<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-1281617565918058769</id><updated>2024-09-08T05:12:28.214-07:00</updated><category term="Secuirty Software"/><category term="Downloads"/><category term="database"/><category term="free software"/><category term="free download"/><category term="secure"/><category term="Malicious Software"/><category term="Operating System"/><category term="control panel"/><category term="webhosting"/><category term="Antenna WiFi"/><category term="Developer Tools"/><category term="hacking"/><category term="E-book"/><category term="Encrypt/Decrypt Software"/><category term="Proxy"/><category term="Squid"/><category term="Tips and Trik"/><category term="google"/><category term="hotspot"/><category term="mikrotik"/><category term="success story"/><category term="yahoo"/><title type='text'>Software Code</title><subtitle type='html'>this site provide free software and tutorial of computers</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://sitesoftwarecom.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://sitesoftwarecom.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>software</name><uri>http://www.blogger.com/profile/00265351112320698523</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>66</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-1281617565918058769.post-1328933556175330818</id><published>2023-01-03T00:04:00.005-08:00</published><updated>2023-01-03T00:04:49.427-08:00</updated><title type='text'>Cara Mudah Membuat Database Dan Tabel MySQL</title><summary type="text">Untuk membuat database msql ada beberapa cara yang dapat di lakukan, diantaranya melalui command promt dan melalui phpmyadmin. Artikel ini akan menjelaskan bagaimana Cara Mudah Membuat Database Dan Tabel MySQL, dimana langkah yang tepat dilakukan adalah dengan melalui Phpmyadmin. Untuk dapat melakukan pembuatan database dan tabel melalui phpmyadmin, Anda perlu menginstall terlebih dahulu software</summary><link rel='replies' type='application/atom+xml' href='http://sitesoftwarecom.blogspot.com/feeds/1328933556175330818/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://sitesoftwarecom.blogspot.com/2023/01/cara-mudah-membuat-database-dan-tabel.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/1328933556175330818'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/1328933556175330818'/><link rel='alternate' type='text/html' href='http://sitesoftwarecom.blogspot.com/2023/01/cara-mudah-membuat-database-dan-tabel.html' title='Cara Mudah Membuat Database Dan Tabel MySQL'/><author><name>software</name><uri>http://www.blogger.com/profile/00265351112320698523</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsBbZAX3ICAWu5OC__GyjUc3d-zpkdNB1CVLxOcrkAsw9mG0kM2c_PipmL_-5tFqqkEuGVlu7zclvmbvRhQC-OV5jlD4zIMkm_yWjMA6hlnX-H4A7XAa2g7NStCAd9tcU0cqupG9W2noSLLNo3zRe6QPD3-Or1iav-IAM_7smP7_f_HJvt5ZP_SqhYqA/s72-w437-h235-c/1%20MEMBUAT%20DATABASE%20DAN%20TABEL%20MYSQL.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1281617565918058769.post-3261094538569230696</id><published>2012-11-21T18:57:00.001-08:00</published><updated>2012-11-21T18:57:57.637-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="success story"/><title type='text'>success stories of social entrepreneurs Indonesia</title><summary type="text">n
 a 10-year work plan to come, Bina Governmental NGOs want to be great 
with employees 5,000 people in 2015 (the first book, page 46), while 
relying on the spirit and the spirit early, the grassroots empowerment. The
 term variety, which is formulated to finally exact figure Bambang 
Ismawan by Harry Tjan Silalahi, &quot;helping underprivileged because they 
felt a great man&quot; (the first book, page </summary><link rel='replies' type='application/atom+xml' href='http://sitesoftwarecom.blogspot.com/feeds/3261094538569230696/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/11/success-stories-of-social-entrepreneurs.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/3261094538569230696'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/3261094538569230696'/><link rel='alternate' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/11/success-stories-of-social-entrepreneurs.html' title='success stories of social entrepreneurs Indonesia'/><author><name>software</name><uri>http://www.blogger.com/profile/00265351112320698523</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1281617565918058769.post-8463592878670732588</id><published>2012-10-31T17:44:00.000-07:00</published><updated>2012-10-31T17:44:30.268-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Trik"/><title type='text'>Convert Power Point into a Macromedia Flash MX</title><summary type="text">To convert Power Point into a Macromedia Flash MX takes several steps, among others:• Open an existing PowerPoint slides on your computer harddisc.• Click File&amp;gt; Save As&amp;gt; Save as type to select windows metafile.





