This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

Sunday, December 19, 2010

Useful Ebook To Make 50 dollars perday in 12 minutes .pdf

This is a Free program - maybe some of you, already know about this great program, and the following information is for those who don't know and haven't joined. , Yeah.., this is another way to make money fast again besides from win money playing online slots or make money online via facebook.

I tell you that, with the knowledge placed carefully within this e-book you WILL be able to generate incomes of $50+ a day with only 10 - 12 minutes work! ,This is based on my own experience with these programs ..

You never have to look at it again, the money will just constantly continue to roll in, how great is that? Well, that's not the best thing you will learn from this book, it's that this method can be “Rinsed and Repeated” as many times as you like!

Let yourself imagine that you within two weeks down the track, patting yourself on the back as you realize reading and utilizing the information in this book was one of the best things you've ever done! While happily sitting back and watching how UNLIMITED cash streams of 50 dollars or more per day start rolling in, its really that easy.


The Method
The secret to making consistent fast cash money online is harnessing the power of two money making services and fusing them with easy promotion techniques.

The services used in this ebook are:

EnviroFile - Create account here (FREE)

and

Linkbucks - Create account here! (FREE)

Read the full explanation in the following ebook :

Download Ebook Make 50 dollars perday in 12 minutes

Size: 236.1KB , PDF Format, compressed in .Rar File , Download winrar here
Password : free7

Friday, December 10, 2010

Great Web Cam Software - Download Free Full Version

Webcam Watcher is a powerfull webcam application that will make you easy to download and saving photos/pictures when they change. You can jump between cameras and scan back and forward in time, really will make fun of your online world, literally putt1ng the w0rld at your f1ngertips...

You can use this tool (Webcam Watcher), example for your online dating activities, or wherever you happen to be across town or anywhere in the world, with the web cam software you can monitoring of the state of your business, home or property from your computer


Webcam Watcher turns your PC into a video recorder for Network IP cameras. Compatible with Intellinet, DLink, Mobotix, Axis, Panasonic, VEO Observer, Vivotek, and other network cameras. This cam software is easy to use, with full-featured Digital Video Recorder for Network Cameras. If you need to keep an eye on your home or business then this software is the answer.

Download Web Cam Watcher and how to use the software here :free-webcam-watcher-for-your-cams.html

Password : free7

Wednesday, December 8, 2010

Try and download the 2011 version of TuneUp Utilities (Not Full!)

Before its I've post about the full version of tuneUp Utilities , that are 2009 version and 2010 version , and now tuneUp Utilities 2011, but it's not (yet) a full version , this is a test for 15 days, No Problem... maybe wait for the next few days I'll get the crack

As you know that TuneUp Utilities is a software used to optimize the performance of our computer,TuneUp Utilities can make PC more faster, stable and secure...




TuneUp Utilities™ – Version 2011 – all new!

"TuneUp Utilities – Version 2011, gets your PC, notebook, or netbook in top shape—saving you costly and painful upgrades! The innovation of this year’s version: TuneUp Program Deactivator, a unique tool that drastically reduces the load on your PC, giving you a true performance boost"

Tuesday, December 7, 2010

Online auto backlinks generator tool

free auto backlinks generator softwareWanna Get Free Backlinks?

Free backlinks generator , with this online tool you can generate 24 backlinks from high quality sites, by creating static web pages that contain links to our blogs/websites.

Just type in your domain name (without http:// or www) and click the "submit your site" button..

After submitting then, click each link on every static pages there.

Auto Backlink Generator
is a tool to that helps you to bring backlinks from the high PageRank sites to your blog, without you having to visit their blog. With this software you can get free traffic to your blog without you being bored in blog walking activities

I think this tool very user friendly and easy to use...



Other tools :
  1. Article Rewriter

  2. HTML Color Picker

  3. Online web tool

  4. Online word count tool

  5. Decript and Encript

Friday, December 3, 2010

Health care, current issues about Healthcare-Associated Infection

Free7 Blogger: Health articles 2011


Healthcare-Associated Infection [HAIs]
I wrote this short topic for free 7 blogger readers who probably have a lot of money [perhaps the money from the adsense revenue or from Win real money playing online slots at Karamba.com , maybe.. ] to be donated for humanitarian purposes, It can be done here : Online Donation Form

health department and services
"Earlier this year, the Department of Health and Human Services released its annual report on the quality of health care Americans receive. While there have been some improvements, hospitals still have work to do to put an end to the ongoing - but solvable - problem of Healthcare-Associated Infections (HAIs).

Caregivers and other healthcare professionals know steps need to be taken to protect patients from HAIs, but it will take strong leadership to make the changes necessary to reduce the likelihood of these life-threatening infections. To help achieve this goal, Kimberly-Clark Health Care launched "Not on My Watch" (www.haiwatch.com), a website that provides tools and information to help facilities eliminate HAIs."

HAI Watch is your resource for collateral and supplies to help keep your organization aware of the importance of healthcare associated infection prevention. The following guidelines on hand hygiene in healthcare settings and other tips are available now, but keep checking back. New HAI awareness tools will be added on an ongoing basis.

Well, a complete information, learn more at : www.haiwatch.com
Or Join directly to HAI WATCHDOG Community


Wednesday, November 24, 2010

A money machine again... try it - Adf.Ly


Time is money,...So don't waste your online time without making money or other useful things.

I previously talked about Win real money playing online slots at Karamba.com , And here is about how make real money with Adf.Ly . I think this is another easy and simple way in making money through internet. Just go here: adf.ly




If you are active in FB or twitter!, your free time can be used to make money with the adf.ly . Why not..? this is really....very simple , doesn't require blogs, websites, or money , just a few click of your mouse to copy-paste any URL into adf.ly , then click on the shrink button...and then place anywhere, on twitter, facebook, email, blog...etc.. and all who clicked on the link, adf.ly will pay you...

More complete, about what is Adf.ly..? and How does it work? , you can read it directly on the site

We are a free URL shortening service with a twist..get paid to share your links on the Internet! Just register for an account and start shrinking. You get paid for every person that visits your URLs. Example URL for Google: http://adf.ly/5XR Place your links on Facebook.., Twitter.., forums.., personal websites.., and any social networking sites.

Monday, November 22, 2010

Win real money buy black diamonds online

Here's just a coffee break for free 7 blogger readers about where to buy black diamonds online an abaout real money. Did you have more than 18 years old, and you need money? Maybe this short information will be interesting to you, Yes, such as on the my post tile above I want to say about Win real money playing online slots at Karamba.com in this article. The online-slots that's a real money game that available on "Karamba.com" website, thus we would actually play an online slot machine for real-money.

At http://www.karamba.com/, the site is a palace of slot games, featuring really convenience services for slot game lovers. They committed .to give you the best online gaming experiences with, the best-services of your "PRIVACY" and "security" , these are really important factor, because as we know play a game will be fun is when the players are relaxed and ready for some Linkgood entertainment, far from the stress and pressure that's the best way to play. And there we also will get guidance on "how to play" the right slot machine at the Help Page of the karamba,com site.

About online slots, in playing the slot machines is almost an identical thing except a couple of prominent differences. At the online slots we make use of virtual coins rather than real ones. But when we are playing the-game for real money, these virtual coins have the exact worth as the real coins. And a litle difference is that we may play those online slots everytime we want and right from our home-sweet-home on our computer, here's "N0 NEED T0 TRAVEL" and no need spend money for a long time to get to a land based slot game, right?.

