<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>share... share... and share....</title><description>This blog contains the knowledge in the field of information technology both computers, networking and programming; lifestyle; forex and life of the author</description><managingEditor>noreply@blogger.com (bLaNkxYs)</managingEditor><pubDate>Sat, 5 Oct 2024 09:02:56 +0700</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">21</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://blankxys.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle>This blog contains the knowledge in the field of information technology both computers, networking and programming; lifestyle; forex and life of the author</itunes:subtitle><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>What Is Forex Trading ????</title><link>http://blankxys.blogspot.com/2011/09/what-is-forex-trading.html</link><category>Currency</category><category>Foreign Exchanger</category><category>Forex</category><category>Stock Exchange</category><category>Trader</category><category>Trading</category><author>noreply@blogger.com (bLaNkxYs)</author><pubDate>Wed, 7 Sep 2011 09:17:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-834272159430017381.post-5759410319186608234</guid><description>Forex or FX is short for foreign exchange. So forex trading is currency trading. You&amp;nbsp;simply exchange one nation’s currency for another in the hope of making money&amp;nbsp;when the exchange rates change. The rates are constantly changing due to market&amp;nbsp;news, national events, changes in values on a country’s stock exchange, etc.


At the most basic level, imagine you exchanged some US dollars</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhofS-goN7OQoED9YBuKLImC4RYLMVmr449w1ZuUKT3oQMqHPSIRLbzegTTc8Qi7QEVUL9fNFMwrw8mkcqhTuE1eFkFbyodTO4gh-UPZXUd7_3Qd0MB1iPIBlAMjiGnlcrKWpgSIxwtsKo/s72-c/forex1.jpg.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>What Is Slackware ???</title><link>http://blankxys.blogspot.com/2011/09/what-is-slackware.html</link><category>Computer</category><category>download free linux</category><category>free</category><category>General Public License</category><category>GNU Software License</category><category>License GNU GPL</category><category>Linux</category><category>operating systems</category><author>noreply@blogger.com (bLaNkxYs)</author><pubDate>Fri, 2 Sep 2011 21:17:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-834272159430017381.post-3534157759342785177</guid><description>Slackware was the first Linux distribution to achieve&amp;nbsp;widespread use. It was started by Patrick Volkerding in late&amp;nbsp;1992. He had gotten introduced to Linux when he needed an&amp;nbsp;inexpensive LISP interpreter for a project. At that time, there&amp;nbsp;were very few distributions, so Patrick went with the&amp;nbsp;distribution from Soft Landing systems (SLS Linux).


However, SLS had some </description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSc143vwS34FvfkNeTdpVqcbfmmLQhBcQkeCWH9cix5DRhyeNHn3RExpOSzHylw2ZoQLjCsuoCSX-eJohRwV7mKeeo9GX1UGSclHAA3jV9u3G8LhP77jG8uha-jwG2FIL8xbyJDSW8uFA/s72-c/1309073894-11.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Kernel.org Cracked</title><link>http://blankxys.blogspot.com/2011/09/as-has-recently-been-announced-on-main.html</link><category>Cracker</category><category>Cracking</category><category>Hacker</category><category>Hacking</category><category>kernel.org</category><category>Linux</category><category>root</category><category>Security Vulnerabilities</category><category>virus linux</category><category>Vulnerabilities</category><author>noreply@blogger.com (bLaNkxYs)</author><pubDate>Thu, 1 Sep 2011 21:22:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-834272159430017381.post-2534777429418722648</guid><description>"As has recently been announced on the main kernel.org page, the main kernel.org server (known as “hera”) was recently compromised by an unknown intruder. This person was able to gain 
“root” access, meaning  they had the full run of the system. Speaking as just one of many  members of the kernel development community, I can say that this episode  is disturbing and embarrassing. But I can also </description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhku3hVp1TrMSO-9PmOiQWkniEPX0QZ0oazyF0PnjUEwen2h9wwNnrLmVuvXRFqNzQN4S1IDsgX-at5-AcNIaPWoqmjcUSMA91X3SVx7t4Q1eLdzCdzJqCus38Pt_P2apRzSWQbD1vqcsQ/s72-c/mirror-medium.