Content feed Comments Feed

How To install Windows XP

You have a computer at home. You most probably have a Windows installed on it. Most likely Windows XP. And you have probably bought it with the operating system installed by the technician at the store. Have you ever wondered what it's like to install the operating system yourself?

10 Free Apps for Managing Your Fonts

If you’re a designer or web developer, you probably have a large font collection. Having a sizable number of fonts can make finding the ideal font for a project a grueling effort, akin to a needle in a haystack scenario. However, there are several free applications that can help you find, categorize, tag, preview, and install/uninstall your fonts. In this article, you’ll find free applications that will help your better manage your font collection.

Myxpitstop.com

Myxpitstop your ONE stop online portal. Feel free to browse around. Read News and Articles collection from around the Globe...you're truly one pitstop......
CahayaBiru.com

The Hunchback of Notre Dame

Posted by kerex Sunday, December 27, 2009

The 1923 film version of The Hunchback of Notre Dame, starring Lon Chaney as Quasimodo and Patsy Ruth Miller as Esmeralda, and directed by Wallace Worsley, is the most famous adaptation of Victor Hugo's novel The Hunchback of Notre Dame, aside from the 1996 Disney Adaptation. The film was Universal's "Super Jewel" of 1923 and was their most successful silent film, grossing over three-million dollars.

The film is most notable for the grand sets that recall 15th century Paris as well as Lon Chaney's performance and spectacular make-up as the tortured bell-ringer of Notre Dame. The film elevated Chaney, already a well-known character actor, to full star status in Hollywood. It also helped set a standard for many later horror films, including Chaney's The Phantom of the Opera in 1925. Today, the film is in the public domain.

A script is currently being drawn up for a proposed remake funded by Dimension Films for a 2013 release.


Bahaya Hutang

Posted by kerex

Motivasi Dato' Dr Fadzilah Kamsah perihal hutang, permasalahan hutang, cara mengatasi dan doa2 lindungi dari beban hutang.










Puteri

Posted by kerex

Filem ini diterbitkan pada tahun 1987 dan diarahkan oleh Dato Rahim Razali. Filem ini dibintangi oleh Ogy Ahmad Daud,Eman Manan,Datuk Ahmad Tamimi Siregar,Erma Fatima,Ahmad Marbawi,Marlia Musa,Dato' Haji Rahim Razali










Mikropemproses

Posted by kerex

Pentium yang dikeluarkan pada tahun 1993, merupakan mikropemproses generasi kelima keluaran syarikat gergasi pengeluar mikropemproses iaitu Intel.

Intel Pentium

Pentium adalah mikropemproses pertama keluaran Intel yang boleh memproses maklumat dalam 32 bit serentak. Ia mengandungi 3.3 juta transistor yang melakukan kerja - kerja memproses pada berbagai kelajuan. Diantara kelajuan - kelajuan pada mana mikropemproses ini boleh di dapati ialah 60, 66, 75, 100, 120, 133, 150, 166 dan 200 MHz. Pentium adalah cip mikropemproses yang pertama dimasukkan dengan ciri - ciri RISC atau Reduced Instruction Set Computing. Melalui ciri ini pemprosesan maklumat oleh mikropemproses dijadikan lebih ringkas agar ianya boleh dijalankan dengan lebih pantas. Lihat Daftar Kata untuk penerangan lebih terperinci berkenaan RISC.

Pada tahun 1995, Intel mengeluarkan cip Pentium Overdrive bagi mesin-mesin yang mempunyai cip 80486 tetapi inginkan kuasa pemprosesan Pentium. Melalui sistem ini Papan induk komputer tersebut harus mempunyai soket khas bagi menerima cip Pentium dan pada masa yang sama menggunakan cip 486-nya yang lama. Teknologi ini seperti semua orang sedia maklum hanyalah satu teknologi peralihan bagi mendapatkan lebih ramai orang menggunakan cip Pentium.

Pada tahun yang sama cip Pentium Pro diperkenalkan kepada dunia. cip Pentium Pro dikatakan adalah cip generasi baru bagi Intel dan berkebolehan "lari" pada kelajuan 150, 166, 180 dan 200 MHz - satu kelajuan yang tidak begitu tinggi kerana kelajuannya adalah sama dengan kelajuan Pentium Overdrive tetapi menggunakan lebih banyak transistor - iaitu sebanyak 5.5 juta semuanya! Kelebihan Pentium Pro sebenarnya terselindung. Ini kerana kemajuannya terletak pada struktur litarnya yang mempunyai ciri-ciri superpipelining, dynamic execution dan kehadiran ingatan cache peringkat kedua (L2) di dalam mikropemproses itu sendiri. Semua cip sebelum ini menggunakan ingatan cache peringkat kedua dari luar cip berkenaan. Pentium Pro membawa ingatan ini masuk ke dalam sistem mikropemprosesnya sendiri.

Dua tahun setelah pengeluaran Pentium Pro, Intel mengeluarkan cip Pentium Pro MMX. Singkatan MMX seringkali dikatakan bermaksud Multi Media eXtensions. Pentium Pro MMX tidak memberikan pengguna satu cip yang lebih laju. Kelebihannya terletak pada kebolehannya memproses maklumat multimedia seperti bunyi, suara, video dan grafik dalam bentuk digital. Sebelum MMX kesemua maklumat digital ini diproses oleh kad-kad multimedia khusus yang dipasangkan pada Papan Induk. Kad-kad ini dikeluarkan oleh pihak ketiga dan diantaranya adalah seperti Kad monitor dan kad bunyi. Kad monitor memproses grafik dan video sementara kad bunyi memproses bunyi, suara dan muzik. Intel telah sekali lagi mengabungkan teknologi kad-kad ini ke dalam cip mikropemprosesnya.

Namun kebolehan cip MMX ini hanyalah terserlah apabila arahan-arahan khas tertulis untuknya oleh penulis perisian-perisian komputer. Perisian-perisian komputer yang mempunyai arahan khas untuk mengambil kesempatan atas teknologi MMX ini dikatakan perisian sedia - MMX. Perisian-perisian yang dikeluarkan sebelum adanya MMX tidak boleh menggunakan teknologi ini dan oleh itu tidak bermanafaat dari keujudannya.