• When asked if you want to save all the slides, then the answer is that each slide (every slide).• Open Macromedia Flash MX&amp;gt; File&amp;gt; Import&amp;gt; Import to Stage&amp;gt; select </summary><link rel='replies' type='application/atom+xml' href='http://sitesoftwarecom.blogspot.com/feeds/8463592878670732588/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/10/convert-power-point-into-macromedia.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/8463592878670732588'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/8463592878670732588'/><link rel='alternate' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/10/convert-power-point-into-macromedia.html' title='Convert Power Point into a Macromedia Flash MX'/><author><name>software</name><uri>http://www.blogger.com/profile/00265351112320698523</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0V_xC4chpSh-1D5ScFQe35n7l64wejqyqsViVqjjVzxPogSg8l31kjEW2Nl2ZRQnf0qFOsdRZIqkS0wQ9rBD02q7pbHqairSbWiGidqvhTvJp5q736XdR4jdVSRfIxF0walNzqkyYfv_h/s72-c/presentasi+PP.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1281617565918058769.post-1495115081346142911</id><published>2012-10-09T07:00:00.004-07:00</published><updated>2012-10-09T07:00:29.988-07:00</updated><title type='text'>Making USB Power Injector with Auto Power-ON</title><summary type="text">Some time ago, in my post entitled Making USB or USB Power Injector Power injector there are some who asked about his USB Power injector that is not equipped with Automatic System PSU so the user must turn on / turn circuit manually after Jack USB plugged in USB connector CPU. For those following my posts the development of USB Power Injector before.
In this series are equipped with Automatic PSU</summary><link rel='replies' type='application/atom+xml' href='http://sitesoftwarecom.blogspot.com/feeds/1495115081346142911/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/10/making-usb-power-injector-with-auto.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/1495115081346142911'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/1495115081346142911'/><link rel='alternate' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/10/making-usb-power-injector-with-auto.html' title='Making USB Power Injector with Auto Power-ON'/><author><name>software</name><uri>http://www.blogger.com/profile/00265351112320698523</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHQDs1O8tsSP0pf3KwhVlwZxb1jy9rwRBGag8XxVN0zurl6rA403I3JXQeWx54lo-4fPWsId6bZtJ0t4rVlLjaIkBlHugGrztICMzan_AaRdTDQ5fGjF_0uVwilpxfewQgRdC88EiibJLU/s72-c/injetor+power+1.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1281617565918058769.post-542093789795263207</id><published>2012-10-09T06:46:00.000-07:00</published><updated>2012-10-09T06:46:06.434-07:00</updated><title type='text'></title><summary type="text">How to make a USB extender. Ingredients:1. ordinary USB cable, standard aja yg 1 m or 0.5m.2. Wired LAN / UTP cabling for the network.Step 1: The USB cable is tested before use USB flash disk in the computer, it is still functioning or not. If it is OK, cut into 2 parts. There are usually red, black, and white, green. Red and black are usually for 5V supply voltages. Green white is usually a USB </summary><link rel='replies' type='application/atom+xml' href='http://sitesoftwarecom.blogspot.com/feeds/542093789795263207/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/10/how-to-make-usb-extender.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/542093789795263207'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/542093789795263207'/><link rel='alternate' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/10/how-to-make-usb-extender.html' title=''/><author><name>software</name><uri>http://www.blogger.com/profile/00265351112320698523</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1281617565918058769.post-9139032063054997401</id><published>2012-10-09T06:43:00.000-07:00</published><updated>2012-10-09T06:43:37.712-07:00</updated><title type='text'>Mikrotik Router Hotspot Billing Integration Setting </title><summary type="text">Setting Mikrotik Router Hotspot Billing integration is straightforward that, through mikrotik installed correctly, run the application &quot;Winbox Loader&quot; so that you can configure Mikrotik Router from the Windows desktop to easily and quickly without having to memorize the command line Mikrotik. After double click the Winbox application will appear as follows:

After that Click ... it would appear </summary><link rel='replies' type='application/atom+xml' href='http://sitesoftwarecom.blogspot.com/feeds/9139032063054997401/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/10/mikrotik-router-hotspot-billing.