Saturday, November 20, 2010

How to Choose the Right Bluetooth Hands-Free Car Kit

Bluetooth Hands-Free Car Kit
So, you've decided to invest in a mobile hands free car kit and you've realised you can't go past a bluetooth model. Not only are these more reliable, higher quality and safer, but there's such an extensive range to choose from...which can be daunting if you don;t know what you're looking for or what's right for you.

Here's a guide to choosing the right car kit for your needs, and a few tips on what you should consider...

Cost

Bluetooth car kits can range quite a lot in cost, depending on the kind of features you require or the type of brand that it is. Obviously your biggest limitation will be how much you are willing or able to pay for the technology, so think about how much you want to spend. A good piece of advice to keep in mind, however, is that a little extra money could get you a warranty or something with a longer shelf-life--not to mention the money it could save you in fines--talking on a mobile phone without hands-free can result in a hefty payment to the boys and girls in blue!

Sound Quality

You're looking for two things when it comes to sound quality, the quality of the speakers that feed the other person's voice to you, and the quality of the pickup that feeds your voice to the other person. It can obviously be problematic to test this out in the shop (most store clerks are slightly unwilling to let you run out to the car-park and give it a whirl calling mum!) but I'd suggest once you've got your shortlist, going online and reading reviews of what consumers are saying, especially in regards to things like sound quality.

Noise Reduction

Ah the blessed noise of a truck's compression breaks right when you're in the middle of negotiating a major deal for your business! There's nothing as distracting as the background noise that comes with being on the open road, so if you're going to be making important business calls then ANR (Active Noise Reduction) might be something you want to consider. The technology helps reduce ambient noise from your surroundings and you may just be able to fool your boss into thinking you're working late in the office instead of driving the kids to soccer!

Choosing a bluetooth hands free car kit is an investment in you and your family's safety, first and foremost, but it can also save you precious time and make you more efficient in your job and personal life. Something to talk to your accountant about is whether or not you can claim tax back on a car kit if you're using it for work calls, but either way, the bluetooth will pay for itself in no time in peace of mind and productivity.


Avira - Action antivirus removal tool

Action antivirus removal
At one time, I have experienced problem when will intend to upgrade Avira Antivirus to a newer version, uninstall the old version that should be part of the process of installing the new version doesn't run properly. Action to uninstall through Add / Remove programs didn't work also. So, as a result of this problem, we can't uninstall antivirus and also can't install new antivirus.

Problems can't uninstall an antivirus program can be due to different reasons. To overcome this problem, it could be done manually by deleting all files and remove the registry settings of the antivirus program . Besides this way, can also be done with a more simple way  that's to use antivirus program removal tool.

A removal-tool is an utility used to detect and remove specific viruses,This is not a substitute for full antivirus protection, but a tool to assist administrators or users when dealing with an infected system

And the best Action antivirus removal tool [free version] that I recommend from avira products :

  1. Download Avira AntiVir Removal Tool
  2. Tutorial - User Manual of Action antivirus Avira removal .pdf

Friday, November 19, 2010

rings collection

Good day all, recently I've found a site that offers unique rings collection, especially diamond engagement rings, if you want to know more informations about this amazing site, check it out at www.shireeodiz.com or read more my post reviews here: Makeityourring Diamond Engagement Rings

Thursday, November 18, 2010

How to make a video tutorial using Camstudio software + youtube tutorial

Surely you've often seen the video tutorials, either through youtube or directly in a blog or website, Or, if you ever buy information products are usually always comes with video tutorials. The function is to clarify the steps that must be done. Now, the question is, how to make video tutorials on your blog or website?

About how to make a video tutorial is actually quite easy, because many sites that provide good tutorial video makers who paid or free, and of course, that I will give here is a free program, free7 is free .. free .. free .. free .. free .. free .. free ... always .. hahaha ...

The tutorial video recording software that I recommend is CamStudio, I think CamStudio is best and the most excellent and software of free tutorial video maker ,easy to use compared to other free softwares. Camstudio can record the activity on the screen either on a particular part only or the whole area of the monitor. The result can be saved in AVI and FLV formats, plus you can record audio also.

So, to find out more details, please download here: Download Camstudio
Other download link : www.4shared.com/file/jFCwhMMH/CamStudio_-_Portable__ScreenRe.htm

Learn from the youtube video below about how use the software!




Tags : Screen Recorder , Video Capture software, make video tutorial on blogger ,Free Downloads Video Captured Software , hot video

Download all website contents/files with HTTrack web site copier!

hatrack Httrack website copy

Httrack is a free program (freeware) used to copy all contents of a website ranging from directory, files, pictures, videos and all the files into a local file (your hard drive) in the same directory as link from web site that you downloaded , All the parts that you have downloaded will be able to be opened offline.

To be able to use Httrack, the first thing to do is download the HTTrack program . Please download here : Download HTTrack Website Copier or directly go to www.httrack.com

HTTrack Website Copier, is an Offline Browser runs on Windows and Unix
Copyright (C) Xavier Roche and other contributors

The HTTrack web tool is free software, we can redistribute it and/or
modify it under the terms of the GNU General Public License
as published by the Free Software Foundation.

Download , install, and go to the "Help" menu for the instructions, how to use HTTrack..

HTTrack! is a free [GPL-libre-freesoftware] and easy-to-use offline browser utility.

The program allows you to download a World Wide Web site from the Internet to a local directory, building recursively all directories, getting HTML, images, and other files from the server to your computer. HTTrack arranges the original site's relative link-structure. Simply open a page of the "mirrored" website in your browser, and you can browse the site from link to link, as if you were viewing it online. Hatrack can also update an existing mirrored site, and resume interrupted downloads. HTTrack is fully configurable, and has an integrated help system.

Thursday, November 11, 2010

How strong solid state hard drive (SSD) endurance from attack?

ssd hardisk drive drive
SSD [Solid-state drive], Hard Disk Drive, which has the type of memory similar to the usb disk , that lately has been more commonly used by people and was famous for its speed and strength and also less easily damaged than the regular hard drive.

The question is, How strong or how resilient an SSD compared to regular hard drive? At least in the  video below, Intel demonstrated how a SSD endurance from attack .


RFuzzy Software, a tool to find out someone's feelings

RFuzzy Software
An Indonesian proverb say "Others in the mouth, another in the heart", that's what is sometimes difficult to guess someone's feelings, what is being spoken, it may be different from the feeling.

 A software, named RFuzzy developed by the Universidad Politécnica de Madrid, Spain to tell the feeling (emotion) a person when he speaks. By analyzing the sound, The RFuzzy Software can tell if someone is sad, excited or worried. RFuzzy analyzes sound measurements in speech, as that speech is output by another purpose-built application. Using fuzzy logic, it is able to determine whether the speaker is happy, sad or nervous. In cases where the emotion is not obvious, the system will still specify how close the speaker is to a certain emotion, as expressed through a percentage.

Although RFuzzy cannot ensure 100% to find out someone's feelings, RFuzzy can display the results based on percentage, eg 90% sad etc.
RFuzzy - A software application recognizes human emotions from conversation analysis
Developed at the UPM's Facultad de Informática, it has also been used to program robots participating in the RoboCupSoccer league
So, If you're interested, Learn more the details of this RFuzzy Software research in the INS- Information Science journal and can be consulted online, here : sciencedirect.com

Friday, November 5, 2010

Simple easy online shopping and online-stores from wazala

wazala online ecommerce store

In simple words, wazala is a site that will help you to start your online store in 15 minutes flat, Add a shopping cart [Shopping cart software is software used in e-commerce to assist people making purchases online] to your website in 15 minutes and start selling online today, Sell online, on your blog shopping cart, your website online store or facebook page e-commerce shop.....

