D) RegEdit - Opens the vics Registry so u can fuck with it >:)
E) App Redirect - Lets you run a DOS command on the vic and shows
you the output
F) Port Redirect - adds an open port to the vic so you can "bounce"
from it using the vics host as your own, E.G.: proxy type of
contraption via IRC

4) Miscellaneous:

A) File Manager - Upload, Download, Run, and do alotta other cool
shit via this client
B) Windows Manager - Displays open windows which you can close,
disable, etc.
C) Process Manager - Shows all processes you can kill, disable,
prioritize etc.
D) Text-2-Speech - Messes with the Text2Speech engine on the vics
pc, you type, it talks
E) Clipboard Manager - View, change, empty the vics clipboard
F) IRC Bot - Connects an IRC bot from the vic to an IRC server of
choice

5) Fun Manager:

A) Desktop/Webcam - Views Webcam continuous capture, a desktop
continuous preview and full screen capture
B) Flip Screen - Flips victims screen upside down, and sideways
C) Print - Prints on victims screen
D) Browser - Opens victims browser with the webpage you specify
E) Resolution - Changes victims pc resolution
F) Win Colors - Changes the victims computer colors

6) Extra Fun:

A) Screen Saver - Changes the Vics Screensaver
B) Restart Win - Shuts down, reboots, or logs off the victim
C) Mouse - Set Mouse trails, reverse buttons, hide curson etc
D) Sound - Record from vics mic, change volume settings
E) Time/Date - Changes system time
F) Extra - A whole buncha extra shit like hide desktop, hide start
button, hide taskbar, open cd-rom etc.

7) Local Options:

A) Quality - Adjusts the quality of the Webcam/Desktop
B) Local Folder - Changes the Sub7 Local Folder
C) Skins - Skin manager for Sub7
D) Misc Options - Misc shit like toggling animation of windows etc
E) Advanced - Messes with ports used for some Sub7 Functions Dont
bother messing around
F) Run EditServer - Hmm..i wonder what this does...

How to give your victim Sub7 ??????

First try and get a victim on ICQ as you can get there IP address straight

away! Now once you have found someone, just chat to them and find out if

they have a virus scanner [if so check the below paragraph, if not just jump

that paragraph] don't jump straight into it first just give them easy

questions like "A/S/L, how are you, Do you have a pic"

then ask them about the Virus Scanner, if they say why just say becuase

about all the worms and viruses on the net, your just wondering what they

are using as you might get some! now once you know that you are ready to

give them the trap!

================================

How to disable the Virus Scanner ????????

================================



There are two ways:

1] this si the easy way, you find out what virus scanner they use, then find

the apporpriate "DAT Killer.exe" you can say it's a pic, or even a patch you

kno about for the virus scanner they have! Once they have clicked on it then

the Virus Scanner is F***ed! Now just say you have [another] pic for them

that you hope will work! or course it's the sub7 server you have created

[remember to change the icon to the Paint Shop Pro Pallet icon] now once

they double click on it "bang!" they are caught!

2] Just give them the server straight away as a pic, once they say it's a

Virus. Blag your way around it. Say it must of become corrupt! on the

download but it should still work!

==================================

How to connect ???????

==================================

Ok now you've done the hard part of giving them the Sub7 server saying it's

a pic [remember to change the icon to the Paint Shop Pro Pallet icon]! now

go into Sub7 and click on the IP button type on the line that says "ICQUIN"

type the victims ICQ number, then press "resolve UIN" and it will give you

there IP number, go back to the main screen and put in the IP on the "IP/UIN

box" now in the box next to that put in the port you set the server to

[27374 is the default] now click connect and your should be in!



Have fun!
Labels: 0 comments | edit post
SQL injection


What is SQL Injection
SQL injection refers to the act of someone inserting a MySQL statement to be run on your database without your knowledge. Injection usually occurs when you ask a user for input, like their name, and instead of a name they give you a MySQL statement that you will unknowingly run on your database.

SQL Injection Example
Below is a sample string that has been gathered from a normal user and a bad user trying to use SQL Injection. We asked the users for their login, which will be used to run a SELECT statement to get their information.


MySQL & PHP Code:// a good user's name
$name = "timmy";
$query = "SELECT * FROM customers WHERE username = '$name'";
echo "Normal: " . $query . "
";
// user input that uses SQL Injection
$name_bad = "' OR 1'";
// our MySQL query builder, however, not a very safe one
$query_bad = "SELECT * FROM customers WHERE username = '$name_bad'";
// display what the new query will look like, with injection
echo "Injection: " . $query_bad;



Display:
Normal: SELECT * FROM customers WHERE username = 'timmy'Injection: SELECT * FROM customers WHERE username = '' OR 1''
The normal query is no problem, as our MySQL statement will just select everything from customers that has a username equal to timmy.
However, the injection attack has actually made our query behave differently than we intended. By using a single quote (') they have ended the string part of our MySQL query
username = ' '
and then added on to our WHERE statement with an OR clause of 1 (always true).
username = ' ' OR 1
This OR clause of 1 will always be true and so every single entry in the "customers" table would be selected by this statement!