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/9139032063054997401'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/9139032063054997401'/><link rel='alternate' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/10/mikrotik-router-hotspot-billing.html' title='Mikrotik Router Hotspot Billing Integration Setting '/><author><name>software</name><uri>http://www.blogger.com/profile/00265351112320698523</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1281617565918058769.post-3750331367029274293</id><published>2012-09-11T07:14:00.001-07:00</published><updated>2012-09-11T07:14:17.379-07:00</updated><title type='text'>Configuration User Manager Hotspot In MikroTik</title><summary type="text">Mikrotik User Manager is a web-shaped management system, which is integrated with mikrotik which can be used for user-user meminage both internal mikrotik mikrotik itself or from outside the base system mikrotik itself, or often in short UserManager also with this Userman most much in use to manage users as follows: • User Hotspot billing system • PPP or PPPoE Client • DHCP Server • Wereles users</summary><link rel='replies' type='application/atom+xml' href='http://sitesoftwarecom.blogspot.com/feeds/3750331367029274293/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/09/configuration-user-manager-hotspot-in.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/3750331367029274293'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/3750331367029274293'/><link rel='alternate' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/09/configuration-user-manager-hotspot-in.html' title='Configuration User Manager Hotspot In MikroTik'/><author><name>software</name><uri>http://www.blogger.com/profile/00265351112320698523</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1281617565918058769.post-6001354065274320027</id><published>2012-06-24T06:21:00.001-07:00</published><updated>2012-06-24T06:21:29.336-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Antenna WiFi"/><category scheme="http://www.blogger.com/atom/ns#" term="hotspot"/><category scheme="http://www.blogger.com/atom/ns#" term="mikrotik"/><category scheme="http://www.blogger.com/atom/ns#" term="Secuirty Software"/><title type='text'>Billing Setting Hotspot Mikrotik Router Integration</title><summary type="text">Billing
 Setting Hotspot Mikrotik Router integration is easy, after the install 
mikrotik correctly, run the application &quot;Winbox Loader&quot; so that you can 
configure the Mikrotik Router from the Windows Desktop to easily and 
quickly without having to memorize the command line Mikrotik. After double-click the Winbox application will appear as follows:&amp;nbsp;After
 that click on the sign ... it will </summary><link rel='replies' type='application/atom+xml' href='http://sitesoftwarecom.blogspot.com/feeds/6001354065274320027/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/06/billing-setting-hotspot-mikrotik-router.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/6001354065274320027'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/6001354065274320027'/><link rel='alternate' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/06/billing-setting-hotspot-mikrotik-router.html' title='Billing Setting Hotspot Mikrotik Router Integration'/><author><name>software</name><uri>http://www.blogger.com/profile/00265351112320698523</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1281617565918058769.post-7070382604197392683</id><published>2012-06-06T03:25:00.000-07:00</published><updated>2012-06-06T03:25:03.602-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="yahoo"/><title type='text'>Yahoo Webmaster Guidelines</title><summary type="text">Bing is a machine that has a design inovatif.untuk poencari new users (new users interface) will be taken to find the information they want quickly based on what their needs with the various features, such as Quick Tabs.&amp;nbsp; Basic SEO Bing · SEO basically adalahtentanf bagaiamna create a good website. And d Bing, there are several ways you can do to achieve optimal rankings for websites that we</summary><link rel='replies' type='application/atom+xml' href='http://sitesoftwarecom.blogspot.com/feeds/7070382604197392683/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/06/yahoo-webmaster-guidelines.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/7070382604197392683'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/7070382604197392683'/><link rel='alternate' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/06/yahoo-webmaster-guidelines.html' title='Yahoo Webmaster Guidelines'/><author><name>software</name><uri>http://www.blogger.com/profile/00265351112320698523</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1281617565918058769.post-1798208433352605638</id><published>2012-06-06T03:23:00.004-07:00</published><updated>2012-06-06T03:23:55.048-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="google"/><title type='text'>Guidelines GOOGLE WEBMASTER</title><summary type="text">If your site has been completed, then we have to input the site to http://www.google/submityour content /. Submit sitemap to Google Webmaster Tools. It is used Google to learn and know about the structure of the site that we have.In to design the site, would be better if we create a site that is clear and text links. Each page must be familiar, at least with a text link. It would be better if the</summary><link rel='replies' type='application/atom+xml' href='http://sitesoftwarecom.blogspot.com/feeds/1798208433352605638/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/06/guidelines-google-webmaster.