Linkbuilding

This is a paid post written on the behalf of www.linkbuilding.org.Link Building could be one of the cleverest pieces of marketing you do – it’s low cost, highly effective at driving traffic and it can have a dramatic effect on your search engine ranking. Links are one of the most popular ways for people to find new sites and so the more quality sites that link to you the better.

Not many may want to link to your blog or your sites. Buy Links or having Seo Links is one way to do it.

Anyway, finding quality sites to target is at the heart of any effective linking strategy. ‘Quality sites’ are not the ones that are easiest to get links from but those that will drive most relevant traffic to your site.

To find quality sites, you’ve got to do methodical research before you start – lots of it.

So here are some ways to identify quality sites:

Mine your referrer logs

Check your referrer logs every day (if you don’t know how check with your ISP). Cut and paste that day’s referring websites into an Excel spreadsheet, then review once a month. Take the sites that refer most traffic and do a backwards link search looking for similar sites that you could also approach.

Find out who links to your competitors

Logic says that if sites link to your competitors, they could also link to you. This is a good start. But don’t stop at just sending ‘me-too’ link requests. Look carefully at the sites that link to your competitors. What market sectors do they come from? Are there any surprises? Is there a niche market that you haven’t thought about. Again for every useful site do a backwards link search.

Scan the Blogs

Search engines love blogs because they are full of fresh content and extensive links. They’re useful for linking because:

* Blogs are great pointers to useful interesting sites

* When you make a comment, you often get a link back to your site

* You get a feel for the real news of the day.

Now you’ve got the list, go get the links. Or better still, buy the links from www.linkbuilding.org. They have the lowest and most affordable rate around.

Continue Reading

Windows XP expiry date…

Apart from knowing that Windows is a shitty Operating System with awful security, this is another reason why I DON’T USE Windows.

Windows usually gets outdated pretty fast, and Microsoft seems to think that every single being in this whole wide world could afford a PC with high specs. And unlike Linux, you’re gonna have to pay for the goddamn license, whether you like it or not.

Well, personally,I wouldn’t mind paying for something good and have high security, but Windows is completely crap. This is just another daylight robbery, forcing people to upgrade the PC. Do take note that each new release of Windows, the requirement would be higher. More often than not, newer version of Windows is not compatible with old PCs. with lower specs.

Cleffairy: I support Open Source.

Continue Reading

How Linux Works

For those who know me and have been following my blog would have a clue by now that I am not using Windows. I’m using Ubuntu, a Linux based operating system. Most of you may wonder how Linux works.

I found an article that explains it. 😀 And I thought I’d share with you techie geeks out there, and non-techie geeks who are interested in this Operating system. Read on, please. 😀

The main problem you face when you’re attempting to lift the lid on what makes Linux tick is knowing where to start. It’s a complicated stack of software that’s been developed by thousands of people.

Following the boot sequence would be a reasonable approach, explaining what Grub actually does, before jumping into the initiation of a RAM disk and the loading of the kernel. But the problem with this is obvious. Mention Grub too early in any article and you’re likely to scare many readers away. We’d have the same problem explaining the kernel if we took a chronological approach.

Instead, we’ve opted for a top-down view, tackling each stratum of Linux technology from the desktop to the kernel as it appears to the average user. This way, you can descend from your desktop comfort zone into the underworld of Linux archaeology, where we’ll find plenty of relics from the bygone era of multi-user systems, dumb terminals, remote connections and geeks gone by.

This is one of the things that makes Linux so interesting: you can see exactly what has happened, why and when. This enables us to dissect the operating system in a way we couldn’t attempt with some alternatives, while at the same time, you learn something about why things work the way they do on the surface.

Level 1: Userspace

Before we delve into the Linux underworld, there’s one idea that’s important to understand. It’s a concept that links userspace, privileges and groups, and it governs how the whole Linux system works and how you, as a user, interact with it.

It’s based on the premise that a normal desktop user shouldn’t be able to make important system changes without proving that they have the correct administrator’s privileges to do so. This is why you’re asked for a password when you install new packages or open your distribution’s configuration panels, and it’s why a normal user can’t see the contents of the /root directory or make changes to specific files.