If you are looking for the following things :

Shopping cart solutions for ...
  • Digital content developers & artists
  • Music and entertainment artists
  • Bloggers and social media marketers
  • Photographers and Illustrators
  • Indie bands and record labels

I am looking for a ...

  • Shopping cart for my facebook page
  • Online shop for my blog or website
  • E-commerce solution for my website
  • Shopping software for my online business
  • Online store for my blog or website

Show me how to ...

  • Sell online on my blog or website
  • Add a shopping cart to my website or blog
  • The business of selling online
  • Sell digital content on my website
  • Get started with online e-commerce

For all of the above purposes, please go directly to  http://www.wazala.com

Wednesday, November 3, 2010

EASEUS Data Recovery Wizard Professional 4.3.6 - Free Download and Tutorials

EASEUS Data Recovery Wizard Professional Software

EASEUS Data Recovery Wizard Professional 4.3.6 is another simple tool to recover folders and files lost because of Intentional (trashed files) or unintentional deletion, Viruses, Formatting a disk, FDISK or any other disk-partitioning tool, All other non-physical data loss problems

1. Introduction

Data Recovery Wizard is complex data recovery software developed for non-destructive data recovery from Hard Disk drives, Memory Card,  and other storage devices. It may sound complicated at first, but after reading this manual and using this Free Data Recovery Software, you'll found that despite the complexity of the software, it's very easy to use. Here's a little bit about the software:

Wizard mode leads data recovery.

Step-by-step guides walk you through recovery session painlessly and easily. Intelligentized partition analysis and file research, needless complicated setting.

Data Recovery Wizard can recover folders and files that were lost because of following causes:

1. Intentional (trashed files) or unintentional deletion
2. Viruses
3. Formatting a disk
4. FDISK or any other disk-partitioning tool
5. All other non-physical data loss problems

Data Recovery Wizard can recover files and folders from disks on which the following components have become corrupted (or even if they are completely missing):

1. Partition table (main or extended)
2. Boot record (sometimes called "BIOS Parameter Block" or BPB)
3. File allocation table (both FAT1 and FAT2 on file systems that use FAT12, FAT16 and FAT32)
4. Root folder
5. Master file table

When Data Recovery Wizard recovers your data, you need have the options of saving it to another hard drive, a network drive, a floppy disk or some other type of storage device.

2. System Requirements

Data Recovery Wizard works on all Windows-based computers. Following are detailed minimum system requirements for the Host Computer:

Operating Systems: Windows 2000, Vista, XP, Windows 7
Memory (RAM): At least 128 megabytes (the more the better)
Available Space on the Good Device: Enough space to save the recovered data; for example, if you expect to recover 40 MB lost data, the Good Device should have at least 40 MB free space (and even more if you plan to take the Host Computer as the Good Device).


3. Supported File Systems and Storage Media

Supported Storage Media

Data Recovery Wizard can be used to recover data from the following types of devices:
1. IDE HDD
2. SCSI HDD
3. SATA HDD
4. Fire Wire HDD
5. USB Disk or Floppy drive
6. Dynamic disk (include Simple Volume, Striped Volume, Spanned Volume, Mirrored Volume, RAID 5 Volume)
7. Compact Flash cards and other disk-like media that use a FAT/NTFS/EXT2/EXT3 file system to store files and folders.

Supported File Systems

Data Recovery Wizard supports the following file systems:
1. FAT12 (used by DOS and Windows on floppy disks and some small-sized media like Compact Flash cards for digital cameras)
2. FAT16 (used by DOS and Windows for partitions less than 2 gigabytes in size)
3. FAT32 (used by Windows for bigger partitions)
4. NTFS (used by Windows NT, Windows 2000, Windows XP, Windows Server 2003, Windows Vista, and Windows 7)
5. EXT2/EXT3 (used by Linux/UNIX Operating System)

 4. Features

Provides partition recovery from FAT12, FAT16, FAT32, NTFS, EXT2, EXT3 file systems.

Supports IDE/ATA, SATA, SCSI, Dynamic Disk, USB, Fire wire (IEEE1394) hard drive and other media such as Floppy Disk, USB Flash Drive, Digital Camera, Digital Audio Player and so on.
Recovers deleted files/folders even after recycle bin has been emptied or use of Shift+Del keys.
File recovery from deleted partitions, lost/missing partitions or formatted logical drives.
File recovery from missing or lost folders.
Recognizes and preserves long file names when restoring files & folders.
Browses files with thumbnail images.
Large and Multi-Disk drive support.
Data recovery from Windows 2000/XP/2003/Vista/7
Ability to recover the data from EXT2/EXT3 file system.
Ability to resume the last recovery result.
Ability to recover compressed and encrypted files on NTFS volume.

5. URGENT - Read This Before Using Data Recovery Wizard

Before you use Data Recovery Wizard to recover lost data, you must keep in mind a very important rule:
DO NOT MAKE ANY CHANGES TO THE DISK ON WHICH THE LOST DATA IS LOCATED (The Bad Device).

The success of your data recovery depends largely on your adherence to this crucial rule. When we say to make no changes to the damaged disk, we mean that you basically should leave the disk alone. This includes the following:

Do not try to delete folders or files from the Bad Device, even if you are able to see them and think that they are not damaged.


Do not try to save anything to the Bad Device.

Do not attempt to format or re-partition the Bad Device, not even with a program like fdisk or format. If the support people for these or any other applications tell you it's OK to format or re-partition the Bad Device, do not listen to them.

You will risk permanent data loss if you do not heed these warnings. If you already have made one of these mistakes, don't worry. Just don't make any more changes to the Bad Device. You can use Data Recovery Wizard free to see if your data is still recoverable. And even if Data Recovery Wizard can't detect your Bad Device, all is not lost. If your Bad Device is HDD, which is not detectable by computer's BIOS, it's URGENT for you to turn off the power of the device immediately! You will not be able to recover the device with any commercially available utilities, and you should consult a professional data recovery service provider.

6. Copyright
Windows is a registered trademark of Microsoft Corporation in the United States and other countries.
Copyright (c) 2005-2008 CHENGDU YIWO Tech Development Co., Ltd (YIWO Tech Ltd, for short). All rights reserved.

Visit http://www.easeus.com/download.htm to get the latest version

Monday, November 1, 2010

Aldo's Pianito, play piano through a computer keyboard

This summary is not available. Please click here to view the post.

Download McAfee VirusScan Enterprise v8.7i

Please, who want to try using McAfee VirusScan Enterprise v8.7i. The McAfee VirusScan Enterprise v8.7i can protect your computer from various threats, including viruses, worms, Trojan horses, and any program codes that has the potential to damage the computer system.



The following are some features of McAfee VirusScan Enterprise:

- Cover all the bases

Block a ample ambit of bacilli and awful code-even those hidden in aeroembolism files; acquisition new, alien bacilli with avant-garde heuristics and all-encompassing detection

- Defend adjoin threats that ambition Microsoft

Protect adjoin exploits targeted at Microsoft applications and services-especially for Microsoft Windows OS services, Microsoft Word, Microsoft Excel, Internet Explorer, Microsoft Outlook, and SQL server

- Curb beginning damage

Limit beginning damage, alike afore DAT files are issued; abutting ports, adviser applications and email engines, block files and directories, and trace and block infection sources

- Scans anamnesis for awful code

Detect threats that address to anamnesis rather than disk, such as CodeRed and SQLSlammer

- Protect email programs

Detect and abrade bacilli in Microsoft Outlook and Lotus Notes-including HTML argument and attachments

- Keep script-type threats at bay

Prevent threats that accomplishment javascript or Visual Basic from executing

- Optimize afterlight for alien systems

Tailor acreage updates to concrete locations and affiliation speeds: resume afterlight afterwards a burst affiliation is re-established

- Lock bottomward files

Keep VirusScan Enterprise files from actuality adapted with added admission aegis rules

- Avant-garde rootkit detection

Scan arrangement anamnesis for installed rootkits, hidden processes, and added buried awful code

See also, AntiVirus 2011, Norton and Kaspersky

Friday, October 29, 2010

Cowon JetAudio 8.0.9.1520 Plus XCV Full - Free Download

free Cowon JetAudioCowon JetAudio is a multimedia software like winamp. advantage of the jetaudio Not only play various music and video files, but also has other features such as CD burning, recording and conversion to other file formats. JetAudio program supports a huge number of formats, including WAV,MP3, MP4, 3GP, OGG, WMA, MPG, AVI, WMV, MIDI, RM , etc..