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/1798208433352605638'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/1798208433352605638'/><link rel='alternate' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/06/guidelines-google-webmaster.html' title='Guidelines GOOGLE WEBMASTER'/><author><name>software</name><uri>http://www.blogger.com/profile/00265351112320698523</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1281617565918058769.post-3466748733866478802</id><published>2012-06-06T03:20:00.003-07:00</published><updated>2012-06-06T03:20:31.982-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="control panel"/><category scheme="http://www.blogger.com/atom/ns#" term="webhosting"/><title type='text'>Facilities Control Panel</title><summary type="text">E-MAIL:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;E-Mail Account pengelolahan (to add, delete, edit or change the password) 3 Webmail for each email address. Webmail is a free E-Mail that allows us to read an email where &amp;amp; anytime: at home, at work or anywhere.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;POP3 account to add, edit and delete POP3 e-mail we can use in Outlook Expres&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;E-Mail Forwarding to add, </summary><link rel='replies' type='application/atom+xml' href='http://sitesoftwarecom.blogspot.com/feeds/3466748733866478802/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/06/facilities-control-panel.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/3466748733866478802'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/3466748733866478802'/><link rel='alternate' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/06/facilities-control-panel.html' title='Facilities Control Panel'/><author><name>software</name><uri>http://www.blogger.com/profile/00265351112320698523</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1281617565918058769.post-1286543022921874304</id><published>2012-06-06T03:19:00.000-07:00</published><updated>2012-06-06T03:19:03.305-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="control panel"/><category scheme="http://www.blogger.com/atom/ns#" term="webhosting"/><title type='text'>On how to use Cpanel Hosting</title><summary type="text"> Control Panel or the Web Manager is the most popular tool to manage our website. With the Control Panel, we do not need to use more manual methods to manage our website. We also do not need to contact the hosting staff for making new email addresses, subdomains, backups, creating a new database, change passwords FTP / Control Panel and so on. Everything we can do yourself by logging into the </summary><link rel='replies' type='application/atom+xml' href='http://sitesoftwarecom.blogspot.com/feeds/1286543022921874304/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/06/on-how-to-use-cpanel-hosting.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/1286543022921874304'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/1286543022921874304'/><link rel='alternate' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/06/on-how-to-use-cpanel-hosting.html' title='On how to use Cpanel Hosting'/><author><name>software</name><uri>http://www.blogger.com/profile/00265351112320698523</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1281617565918058769.post-6767767242452597169</id><published>2012-06-06T03:14:00.000-07:00</published><updated>2012-06-06T03:14:45.743-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="control panel"/><category scheme="http://www.blogger.com/atom/ns#" term="webhosting"/><title type='text'>Understanding Web Hosting</title><summary type="text">Web Hosting is an internet hosting service that allows individuals and organizations to create Web sites that are accessible through the World Wide Web (www). Web hosts are companies that provide space on a server owned or leased for use by clients, as well as providing Internet connectivity, typically in a data center. Web hosts can also provide data center space and connectivity to the Internet</summary><link rel='replies' type='application/atom+xml' href='http://sitesoftwarecom.blogspot.com/feeds/6767767242452597169/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/06/understanding-web-hosting.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/6767767242452597169'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/6767767242452597169'/><link rel='alternate' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/06/understanding-web-hosting.html' title='Understanding Web Hosting'/><author><name>software</name><uri>http://www.blogger.com/profile/00265351112320698523</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1281617565918058769.post-5745384055798618573</id><published>2012-04-21T10:09:00.001-07:00</published><updated>2012-04-21T10:10:01.320-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Antenna WiFi"/><title type='text'>How to Create or Making USB Power Injector</title><summary type="text">

How to Make, Making Power Injector USB Modem, Wi-Fi. USB Extender with a length of more than 8 feet is often an error when used to connect the USB Air Card Modem and Wireless LAN. Actually, this error does not always occur in any type of device that uses USB Extender with over 8 feet long. For
 example, a USB Extended through 12 meters, usually no error will occur 