Your distribution will use either sudo or an administrator account to grant access to the system-wide configurable parts of your system. The former will work typically only for a single session or command, and is used as an ad-hoc solution for normal day-to-day use, much like the way both Windows 7 and OS X handle privileges.

Linux exposed - privilidges

USER CONTROL: Groups make it possible to enable and disable certain services on a per-user basis

With a full-blown system administrator’s account, on the other hand, it’s sometimes far too easy to stay logged in for too long (and thus more likely that you’ll make an irreversible mistake or change). But the reason for both methods is security.

Linux uses a system of users, groups and privilege to keep your system as secure as possible. The idea is that you can mess around with your own files as much as you like, but you can’t mess about with the integrity of the whole system without at least entering a password. It might seem slightly redundant on a system when you are the only user of your system, but as we’ll see with many other parts of Linux, this concept is a throwback to a time when the average system had many users and only a single administrator or two.

Linux is a variant of the Unix operating system, which has been one of the most common multi-user systems for decades. This means that multi-user functionality is difficult to avoid in Linux, but it’s also one of the reasons why Linux is so popular – multi-user systems have to be secure, and Linux has inherited many of the advantages of these early systems.

A user account on Linux is still self-contained, for example. All of your personal files are held within your own home directory, and it’s the same for other users of the system. You can usually see their names by looking at the contents of /home with your file manager, and depending on their permissions, even look inside other people’s home folders.

But who can and can’t read their contents is governed by the user who owns the files, and that’s down to permissions.

Permissions

Every file and directory on the Linux filesystem has nine attributes that are used to define how they can be accessed. These attributes correspond to whether a user, a group or anyone can read, write and execute the file.

You might want to share a collection of photos with other users of your system, for example, and if you create a group called ‘photos’, add all the users who you’d like access to the group and set the group permissions for the photos folder, you’ll be able to limit who has access to your images.

Any modern file manager will be able to perform this task, usually by selecting a file and choosing its properties to change its permissions. This is also how your desktop will store configuration information for your applications, tools and utilities.

Hidden directories (those that start with a full stop), are often created within your home directory, and within these you’ll find text files that your desktop and applications will use to store your setup.

No one else can see them, and it’s one of the reasons why porting your current home directory to a new distribution can be such a good idea – you’ll keep all your settings, despite the entire operating system changing.

If you come to Linux from Windows or OS X rather than through the server room, the idea that there’s something called a desktop is quite a strange one. It’s like trying to explain that Microsoft Windows is an operating system to someone who just thinks it’s ‘the computer’.

The desktop is really just a special kind of application that has been designed to aid communication between the user and any other applications you may run.

This communication part is important, because the desktop always needs to know what’s happening and where. It’s only then it can do clever things like offer virtual desktops, minimise applications, or divide windows into different activities.

There are two ways that a desktop helps this to happen. The first is through something called its API, which is the Application Programming Interface. When a programmer developers an application using a desktop’s API, they’re able to take advantage of lots of things the desktop offers. It could be spell checking, for example, or it could be the list of contacts you keep in another app that uses the same API.

Linux exposed - moblin

MOBLIN: Moblin and UNR make good use of the Clutter framework to offer accelerated and smooth scrolling graphics

When lots of applications use the same API, it creates a much more homogeneous and refined experience, and that’s exactly what we’ve come to expect of both Gnome and KDE desktops.

The reason why K3b works so well with your music files is because it’s using the same KDE API that your music player uses, and it’s the same with many Gnome apps too.

Toolkits

But applications designed for a specific desktop environment don’t have to use any one API exclusively. There are probably more APIs than there are Linux distributions, and they can do anything from complex mathematics to hardware interfacing.

This is where you’ll hear terms like Clutter and Cairo bandied around, as these are additional toolkits that can help a programmer build more unified-looking applications.

Clutter, for example, is used by both Ubuntu Netbook Remix and Moblin to create hardware-accelerated, smoothly animated GUIs for low-power devices.

It’s Clutter that scrolls the top bar down in Moblin, for instance, and provides the fade-in effects of the launch menu in UNR. Cairo helps programmers create vector graphics easily, and is the default rendering engine in GTK, the toolkit behind Gnome, for many of its icons.

Rather than locking an image to a specific resolution, vector-based images can be infinitely scaled, making them perfect for images that are going to be used in a variety of resolutions. Inter-process communication The second way the desktop helps is by using something called ‘inter-process communication’.