In addition to these features, with Cowon JetAudio 8.0.9.1520 Plus you have the ability to create your own Internet broadcasting by using JetCast provided the Jet Audio.


Other JetAudio features:
-Support all popular audio and video formats
-Recording music on CD
-The use of different audio effects
-Speed Control Playback
-Built-in equalizer
-Convert files between formats
-Built-in plugins visualization
-ID3 tag editor for MP3, OGG and WMA
-Synchronization of lyrics for karaoke functions
-You can watch DVD movies
-Ability to change skin interface

Features Plus VX:
"Convert video files into different formats
"Functions coding MP3/MP3Pro files
"For more audio effects (BBE and BBE ViVA)
"Advanced audio features (32-bit, DRC and Dynamic Limiter)
"Enhanced recording (Silence Detector, EQ, Low / High / Band Pass Filters)
"Additional special tools (Audio Trimmer, Audio Mixing Recorder)

Download Jet Audio 8.0.4 PLUS VX - Full Version

Free color picker download - webmaster tools

For all of you webmasters or bloggers, Memorized many HTML color codes certainly is not easy right? , You can use my online web tool on : http://webdesigncode.themes7.net , and here I would share with you 2 useful tools , Just Color Picker and Webmaster's Toolkit

1- Just Color Picker - Freeware


This is really an unique and simple HTML color tool, I love it, Just Color Picker is a utility that captures the color value of any screen pixel and displays its value in a variety of formats such as HTML, RGB, HEX, HSB/HSV, and HSL.

How to Use It

To get the color value of a pixel, point the mouse cursor at the necessary pixel and press the hotkey to hold the code of this color. The default hotkey is Alt+X . (I use f7 on my keyboard)

Click the Copy Value Button to copy the color value to the clipboard. You also can mark a part of the displayed color value with the mouse cursor before. In this case it will only copy that part to the clipboard. The button right of the Copy Value Button (up / down arrow) expands the program window and opens the RGB mixer and harmonious color finder.

The mixer contains the latest picked color, which you can modify. Move an RGB slider to modify this color. At the same time you will see six harmonious colors (contrast or light) that may be useful for your artwork or web-site.


2 - Webmaster's Toolkit 2.07 - Shareware



web html color toolkit
Webmaster's Toolkit - this is a software utility that allows to quickly measure the size of objects on the screen, determine the color of any pixel and alter or produce your own colors with the Photoshop-style Color Picker.

- measuring the distance with perfect accuracy up to a pixel
- choice of any color with a color picker in the PhotoShop style
- determining color by means of an eyedropper for any objects on the screen
- adjusting the color.

Tuesday, October 26, 2010

iTunes 10 download released

iTunes 10 download for windowsiTunes is Apple's media player application which was originally released for the Mac OS but the latter are also available from iTunes for Windows OS. ITunes 10 now was released, it is clear that nothing has changed in Cupertino. Apple still give iTunes their customers a setup program that didn't monolithic with the option to pick and choose based on your specific needs.

What's new in the iTunes 10 ?, Which obviously Apple do a little update from the iTunes logo, and replace the logo of a CD with musical notes that the previous logo appeared on the old version of itunes.

Interestingly, in this version there is a new feature named Ping, this is a social networking application that integrates with iTunes 10 and can be used to follow-on favorite celebrities and information about them but can also be used to share music files with friends.

With the presence of the iTunes Ping service, this will be a competitor to Facebook, considering that currently there are a lot of iTunes users around the world and iTunes Ping will be a serious competitor to Facebook.

Visit the Apple site to get the latest version of iTunes 10 , here : iTunes 10 download

Friday, October 22, 2010

SopCast Download - Latest News

A program that will allow you to watch video streams using Bittorrent technology, SopCast combining broadcast media channels and distribution media under one roof, the program to examine the video streaming coming from sources that are dubious. Try to download the lastest program here : SopCast Download

There are three main components of the latest SopCast programs. Live Channels will television channels to stream television from most of China, Japan, and Korea. VoD Channels are videos-on-demand, and MyServer which allows you to broadcast media from your computer to another SopCast users.

SopCast is a simple, free way to broadcast video and audio or watch video and listen to radio on the Internet. Adopting P2P (Peer-to-Peer) technology is very efficient and easy to use.

The SopCast Let people be broadcaster without the costs of a server with large bandwidth. We can build your own TV station as compared to large commercial sites with minimal resources.

And you may embed all SopCast-channels to your site / blog (example here: online.free-7.net) , just copy-pasting the following code:

<iframe id="SopFrame" name="SopFrame"
frameborder="0" src="http://www.easetuner.com/
channel/getchlist.iframe.html" width="800"
height="350" scrolling="no">
The browder doesn't support iframe.</iframe>

Okay, Learn more and Download Latest SopCast program at www.sopcastSopCast .com

Sunday, October 17, 2010

Halalscape Browser - islamic-browser ,safe and sophisticated

Halalscape islamic browser safe
As with KidZui and I'm halal (search engine) that I have post before, Halalscape also one of safe browsers that allows you to protect your children from adult contents in the Internet world.

While many scattered adult sites, gambling and porn sites. Halalscape designed to provide peace of mind. Halalscape have Performance, Security, Privacy, Customization, Productivity, Tabs, Bookmarks, Universal Access is good and much more. Halalscape has it all. Halalscape mingle with popular search engines such as Google, Yahoo, Dogpile, Altavista, Lycos, and MSN. This means you are always protected, safe and has sophisticated features .

If you are a parent and worry about your kids browsing on a non-standard browser that is protected. The browser will protect you and your children and your entire family. and good thing it is completely FREE to use.

Well, please download directly to the site here: halalscape.com

Friday, October 15, 2010

Windows phone 7 launched

windows 7 phoneMicrosoft finally announced Windows Phone 7, in October 2010 in Europe. While in America this platform will follow in November.

The above is disclosed by Microsoft COO Kevin Turner. "As said before, for me this is true. In October and November we will return to play, and this game is not yet finished," he said.

According to Turner now there are 200 million smartphones sold in the market. "If you think what happened three or five years, there will be 400-450 million smartphones," he continued.


Turner is believed that on this occasion, Microsoft will make major changes go into competition with smart phone competition. Talking about Windows 7 phone that will be present, Turner also gives notes "When you see this phone and the user interface, it's not like Microsoft's mobile phones ever released before,"

Meanwhile, Samsung has introduced a new product that will use Windows phone named Samsung Cetus, While HTC is also rumored will release a product called HTC Mystery

Windows phone 7 , windows mobile 7, windows 7 phones

Thursday, October 14, 2010

Recover formatted harddisk drive with Stellar Phoenix FAT & NTFS

To recover lost data from Hard Drives , I recommend at least 3 kinds of free data recovery softwares these programs are :

1- Ontrack Easy Recovery - Download here
2- Recuve Data Recovery - Download here
2 - Stellar Phoenix FAT & NTFS

And now I'll talk about tellar Phoenix FAT - NTFS , the tool able to recovers and repairs deleted or formated files from your hard-disk drive on Windows computer .