Teknologi yang tiba selepas itu dari pengeluar gergasi Intel adalah Pentium II. Dikeluarkan pada tahun 1999, Pentium II dibina atas struktur yang sama dengan Pentium Pro tetapi ditambahkan lagi 2 juta transistor yang menjadikan semuanya kini 7.5 juta transistor. Pentium II boleh didapati dalam versi dengan kelajuan 233, 266, 300 dan 333MHz. Versi-versi yang lain mungkin akan keluarkan. Pentium II adalah cip mikropemproses yang terbesar dari segi saiznya yang pernah dikeluarkan.
Bentuknya juga berlainan iaitu berupa segiempat bujur dibandingkan dengan bentuk hampir segiempat sama cip-cip sebelumnya. Saiznya yang besar melambangkan kebolehan tambahannya yang diantaranya ialah:-

* Struktur arkitek Dual Independent Bus atau DIB
* Ingatan Cache Peringkat Pertama (L1) sebanyak 32Kilobyte dan ingatan cache Peringkat Kedua (L2) sebanyak 512Kilobyte. Kedua-dua ingatan cache ini disepadukan ke dalam litaran cip elektronik tersebut.
* Kebolehan memproses MMX


Kesemua cip-cip mikropemproses Intel sebelum Pentium digelar dengan nombor mereka seperti 80286, 80386 dan 80486. Akibat dari penggunaan nombor-nombor ini oleh penyaing Intel seperti AMD, Intel telah berusaha untuk mendapatkan perintah mahkamah bagi menyatakan bahawa nombor-nombor tersebut harus diberikan perlindungan hakcipta.

Tetapi Intel gagal di dalam usahanya dan terpaksa mencari jalan lain. Intel kemudian dikatakan telah mengupah satu agensi penamaan sebanyak berjuta dollar Amerika untuk mencari nama yang sesuai bagi cip mikropemproses generasi yang kelimanya. Kononnya setelah berbulan - bulan membuat kaji selidik, agensi itu mengemukakan nama tersebut: Pentium! "Pentium" diambil dari nama Yunani Pent bagi nombor 5 dan "ium" adalah sambungan biasa. Sehingga lewat dekad ke 80an, Intel sering dianggap pengeluar tunggal cip mikropemproses bagi kegunaan industri komputer. Namun tahun-tahun 90-an melihat kemunculan syarikat yang memberikan cabaran sengit kepada Intel.

Syarikat-syarikat ini mengeluarkan cip yang setanding dari segi fungsi tetapi sering pada harga yang lebih rendah dan juga sering mempunyai prestasi yang lebih dari cip-cip Intel. Dua dari syarikat yang berhasrat menggugat kedudukan "maharaja" Intel ialah AMD dan Cyrix. Mari kita berkenalan sedikit dengan mereka.

AMD K6

K6 adalah nama kepada cip mikropemproses dari AMD atau Advance Mikro Devices. Cip mikropemproses K6 adalah 100% bersesuaian dengan cip Pentium dari Intel. Jadi pengguna komputer boleh menggunakan komputer yang dikuasai oleh K6 untuk melaksanakan semua perisian - perisian kegemarannya.

Selain dari kesesuaiannya dengan cip Pentium, K6 juga mempunyai teknologi MMX dan walaupun adalah 20% lebih kecil dari cip Pentium, ia mempunyai 3 juta transistor lebih dari Pentium (iaitu 8.5 juta transistor dibandingkan dengan 5.5 pada Pentium).

Dalam kebanyakan ujian prestasi yang dijalankan, K6 dikatakan mengatasi Pentium dari berbagai segi. Harganya yang rendah juga menjadikannya pilihan kepada pembuat komputer yang ingin menjaga kos pengeluaran mereka.

Cyrix 6x86

Cyrix adalah satu lagi pengeluar cip mikropemproses yang bersesuaian dengan cip Pentium Intel. Jawapan kepada cabaran Pentium dari Cyrix adalah cip 6x86 dimana x digantikan dengan nombor generasi cip berkenaan.

Cip-cip keluaran Cyrix juga dikatakan mempunyai teknologi yang setanding dengan Pentium dan prestasi yang lebih baik pada harga yang lebih rendah. Walaupun Intel mendapat cabaran sengit dari AMD dan Cyrix, kedudukannya sebagai pengeluar No.1 cip mikropemproses tidak pernah tergugat.

Ini kerana walaupun AMD dan Cyrix boleh mengeluarkan cip yang lebih berkualiti dan murah hanya Intel sahajalah yang dapat memenuhi permintaan sedunia bagi cip mikropemproses komputer. Berdasarkan keyakinan ini Intel terus membesar seperti yang dapat dilihat dari pembukaan kilangnya yang terbaru di kawasan perindustrian teknologi tinggi di Kulim, Kedah.
Selain dari itu Intel juga mempunyai kilang di Bayan Lepas, Penang berhampiran dengan penyaingnya, AMD.

Melihat ke depan, kita dapati bahawa mikropemproses akan menjadi lebih berkuasa. Bukan sahaja kelajuan MHz-nya akan bertambah, malah mikropemproses akan mengambil alih banyak (jika tidak semua) fungsi-fungsi papan induk komputer.

Fungsi-fungsi seperti memproses data multimedia mungkin satu hari nanti akan diproses oleh mikropemproses sepenuhnya. Juga bersedialah untuk hari dimana anda akan dapati mikropemproses dengan teknologi modem dibina sekali ke dalam struktrur litarnya.

Terdapat implikasi besar terhadap perkembangan ini. Yang utama, prestasi dan harga sesuatu sistem komputer akan lebih bergantung kepada kecanggihan mikropemproses dan kurang kepada komponen-komponen lain. Ini akan menjadikan mikropemproses dan pembuat-pembuatnya mempunyai lebih kuasa kawalan atas arah haluan teknologi komputer di dunia.


Daftar Kata

RISC:
singkatan bagi Reduced Instruction Set Computing dan disebut "risk". Setiap mikropemproses mempunyai satu set arahan dengan mana ia memproses kesemua data. Sehingga pertengahan dekad 80an kebanyakan kemajuan mikrompemproses dilakukan dengan menambah jumlah bilangan arahan yang boleh difahami dan dilaksanakan oleh mikropemproses. Tetapi pada ketika itu beberapa pengeluar mikropemproses cuba mencari haluan lain dengan mengeluarkan cip yang hanya boleh melaksanakan beberapa set arahan - arahan yang ringkas sahaja.

Terdapat dua kelebihan nyata sistem ini:-
cip mikropemproses boleh memproses arahan dengan lebih ringkas dan ini menjadikannya lebih cepat. Disebabkan keringkasan pemprosesan arahan mikropemproses, cip jenis ini tidak memerlukan bilangan transistor yang banyak dan oleh itu kos merekabentuk dan mengeluarkan cip jenis ini adalah lebih rendah. Kemunculan cip dengan teknologi RISC ini mengakibatkan cip dengan teknologi lama dipanggil CISC atau Complex Instruction Set Computing. Namun setelah semua ini diperkatakan, kini tidak terdapat jurang yang terlalu besar di antara teknologi RISC dan CISC. Ini kerana kos pengeluaran cip mikropemproses semakin menurun dan kebanyakan cip CISC telahpun memuatkan arahan - arahan RISC dan banyak cip RISC yang baru mengandungi arahan - arahan CISC yang lama. Jadi nampaknya terdapat semacam "pengabungan" antara keduanya.