As you might expect from its name, this helps one process talk to another, which in the case of a desktop, is usually one application talking to another. This is important because it helps a desktop feel cohesive: your music player might want to know when an MP3 player has been connected, for example, or your wireless networking software may want to use the system-wide notification system to let you know its found an open network.

In general terms, inter-process communication is the reason why GTK apps perform better on the Gnome desktop, and KDE apps work well with KDE, but the great thing about both desktops is that they use the same compatible method for inter-process communication – a system called D-BUS.

So why do Gnome and KDE feel so different to each another? Well, it’s because they use different window managers.

The idea of a window manager stretches right back to the time when Unix systems first crawled out of the primordial soup of the command line, and started to display a terminal within a window. You could drag this single window across the cross-hatched background, and open other terminals that you could also manipulate thanks to something called TWM, an acronym that reputedly stood for Tom’s Window Manager.

It didn’t do much, but it did free the user from pages of text. You could move windows freely around the display, resize them, maximize them and let them overlap one another. And this is exactly what Gnome and KDE’s window managers are still doing today.

KDE’s window manager, dubbed KWin, augments the moving and management components of TWM with some advanced features, such as its new-found abilities to embed any window within a tabbed border, snap applications to an area of the screen or move specific applications to preset virtual activities on their own desktops.

KWin also recreates plenty of compositing effects, such as window wobble, drop shadows and reflections, an idea pioneered by Compiz. This is yet another window manager, but rather than adding functionality, it was created specifically to add eye-candy to the previously static world of window management.

Compiz is still the default replacement for Gnome’s window manager (Metacity), and you can get it on your Gnome machine if you enable the advanced effects in the Visual Effects panel. You’ll find that it seamlessly replaces the default drawing routines with hardware-accelerated compositing.

Dependencies

One of biggest hurdles for people when they switch to Linux is the idea that you can’t simply download an executable from the internet and expect it to run.

When a new version of Firefox is released, for example, you can’t just grab a file from www.mozilla.org, save it to your desktop and double-click on the file to install the new version. A few distributions are getting close to this ideal, but that’s the problem.

It’s distribution-dependent, and we’re no closer to a single solution for application installation than we were 10 years ago. The problem is down to dependencies and the different ways distributions try to tame them.

A dependency is simply a package that an application needs if it’s to work properly. These are normally the APIs that the developers have used to help them develop the application, and they need to be included because the application uses parts of its functionality.

When they’re bundled in this way they’re known as libraries, because an app will borrow one or two components from a library to add to its own functionality.

Clutter is a dependency for both Moblin and UNR, for instance, and it would need to be installed for both desktops to work. And while Firefox may seem relatively self-contained on the surface, it has a considerable list of dependencies, including Cairo, a selection of TrueType fonts and even an audio engine.

Other operating systems solve this problem by statically linking applications to the resources they require. This means that they bundle everything that an app needs in one file.

All dependencies are hidden within the setup.msi file on Windows, for example, or the DMG file on OS X, giving the application or utility everything it needs to be able to run without any further additions.

The main disadvantage with this approach is that you’ll typically end up with several different versions of the same library on your system. This takes up more space, and if a security flaw is found, you’ll have to update all the applications rather than just the single library.

Xis a stupid name for the system responsible for drawing the windows on your screen, and for managing your mouse and keyboard, but that’s the name we’re stuck with. As with the glut of programming languages called B, C, C++ and C#, X got its name because its the successor to a windowing system called W, which at least makes a little more sense.

X has been one of the most important components in the Linux operating system almost from its inception. It’s often criticised for its complexity and size, but there can’t be many pieces of software that have lasted almost 20 years, especially when graphics and GUIs have changed so much.

But there’s something even more confusing about X than its name, and that its use of the terms ‘client’ and ‘server’. This relationship hails back to a time before Linux, when X was developed to work on dumb, cheap screens and keyboards connected to a powerful Unix mainframe system.

Linux exposed - xterm

XTERM: The original XTerm is still the default failsafe terminal for many distributions, including Ubuntu

The mainframe would do all the hard work, calculating the contents of windows and the shape of the GUI, while all the screen had to do was handle the interaction and display the data. To ensure that this connectivity wasn’t tied to any single vendor, an open protocol was created to shuffle the data between the various devices, and the result was X.