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Free and Open Source Software</title><link>http://blankxys.blogspot.com/2011/08/free-and-open-source-software.html</link><category>free</category><category>General Public License</category><category>GNU Software License</category><category>IT</category><category>License GNU GPL</category><category>Linux</category><author>noreply@blogger.com (bLaNkxYs)</author><pubDate>Mon, 29 Aug 2011 16:29:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-834272159430017381.post-2070625393427740606</guid><description>Within the Linux community, there are two major&amp;nbsp;ideological movements at work. The Free Software movement, which we'll get into in a moment, is working toward the goal of making all software free of intellectual property restrictions, which it believes hamper technical improvement and work against the good of the community. The Open Source movement is working toward most of the same goals, </description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiecozMipfqZBOZa4n2bhb77vv2Zv6PtUlp5JouaObdk1u_qSrBUVzBpDHJwW8uMUKyKYy0YcDP67ufWRvkkvvX0arYsP-7szN-o4ZOIb1XSoXXYBDpu_7QzUm-vC7HdHDU8uwyWrfGqog/s72-c/its%252CP20fos.jpg.pagespeed.ce.WOVB6KGhw0.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>What Is Linux ???</title><link>http://blankxys.blogspot.com/2011/08/what-is-linux.html</link><category>download free linux</category><category>free</category><category>General Public License</category><category>GNU Software License</category><category>License GNU GPL</category><category>Linux</category><author>noreply@blogger.com (bLaNkxYs)</author><pubDate>Sun, 28 Aug 2011 10:26:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-834272159430017381.post-2021953060991748770</guid><description>Linux was started by Linus Torvalds in 1991 as a personal&amp;nbsp;project. He was looking for a way to run a Unix-based&amp;nbsp;operating system without spending a lot of money. In&amp;nbsp;addition, he wanted to learn the ins-and-outs of the 386&amp;nbsp;processor. It was released free-of-charge to the public so that&amp;nbsp;anyone could hack on it and make improvements under the&amp;nbsp;GNU General Public License
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg07o5dlfpF_5cL64qN2HgsbWABv83YQ-TOdFmiP2wLpIau1R5EXKuYuQ5oktxwTbgpW19JdzW32H1BbkRrG5y3PJdx373mkAzVL0LPJKHRqqDWAeMW3O8YwBzbuCiJpJAf41DjXLVkf3I/s72-c/folder+tux.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>DEFCON 19</title><link>http://blankxys.blogspot.com/2011/08/defcon-19.html</link><category>Computer</category><category>Conference</category><category>Defcon</category><category>Hacker</category><category>IT</category><category>Network</category><category>pentest</category><category>Security Vulnerabilities</category><category>Software vulnerabilities</category><category>Vulnerabilities</category><category>Web Vulnerabilities</category><author>noreply@blogger.com (bLaNkxYs)</author><pubDate>Sat, 27 Aug 2011 14:42:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-834272159430017381.post-8677374242137011236</guid><description>Defcon is the annual gathering of hackers around the world. This year, Defcon held back its activities at the Rio Hotel, Las Vegas on 4 - August 7, 2011 last. Who can not attend, you can download all the materials grand conference on the link below. Happy Hacking :D







Download Here</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYGR8g-0pfRJycyftHQdYLkDEdY66hJIzlM_4oGHlbLIGAGbsPXPdmeunV21rsjCuXBPdFaTPNPcGOMcfBxs43xP4g8OaOkI8D5UBAAo49hvgdCENXCv6puhExD5rQpT70dgUzuHYHa_M/s72-c/podium.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Trademark</title><link>http://blankxys.blogspot.com/2011/08/trademark.html</link><category>business</category><category>Trademark</category><author>noreply@blogger.com (bLaNkxYs)</author><pubDate>Wed, 24 Aug 2011 17:09:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-834272159430017381.post-8149588624432569489</guid><description>A Trademark is a mark used by an individual or business organization which represents trade or business and which is capable of distinguishing goods or services from that of others.

A trademark is typically a name, word, phrase, logo, symbol, design, image, or a combination of these elements. There is also a range of non-conventional trademarks comprising marks which do not fall into these </description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFqYWnN48yF1P9bVr4xTaHf39FfPdDKh0Ztb_YDAAe2_C083rjl9u8hYRPFj4OPufH8cONqFNcX4Z0JOSGAH_bWVVlIMBMVS0v88mYLCb_5W2LQtc4ztX2tHq8hWZ4GMCDIusk5BN64tI/s72-c/TM.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Exploring Armitage User Interface</title><link>http://blankxys.blogspot.com/2011/08/exploring-armitage-user-interface.html</link><category>Armitage</category><category>Computer</category><category>Exploit</category><category>Framework</category><category>Hostname</category><category>Internet</category><category>IP address</category><category>Linux</category><category>Metasploit</category><category>Network</category><category>network protocol</category><category>Online</category><category>pentest</category><category>Security Vulnerabilities</category><category>Vulnerabilities</category><author>noreply@blogger.com (bLaNkxYs)</author><pubDate>Tue, 23 Aug 2011 23:32:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-834272159430017381.post-185135726800333346</guid><description>The Armitage user interface has three main panels :
Modules
The modules panel lets you launch a Metasploit auxiliary module, throw an exploit, or generate a payload.