Pipelining:
Kebolehan mikropemproses memproses lebih dari satu arahan pada satu - satu ketika. Dalam teknik ini mikropemproses mula memproses arahan kedua walaupun arahan pertama belum disiapkan dengan memberikan setiap arahan kepada segmen - segmen yang berlainan. Kesemua segmen memproses arahan mereka serentak dan hasilnya diperolehi dengan lebih cepat. Pentium Pro menggunakan teknik ini untuk memproses 4 arahan serentak.

Dynamic execution:
Merujuk kepada tiga teknik memproses arahan yang dijalankan serentak:-

Peramalan berbagai cabang (Multiple branch prediction): Melalui teknik ini mikropemproses meramalakan arahan yang akan datang dengan melihat kehadapan arahan - arahan yang akan diproses olehnya. Ini menjadikan ia lebih peka dengan aturan arahan komputer dan ianya lebih bersedia mengambil tindakan yang sewajarnya.

Penganalisaan Perjalanan Data (Data Flow Analysis): mikropemproses mencari cara yang paling optimum untuk memproses arahan dan data - bebas dari cara bagaimana arahan diberikan kepadanya. Ini melahirkan pemproses yang lebih cekap.

Perlaksanaan Spekulatif (Speculative Execution): mikropemproses melihat kedepan arahan yang mungkin diperlukan dan melaksanakannya - walaupun belum diperlukan lagi. Dengan cara ini mikropemproses sentiasa berada di dalam keadaan sibuk melaksanakan arahan dan ini meningkatkan prestasinya.

DIB:
Singkatan bagi Dual Independent Bus. Ia adalah satu struktur arkitek litaran elektronik di dalam cip mikropemproses yang memberikan cip berkenaan dua laluan serentak kepada ingatan komputer. Laluan pertama adalah kepada ingatan utama atau RAM dan laluan kedua adalah kepada ingatan L2 cache-nya. Melalui sistem ini cip mikropemproses dapat perolehi data yang tersimpan dalam ingatan dengan lebih cepat dan ini sudah tentu meningkatkan kad pemprosesan datanya

Rujukan dan maklumat lanjut:
Lawatilah laman-laman syarikat pengeluar mikropemproses berikut untuk pelajari lebih dekat akan mikropemproses keluaran syarikat berkenaan.

Intel: http://www.intel.com
AMD: http://www.amd.com
Cyrix: http://www.cyrix.com

Football for Hope

Posted by kerex Saturday, December 26, 2009



Football for Hope was a FIFA-sponsored football match played between Ronaldinho XI team and Shevchenko XI team on February 15, 2005 at the Nou Camp stadium, Barcelona in support of the relief effort after the 2004 Indian Ocean tsunami disaster. Organised by FIFA and UEFA in consultation with the Royal Spanish Football Federation, and with support from FC Barcelona who provided their stadium and staff free of charge, this benefit match for the victims of the tsunami saw an XI led by Ronaldinho, the 2004 FIFA World Player of the Year, beat a team captained by Andriy Shevchenko, the 2004 European Footballer of the Year, by 6 goals to 3. Fifa hopes to raise £7 million in support of the tsunami victims, around a third through the game itself. All proceeds from the Football For Hope match will go to the FIFA/Asian Football Confederation Tsunami Solidarity Fund.

The Match
The game itself, which was watched by some 35,000 spectators, was a typical charity affair with a predictable pace, although the fans were entertained by a feast of goals. Cameroon's Samuel Eto'o and Senegal's Henri Camara both hit two goals, which along with strikes from Ronaldinho and the South Korean Cha Du-Ri helped the FIFA World Player of the Year's team to victory, with Alessandro Del Piero, Gianfranco Zola and David Suazo scoring for Shevchenko's side.



Ronaldhinho XI vs Shevchenko XI




Shevchenko XI



Coaches: Marcello Lippi (Italy - Italian national team), Arsène Wenger (France - Arsenal)

Goalkeepers: Gianluigi Buffon (Italy - Juventus), Iker Casillas (Spain - Real Madrid), Francesco Toldo (Italy - Inter Milan)

Defenders: Kakha Kaladze (Georgia - AC Milan), Christian Karembeu (France - Bastia), Vincent Kompany (Belgium - Anderlecht), Samuel Kuffour (Ghana - Bayern Munich), Paolo Maldini (Italy - AC Milan), Paolo Montero (Uruguay - Juventus), Carles Puyol (Spain - Barcelona), Jaap Stam (Netherlands - AC Milan), Lilian Thuram (France - Juventus)

Midfielders/ Attackers: Roberto Baggio (Italy - retired), Michael Ballack (Germany - Bayern Munich), David Beckham (England - Real Madrid), Sebastian Deisler (Germany - Bayern Munich), Alessandro Del Piero (Italy - Juventus), Steven Gerrard (England - Liverpool), Ludovic Giuly (France - Barcelona), Thierry Henry (France - Arsenal), Jari Litmanen (Finland - Malmö), Pavel Nedvěd (Czech Republic - Juventus), Raúl (Spain - Real Madrid), Sergei Semak (Russia - CSKA Moscow), Andriy Shevchenko (Ukraine - AC Milan), David Suazo (Honduras - Cagliari), Francesco Totti (Italy - AS Roma), Patrick Vieira (France - Arsenal), Johann Vogel, (Switzerland - PSV), Zinedine Zidane (France - Real Madrid), Gianfranco Zola (Italy - Cagliari), Hakan Şükür (Turkey - Galatasaray)






Ronaldinho XI



Coaches: Carlos Alberto Parreira (Brazil - Brazilian national team), Frank Rijkaard (Netherlands - Barcelona)

Goalkeepers: Dida (Brazil - AC Milan), Idriss Kameni (Cameroon - Espanyol)

Defenders: Cafú (Brazil - AC Milan), Iván Córdoba (Colombia - Inter Milan), Cris (Brazil - Lyon), Gabriel Heinze (Argentina - Manchester United), Radhi Jaidi (Tunisia - Bolton Wanderers), Lúcio (Brazil - Bayern Munich), Rafael Márquez (Mexico - Barcelona), Lucas Radebe (South Africa - Leeds United), Javier Zanetti (Argentina - Inter Milan), Rigobert Song (Cameroon - Galatasaray)

Midfielders/ Attackers: Adriano (Brazil - Inter Milan), DaMarcus Beasley (USA - PSV), Delron Buckley (South Africa - Arminia Bielefeld), Henri Camara (Senegal - Southampton), Esteban Cambiasso (Argentina - Inter Milan), Cha Du-Ri (South Korea - Eintracht Frankfurt), Deco (Portugal - Barcelona), Didier Drogba (Côte d'Ivoire - Chelsea), Brett Emerton (Australia - Blackburn Rovers, Michael Essien (Ghana - Lyon), Samuel Eto'o (Cameroon - Barcelona), Juninho (Brazil - Lyon), Kaká (Brazil - AC Milan), Li Tie (China - Everton), Mehdi Mahdavikia (Iran - Hamburg), Obafemi Martins (Nigeria - Inter Milan), Hidetoshi Nakata (Japan - Fiorentina), Park Ji-Sung (South Korea - PSV), Ronaldo (Brazil - Real Madrid), Ronaldinho (Brazil - Barcelona)

Read More More Soccer...