You must know that, reformatting a disk doesn't erase the data on the disk, only the data on the address tables. So, don't be panic, however, if you accidentally reformat a disk that has useful data. A computer specialist should be able to recover most, if not all, of the information on the disk. You can also buy programs that enable you to recover a disk yourself, or try my recomended of free recovery softwares above

Portable version

Use multiple proxies - Proxy tutorial

A question ,Why we need to hide IP..? , One of many reasons, because many websites and software applications use your IP address to track and profile your online activity. When you connect to the Internet, your computer is assigned an IP address, which is your unique identification number on the Internet. This number may contain information about where you are located, who you are, and what programs are running on your computer.

Okay, here is a tutorial on chaining proxies for the use of becoming more anonymous while online. There aren’t enough tutorials online about this subject so I decided to make an attempt at writing one. Since it’s on the subject, I included a section on chaining wingates to become anonymous on telnet.
------------------------------------------------------------------------------------

I’m going to assume that most of you have already used a proxy before to hide your real IP address or domain or maybe just used one to surf anonymously online. If you didn’t, well hopefully you can keep up and possibly learn how to use a proxy. Its also best if you know what an IP address or Domain is first, before reading this tutorial. Hmm, I guess I have to show you where to find a proxy too, check out here : Free Web Proxy List

It will be up to you to figure out which ones work or not. I’m not going to do all the work for you icon_smile.gif. You can check and see if the proxy works by going to http://www.privacy.net to see if your IP address changed.

Proxy Servers
A proxy is a server that acts as a gateway between your computer and your destination (website, IRC chat, etc.). These proxies receive requests from users to view, for example, a web page. The proxy will then forward the request to the internet, find your requested page, then send the web page back to you, the user. Most proxies come with a cache (sounds like “cash”) feature that saves former websites that were visited on that proxy.
Think of cache as a proxy’s storage room. Each site that you make the proxy visit, it saves in its own storage area (cache). So if the user or someone else requests the same site again later on, the proxy will go back into its cache, find the web page and send it back to the user. This saves time because the proxy doesn’t have to go search the Internet for the web page. It just pulls the site out of its cache.

The use of proxies to stay anonymous is a favorite thing to do among people on the Internet who are either paranoid or just security conscious. The anonymity factor comes from the proxy’s ability to hide your true Internet address. For example, if I were to run a scan on your computer right now, I would get the Internet address that was given to you by your ISP (internet service provider), but if I were to scan you while you were using a proxy, then I would get the Internet address of the proxy server. Basically the whole proxy picture looks like this…

[User]>>>>>[Proxy]>>>>>[Web Pages]

Simple enough, right? Right. So now let’s get to the chaining part.

Proxy Chaining
Proxy chaining is merely connecting to more than one proxy and then to your intended destination. You can use as many proxy servers as you can or want. The more you have, the more anonymous you will be. Remember, it doesn’t matter how many proxies you chain together, you will never be 100% anonymous. Let’s look at an example…

[User]>>[Proxy1]>>[Proxy2]>>[Proxy3]>>[Proxy4]>>[Destination]

The example shows that for a proxy chain to be created, the user must first connect to Proxy1. Once the user is connected to Proxy1, from Proxy1, the user will connect to Proxy2, from Proxy2, the user will connect to Proxy3, from Proxy3, the user will connect to Proxy4, from Proxy4, the user will then connect to the intended destination (web page, Unix server, ftp server, etc.).

All together we have 4 proxies in this example. Each proxy is a link in the chain. If the user would be scanned while on the proxy chain in the example, the IP address or domain of Proxy4 would appear on the scan. Now the problem with proxies is they tend to “die out” in a few weeks or less. It all depends. So if Proxy2 were to cease functioning, the chain wouldn’t work.
You would need to get rid of Proxy2 and just use Proxy1, Proxy3, and Proxy4 or find another proxy to take Proxy2’s place. This is why proxy chaining can be a real pain if you are using them just to surf the net. If one dies, you have to figure out which one is the one not working, so you have to go through each one to check them or until you find the one that isn’t working.

Proxy chaining is a necessity if you plan on using proxies to execute a “hack”. If you are attempting to gain unauthorized remote access to any server, whether it is through telnet, ftp, or http, chaining is a must. As I said, you will never be 100% anonymous no matter what you do online so it is possible that you still can be tracked even if u chain proxies. Chaining just makes it a lot hard to track someone.

To make it even harder, its best to use foreign proxies because if someone wanted to trace you, they would need to get logs of your use of each proxy from each proxy administrator. This could take quite a while or even never at all if one of the proxy’s, or all for that matter, belong to an admin in a country that isn’t too fond of the country you are located in.
The longer it takes for the authorities to subpoena the logs of your usage of a single proxy from that proxy’s administrator, the more chance that the other proxies that you used in the chain will have their logs deleted by the time anyone gets to the server administrators of those proxies. So when attempting to do any kind of “hack”, it’s best to use at least five or six proxies in a chain.

HTTP Chaining
HTTP chaining is basically chaining a proxy server in your browser’s address bar. Example:

http://proxy.magusnet.com/-_-http://www.google.com

Notice how the above proxy and destination (yahoo) are seperated by a (-_-) If you wanted to make a chain out of this you would simply add another proxy ex. ( http://proxy.server1.com/-_-http://proxy.server2.com/-_-http://www.destination.com)

Another way to use proxys in your address bar is by adding the proxy IP or domain then the port number. Example…

http://anon.free.anonymizer.com:80/http://www.google.com

Notice how the above proxy and destination server are seperated this time by a (/) forward slash instead of a (-_-) dash, underscore, dash. To make a chain out of this you would again simply add another proxy ex. ( http://proxy1:80/http://proxy2:80/proxy3:80/http://www.yahoo.com)

Browser Chaining
To browser chain is fairly easy. I’ll use Internet Explorer as an example since I believe it is the browser that most people have and use. First you need to find the Internet Options. You can do this by either finding the Explorer icon on the desktop, right click on it, then press properties or if you have a browser window already opened if you are online then you can go to Tools (or sometimes its View) and press Internet Options.
Now that you have the Internet Options window up you can now go to the Connections tab, then go to the first Settings button (not LAN Settings, the one above it) and click it. Now you should be in the Settings box. Put a check in the box where it says to Use a proxy server.

Now if you wanted to surf using one proxy you would merely put the proxy in the Address: space and put the proxy’s port number in the Port: space. To use a chain here you would put in a proxy along with a “:” colon then the port number followed by a space separting the next proxy then a “:” colon then the port number then a space and so on. The last proxy you add should have its port number placed inside the Port: space. If you did it, then it should look like this exactly…

Address: 213.234.124.23:80 121.172.148.23:80 143.134.54.67 Port: 80

***Notice that each proxy:port is separated by a space and that the last proxy has its port number placed in the Port: space. Do not check the box marked “Bypass proxy server for local addresses”. Press OK when you see that everything is in working order***

Wingates
A wingate is a proxy server that someone installs onto his/her computer which allows for a single or multiple online connection to take place through port 23, the default telnet port. Depending on their security, some wingates will allow anyone online to connect to them and usually stay “alive” or “working” anywhere from a few days to even months. There are people out there that scan for these Wingates and post the computer’s IP number or domain on their website to give anyone online a free list of them to use. You can also scan them yourself by using programs like WinScan.