Click through the tree to find the desired module. Double click the
module to bring up a dialog with options.&amp;nbsp;
Targets
The targets panel shows all hosts in the current workspace.
Armitage represents each target as a computer </description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFfq1k9m3rbt1YDISSv7YMyKS9da8NqPKSljNVUc0wZR24ShyphenhyphenZE1CvoqcqaJdNnrGbWrDyVRnrqbJ4OkQZkgGNrDcUebgGRGPoBpgeOjGlQFZkR-kgbEntxtRP1dGXYbjVIWGxhtZjSPM/s72-c/Armitage.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>XSS Vulnerability in Wordpress 3.2.1</title><link>http://blankxys.blogspot.com/2011/08/xss-vulnerability-in-wordpress-321.html</link><category>Exploit</category><category>PHP</category><category>Vulnerabilities</category><category>Web Vulnerabilities</category><category>Wordpress</category><category>XSS</category><author>noreply@blogger.com (bLaNkxYs)</author><pubDate>Mon, 22 Aug 2011 07:45:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-834272159430017381.post-5348981836395849671</guid><description>
Improper sanitized code in Wordpress Core Module(post-template.&amp;nbsp;php) Causing Cross site Scripting. This file can be finded in&amp;nbsp;directory /wp-includes. Author can simply Update his Post titleto &amp;lt;a&amp;gt;&amp;lt;script&amp;gt;alert('1');&amp;lt;/script&amp;gt;&amp;lt;/a&amp;gt; and its will give out&amp;nbsp;alert on index page and post page.Below are the temporary patches for fixing. Vendor notified aboutthis </description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0A_PKrqBAf_ImEREQTpdBgXn10ciXzkOkKbWAe7bcXHl8DrzMDLKrLnKcHlyIBclhD4MoGZ7ezEvvHA2818mIl1bRVgqEnhSiitAKqtxDDahMh47SihEwNMdgqMv4WT1byBGiB9zsMac/s72-c/wordpress-logo.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Armitage Feature</title><link>http://blankxys.blogspot.com/2011/08/armitage-feature.html</link><category>Access</category><category>Armitage</category><category>Database</category><category>Exploit</category><category>Framework</category><category>Internet</category><category>IP address</category><category>Metasploit</category><category>Network</category><category>network protocol</category><category>operating systems</category><category>pentest</category><category>Security Vulnerabilities</category><category>Vulnerabilities</category><author>noreply@blogger.com (bLaNkxYs)</author><pubDate>Wed, 17 Aug 2011 22:01:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-834272159430017381.post-2062016825613618540</guid><description>Armitage Feature like :
1. Discovery
Armitage provide several Host&amp;nbsp;Management features available in metasploit.
You can import hosts and launch&amp;nbsp;scans to buildup a database of&amp;nbsp;possible targets and visualize them&amp;nbsp;on the screen, working with&amp;nbsp;visualizations is more interactive&amp;nbsp;when you right click on them and&amp;nbsp;configures the options and settings&amp;nbsp;according&amp;nbsp;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbGJuv5leVSyc1b6xUmZaYfVy7Konwd1BQfMTIyC853yZveUsv6m-PxqeIZgrpNCIyfUswgkpFQxoe07eUQ7BvUsnRJYa1AGbumdLXqfDpBkFCIasCCslMQ9Cfc49GBJjB6bJILbon4P8/s72-c/viewer.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Armitage – The Ultimate Attack Platform for Metasploit</title><link>http://blankxys.blogspot.com/2011/08/armitage-ultimate-attack-platform-for.html</link><category>Access</category><category>Armitage</category><category>Database</category><category>Exploit</category><category>Framework</category><category>Hostname</category><category>Internet</category><category>IP address</category><category>Metasploit</category><category>Network</category><category>network protocol</category><category>pentest</category><category>Vulnerabilities</category><author>noreply@blogger.com (bLaNkxYs)</author><pubDate>Wed, 17 Aug 2011 21:40:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-834272159430017381.post-1848921833663321664</guid><description>To use Armitage, it is necessary to&amp;nbsp;understand Metasploit. Metasploit is a&amp;nbsp;command line tool. Anything you do in&amp;nbsp;Armitage is translated into a command that&amp;nbsp;Metasploit understands. To make it easier&amp;nbsp;and funnier “Raphael Mudge” designed&amp;nbsp;Armitage, which is a user interface for&amp;nbsp;Metasploit.Armitage is a graphical management tool&amp;nbsp;for Metasploit. It helps you to </description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZ8LpxcQCLYQVfbdd8PNRpXqpVz_CDH7uDgfK6gGIBMBeIgeyAzU3LEkZp8BDuKPMJcNhRgqF2su83Fq2Q1j0mlj1O1uraVGCWTJamFduowmy1hJDVdFoSXDrsYk9vXeg1syhLVf9BriQ/s72-c/Armitage_scanned_hosts.