Zathura: A Space Adventure

Posted by kerex

Danny and Walter are two brothers who barely get along even while driving their parents to distraction as their older sister tries to ignore them. Despite their squabbling, the brothers manage cooperate enough to play an old mechanical board game named Zathura. However, after their first move, they find that the game has apparently flung them, their sister and their entire house into outer space. Furthermore, the brothers surmise the only way to return home is to finish the game. However with almost every move, new dangers arise as the siblings find themselves learning to cooperate in ways they never expected as they realize what they mean to each other.





It's Fast
Payments can be sent instantly, quicker than sending checks or money orders.

It's Private
PayPal does not reveal your financial information to sellers.

It's Global
PayPal is accepted worldwide, and can be used to make payments locally or internationally.

It's Easy
Send money to anyone in just a few clicks.

It's Trusted
Advanced fraud prevention helps keep you secure.

It's Cost-Effective
Paypal don’t charge a fee to make a purchase (fees apply for currency conversion), and PayPal is affordable for businesses of all




What is Paypal?

* The safer, easier way to pay
* Use your debit or credit card without revealing your number
* Speed through check out, no need to enter your address details




How Paypal keep you secure

* use your debit or credit card witjout revealing your number
* Paypal Buyer Pretection covers many eBay transactions
* Paypal anti-fraud programs work tirelessly behind the scenes



How you cheack out faster

* Cheak out in as little as three clicks
* No need to wait for cheques to clear and recive your item faster

Solutions for Paying & Getting Paid Online - Secure & Easy. Sign Up Now: http://www.paypal.com

Sign up for PayPal and start accepting credit card payments instantly.

Another spoof from the mind of Mel Brooks. This time he's out to poke fun at the Dracula myth. Basically, he took "Bram Stoker's Dracula," gave it a new cast and a new script and made a big joke out of it. The usual, rich English are attacked by Dracula and Dr. Van Helsing is brought in to save the day.






WW2 Short Documentary

Posted by kerex

"Before all this living history leaves us, let's see what there is to learn ... not about ancient times, but about human behavior, and how what they went through is reflected in how we live today."
Tom Hanks


Anak Tunggal

Posted by kerex

Filem ini diterbitkan pada tahun 1980 dan diarahkan oleh M.Osman. Filem ini dibintangi oleh Hamidah Wahab,R.Jaafar,Ahmad B,Param.


Dendang Perantau

Posted by kerex

Filem ini diarahkan oleh Datuk Jamil Sulong dan diterbitkan pada tahun 1979. Filem ini dibintangi oleh Latif Ibrahim,Teh Faridah,Hail Amir,Uji Rashid


Twillight Zone

Posted by kerex


The Twilight Zone is an American television anthology series created by Rod Serling. Each episode (156 in the original series) is a mixture of self-contained fantasy, science fiction, suspense, or horror, often concluding with a macabre or unexpected twist. A popular and critical success, it introduced many Americans to serious science fiction and abstract ideas through television and also through a wide variety of Twilight Zone literature.




Malaysia Truly Asia

Posted by kerex

Malaysia is situated in central South-East Asia, bordering on Thailand in the north, with Singapore and Indonesia to the south and the Philippines to the east. It is composed of Peninsular Malaysia and the states of Sabah and Sarawak on the north coast of the island of Borneo, 650-950km (404-600 miles) across the South China Sea.


Area: 329,758 sq km (127,320 sq miles), Include Peninsula Malaysia and Sabah, and Sarawak of Borneo.

Population: 24,100,000 (2004).

Capital: Kuala Lumpur. Population: 1,495,000 (2003)

Time Zone: GMT + 8

Government: Constitutional monarchy since 1963, gained independence from the British in 1957. Head of Head of Government: Prime Minister Datuk Seri Najib Tun Razak since 2009.(Updated 2009)

Language: Bahasa Malaysia (Malay Language) is the national and official language, English are second language and widely spoken. Other languages such as Chinese (Cantonese and Hokkien), Tamil, Iban, kadazandusun are spoken by minorities.

Religion: Muslim (53%), Buddhist (19%) majorities and Hindus (6%). The remainder are Christian, Taoist, Confucianism and Animist.

Electricity: 220 volts AC, 50Hz. Square 3-pin plugs and bayonet-type light fittings are generally used.




Peninsular Malaysia is an area of forested mountain ranges running north-south, on either side of which are low-lying coastal plains. The coastline extends some 1900km (1200 miles). The west coast consists of mangrove swamps and mudflats which separate into bays and inlets. In the west, the plains have been cleared and cultivated, while the unsheltered east coast consists of tranquil beaches backed by dense jungle.




Two state in North Borneo which is Sabah and Sarawak. Sarawak and Labuan which is part of Federal Territory has alluvial and, in places, swampy coastal plains with rivers penetrating the jungle-covered hills and mountains of the interior. Sabah has a narrow coastal plain which gives way to mountains and jungle. Mount Tahan, at 2187m (7185ft), is highest peak in peninsula Malaysia, while Mount Kinabalu, at 4095m (13,432ft), is the highest peak in Malaysia and also stand highest peak in South-East Asia.

The major islands are Langkawi (a group of 99 islands), Penang and Pangkor off the west coast; and Tioman, Redang, Kapas, Gemok, Perhentian and Rawa off the east coast while Manukan, Gaya, Sulug, Pulau Tiga, Mamutik, Sapi, Turtle Island, Layang-layang, Sipadan and Mabul Island in Borneo which are excellent sea diving spots.


Country Overview
Malaysia is situated in central South-East Asia, bordering Thailand, Singapore, Indonesia and the Philippines. Kuala Lumpur, Johor Bahru, Penang, Melacca and the Southwest are the most developed and densely populated regions of the country. This is also where the most important historical remains are to be found. Malaysia's capital city and main international gateway, Kuala Lumpur, was founded in the 1890s, and its architecture reflects a cosmopolitan mix of Malay, Chinese, Indian and European cultures. The city of Malacca is two hours by road from Kuala Lumpur. Founded in the early 15th century, Malacca remains predominantly a Chinese community, with reminders of periods under Portuguese, Dutch and British rule. Architectural remains in the centre of the city.