during their use of Flash </summary><link rel='replies' type='application/atom+xml' href='http://sitesoftwarecom.blogspot.com/feeds/5745384055798618573/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/04/how-to-create-or-making-usb-power.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/5745384055798618573'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/5745384055798618573'/><link rel='alternate' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/04/how-to-create-or-making-usb-power.html' title='How to Create or Making USB Power Injector'/><author><name>software</name><uri>http://www.blogger.com/profile/00265351112320698523</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhObrvFy5PWmObs_v3edrIki4otVFpvCjN4XQxfWyVzhms9a9r1dt98AGp9XEzk_wxhoFMvMhMRkv8XTi-gWnSZsgGznw1PxmSKSRJeSIBjIfZYQfh9PKHX27pYrT6WCdpBRAPfpzNauIfR/s72-c/1.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1281617565918058769.post-7537269287865851819</id><published>2012-04-18T19:58:00.002-07:00</published><updated>2012-04-18T20:02:52.776-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="free software"/><title type='text'>YAHOO! rise to new applications</title><summary type="text">YAHOO! increase the quality of services to the user by presenting a new application on its web pages, which is Yahoo Mail, TV widget and Zimbra. The addition of these new applications is part of inistiatif Yahoo! To make its services more rich.As announced in December last year, Yahoo is now paving the way for outside developers and integrate with the features of social networking sites.Yahoo </summary><link rel='replies' type='application/atom+xml' href='http://sitesoftwarecom.blogspot.com/feeds/7537269287865851819/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/04/yahoo-rise-to-new-applications.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/7537269287865851819'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/7537269287865851819'/><link rel='alternate' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/04/yahoo-rise-to-new-applications.html' title='YAHOO! rise to new applications'/><author><name>software</name><uri>http://www.blogger.com/profile/00265351112320698523</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIDcoAoQxnfl0w4KnAz8BzKGO_smMpCwAezpW0ISETqXdp3gwy-Vot-yqGilO2MbHhmJ6z67FkulvMKC8dlxs6EBFKaro5tdhHEgMBMoVIJSpIcYROq6c57U6O4j3BiqlGFBaKbggpzMeO/s72-c/zimbra_logo-jpg1.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1281617565918058769.post-7628356082257571820</id><published>2012-04-18T19:42:00.000-07:00</published><updated>2012-04-18T19:43:36.291-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malicious Software"/><category scheme="http://www.blogger.com/atom/ns#" term="Secuirty Software"/><title type='text'>Anti malicious websites</title><summary type="text">The Chinese government wants all personal computers sold in the country must have software that can block dangerous situ-site. Site blocking software is intended to cover the sites, especially pornography. This rule is an effort to protect the younger generation of content that is considered harmfulSoftware called &quot;Green Dam Youth Escort&quot; will block access to sites banned by the government by </summary><link rel='replies' type='application/atom+xml' href='http://sitesoftwarecom.blogspot.com/feeds/7628356082257571820/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/04/anti-malicious-websites.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/7628356082257571820'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/7628356082257571820'/><link rel='alternate' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/04/anti-malicious-websites.html' title='Anti malicious websites'/><author><name>software</name><uri>http://www.blogger.com/profile/00265351112320698523</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1281617565918058769.post-5133316391732978225</id><published>2012-04-18T10:01:00.001-07:00</published><updated>2012-04-18T10:02:40.537-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="free software"/><category scheme="http://www.blogger.com/atom/ns#" term="Proxy"/><category scheme="http://www.blogger.com/atom/ns#" term="Squid"/><title type='text'>Proxy Server on Squid</title><summary type="text">Is it transparent cache?Explanation  of terms transparent and transparent proxy cache depends on the  instance, but we assume here that the context of HTTP Proxy / cache with  transparent hijacking of port 80 which is an HTTP path that failed in  the internet. The  difference is that the cache include cache, but the proxy only proxies  without caching. Transparent Overload has different meanings </summary><link rel='replies' type='application/atom+xml' href='http://sitesoftwarecom.blogspot.com/feeds/5133316391732978225/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/04/proxy-server-on-squid.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/5133316391732978225'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/5133316391732978225'/><link rel='alternate' type='text/html' href='http://sitesoftwarecom.blogspot.com/2012/04/proxy-server-on-squid.html' title='Proxy Server on Squid'/><author><name>software</name><uri>http://www.blogger.com/profile/00265351112320698523</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1281617565918058769.post-6071774411688587888</id><published>2010-10-11T21:26:00.000-07:00</published><updated>2010-10-11T21:30:01.835-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Secuirty Software"/><title type='text'>7 Tips for Keeping Passwords</title><summary type="text">Passwords are secret codes that must be protected. Many negative things can happen when your password leak into the hands of others. Learn 7 tips to keep it brief.1. Not Using Default PasswordThe default password is the password that we can be the first time. This default password should indeed be quickly replaced because of very vulnerable. The reason, the default password can be easily searched</summary><link rel='replies' type='application/atom+xml' href='http://sitesoftwarecom.blogspot.com/feeds/6071774411688587888/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://sitesoftwarecom.blogspot.com/2010/10/7-tips-for-keeping-passwords.