More Serious SQL Injection Attacks
Although the above example displayed a situation where an attacker could possibly get access to a lot of information they shouldn't have, the attacks can be a lot worse. For example an attacker could empty out a table by executing a DELETE statement.
MySQL & PHP Code:$name_evil = "'; DELETE FROM customers WHERE 1 or username = '";
// our MySQL query builder really should check for injection
$query_evil = "SELECT * FROM customers WHERE username = '$name_evil'";
// the new evil injection query would include a DELETE statement
echo "Injection: " . $query_evil;
Display:
SELECT * FROM customers WHERE username = ' '; DELETE FROM customers WHERE 1 or username = ' '
If you were run this query, then the injected DELETE statement would completely empty your "customers" table. Now that you know this is a problem, how can you prevent it?

For more info, please visit http://www.tizag.com/
Labels: 0 comments | edit post
SQL injection
login 1'or'1'='1


Labels: 0 comments | edit post
Fiber optic


• SPEED: Fiber optic networks operate at high speeds - up into the gigabits
• BANDWIDTH: large carrying capacity
• DISTANCE: Signals can be transmitted further without needing to be "refreshed" or strengthened.
• RESISTANCE: Greater resistance to electromagnetic noise such as radios, motors or other nearby cables.
• MAINTENANCE: Fiber optic cables costs much less to maintain.

Fiber Optic types :

Single Mode cable is a single stand (most applications use 2 fibers) of glass fiber with a diameter of 8.3 to 10 microns that has one mode of transmission. Single Mode Fiber with a relatively narrow diameter, through which only one mode will propagate typically 1310 or 1550nm. Carries higher bandwidth than multimode fiber, but requires a light source with a narrow spectral width. Synonyms mono-mode optical fiber, single-mode fiber, single-mode optical waveguide, uni-mode fiber.

Single Modem fiber is used in many applications where data is sent at multi-frequency (WDM Wave-Division-Multiplexing) so only one cable is needed - (single-mode on one single fiber)

Single-mode fiber gives you a higher transmission rate and up to 50 times more distance than multimode, but it also costs more. Single-mode fiber has a much smaller core than multimode. The small core and single light-wave virtually eliminate any distortion that could result from overlapping light pulses, providing the least signal attenuation and the highest transmission speeds of any fiber cable type.

Single-mode optical fiber is an optical fiber in which only the lowest order bound mode can propagate at the wavelength of interest typically 1300 to 1320nm.


Multi-Mode cable has a little bit bigger diameter, with a common diameters in the 50-to-100 micron range for the light carry component (in the US the most common size is 62.5um). Most applications in which Multi-mode fiber is used, 2 fibers are used (WDM is not normally used on multi-mode fiber). POF is a newer plastic-based cable which promises performance similar to glass cable on very short runs, but at a lower cost.

Multimode fiber gives you high bandwidth at high speeds (10 to 100MBS - Gigabit to 275m to 2km) over medium distances. Light waves are dispersed into numerous paths, or modes, as they travel through the cable's core typically 850 or 1300nm. Typical multimode fiber core diameters are 50, 62.5, and 100 micrometers. However, in long cable runs (greater than 3000 feet [914.4 meters), multiple paths of light can cause signal distortion at the receiving end, resulting in an unclear and incomplete data transmission so designers now call for single mode fiber in new applications using Gigabit and beyond.
Labels: 0 comments | edit post
IP Address
1) An IP address is an identifier that is assigned at the Internet layer to an interface or a set of interfaces. Each IP address can identify the source or destination of IP packets.

2) 2 types of IP address :

* Public IP address

Public IP Addresses (also known as Static IP Addresses) are IP addresses that are visible to the public.Because these ip addresses are public, they allow other people to know about and access your computer, like a Web server.

* Private IP address

These addresses can be used on a private network, but they’re not routable through the public Internet. This not only creates a measure of much-needed security, but it also conveniently saves valuable IP address space.

RFC 1918 defines the following address prefixes for the private address space:

*

10.0.0.0/8 (10.0.0.0, 255.0.0.0)

Allows the following range of valid IPv4 unicast addresses: 10.0.0.1 to 10.255.255.254. The 10.0.0.0/8 address prefix has 24 host bits that you can use for any addressing scheme within a private organization.
*

172.16.0.0/12 (172.16.0.0, 255.240.0.0)

Allows the following range of valid IPv4 unicast addresses: 172.16.0.1 to 172.31.255.254. The 172.16.0.0/12 address prefix has 20 host bits that you can use for any addressing scheme within a private organization.
*

192.168.0.0/16 (192.168.0.0, 255.255.0.0)

Allows the following range of valid IPv4 unicast addresses: 192.168.0.1 to 192.168.255.254. The 192.168.0.0/16 address prefix has 16 host bits that you can use for any addressing scheme within a private organization.