Bugatti Veyron

Posted by kerex Friday, December 25, 2009

The Bugatti Veyron EB 16.4 is a mid-engine grand touring car produced by Bugatti headquarters in Château St Jean in Molsheim (Alsace, France), and whose production and development is often credited to Ferdinand Karl Piech. It is named after French racing driver Pierre Veyron, who won the 24 hours of Le Mans in 1939 while racing for the original Bugatti company. 200 examples of the Veyron are known to have been built and delivered since production began. There will be a total of 300 built. All the Veyron editions contribute to the 300 being built. The Veyron has been proclaimed many times as the greatest car of all time. The editions that are contributing are the Veyron, Veyron 16.4, Pur Sang, Hermes Edition, Sang Noir, Targa, Vincero, and the Bleu Centenaire. It will be replaced with the Grand Sport, which is essentially a Veyron Convertible. More...







Read More Info: Bugatti Veyron

Malaysia’s foremost singing sensation, SHEILA MAJID has continued to hold her rank presence in regional music scene for the last eighteen years with her trademark contemporary pop music tastefully with a Jazz and R&B flavour.

With the 1985 release of her debut album, aptly entitled Dimensi Baru, (translation: New Dimension), SHEILA MAJID brought a new dimension to the local music industry; building a phenomenal following manifested by sold-out concerts in various cities.

kerex2day





More SHEILA MAJID...


Jangan Tegur

Posted by kerex Thursday, December 24, 2009

Jangan Tegur mengisahkan Natasya (Julia Ziegler) yang telah terlibat dengan kemalangan jalan raya dan koma selama beberapa minggu. Sewaktu di dalam koma, Natasya telah bermimpi tentang seorang gadis bernama Baizura (Nadia Mustafar) yang disyaki telah hilang 2 tahun secara misteri tanpa khabar berita. Natasya sering diganggu dengan mimpi-mimpi aneh yang menceritakan akan kesengsaraan Baizura yang telah dibomoh dan sering didatangi makhluk-makhluk halus.
Tersedar dari koma, Natasya mula mengalami perkara yang sama seperti yang telah dialami oleh Baizura. Daya penglihatannya tidak membataskan dia melihat makhluk-makhluk halus itu. Ini menambahkan kerunsingan suami Natasya iaitu Kamal. Kamal (Pierre Andre) pula adalah seorang yang tidak mempercayai benda-benda khurafat ini sehinggalah dia melihatnya sendiri.

Melalui mimpi-mimpi yang dialami, Natasya mula menyiasat apakah yang telah berlaku kepada Baizura. Siasatan yang dilakukan telah menyebabkan dia sering diganggu oleh makhluk-makhluk yang menganggu Baizura seperti dalam mimpinya. Apakah yang berlaku kepada Baizura? Mengapakah Natasya dibayangi dengan kemunculan Baizura? Apakah kaitan mereka berdua? Saksikan kemunculan filem Jangan Tegur yang bakal menemui anda nanti..

Pelakon lain yang turut menjayakan filem ini adalah Almy Nadia, Ellie Suriati, Azri Iskandar, Kaza dan ramai lagi.



Football Funny Compilation

Posted by kerex

Great Funny Football Compilation Video, A video combining several great football funny moment. Funny goals, Celibration and goalkeeper mistakes. Some bits are extremely hilarious so don't sue me if you end up in hospital laughing.








Football Funny





Goal Celebrations





Goalkeeper Blunder



Click here for Soccer Articles...

10 Tips For Google Image Search

Posted by kerex Sunday, May 17, 2009

Google Image Search could be used in many ways.

1. If you want to know if a person is a man or a woman and the name doesn't help, do a search for the name.

2. If you don't know the meaning of a word, the pictures may help you.

3. A better search for Flickr. Google uses information from other sites that link to Flickr photos, so you may find Google search better.

4. Find what's interesting about a site, by looking at the pictures included. For example: wired.com.

5. Find a new wallpaper for your desktop by restricting your search to large images. You can automate this using an application.

6. Find random personal pictures, using standard file names from digital cameras.

7. Type the name of a painter and you can take an art class.

8. Install a Greasemonkey script so you can view the original version of the image directly by clicking on the thumbnail.

9. Find the color of a word. "Word Color is a windows program that uses Google Image Search to determine the color of a word or string of words. It goes out there, retrieves the top 9 images and loops through all pixels, calculating the average hue, which is later converted to a color."

10. If you want to grab search results, GoogleGrab is a tool that downloads images from Google Image Search. It even supports batch search.

Guide to Choose a mIRC Script

Posted by kerex Wednesday, May 13, 2009



mIRC has its own programming language that allows scripters to enhance mIRC by adding new features, changing the layout, and just about anything else. Many new users rush out to try scripts blindly. This is both risky and unnecessary, because mIRC has many advanced features built in already, and adding scripts written by strangers can add new features, but they can also slow down or cripple mIRC, or worse yet, cause you to "hacked" just like if you opened email attachments blindly. - irchelp.org

Here is some guide how to choose a mIRC scripts (taking from irchelp.org - editing)

Safe Scripts:

Where do you find safe scripts? Well, if you don't understand mIRC scripting, you are at the mercy of that scripts author. About all that is left is relying on someone else's guidance. The best place to start if you are new to IRC and just starting is finding a script archive website that REVIEWS the scripts they host.

Just because a script site has been around for quite awhile doesn't mean all the scripts there are safe. Over the years I have seen both archive websites and very popular scripts go from being useful and trustworthy to tools to hack your computer. You have to accept the responsibility for any script you choose to use, where ever you obtain that script from. The information here is simply a helpful guide, not a form of assurance.

Kinds of Scripts:

Purpose:

There are thousands of scripts with different purposes. Some people want lots of colorful popups .. others want to control channel behavior .. the next user wants to limit spam advertisements. The "best" script is one that fits your needs. You have to decide what those are. What exactly do you want the script to do for you?

Full scripts handle lots of different functions, usually including flood attack protection, file transfers, marking you away when you are idle, and more.

Addon scripts are more specific in purpose. A single addon script will handle setting you away, another addon script will deal with floods or attacks. There are thousands of addon scripts written for different purposes from fservers to memo handling.

Format:

Scripts can be a single file, usually with an mrc file extension. Normally that file can be written as a "Remote" script. There are three script sections in mIRC: Remotes, Aliases, and Popups. Remotes work without you needing to interact via the keyboard or a mouse. Aliases are for keyboard shortcuts and Popups are written for your mouse.

However, as mIRC scripting advanced, it became possible to add aliases and popups to a "remote" script. This blurred the distinction between the three sections. For more info on how the three sections work and are interrelated, read the current mIRC FAQ and the mIRC Help file that came with your copy of mIRC.


Signs of a Backdoor or Hacking in a Script:

Script features to be very very careful of ..