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/6071774411688587888'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/6071774411688587888'/><link rel='alternate' type='text/html' href='http://sitesoftwarecom.blogspot.com/2010/10/7-tips-for-keeping-passwords.html' title='7 Tips for Keeping Passwords'/><author><name>software</name><uri>http://www.blogger.com/profile/00265351112320698523</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1281617565918058769.post-978042882382639437</id><published>2010-07-19T22:40:00.000-07:00</published><updated>2010-07-19T22:41:35.744-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="database"/><title type='text'>Attacking Oracle</title><summary type="text">chapter 3Scanning for Oracle  Servers Finding  an Oracle database server on the network is best achieved by doing a TCP port  scan, unless of course you already know where it is. Oracle and its peripheral  processes listen on so many different ports, chances are that one of them will  be on the default port even if most of them aren&#39;t. The following list details  some common Oracle processes and </summary><link rel='replies' type='application/atom+xml' href='http://sitesoftwarecom.blogspot.com/feeds/978042882382639437/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://sitesoftwarecom.blogspot.com/2010/07/attacking-oracle.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/978042882382639437'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/978042882382639437'/><link rel='alternate' type='text/html' href='http://sitesoftwarecom.blogspot.com/2010/07/attacking-oracle.html' title='Attacking Oracle'/><author><name>software</name><uri>http://www.blogger.com/profile/00265351112320698523</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1281617565918058769.post-6126632384418737249</id><published>2010-07-19T22:38:00.000-07:00</published><updated>2010-07-19T22:39:05.042-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="database"/><title type='text'>Database Authentication</title><summary type="text">When a client authenticates to the server, rather than  sending a password across the wire in clear text like most other RDBMSes Oracle  chooses to encrypt it. Here&#39;s how the authentication process works. First, the  client connects to the TNS Listener and requests access to the RDBMS, specifying  its SID. Provided the SID is valid the Listener responds with a TCP port and  redirects the client </summary><link rel='replies' type='application/atom+xml' href='http://sitesoftwarecom.blogspot.com/feeds/6126632384418737249/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://sitesoftwarecom.blogspot.com/2010/07/database-authentication.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/6126632384418737249'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/6126632384418737249'/><link rel='alternate' type='text/html' href='http://sitesoftwarecom.blogspot.com/2010/07/database-authentication.html' title='Database Authentication'/><author><name>software</name><uri>http://www.blogger.com/profile/00265351112320698523</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1281617565918058769.post-5157203552852709091</id><published>2010-07-19T22:34:00.000-07:00</published><updated>2010-07-19T22:37:31.291-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="database"/><title type='text'>Oracle Authentication and Authorization</title><summary type="text">Oracle  supports two kinds of accounts: database accounts and operating system accounts.  Operating system accounts are authenticated externally by the operating system  and are generally preceded with OP$, whereas database accounts are authenticated  against the database server. A number of users are created by default when the  database is installed; some of these are integral to the correct </summary><link rel='replies' type='application/atom+xml' href='http://sitesoftwarecom.blogspot.com/feeds/5157203552852709091/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://sitesoftwarecom.blogspot.com/2010/07/oracle-authentication-and-authorization.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/5157203552852709091'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/5157203552852709091'/><link rel='alternate' type='text/html' href='http://sitesoftwarecom.blogspot.com/2010/07/oracle-authentication-and-authorization.html' title='Oracle Authentication and Authorization'/><author><name>software</name><uri>http://www.blogger.com/profile/00265351112320698523</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1281617565918058769.post-5908978052047876392</id><published>2010-07-19T22:30:00.000-07:00</published><updated>2010-07-19T22:34:05.816-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="database"/><title type='text'>The Oracle Intelligent Agent</title><summary type="text">This component is peripheral to the actual RDBMS but is integral to its management. The Intelligent Agent performs a number of roles, but probably its most significant function is to gather management and performance data, which can be queried through SNMP or Oracle&#39;s own proprietary protocols. The Agent listens on TCP port 1748, 1808, and 1809. As far as SNMP is concerned the port is </summary><link rel='replies' type='application/atom+xml' href='http://sitesoftwarecom.blogspot.com/feeds/5908978052047876392/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://sitesoftwarecom.blogspot.com/2010/07/oracle-intelligent-agent.