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>TCP/IP protocol</title><link>http://blankxys.blogspot.com/2011/08/tcpip-protocol.html</link><category>Access</category><category>Bandwidth</category><category>Computer</category><category>Gateway</category><category>Internet</category><category>IP address</category><category>Network</category><category>network protocol</category><category>Online</category><category>operating systems</category><category>protocols</category><category>Server</category><author>noreply@blogger.com (bLaNkxYs)</author><pubDate>Mon, 1 Aug 2011 15:41:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-834272159430017381.post-8290539008365548298</guid><description>The TCP/IP protocol suite allows computers of all sizes, from many different computer vendors, running&amp;nbsp;totally different operating systems, to communicate with each other. It is quite amazing because its use has&amp;nbsp;far exceeded its original estimates. What started in the late 1960s as a government-financed research project&amp;nbsp;into packet switching networks has, in the 1990s, turned into </description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjT8fwht-yVgZMtPUNNSJYk9M5MS3D6hVxVqLOmM39KYw35z2TB7L4BvHkzTFsgc73OI5AQloErWnh-9P2X81jA9JlZO1yWJsnoeskVU8RW9N5Jl4E6zRgeFY-b6jMnPrUboXbB0RVo9Zs/s72-c/107ac55f-c20f-4085-b1dc-1fdc9cb54d08.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Detecting and Removing Vulnerabilities</title><link>http://blankxys.blogspot.com/2011/07/detecting-and-removing-vulnerabilities.html</link><category>Computer</category><category>IT</category><category>Network</category><category>Security Vulnerabilities</category><category>Software vulnerabilities</category><category>Vulnerabilities</category><category>Web Vulnerabilities</category><author>noreply@blogger.com (bLaNkxYs)</author><pubDate>Mon, 25 Jul 2011 22:33:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-834272159430017381.post-1692397041058100982</guid><description>Vulnerability management has evolved from simply running a&amp;nbsp;scanner on an application, computer, or network to detect&amp;nbsp;common weaknesses. Scanning is an essential element of vulnerability&amp;nbsp;management, but VM includes other technologies&amp;nbsp;and workflow that contribute to a bigger picture required for&amp;nbsp;controlling and removing vulnerabilities. The primary objectives&amp;nbsp;of VM are</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPmufrCGAjLZuMuccEHeoCyw4sHdJ-9Vnr1LNqngVSLwMoG3_15uG-eHo-UsxbbQSIhFqAvcYrKKcNOPDwHLVl-MJnfJyB-nInZKvSrIGZCJw6ks-3nQpQRiyD2vHA68emdcsaM4B6vjU/s72-c/facebook_vulnerabilities.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Where do vulnerabilities come from?</title><link>http://blankxys.blogspot.com/2011/07/where-do-vulnerabilities-come-from.html</link><category>Buffer Overflow</category><category>Computer</category><category>Exploit</category><category>General Public License</category><category>Network</category><category>Online</category><category>Programming</category><category>Software</category><category>Virus</category><category>Vulnerabilities</category><category>Worm</category><author>noreply@blogger.com (bLaNkxYs)</author><pubDate>Mon, 25 Jul 2011 22:23:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-834272159430017381.post-5159918074992524813</guid><description>Programming mistakes cause most vulnerabilities in software.&amp;nbsp;A common mistake is failing to check the size of data buffers –&amp;nbsp;a kind of storage bin of memory where a computer process&amp;nbsp;executes its functions. When a buffer overflows, it overwrites&amp;nbsp;data in adjacent memory buffers. This corrupts the stack or&amp;nbsp;heap areas of memory, which may allow the execution of an&amp;nbsp;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVtboMTEwYSSGMWT_5WLYwK7ZLgC1g6otEbZPhRxwAwBLF3QwoqwTPRIcK6Ki9bXxsHP7fRlcvPfs02gwCndWWDEaw2XwNdzPapR08ZOE8pWj1XsranSRKyKmA4Ip3nGDOu6vGBefrpV4/s72-c/application-and-os-vulnerabilities.