* Any scripts (usually found bundled as zip or rar files) that include an associated file that ends with the extension .exe or .bat [Ed. note - many other extensions are also dangerous]
* Scripts that force you to join a particular channel or message a specific user
* Scripts that have /sockopen or any unexpected "Socket" components written into them.
* Scripts that require you to use a .dll (dynamic link library) file that they provide.



Also: Scripts that advertise themselves are, at best, rude and are more likely to have a backdoor.




Note that if you are looking for a "socket based script" it will obviously have socket components in it. The same for a dll based script. My best advice for new users is not to use these unless you can personally evaluate the script in question or you have been around IRC long enough to know someone you can trust that is expert enough to do it for you.

Popular scripts are sometimes converted into backdoors and offered to new users. The same for popular dll files. You spend some time on IRC and start seeing people use a particular script, finally you find it at some website. But the script you find may not be the one that was originally written. A malicious individual may have taken the original script or dll and added a virus feature to it and then reposted it. You think you are getting the nice, safe original and the next thing you know you have opened a door into your computer. So be careful.

Kucing aku pandai berjogging

Posted by kerex Monday, April 27, 2009

Ini kucing kesayang wa, name nye 'CAT'. Yeps! thats right.. C.A.T is my cat name :) sekarang kucing kesayangan wa dah takde. Kucing tu hilang masa wa pindah ke rumah baru. Mungkin dia tak biasa dengan suasana dan bau bauan di kawasan rumah baru tu. Senang citer kucin wa lari rumah.. puas da wa cari tapi tak jumpa, sedih tu beb tak jumpa kucing wa. Dalam banyak banyak ni baka dan spesis yang paling bijak pernah wa bela. Yang tinggal hanya video ni sahaja sebagai pengobat rindu wa pada kucing wa. Video ni tak berapa jelas, al maklum la masa tu wa pakai HP kemera generasi pertama. Video ni wa ambil masa kucing wa tengah bermain di papan jogging kat rumah lama wa.


AIMP2 - An alternative media player

Posted by kerex Tuesday, March 10, 2009



Audio players come in all shapes and sizes, from resource hogging beasts such as iTunes and Windows Media Player, to relatively more lightweight competitors such as Winamp, MediaMonkey. And if you happen to have an iPod or some other sort of portable media player, chances are you are sort of locked in to whatever application works best with your portable device. But let's say you don't care about support for a portable player and just want a capable, lightweight player that has frills but not too many.

Meet AIMP2. AIMP2 weighs in at a mere 2.88MB, has a slightly smaller memory footprint than Winamp and can do just about everything you want except sync with a portable device. It supports anything from AAC to WMA, allows you to record radio streams, has a fully fledged library to organize your music, allows you to manipulate playlists while listening to another, and even supports a number of Winamp plug-ins. And for those who like to wake up and fall asleep to music, AIMP2 also includes a timed start and an auto shutdown timer.

Although lacking some of the features that the bigger media players may have, AIMP2 has an impressive feature set for its size. Additional skins and plug-ins are relatively scarce, but the basic skin works so well other skins are almost unnecessary beyond mere aesthetics. It has also been localized for a number of languages (the default being Russian), which makes this a very international user friendly application.

Overall, AIMP2 just feels right, and is a good alternative for anyone that is looking for something that works the way it should.

Portable AIMP2 Link:
http://rapidshare.com/files/213935585/AIMP2.rar

Apa itu Virus

Posted by kerex Monday, March 9, 2009

Virus bukan hanya melemahkan operasi komputer tetapi juga mengkucar-kacirkan seluruh dunia sehingga mencapai tahap mengancam keselamatan. KADANGKALA kita terlalu ghairah dengan kecanggihan dunia teknologi maklumat dan telekomunikasi (ICT) sehingga lupa soal remeh-temeh terutama membabitkan isu keselamatan. Ancaman utama dunia tanpa sempadan ini ialah virus kerana ia dikatakan mampu melumpuhkan operasi harian yang banyak bergantung kepada ICT.

Virus komputer ialah sejenis program komputer yang ditulis untuk mengubah cara komputer beroperasi tanpa kebenaran dan tanpa disedari oleh pemiliknya kerana ia bijak berselindung di sebalik fail program lain.

Menerusi terma yang biasa digunakan untuk merujuk kepada program jahat itu, sejenis virus akan bertindak melakukan dua perkara iaitu menggandakan atau menyalin dirinya sendiri dan melancarkannya.

Virus komputer itu akan merebak dari satu komputer kepada komputer lain yang menggunakan kaedah sama seperti virus dalam bidang perubatan atau biologi yang menjangkiti manusia ke manusia lain.

Pada Januari 2004 lalu, pakar virus menganggarkan virus Mydoom yang lebih dikenali sebagai cecacing dan virus ILOVEYOU yang menyerang pada 2000 menjangkiti kira-kira 250,000 komputer dalam tempoh sehari.

Pelbagai cara virus menjangkiti komputer. Ada yang melalui cakera liut atau cakera padat (CD), pemacu flash dan yang lain ketika proses pemindahan data serta hubungan antara komputer dalam rangkaian yang sama.

Sementara dalam dunia internet, virus boleh merebak apabila kita membuat pindah turun sebarang fail atau memasang aplikasi perisian yang tidak diketahui asal-usulnya dengan tepat.

Kaedah paling popular penyebaran virus ialah menerusi mel elektronik. E-mel tidak diundang biasanya akan masuk ke kekotak e-mel kita dan diserta dengan fail sisipan. Virus dimasukkan ke fail sisipan dan dilancarkan sebaik penerima membukanya.

Sebaik dilancarkan, tanpa disedari virus terbabit menyalin dirinya sendiri menjadi seberapa banyak yang boleh dan mencuri alamat e-mel yang ada dalam simpanan komputer terbabit, lalu bertindak menghantar dirinya ke alamat e-mel yang dicuri itu.

Begitulah keadaannya ia merebak. Oleh itu berhati-hati dengan e-mel dari pengirim yang tidak dikenali.

Ada juga e-mel yang menyamar sebagai rakan atau yang mempromosikan sesuatu seperti menjanjikan sesuatu yang lumayan untuk pengguna. E-mel ini amat berbahaya, jangan mudah terpedaya kepada promosi.

Terdapat beribu-ribu jenis virus dalam dunia perkomputeran hari ini. Menurut kajian, kira-kira 200 jenis virus dikesan setiap hari, hinggakan ia sukar dikesan berapa banyak sebenarnya virus sudah bertapak dalam komputer hari ini.

Virus yang menyerang manusia atau binatang boleh mengakibatkan kematian, begitu juga dengan virus komputer ini yang dibangunkan sedemikian rupa hingga menyebabkan kegagalan berfungsi secara menyeluruh sesebuah sistem komputer itu.

Ada juga hanya pada tahap melemahkan operasi komputer dan ada juga yang hanya hendak mengkucar-kacirkan keadaan. Semakin canggih sistem perkomputeran yang dibangunkan, semakin canggih juga virus itu dicipta.