Chaining Wingates Using Telnet
I’m going to assume you already know what telnet is so I will just get right down to it. To chain using telnet, you would first bring up the DOS prompt and type in “telnet” then your wingate. (Since telnet’s default port is 23 and all wingates run on port 23, the port number is not necessary but I will add it just to show you how you should type any port number out on screen) Example…

C:\WINDOWS>telnet 61.133.119.130 23

So now you have “telnet”, a space, the wingate IP, a space, then the port number 23. Once you are connected to the wingate it should look like this…

Wingate>

Now you would type your next wingate and port number in, then press enter like so…

Wingate> 203.207.173.166 23

You can continue to do this until you connected to as many Wingates as you need. Once you are finished with your wingates you would connect to your destination. Example…

WinGate>arbornet.org

So now the entire picture would look something like this…

C:\Windows> telnet 61.133.119.130 23

Wingate>203.207.173.166 23

Wingate>135.245.18.167 23

Wingate>m-net.arbornet.org
Connecting to host arbornet.org...Connected

Welcome to the Once and Future M-Net
FreeBSD 4.3 (m-net.arbornet.org) (ttypv)

Enter newuser at the login prompt to create a new account
Enter upgrade at the login prompt to find out about increased access

login:

Tuesday, October 12, 2010

Getting x-box live for free

For you who think about getting xbox live but not have enough money to pay for the starter kit, You can now get it for free [that's if you have a free 2 month trial] . Ok , here is what you should do...

Follow these steps:

1- Go to http://www.xbconnect.com and download the current version of XBConnect

2- You must get a Ethernet cable and connect your X-BOX to your router (if you have, you MUST have one BTW)
3- install and open xbconnect. Create a new account .......

4- go on www.xbox.com/live and sign in your .NET passport and create a profile for xbox live

5- open your xbox with a xbox live supported game and follow the setup for xbox live ....

Done

Monday, October 11, 2010

Free Ascii Art Generator, Convert picture into text

ascii art generator
Ascii Art Generator is a tool able to convert picture files to ASCII-Art. The ASCII-Art can be use for E-Mail signature, Chatting, or anything else you want.





MMMMMMMMMMM. MMMMMMMMMMM , MMMMMMMMMMMM .MMMMMMMMMMMM MMMMMMMMMMMM
MMMMMMMMMMM.. MMMMMMMMMMMM. MMMMMMMMMMMM. MMMMMMMMMMMM..MMMMMMMMMMMM
MMMMMMMMMMM.. MMMMMMMMMMMMM MMMMMMMMMMMM. MMMMMMMMMMMM..MMMMMMMMMMMM
MMMMM. MMMM ,MMMMM MMMM . MMMMM .. MMMM.
MMMMM. MMMM MMMMM MMMM MMMMM MNMM
MMMMMMMMMM. MMMMMMMMMMMMM MMMMMMMMMMM MMMMMMMMMMM .MMMM
MMMMMMMMMM. MMMMMMMMMMM MMMMMMMMMMM MMMMMMMMMMM .MMMM
MMMMMMMMMM. MMMMMMMMMM , MMMMMMMMMMM MMMMMMMMMMM, MMMM
MMMMM. MMMM MMMMM. MMMM MMMMM MMM
MMMMM. MMMM MMMMM. MMMM MMMMM .MMMM.
MMMMM. MMMM MMMMM MMMMMMMMMMMM. MMMMMMMMMMMM MMMM
MMMMM. MMMM MMMMM: MMMMMMMMMMMM. MMMMMMMMMMMM MMMM.
MMMMM. MMMM MMMMM. MMMMMMMMMMMM. MMMMMMMMMMMM MMMN
... . .... .... . ........... ............ . ..



ASCII Art Generator is an amazing graphics art to text art solution, which allows you to convert digital pictures into full color text-based images easily and quickly. You can input any message you’d like, and let your picture say what you want it to read. It supports gif, jpg, bmp files, and generates four popular formats, including html, image, rtf & ASCII.

Make your pictures/photos eye-catching with a very cool texture composed of letters and digits. You can use the online tool for free...

So, check out here : www.glassgiant.com

Thursday, October 7, 2010

Tips to Overcome Viruses on Your Computer

Viruses,Trojans,Spywares,Worms they are a disturbance on a computer that is caused by external parties for different purposes such as to steal your data, damaging your hardware, delete files, eliminate certain functions, took over the controls on your computer ,etc. To be sure there are no viruses or spywares that brings profit-making on the infected computer.

If you've let your guard down,or even if you have not, it can be hard to tell if your PC is infected. Here's what to do if you suspect the worst.

Heard this one before? You must run antivirus software and keep it up to date or else your PC will get infected, you'll lose all your data, and you'll incur the wrath of every e-mail buddy you unknowingly infect because of your carelessness.

You know they're right. Yet for one reason or another, you're not running antivirus software, or you are but it's not up to date. Maybe you turned off your virus scanner because it conflicted with another program. Maybe you got tired of upgrading after you bought Norton Antivirus 2001, 2002, and 2003. Or maybe your annual subscription of virus definitions recently expired, and you've put off renewing.

It happens. It's nothing to be ashamed of. But chances are, either you're infected right now, as we speak, or you will be very soon.

For a few days in late January, the Netsky.p worm was infecting about 2,500 PCs a day. Meanwhile the MySQL bot infected approximately 100 systems a minute (albeit not necessarily desktop PCs). As David Perry, global director of education for security software provider Trend Micro, puts it, "an unprotected [Windows] computer will become owned by a bot within 14 minutes."

Today's viruses, worms, and so-called bots--which turn your PC into a zombie that does the hacker's bidding (such as mass-mailing spam), aren't going to announce their presence. Real viruses aren't like the ones in Hollywood movies that melt down whole networks in seconds and destroy alien spacecraft. They operate in the background, quietly altering data, stealing private operations, or using your PC for their own illegal ends. This makes them hard to spot if you're not well protected.

Is Your PC "Owned?"

I should start by saying that not every system oddity is due to a virus, worm, or bot. Is your system slowing down? Is your hard drive filling up rapidly? Are programs crashing without warning? These symptoms are more likely caused by Windows, or badly written legitimate programs, rather than malware. After all, people who write malware want to hide their program's presence. People who write commercial software put icons all over your desktop. Who's going to work harder to go unnoticed?

Other indicators that may, in fact, indicate that there's nothing that you need to worry about, include:

- An automated e-mail telling you that you're sending out infected mail. E-mail viruses and worms typically come from faked addresses.
- A frantic note from a friend saying they've been infected, and therefore so have you. This is likely a hoax. It's especially suspicious if the note tells you the virus can't be detected but you can get rid of it by deleting one simple file. Don't be fooled--and don't delete that file.

I'm not saying that you should ignore such warnings. Copy the subject line or a snippet from the body of the e-mail and plug it into your favorite search engine to see if other people have received the same note. A security site may have already pegged it as a hoax.

Sniffing Out an Infection

There are signs that indicate that your PC is actually infected. A lot of network activity coming from your system (when you're not actually using Internet) can be a good indicator that something is amiss. A good software firewall, such as ZoneAlarm, will ask your permission before letting anything leave your PC, and will give you enough information to help you judge if the outgoing data is legitimate. By the way, the firewall that comes with Windows, even the improved version in XP Service Pack 2, lacks this capability.

To put a network status light in your system tray, follow these steps: In Windows XP, choose Start, Control Panel, Network Connections, right-click the network connection you want to monitor, choose Properties, check "Show icon in notification area when connected," and click OK.

If you're interested in being a PC detective, you can sniff around further for malware. By hitting Ctrl-Alt-Delete in Windows, you'll bring up the Task Manager, which will show you the various processes your system is running. Most, if not all, are legit, but if you see a file name that looks suspicious, type it into a search engine and find out what it is.