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Linux and the GPL</title><link>http://blankxys.blogspot.com/2011/07/linux-and-gpl.html</link><category>download free linux</category><category>free</category><category>General Public License</category><category>GNU Software License</category><category>License GNU GPL</category><category>Linux</category><author>noreply@blogger.com (bLaNkxYs)</author><pubDate>Mon, 25 Jul 2011 22:07:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-834272159430017381.post-5361034559952442681</guid><description>Linux is distributed under the GNU General Public License (GPL), which, in essence, says that anyone may copy, distribute, and even sell the program, so long as changes to the source are reintroduced back to the community and the terms of the license remain unaltered. Free means that you are free to take Linux, modify it, and create your own version. Free means that you are not at the mercy of a </description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp83fTjpHurn4Zr7lpTqIHBXz5MQQJzI4RCTcu8mW9Pf8GHAqGMLgqHuq-CAlLJIvYHvZ214xzd7LUT6FlLUHpb_GQXjy78ejK8MFppd1wJLN7RxV6Mm_gjVCIw8njsCtWKljEkqEdrrU/s72-c/tux6.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Content Management System</title><link>http://blankxys.blogspot.com/2011/07/content-management-system.html</link><category>CMS</category><category>content</category><category>content management system</category><category>erp</category><category>HTML</category><category>Joomla</category><category>Programming</category><category>Web</category><category>World Wide Web</category><author>noreply@blogger.com (bLaNkxYs)</author><pubDate>Mon, 25 Jul 2011 21:36:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-834272159430017381.post-1170284929155509637</guid><description>When the World Wide Web was born, creating even the simplest web page required&amp;nbsp;learning the language of the Web: HTML. Since then, great strides in the power of web&amp;nbsp;authoring software have been made with the availability of professional web editors&amp;nbsp;such as Adobe Dreamweaver and Microsoft FrontPage. These types of editors have&amp;nbsp;made the creation and maintenance of a web site </description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9gaFDvrqezrG-a3spbuenARMt98t74fs0kfdWqVorDQchf4ETzonk1osSKOF0EDq0z9qugzuXZWP_3wAZ-5dcFitN23hExwjXmBVweC1lRBgavkbVWiPF3pzfSDW9xWdoCT4ZqfZe5M4/s72-c/content_management_system_setup.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Is Linux Really FREE?</title><link>http://blankxys.blogspot.com/2011/07/is-linux-really-free.html</link><category>download free linux</category><category>free</category><category>General Public License</category><category>GNU Software License</category><category>License GNU GPL</category><category>Linux</category><category>virus linux</category><author>noreply@blogger.com (bLaNkxYs)</author><pubDate>Sun, 24 Jul 2011 10:54:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-834272159430017381.post-5738502872198324</guid><description>In any discussion of what free means in relation to software, you'll often see the expressions "free as in speech" or "free as in beer." In this case, free isn't a question of cost, although you can get a free copy (as in free beer) of Linux and install it on your system without breaking any laws. As Robert A. Heinlein would have said, "There ain't no such thing as a free lunch." A free download </description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6cv1nEXWsQgBCi_I5kFWx3aRciigAipRKzFTZSRq-TJxwLEBqYynsuV59-bbjctlO1SyN_XlaaBOkKy_hzwvAvdnrZ2MO1vYP17nANtDqiVq0MJq98ZeIKd0yOd5mIMo_PEVCqM3CbpQ/s72-c/opensource.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>VoIP Hardware for experienced Users</title><link>http://blankxys.blogspot.com/2011/07/voip-hardware-for-experienced-users.html</link><category>Access</category><category>Computer</category><category>Gateway</category><category>Hardware</category><category>Internet</category><category>IP address</category><category>IP Phone</category><category>Network</category><category>network protocol</category><category>protocols</category><category>Server</category><category>Telephone</category><category>VoIP</category><author>noreply@blogger.com (bLaNkxYs)</author><pubDate>Sat, 23 Jul 2011 23:36:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-834272159430017381.post-2794151998117550380</guid><description>Once you are experienced in using softphone, you may start wondering whether there is an easier way&amp;nbsp;to communicate through VoIP, as using softphone via a computer is not practical—you need to turn on&amp;nbsp;your computer each time you want to communicate through VoIP or keep your computer running for a&amp;nbsp;long duration just to receive incoming call. This may not be prudent at all, since the </description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMVn6OjqfLGwsIu3WI4nnsrRPbI0nxh8HptYdTlZKI8C31mlmS2V32TBScQ_4-pmFYIWep22yunDHwktVnbjDMrzoPjWFxDf45hebev2Y_onfs3jhQ_nQue-BwZcThKJg4gDKOufcCFew/s72-c/voip.