Pelbagai andaian dibuat oleh pakar mengenai pembangunan virus komputer itu kerana ia seolah-olah bertindak sebagai pengacau yang tidak diundang dan membabitkan orang yang tiada kaitan dengan pembangunnya.

Ada pihak mengandaikan virus dicipta hanya sekadar suka-suka kerana memikirkan dirinya seorang yang terlalu bijak dalam bidang perkomputeran dan melepaskan virus untuk mengkucar-kacirkan keadaan untuk merasa puas.

Dalam pada itu, ada juga yang mengatakan ia disebabkan oleh rasa dengki khianat dengan kejayaan orang lain, lalu melepaskan virus untuk merosakkan data serta memusnahkan peralatan perkomputeran terbabit.

Kerosakan akibat serangan virus itu ada yang bersifat kekal dan ada juga hanya sementara. Malah, ada juga virus yang menjangkiti sesebuah komputer, tapi ia bertindak seperti bom masa yang mana akan aktif pada waktu serta tarikh yang ditetapkan pembangunnya.

Lebih parah dari itu, ada virus yang bertindak sebagai pengintip, yang mana ia merakam setiap tindakan pengguna dan menyampaikannya kepada pembangunnya.

Biasanya ia bertujuan untuk mencuri maklumat, terutamanya dokumen sulit atau maklumat yang berkaitan dengan kewangan. Misalnya, ia merakam ketukan papan kekunci anda ketika pengguna sedang memasukkan nama log masuk dan kata laluan. Malah, ia mampu bertindak lebih jahat dengan merakam nombor pengenalan peribadi (PIN) atau nombor akaun .

Perisian antivirus diperlukan untuk memperbaiki dan memulihkan keadaan. Bagaimanapun, kemungkinan kehilangan data adalah besar, manakala perisian yang dijangkiti perlu dipasang semula.

Proses pemulihan pula memakan masa, sedangkan faktor kelambatan dan kegagalan berfungsi walau dalam tempoh sesaat pun akan mengakibatkan kerugian besar.




Klasifikasi virus

VIRUS boleh diklasifikasikan kepada beberapa jenis yang dikenal pasti iaitu virus sektor boot, virus fail, virus makro, virus multiparti, virus rangkaian dan virus e-mel.

Virus sektor boot akan menjangkiti sektor boot dalam cakera keras, iaitu bahagian paling penting. Ia akan menggagalkan proses menghidupkan komputer dan akhirnya tidak boleh digunakan. Virus ini yang sudah dikenali ialah Polyboot dan AntiEXE.

Virus fail juga dikenali parasit iaitu kod terlekat pada fail pelancar atau EXE, fail pemacu dan fail yang sudah dipadatkan. Ia aktif setiap kali fail itu dilancarkan dan akan menyalin dirinya untuk memasuki ke lain-lain fail EXE yang ada dalam komputer sama. Contohnya Randex, Meve dan MrKlunky.

Virus makro biasanya akan menempel dalam fail pekerjaan atau dokumen yang dibuat menggunakan perisian pemprosesan perkataan atau seumpamanya. Ia sekadar menempel dan merebak apabila pengguna membuat pindahan data menerusi e-mel atau cakera liut, pemacu USB atau CD. Contoh virus ini ialah Relax, Melissa.A dan Bablas.

Virus multiparti adalah gabungan antara virus sektor boot dengan virus fail. Ia hadir menerusi media yang dijangkiti dan tinggal dalam memori. Kemudian ia akan bergerak ke sektor boot dan cakera keras. Selepas itu, ia akan mencari fail EXE dan merebak secara meluas ke keseluruhan sistem. Antara virus ini yang dikenali ialah Ywinz.

Virus rangkaian bertindak cepat merentasi sistem rangkaian setempat (LAN) atau menerusi internet. Ia aktif menerusi perkongsian fail. Apabila ia sudah menjangkiti sistem, ia akan mencari sasaran berpotensi dalam rangkaian yang sama atau mungkin keluar ke rangkaian lain menerusi sistem rangkaian luas (WAN). Contohnya ialah Nimda dan SQLSlammer.

Virus e-mel boleh dalam bentuk makro yang merebak ke semua alamat e-mel komputer. Apabila pengguna menghantar e-mel, komputer penerima pula akan dijangkiti dan ada juga yang menghantar dirinya sendiri menggunakan alamat-alamat tadi.

Menghalang jangkitan

BEBERAPA penyelesaian dicadangkan bagi membantu menghalang sebarang jangkitan virus ke komputer.

Pengguna perlu memeriksa semua perisian baru atau apa saja yang hendak dipindah turun ke komputer. Jika terdapat virus, laporkan kepada pihak tertentu atau jabatan sokongan ICT di pejabat atau Pusat Tindak Balas Kecemasan dan Keselamatan ICT Kebangsaan (Niser). Perisian antivirus adalah jawapan sebenar kepada semua pemasalahan virus itu. Ia akan mengimbas setiap fail masuk atau keluar dan bertindak serta merta.

Malangnya, masih ramai pengguna terutama pengguna di rumah yang tidak mengambil pusing mengenai perisian anti virus ini, sedangkan ia amat penting bagi memastikan komputer terus elok dan data terus selamat.

Berbelanjalah sedikit wang untuk membeli perisian antivirus demi memastikan tidak mengalami kerugian yang banyak.

Youtube

Posted by kerex Saturday, March 7, 2009

The Company
First, we'll start by looking at YouTube as the startup-turned-company. We'll see how it got to where it is today, how it plans to make money, the acquisition rumors that have circumvented it for the past few months, its hasty bandwidth bills, and the legal issues the company has so far had to put up with.

Background
Based in San Mateo, YouTube is a small privately-funded company with 60 employees. Chad Hurley, one of its co-founders, serves as the CEO with its other two co-founders Steven Chen, CTO, and Jawed Karim, Advisor. So far, the company has raised over $11 million of funding from Sequoia Capital, the firm who also provided initial venture capital for Google, Yahoo!, and Apple in their early days. Their tagline is "Broadcast Yourself" and this largely represents their goal.

History
YouTube was founded by three former PayPal employees, who, witnessing the boom of online grassroots video, realized the need for a decent service that made the process of uploading, watching and sharing videos hassle-free. They registered the domain YouTube.com on February 15th, 2005 and developed the site over the following months from a garage in Menlo Park. In May 2005 they launched in a public beta, and in November, YouTube made its debut with an $3.5 million of funding from Sequoia Capital.