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/5908978052047876392'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/5908978052047876392'/><link rel='alternate' type='text/html' href='http://sitesoftwarecom.blogspot.com/2010/07/oracle-intelligent-agent.html' title='The Oracle Intelligent Agent'/><author><name>software</name><uri>http://www.blogger.com/profile/00265351112320698523</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1281617565918058769.post-8833267476367859477</id><published>2010-06-28T23:46:00.000-07:00</published><updated>2010-06-28T23:48:46.640-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="database"/><category scheme="http://www.blogger.com/atom/ns#" term="Secuirty Software"/><title type='text'>The Oracle RDBMS</title><summary type="text">Because  we&#39;ll be talking about the Oracle RDBMS in depth in later sections, we&#39;ll simply  cover a few of the more important details here. One of the major differences  between Oracle running on Windows and Oracle running on UNIX-based platforms is  the number of processes that combine to create the actual RDBMS. On Windows  there is simply the oracle.exe process, but on UNIX platforms there are </summary><link rel='replies' type='application/atom+xml' href='http://sitesoftwarecom.blogspot.com/feeds/8833267476367859477/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://sitesoftwarecom.blogspot.com/2010/06/oracle-rdbms.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/8833267476367859477'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/8833267476367859477'/><link rel='alternate' type='text/html' href='http://sitesoftwarecom.blogspot.com/2010/06/oracle-rdbms.html' title='The Oracle RDBMS'/><author><name>software</name><uri>http://www.blogger.com/profile/00265351112320698523</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1281617565918058769.post-2068123151166475181</id><published>2010-06-28T23:38:00.000-07:00</published><updated>2010-06-28T23:45:07.708-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="database"/><category scheme="http://www.blogger.com/atom/ns#" term="Secuirty Software"/><title type='text'>Examining the Oracle Architecture</title><summary type="text"> Chapter 2 (1)We begin this chapter by examining the physical layout of  the database, such as the Oracle processes and how they interact with the  network. We move on to examining authentication and authorization and then move  to the logical layout of the database.  Oracle Processes  and Oracle on the Network This section describes the major components of Oracle and  their interaction with the </summary><link rel='replies' type='application/atom+xml' href='http://sitesoftwarecom.blogspot.com/feeds/2068123151166475181/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://sitesoftwarecom.blogspot.com/2010/06/examining-oracle-architecture.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/2068123151166475181'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/2068123151166475181'/><link rel='alternate' type='text/html' href='http://sitesoftwarecom.blogspot.com/2010/06/examining-oracle-architecture.html' title='Examining the Oracle Architecture'/><author><name>software</name><uri>http://www.blogger.com/profile/00265351112320698523</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1281617565918058769.post-6225181523307964922</id><published>2010-06-19T00:00:00.000-07:00</published><updated>2010-06-19T00:01:12.046-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="database"/><title type='text'>Conclusion</title><summary type="text"> We believe that the best way to secure a system is to  understand how to attack it. This concept, while controversial at first sight,  has a long history in the field of cryptography and in the broader network  security field. Cryptographic systems are generally not considered &quot;secure&quot;  until they have been subjected to some degree of public scrutiny over an  extended period of time. We see no </summary><link rel='replies' type='application/atom+xml' href='http://sitesoftwarecom.blogspot.com/feeds/6225181523307964922/comments/default' title='Posting Komentar'/><link rel='replies' type='text/html' href='http://sitesoftwarecom.blogspot.com/2010/06/conclusion.html#comment-form' title='0 Komentar'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/6225181523307964922'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1281617565918058769/posts/default/6225181523307964922'/><link rel='alternate' type='text/html' href='http://sitesoftwarecom.blogspot.com/2010/06/conclusion.html' title='Conclusion'/><author><name>software</name><uri>http://www.blogger.com/profile/00265351112320698523</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>