Want another place to look? In Windows XP, click Start, Run, type "services.msc" in the box, and press Enter. You'll see detailed descriptions of the services Windows is running. Something look weird? Check with your search engine.

Finally, you can do more detective work by selecting Start, Run, and typing "msconfig" in the box. With this tool you not only see the services running, but also the programs that your system is launching at startup. Again, check for anything weird.

If any of these tools won't run--or if your security software won't run--that in itself is a good sign your computer is infected. Some viruses intentionally disable such programs as a way to protect themselves.

What to Do Next

Once you're fairly sure your system is infected, don't panic. There are steps you can take to assess the damage, depending on your current level of protection.

- If you don't have any antivirus software on your system (shame on you), or if the software has stopped working, stay online and go for a free scan at one of several Web sites. There's Symantec Security Check or Trend Micro's HouseCall. If one doesn't find anything, try two. In fact, running a free online virus scan is a good way to double-check the work of your own local antivirus program. When you're done, buy or download a real antivirus program.
- If you have antivirus software, but it isn't active, get offline, unplug wires-- whatever it takes to stop your computer from communicating via the Internet. Then, promptly perform a scan with the installed software.
- If nothing seems to be working, do more research on the Web. There are several online virus libraries where you can find out about known viruses. These sites often provide instructions for removing viruses--if manual removal is possible--or a free removal tool if it isn't. Check out GriSOFT's Virus Encyclopedia, Eset's Virus Descriptions, McAffee's Virus Glossary, Symantec's Virus Encyclopedia, or Trend Micro's Virus Encyclopedia.

A Microgram of Prevention

Assuming your system is now clean, you need to make sure it stays that way. Preventing a breach of your computer's security is far more effective than cleaning up the mess afterwards. Start with a good security program, such Trend Micro's PC-Cillin, which you can buy for $50.

Don't want to shell out any money? You can cobble together security through free downloads, such as AVG Anti-Virus Free Edition, ZoneAlarm (a personal firewall), and Ad-Aware SE (an antispyware tool).

Just make sure you keep all security software up to date. The bad guys constantly try out new ways to fool security programs. Any security tool without regular, easy (if not automatic) updates isn't worth your money or your time.

Speaking of updating, the same goes for Windows. Use Windows Update (it's right there on your Start Menu) to make sure you're getting all of the high priority updates. If you run Windows XP, make sure to get the Service Pack 2 update. To find out if you already have it, right-click My Computer, and select Properties. Under the General tab, under System, it should say "Service Pack 2."

Here are a few more pointers for a virus-free life:

- Be careful with e-mail. Set your e-mail software security settings to high. Don't open messages with generic-sounding subjects that don't apply specifically to you from people you don't know. Don't open an attachment unless you're expecting it.
- If you have broadband Internet access, such as DSL or cable, get a router, even if you only have one PC. A router adds an extra layer of protection because your PC is not connecting directly with the Internet.
- Check your Internet ports. These doorways between your computer and the Internet can be open, in which case your PC is very vulnerable; closed, but still somewhat vulnerable; or stealthed (or hidden), which is safest. Visit Gibson Research's Web site and run the free ShieldsUP test to see your ports' status. If some ports show up as closed--or worse yet, open--check your router's documentation to find out how to hide them.

My recommended antivirus:

Tuesday, October 5, 2010

Linux boot process

How Linux boot process
Did you know how Linux boots? For Linux users, probably most of us don't care about what happens when booting linux in progress. In fact, in the boot we can see about linux systems that used, change the password, backup and restore databases, etc. Therefore this short tutorial tries to explain what is happening in linux when booting the events took place.

As it turns out, there is not much to the boot process:

Hardware POST and initial hardware boot loader

The hardware is powered up, a POST (Power-On Self-Test) occurs, and the initial boot loader takes over:

- If on a PC, this is the rather limited BIOS which must determine the system MBR (Master Boot Record) and turn control over to it. The system MBR will be the MBR of the first populated media, examined in whatever order the BIOS examines them. The MBR of a piece of media is its first 512-byte sector.
- If on an Alpha or a SPARC, this is instead the far more capable SRM (Alpha) or Boot ROM (SPARC), which is a mini-OS of its own.

System MBR and Linux boot loader

The system MBR should contain the Linux boot loader:

- On a PC, this is GRUB, or perhaps LILO.
- On an Alpha, this is aboot.

That boot loader is loaded into RAM and started, and it takes control of the system. Both GRUB and aboot are able to understand the Linux file systems; LILO must do everything in terms of physical addresses.

1. A boot loader finds the kernel image on the disk, loads it into memory, and starts it.
2. The kernel initializes the devices and its drivers.
3. The kernel mounts the root filesystem.
4. The kernel starts a program called init.
5. init sets the rest of the processes in motion.
6. The last processes that init starts as part of the boot sequence allow you to log in.

Identifying each stage of the boot process is invaluable in fixing boot problems and understanding the system as a whole. To start, zero in on the boot loader, which is the initial screen or prompt you get after the computer does its power-on self-test, asking which operating system to run. After you make a choice, the boot loader runs the Linux kernel, handing control of the system to the kernel.

There is a detailed discussion of the kernel elsewhere in this book from which this article is excerpted. This article covers the kernel initialization stage, the stage when the kernel prints a bunch of messages about the hardware present on the system. The kernel starts init just after it displays a message proclaiming that the kernel has mounted the root filesystem:

VFS: Mounted root (ext2 filesystem) readonly.

Soon after, you will see a message about init starting, followed by system service startup messages, and finally you get a login prompt of some sort.

NOTE On Red Hat Linux, the init note is especially obvious, because it "welcomes" you to "Red Hat Linux." All messages thereafter show success or failure in brackets at the right-hand side of the screen.

Most of this chapter deals with init, because it is the part of the boot sequence where you have the most control.
init

There is nothing special about init. It is a program just like any other on the Linux system, and you'll find it in /sbin along with other system binaries. The main purpose of init is to start and stop other programs in a particular sequence. All you have to know is how this sequence works.

There are a few different variations, but most Linux distributions use the System V style discussed here. Some distributions use a simpler version that resembles the BSD init, but you are unlikely to encounter this.

Runlevels

At any given time on a Linux system, a certain base set of processes is running. This state of the machine is called its runlevel, and it is denoted with a number from 0 through 6. The system spends most of its time in a single runlevel. However, when you shut the machine down, init switches to a different runlevel in order to terminate the system services in an orderly fashion and to tell the kernel to stop. Yet another runlevel is for single-user mode, discussed later.

The easiest way to get a handle on runlevels is to examine the init configuration file, /etc/inittab. Look for a line like the following:
id:5:initdefault:

This line means that the default runlevel on the system is 5. All lines in the inittab file take this form, with four fields separated by colons occurring in the following order:
# A unique identifier (a short string, such as id in the preceding example)
# The applicable runlevel number(s)
# The action that init should take (in the preceding example, the action is to set the default runlevel to 5)
# A command to execute (optional)

There is no command to execute in the preceding initdefault example because a command doesn't make sense in the context of setting the default runlevel. Look a little further down in inittab, until you see a line like this:

l5:5:wait:/etc/rc.d/rc 5

This line triggers most of the system configuration and services through the rc*.d and init.d directories. You can see that init is set to execute a command called /etc/rc.d/rc 5 when in runlevel 5. The wait action tells when and how init runs the command: run rc 5 once when entering runlevel 5, and then wait for this command to finish before doing anything else.