To get a decent start and attract the initial crowd they were looking for — teenagers, college students, hobbyists, film-makers — they came out with a contest that promised to give out one iPod Nano to a random member each day, which ran for two months. This contest worked on a point-based system, for example one point was rewarded for signing up, one for inviting others, another one for posting a video, etc. The more the points you gained, the higher the chance of winning you had. This was a significant action that got YouTube noticed by the masses and gave it a headstart as per the signups. After all, if you knew you had a chance to winning a $250 iPod Nano just by signing up and posting that Uncle Bob's funny biking incident clip you've had on your hard-drive for the past few years, wouldn't you?

Now, after being the host (and former-host) of countless SNL segments, Superbowl ads, TV goof-ups, Anime mashups, Nobody's Watching episodes, Sporting segments, Shakira music videos, and most recently the Lonelygirl15 installments — which have managed to receive more than 90 million views in total — the result? World's fastest growing website at present, YouTube.

Business
YouTube's Business Aspect While the service is completely free for the users, the company's business model — which was put in place in March 2005 — is based on traditional banner advertising, sponsorships, partnerships and promotions, and even contextual advertising. So far, they've had numerous partnerships with traditional media companies, notably NBC and the Warner Music Group.

There has been a lot of debate over YouTube's business, with claims that it is purely based on copyrighted infringements. Billionaire Mark Cuban was recently quoted in a News.com article saying "anyone who buys YouTube is a moron." While it has only been faced with one lawsuit by Californian journalist Robert Tur over copyright infringement, it has had to take several videos down to settle matters, most notably the SNL skit Lazy Sunday over NBC's requisition.

Bandwith Cost
On April 2005, a Forbes article cast a spotlight on YouTube's bandwidth bills and how much of a limitation this is to its business. The article claimed that the site uses 200 terabytes a day which easily approaches to a $1 million monthly bandwidth bill. What's surprising is that this was even before its peak in June/July in which the site doubled in traffic.

Ever since it began, the company has had a stronger goal to build a community than to make a lot of money. But with the growing phenomenon, now with more than 65,000 uploads daily and 100 million videos being watched, they've had to kick-start their business plan in-order to sustain the growth.


The Service

Now, we'll look at YouTube as the service and the website. We'll explore what millions and millions of people see everyday, the unique approach they've taken toward making online video more accessible in today's culture, and the different sections of the site which form together.

Registration
The signup process for YouTube hasn't changed much since its launch and is fairly easy. According to their use of the site, users can join as different accounts. For general use and those who will use YouTube just to watch videos and perhaps submit the odd one, a traditional account is the way to go. For musicians, they have a specific type of Musician account, as is the case with Comedians and Directors. As the lines have cleared, they've been quick to accommodate each type of user. Also, it's worth mentioning that no matter what the account, YouTube clearly states in the terms that the uploader grants YouTube a non-exclusive access to the video to be watched on the Internet, and warns you not to infringe any copyrights.

Uploading
Just like registering for YouTube, they've made the process of uploading a video incredibly simple. After giving it a title, description, tags, category, and language, you simply select your video file — YouTube accepts almost every type there is — choose whether you want it public or private, and your video is on YouTube, accessible by millions. One of the prime factors being their success is the ease of use which they've truly taken great care in providing

Youtube homepage
Since day one, YouTube has used a tabbed navigation menu which can be seen at the top of every page. Their homepage contains 10 daily featured videos and one from their exclusive partner (presently NBC). Also featured are 'Active Channels' and 'Active Groups' which I'll go into later. It's noticeable that they don't have any advertising on their homepage, but choose to monetize each video alone and subsequent pages.

YouTube Directors
As I stated above, users can join as different types of accounts. By signing up for a Director's Account, you essentially become YouTube's content partner. Along with a 'Director' tag, you get to co-brand your logo, link to a URL and provide your company's description on each of your videos. You also get the ability to upload videos longer than the 10 minute limit they've set, and customize a lot of fields and values. The program is aimed at amateur film-makers and online content distributors alike.

YouTube Comedians
With the growing number of amateur comedians that post videos onto YouTube, they've also made a special type of account for this user base. A comedian account is basically a lighter version of a Directors account, where, along with the 'Comedian' tag, you get the ability to customize your channel and videos. It is notable, however, that you still don't have the ability to surpass the 10 minute time constrain and post your logo to the videos.

YouTube Musicians
Like the Comedian account, YouTube also provides Musicians with their own subset of an account. Musicians can signup for one and get an account which allows to them to post their own music videos and most importantly identify themselves as musicians. Also, they can customize their channel specifically with information like "Record Label." This is great for independent and amateur musicians.

YouTube Channels
A channel is YouTube's flash name for a user's profile. There are some exceptions, though. Like a MySpace profile, users can decorate their channels and insert information that describes themselves. A typical channel includes information about the user, the videos they've uploaded, their favorites, ways to get in touch with them, the subscribers to their channel, the channel they've subscribed to, bulletins, and comments. Users can subscribe to others' channels, meaning they'll be updated of any new videos from the user through the 'My Subscriptions' page, and even subscribe to specific tags, such as "Snowboarding" or "Basejumping."

YouTube Playlists
One of the neat and handy features of the site, YouTube allows users to create their own playlists to better organize their favorites collection, give other users a grouped collection of similar kinds of videos, or to simply group together a parted segment of videos. The use of this feature is completely up to the user, and it's something the YouTube community has inferred to good use.

YouTube Groups
YouTube Groups is primarily the 'social' section of the site which allows users to group together as people and as their videos and have discussions on the topic. While it is widely used to hold video competitions and contests, the recent launch of Colleges has welcomed the Facebook audience to dawn upon and meet up with their peers

YouTube Underground Contest
Currently the very hot section of the website, the YouTube Underground Contest is a contest they've held to find the best amateur, independent, and unsigned musician out there who can write, play, and make a good music video. The community will vote on the best one, and four grandprize winners will basically get their start in the industry — from being featured on ABC's Good Morning America and thousands of mobile phones via Cingular Video to a chance to perform live, and all the professional equipment they can obtain. The contest starts on October 2nd and finishes October 18th.

YouTube APIs & Codes
A key part in YouTube's phenomenon and growth (see comments below), this is something they've been credited to since day one. With YouTube, it's possible for anyone to embed a video onto a webpage, MySpace profile, or blog by simply obtaining the code and copying/pasting it onto an HTML file. With this model, not only does the power of user-generated content arise, but the other side of the story — user-promoted content — accompanies it. What's more, there's a whole lot of things for the developer community to build upon with YouTube's API set.

Summary
One of the great things about YouTube is that the concept — uploading, viewing and sharing videos — appeals to nearly every age, race, and nationality. Their growth has been truly phenomenal and they remain one of the prime examples of success in Web 2.0. Used by millions everyday, they’ve made an exceptional name for themselves in this new content distribution model and with certainly no doubt in my mind, will go on to be one of the companies that change the way the world watches content.

YouTube Homepage

About Us

My Photo
kerex
http://www.myxpitstop.com
View my complete profile