Client–server confusion

What is counter-intuitive is that the server in this equation is the terminal – the bit with the screen and keyboard. The client is the machine with all the CPU horsepower.

Normally, in client–server environments, it’s the other way around, with the more powerful machine being called the server. X swaps this around because it’s the terminal that serves resources to the user, while the applications use these resources as clients.

Now that both the client and the server run on the same machine, these complications aren’t an issue. Configuration is almost automatic these days, but you can still exploit X’s client–server architecture. It’s the reason why you can have more than one graphical session on one machine, for example, and why Linux is so good for remote desktops.

The system that handles authentication when you log into your system is called PAM (Pluggable Authentication Modules), which, as its name suggests, is able to implement many different types of security systems through the use of modules.

Authentication, in this sense, is a way of securing your login details and making sure they match those in your configuration files without the data being snooped or copied in the process. If a PAM module fails the authentication process, then it can’t be trusted.

Installed modules can be found in the /etc/ pam.d/directory on most distributions. If you use Gnome, there’s one to authenticate your login at the Gdm screen, as well as enabling the auto-login feature. There are common modules for handling the standard login prompt for the command line, as well as popular commands like passwd, cvs and sudo.

Each will use Pam to make sure you are who you say you are, and because it’s pluggable, the authentication modules don’t always have to be password-based. There are modules you can configure to use biometric information, like a fingerprint, or an encrypted key held on a USB thumb drive.

The great thing about PAM is that these methods are disconnected from whatever it is you’re authenticating, which means you can freely configure your system to mix and match.

Command-line shells

The thing that controls the inner workings of your computer is known as a shell, and shells can be either graphical or text based.

Before graphical displays were used to provide interactive environments to people over a network, text-based displays were the norm, and this layer is still a vitally important part of Linux. They hide beneath your GUI, and often protrude through the GUI level when you need to accomplish a specific task that no GUI design has yet been able to contain.

There are many graphical applications that can open a window on the world of the command line, with Gnome’s Terminal and KDE’s Konsole being two of the most common. But the best thing about the shell is that you don’t need a GUI at all.

You may have seen what are known as virtual consoles, for example. These are the login prompts that appear when you hold the Alt key and press F1–F6. If you log in with your username and password through one of these, you’ll find a fully functional terminal, which can be particularly handy if your X session crashed and you need to restart it.

Consoles like these are still used by many system administrators and normal desktop users today. It takes less bandwidth to send text information over a network and it’s easier to reconstruct than its graphical counterpart, which makes it ideal for remote administration.

This also means that the command line interface is more capable than a graphical environment, if you can cope with the learning curve.

By default, if you don’t install the X Window System, most distributions will fall back to what’s known as the Bourne Again Shell – Bash for short.

Linux exposed - terminals

THE TERMINAL: Most Linux installations offer more than one way of accessing a terminal, and more than one terminal

Bash is the command line that most of us use, and it enables you to execute scripts and applications from anywhere on your system. If you don’t mind the terse user interface of text-based systems like this, you can accomplish almost anything with the command line.

There are many different shells, and each is tailored for a specific type of user. You might want a programming-like interface (C-Shell), for example, or a super-powerful do-everything shell (Z Shell), but they all offer the same basic functionality, and to get the best out of them, you need to understand something about the Linux filesystem.

We’re moving into the lower levels of the Linux operating system, leaving behind the realm of user interaction, GUIs, command lines and relative simplicity.

The best way of explaining what goes on at this level is to go through the booting process up to the point where you can choose either a graphical session or work with the command line, and the first thing you see when you turn your machine on.

The init process is used by many distributions, including Debian and Fedora, to launch everything your operating system needs to function from the moment it leaves the safety of Grub. It’s got a long history – the version used by Linux is often written as sysvinit, which shows its Unix System V heritage.

Everything from Samba to SSH will need to be started at some point, and init does this by trawling through a script for each process in a specific order, which is defined by a number at the beginning of the script’s name. Which scripts are executed is dependent on something called the runlevel of your system, and this is different from one distribution to another, and especially between distros based on Fedora and Debian.