There are several different actions in addition to initdefault and wait, especially pertaining to power management, and the inittab(5) manual page tells you all about them. The ones that you're most likely to encounter are explained in the following sections.

respawn

The respawn action causes init to run the command that follows, and if the command finishes executing, to run it again. You're likely to see something similar to this line in your inittab file:
1:2345:respawn:/sbin/mingetty tty1

The getty programs provide login prompts. The preceding line is for the first virtual console (/dev/tty1), the one you see when you press ALT-F1 or CONTROL-ALT-F1. The respawn action brings the login prompt back after you log out.

ctrlaltdel

The ctrlaltdel action controls what the system does when you press CONTROL-ALT-DELETE on a virtual console. On most systems, this is some sort of reboot command using the shutdown command.

sysinit

The sysinit action is the very first thing that init should run when it starts up, before entering any runlevels.

How processes in runlevels start

You are now ready to learn how init starts the system services, just before it lets you log in. Recall this inittab line from earlier:

l5:5:wait:/etc/rc.d/rc 5

This small line triggers many other programs. rc stands for run commands, and you will hear people refer to the commands as scripts, programs, or services. So, where are these commands, anyway?

For runlevel 5, in this example, the commands are probably either in /etc/rc.d/rc5.d or /etc/rc5.d. Runlevel 1 uses rc1.d, runlevel 2 uses rc2.d, and so on. You might find the following items in the rc5.d directory:

S10sysklogd S20ppp S99gpm
S12kerneld S25netstd_nfs S99httpd
S15netstd_init S30netstd_misc S99rmnologin
S18netbase S45pcmcia S99sshd
S20acct S89atd
S20logoutd S89cron

The rc 5 command starts programs in this runlevel directory by running the following commands:

S10sysklogd start
S12kerneld start
S15netstd_init start
S18netbase start
...
S99sshd start

Notice the start argument in each command. The S in a command name means that the command should run in start mode, and the number (00 through 99) determines where in the sequence rc starts the command.

The rc*.d commands are usually shell scripts that start programs in /sbin or /usr/sbin. Normally, you can figure out what one of the commands actually does by looking at the script with less or another pager program.

You can start one of these services by hand. For example, if you want to start the httpd Web server program manually, run S99httpd start. Similarly, if you ever need to kill one of the services when the machine is on, you can run the command in the rc*.d directory with the stop argument (S99httpd stop, for instance).

Some rc*.d directories contain commands that start with K (for "kill," or stop mode). In this case, rc runs the command with the stop argument instead of start. You are most likely to encounter K commands in runlevels that shut the system down.

Adding and removing services

If you want to add, delete, or modify services in the rc*.d directories, you need to take a closer look at the files inside. A long listing reveals a structure like this:

lrwxrwxrwx . . . S10sysklogd -> ../init.d/sysklogd
lrwxrwxrwx . . . S12kerneld -> ../init.d/kerneld
lrwxrwxrwx . . . S15netstd_init -> ../init.d/netstd_init
lrwxrwxrwx . . . S18netbase -> ../init.d/netbase
...

The commands in an rc*.d directory are actually symbolic links to files in an init.d directory, usually in /etc or /etc/rc.d. Linux distributions contain these links so that they can use the same startup scripts for all runlevels. This convention is by no means a requirement, but it often makes organization a little easier.

To prevent one of the commands in the init.d directory from running in a particular runlevel, you might think of removing the symbolic link in the appropriate rc*.d directory. This does work, but if you make a mistake and ever need to put the link back in place, you might have trouble remembering the exact name of the link. Therefore, you shouldn't remove links in the rc*.d directories, but rather, add an underscore (_) to the beginning of the link name like this:
mv S99httpd _S99httpd

At boot time, rc ignores _S99httpd because it doesn't start with S or K. Furthermore, the original name is still obvious, and you have quick access to the command if you're in a pinch and need to start it by hand.

To add a service, you must create a script like the others in the init.d directory and then make a symbolic link in the correct rc*.d directory. The easiest way to write a script is to examine the scripts already in init.d, make a copy of one that you understand, and modify the copy.

When adding a service, make sure that you choose an appropriate place in the boot sequence to start the service. If the service starts too soon, it may not work, due to a dependency on some other service. For non-essential services, most systems administrators prefer numbers in the 90s, after most of the services that came with the system.

Linux distributions usually come with a command to enable and disable services in the rc*.d directories. For example, in Debian, the command is update-rc.d, and in Red Hat Linux, the command is chkconfig. Graphical user interfaces are also available. Using these programs helps keep the startup directories consistent and helps with upgrades.

HINT: One of the most common Linux installation problems is an improperly configured XFree86 server that flicks on and off, making the system unusable on console. To stop this behavior, boot into single-user mode and alter your runlevel or runlevel services. Look for something containing xdm, gdm, or kdm in your rc*.d directories, or your /etc/inittab.

Controlling init

Occasionally, you need to give init a little kick to tell it to switch runlevels, to re-read the inittab file, or just to shut down the system. Because init is always the first process on a system, its process ID is always 1.

You can control init with telinit. For example, if you want to switch to runlevel 3, use this command:

telinit 3

When switching runlevels, init tries to kill off any processes that aren't in the inittab file for the new runlevel. Therefore, you should be careful about changing runlevels.

When you need to add or remove respawning jobs or make any other change to the inittab file, you must tell init about the change and cause it to re-read the file. Some people use kill -HUP 1 to tell init to do this. This traditional method works on most versions of Unix, as long as you type it correctly. However, you can also run this telinit command:

telinit q

You can also use telinit s to switch to single-user mode.

Shutting down

init also controls how the system shuts down and reboots. The proper way to shut down a Linux machine is to use the shutdown command.

There are two basic ways to use shutdown. If you halt the system, it shuts the machine down and keeps it down. To make the machine halt immediately, use this command:

shutdown -h now
On most modern machines with reasonably recent versions of Linux, a halt cuts the power to the machine. You can also reboot the machine. For a reboot, use -r instead of -h.

The shutdown process takes several seconds. You should never reset or power off a machine during thhs stage.

In the preceding example, now is the time to shut down. This argument is mandatory, but there are many ways of specifying it. If you want the machine to go down sometime in the future, one way is to use +n, where n is the number of minutes shutdown should wait before doing its work. For other options, look at the shutdown(8) manual page.

To make the system reboot in 10 minutes, run this command:
shutdown -r +10

On Linux, shutdown notifies anyone logged on that the machine is going down, but it does little real work. If you specify a time other than now, shutdown creates a file called /etc/nologin. When this file is present, the system prohibits logins by anyone except the superuser.

When system shutdown time finally arrives, shutdown tells init to switch to runlevel 0 for a halt and runlevel 6 for a reboot. When init enters runlevel 0 or 6, all of the following takes place, which you can verify by looking at the scripts inside rc0.d and rc6.d:

1. init kills every process that it can (as it would when switching to any other runlevel).

# The initial rc0.d/rc6.d commands run, locking system files into place and making other preparations for shutdown.
# The next rc0.d/rc6.d commands unmount all filesystems other than the root.
# Further rc0.d/rc6.d commands remount the root filesystem read-only.
# Still more rc0.d/rc6.d commands write all buffered data out to the filesystem with the sync program.
# The final rc0.d/rc6.d commands tell the kernel to reboot or stop with the reboot, halt, or poweroff program.

The reboot and halt programs behave differently for each runlevel, potentially causing confusion. By default, these programs call shutdown with the -r or -h options, but if the system is already at the halt or reboot runlevel, the programs tell the kernel to shut itself off immediately. If you really want to shut your machine down in a hurry (disregarding any possible damage from a disorderly shutdown), use the -f option.