3) Example of IP address :

The IPv4 address 11000000101010000000001100011000 is expressed as 192.168.3.24 in dotted decimal notation. To convert an IPv4 address from binary notation to dotted decimal notation, you:

*

Segment it into 8-bit blocks: 11000000 10101000 00000011 00011000
*

Convert each block to decimal: 192 168 3 24
*

Separate the blocks with periods: 192.168.3.24

For more information, please visit at http://technet.microsoft.com/en-us/library/bb726995.aspx
Subnetting
i) Subnetting is a set of techniques that you can use to efficiently divide the address space of a unicast address prefix for allocation among the subnets of an organization network.
ii)The fixed portion of a unicast address prefix includes the bits up to and including the prefix length that have a defined value. The variable portion of a unicast address prefix includes the bits beyond the prefix length that are set to 0.
iii)Example of subnet : 131.107.192.0/18 (Class B)
The key information in this chapter is the following:

*

Subnetting is a set of techniques that you can use to efficiently allocate the address space of one or more unicast address prefixes among the subnets of an organization network.
*

To determine the subnet prefix of an IPv4 address configuration in prefix length notation (w.x.y.z/n), retain the n high-order bits, set all the remaining bits to 0, and then convert the result to dotted decimal notation. To determine the subnet prefix of an IPv4 address configuration in subnet mask notation, perform a bit-wise logical AND between the IPv4 address and its subnet mask.
*

When determining the number of host ID bits in an IPv4 address prefix to use for subnetting, choose more subnets over more hosts per subnet if you have more possible host IDs than are practical to use on a given subnet.
*

To subnet an IPv4 address prefix, use either binary or decimal methods as described in this chapter to enumerate the subnetted address prefixes and the ranges of usable IPv4 addresses for each subnet.
*

Variable length subnetting is a technique of creating subnetted IPv4 address prefixes that use prefix lengths of different sizes.
*

To subnet an IPv6 global address prefix, use either hexadecimal or decimal methods as described in this chapter to enumerate the subnetted address prefixes
Labels: 0 comments | edit post
TCP/IP, SUBNET N IP ADDRESS
Transmission Control Protocol / Internet Protocol (TCP/IP)

  • Computer network protocols created in the 1970's by DARPA,an agency of the United States Departmet.
  • TCP/IP is a network protocols that enable computers to communicate over network.
  • Its provide end-end connectivity specifying how data should formatted,addressed,transmitted,routed and received at the destination.
  • TCP/IP Layer
  • i) Link Layer
    +networking scope of the local network connection to which a host is attached
    +The processes of transmitting and receiving packets on a given link can be controlled both in the software device driver for the network card
    ii) Internet Layer
    +solves the problem of sending packets across one or more networks.this process is called routing.
    +performs 2 basic functions (Host addressing and identification and Packet routing)
    iii) Transport Layer
    +End-to-end message transfer capabilities independent of the underlying network, along with error control, segmentation, flow control, congestion control, and application addressing (port numbers).
    iv) Application Layer
    +refers to the higher-level protocols used by most applications for network communication.

Labels: 0 comments | edit post
  • About Me

    @-->WhaT uR wAnt NoE AbouT mE??___
    @-->AbOuT mE = aSk mE + FolloW mE_xP WekKz___
    @-->Don’T NoE AiGht,Let’s OpEn uR eYeS WitHoUt uR mInd & I tEll You___
    @-->mA name iS iKrAm____
    @-->mA fWenz AlSo Call mE am_dorian tPi xsRuPe Deyh____
    @-->I’m 22 YeaRs olD____
    @-->mA beStdaY oN 10/Oc/1989_cApRi____
    @-->I’m SimPle Guy WitH SimpLe LiFe N SimPly WhiTe~LikE NaSi LEmaK~! heHeh=)____
    @-->I doN’t LikE SmoOkiNg yAwW_yE ker?? SomeTimE “^_^____
    @-->N nEvEr tAke alCoholiC DriNks____
    @-->alwAy’s TenSiaL AbOut mA sTudy sUcH java@ Coding & Coding & Coding; De SubJek PosiNg2___
    @-->Errm...HepPy goOd LucKy____
    @-->vErY CheEky bUt litTle biT nAughTy^^ ____
    @-->I LikE meeting Up 4 DinNer___
    @-->mA fAv aCtiVitiEs~hElpiNg sOmeoNe tHat I TruSt___
    @-->i’M hUngRy Not 4 DrinKs bUt 4 SucCeSs,HonEstly & ♥~ahAhakz =) ____
    @-->I ValuE fRieNdsHip a Lot ____
    @-->WhaTeVEr gUy @ GurlZ tHat I NoE...____
    @-->LasTly I h8 PeoPle Who aRe sElfiSh,Ego & BusY bOdy...!!

    Followers