Linux exposed - gufw

GUFW: You don’t have to mess around with Iptables manually if you don’t want to. There are many GUIs, like GUFW, that make the job much easier to manage

You can see this in action by using the init command to switch runlevels manually. On Debian-based systems, type init 1 for single-user mode, and init 5 for a full graphical environment. Older versions of Fedora, on the other hand, offer a non-networking console login at runlevel 2, network functionality at level 3, and a full blown GUI at level 5, and each process will be run in turn as your system boots. This can create a bottleneck, especially when one process is waiting for network services to be enabled.

Each script needs to wait for the previous to complete before it can run, regardless of how many other system resources are being under-utilised.

If you think the init system seems fairly antiquated, you’re not alone. Many people feel the same way, and several distributions are considering a switch from init to an alternative called upstart. Most notably, the distribution that currently sponsors its development, Ubuntu, now uses upstart as its default booting daemon, as does Fedora, and the Debian maintainers have announced their intention to switch for the next release of their distribution.

Upstart’s great advantage is that it can run scripts asynchronously. This means that when one is waiting for a network connection to appear, another can be configuring hardware or initiating X. It will even use the same scripts as init, making the boot process quicker and more efficient, which is one of the main reasons why the latest versions of Ubuntu and Fedora boot so quickly in comparison with their older counterparts.

The kernel

We’ve now covered almost everything, with one large exception, the kernel itself. As we’ve already discussed, the kernel is responsible for managing and maintaining all system resources. It’s at the heart of a running Linux system, and it’s what makes Linux, Linux.

The kernel handles the filesystem, manages processes and loads drivers, implements networking, userspaces, memory and storage. And surprisingly, for the normal user, there isn’t that much to see.

Other than the elements displayed through the /proc and /sys filesystems, and the various processes that happen to be running in the background, most of these management systems are transparent. But there are some elements that are visible, and the most notable of these is the driver framework used to control your hardware.

Most distributions choose to package drivers as modules rather than as part of the monolithic kernel, and this means they can be loaded and unloaded as and when you need them. Which kernel modules are included and which aren’t is dependent on your distribution. But if you’ve installed the kernel source code, you can usually build your own modules without too much difficulty, or install them through your distribution’s package manager.

To see what modules are running type lsmod as a system administrator to list all the modules currently plugged into the kernel. Next to each module you’ll see listed any dependencies. Like the software variety, these are a requirement for the module to work correctly.

Modules are kernel-specific, which is why your Nvidia driver might sometimes break if your distribution automatically updates the kernel. Nvidia’s GLX module needs to be built against the current version of the kernel, which is what it attempts to do when you run the installer.

Fortunately, you can install more than one version of a module, and each will be automatically detected when you choose a new kernel from the Grub menu. This is because all the various modules are hidden within the /lib/modules directory, which itself should contain further directories named after kernel versions.

You can find which version of the kernel you’re running by typing uname -a. Depending on your distribution, you can find many kernel driver modules in the /lib/modules/kernel_name/kernel/drivers directory, and this is sometimes useful if your hardware hasn’t been detected properly.

If you know exactly which module your hardware should use, for example, you can load it with the modprobe module name. You may find that your hardware works without any further configuration, but it might also be wise to check your system logs to make sure your hardware is being used as expected.

You can remove modules from memory with the rmmod command, which is useful if Nvidia’s driver installer complains that a driver is already running.

Iptables

One of the more unusual modules you’ve find listed with lsmod is ip_tables. This is part of one of the most powerful aspects to Linux – its online security.

Iptables is the system used by the kernel to implement the Linux firewall. It can govern all packets coming into and out of your system using a complex series of rules. You can change the configuration in real time using the iptables command, but unless you’re an expert, this can be difficult to understand, especially when your computer’s security is at risk.

This is a reflection of the complexity within the networking stack, rather than Iptables itself, and is a necessary side effect of trying to handle several different layers of network data at the same time. But if you’re used to other systems and you want to configure Iptables manually, we’d recommend a GUI application like Firestarter, or Ubuntu’s ufw, which was developed specifically to make Iptables easier to use.

When it’s installed, you can quickly enable the firewall by typing ufw enable as root, for instance. You can allow or block specific ports with the ufw allow and ufw deny commands, or substitute the port with the name of the service you want to block.