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>PC to PC Internet Telephone Call</title><link>http://blankxys.blogspot.com/2011/07/pc-to-pc-internet-telephone-call.html</link><category>Access</category><category>Bandwidth</category><category>Computer</category><category>Internet</category><category>Network</category><category>network protocol</category><category>Server</category><category>SIP Provider</category><category>Telephone</category><category>VoIP</category><author>noreply@blogger.com (bLaNkxYs)</author><pubDate>Sat, 23 Jul 2011 13:11:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-834272159430017381.post-2238885428956689625</guid><description>This part will explain the simplest VoIP call technique using a computer to call another computer or VoIP network. All you need is a computer with a sound card, headset, microphone and internet connectivity. How much these equipments will cost depend on the specification you use. But sinceVoIP for personal use does not require sophisticated equipment, these equipments will not cost much. Of these</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWLV7parNQc6ZnkavZVOTQa-KOO3xJiMMszR6Rgpz0cOP4nQVp1Kw2yk2WjyPkaXZkbeV282w6tMcKxpfjlM8P-owKjmrue59PFRjnJ9kWlkL_hXX_TX780qT2tAvbhF0yf30I0pLZZi4/s72-c/internet-phone-calling.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>What Is Internet Telephony ?</title><link>http://blankxys.blogspot.com/2011/07/what-is-internet-telephony.html</link><category>Access</category><category>Bandwidth</category><category>Gateway</category><category>Internet</category><category>IP address</category><category>IP Phone</category><category>Network</category><category>network protocol</category><category>Online</category><category>protocols</category><category>Server</category><category>SIP Provider</category><category>Telephone</category><category>VoIP</category><author>noreply@blogger.com (bLaNkxYs)</author><pubDate>Sat, 23 Jul 2011 13:04:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-834272159430017381.post-2682287732205485619</guid><description>In a simple definition, Voice over Internet Protocol (VoIP) or internet telephony is a telephone network over the internet (TCP/IP) network. Thus, you could use VoIP anywhere as long as you are connected to the internet.

There are two main internet telephony technology, i.e., H.323 and Session Initiation Protocol (SIP) that are frequently used. The former is an older standard developed by the </description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjs16HaTA6f44GzuGoVugTJc3o4kYNCaHcnKvnLfr7fI6g4HSLj4t753ZPmc7eheoxQsCG6VkoeWRdq3bgr-OpiQmhXqBAa4xmCoYKFTiDUobx6IvneF-9wNNBUtf81bTt8o3J34cYt7M/s72-c/article-page-main_ehow_images_a07_3q_v2_internet-telephone-technology-800x800.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How VoIP Works for Dummies ??</title><link>http://blankxys.blogspot.com/2011/07/how-voip-works-for-dummies.html</link><category>Access</category><category>Bandwidth</category><category>Computer</category><category>Gateway</category><category>Hostname</category><category>Internet</category><category>IP address</category><category>IP Phone</category><category>Network</category><category>network protocol</category><category>Online</category><category>protocols</category><category>Server</category><category>SIP Provider</category><category>Telephone</category><category>VoIP</category><author>noreply@blogger.com (bLaNkxYs)</author><pubDate>Sat, 23 Jul 2011 12:50:00 +0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-834272159430017381.post-2852274926548998697</guid><description>The heart of VoIP network is the softswitch. It stores all information on the subscribers. In a simple view, a VoIP softswitch basically has a table mapping the phone number of the subscriber and the computer or IP address of the subscriber.

Everytime, a subscriber wants to make a call to another subscriber. The client equipment will ask the softswitch the destination address of the other </description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOSSL1qy5UqpiJa6zFpGUf-bPaQBNh5l0WT9L7Zel_GO873RVuE3OeYaN5B5cJiw0yZSRGUb3PZx_VGa1iLRHN7gT3QJn5stg6kcY-AW8t6Iu8GOFagNiMRCrnxi4DCeJbiM4JiKXfcYo/s72-c/voip+%25281%2529.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>