You can find a list of service names for the system in the /etc/services file, and if you’re really stuck, you can install an even more user-friendly front-end to Iptables by installing the gufw package.

Cleffairy: I hate Windows. Windows sucks and have an expiry date. Worsts till, it’s a bloody virus magnet. Security-wise, for me…Linux based OS is a better option.

Continue Reading

Parole oui à la sécurité !

C’est une entrée programmée

C’est un poteau payé écrit au nom de pose video surveillance. Cette compagnie fournit installation video surveillance. Vérifiez le lien : installateur video surveillance pour de plus amples informations sur la façon dont vous pouvez obtenir votre propre surveillance visuelle installée n’importe où, lorsque vous voulez.

Dites oui à la sécurité et à pas plus au conjoint de fraude, au cambriolage ou même aux bonnes paresseuses qui relâchent autour de toute heure. Obtenez votre propre surveillance visuelle maintenant.

pour de plus amples informations sur la façon dont vous pouvez obtenir votre propre surveillance visuelle installée n’importe où, lorsque vous voulez.
Dites oui à la sécurité et à pas plus au conjoint de fraude, au cambriolage ou même aux bonnes paresseuses qui relâchent autour de toute heure. Obtenez votre propre surveillance visuelle maintenant.
Continue Reading

Parole oui à la sécurité !

C’est une entrée programmée

C’est un poteau payé écrit au nom de pose video surveillance. Cette compagnie fournit installation video surveillance. Vérifiez le lien : installateur video surveillance pour de plus amples informations sur la façon dont vous pouvez obtenir votre propre surveillance visuelle installée n’importe où, lorsque vous voulez.

Dites oui à la sécurité et à pas plus au conjoint de fraude, au cambriolage ou même aux bonnes paresseuses qui relâchent autour de toute heure. Obtenez votre propre surveillance visuelle maintenant.

pour de plus amples informations sur la façon dont vous pouvez obtenir votre propre surveillance visuelle installée n’importe où, lorsque vous voulez.
Dites oui à la sécurité et à pas plus au conjoint de fraude, au cambriolage ou même aux bonnes paresseuses qui relâchent autour de toute heure. Obtenez votre propre surveillance visuelle maintenant.
Continue Reading

Staying connected is just clicks away with iTalk Whoa

Remember my previous entry where I mentioned I had a blast in iTalk Whoa launching party? Some of you asked me what is iTalk Whoa.

So what’s iTalk Whoa? Elementary my dear readers, iTalk Whoa is a Unified Messaging and Convergence platform providing single-point-access to Messaging & Collaboration systems.

In other words, iTalk Whoa provides a service that would enables you to synchronize your numerous email accounts as well as social networking sites to enable it to connect, communicate and collaborate with your families and friends in just one web portal.

WHOA! That would mean by using iTalk whoa, you get to do many things in just one web portal. It’s great isn’t it? Talk about Internet revolution. By using iTalk Whoa, you can email, SMS, make calls, connect with instant messaging and even read your favorite news through just one portal. Yes, JUST ONE PORTAL.

Sounds too good to be true? Well, believe it, because it’s true and made possible by iTalk Whoa. Staying connected with the world is just clicks away with iTalk Whoa. Efficiency at it’s best, and this product is suitable for those who are always on the go as well as lovebirds who are kept apart geographically.

Basically, iTalk Whoa! is made of:

♥Webmail

♥Push eMail

♥Calendar & Task Organizer

♥Instant Messaging (IM)

♥Voice Call

♥Web SMS

♥Synchronization

♥Social Networking Streams

♥Security

As of late, I’ve been given an opportunity to test the product before it’s launching. I’ve been given an iTalk card and so, I went ahead to their website and use the prepaid card to test the functions, etc. And  must say that it’s quite convenient to use. Please allow me to elaborate.

Webmail

Their webmail is a standards-based webmail server which enable different emails accounts to be viewed in one portal. To make long story short, iTalk Whoa is integrates with major webmail services such as MSN, Yahoo! as well as Gmail. It is also integrated with standard compliant corporate email servers. Sounds complicated? Well, it’s not. Actually, iTalk Whoa email service is some sort of email client software, like Microsoft Outlook or Mozilla Thunderbird. It it is capable of fetching your emails from your Gmail, Yahoo Mail, Live/Hotmail and other email services so that you can read your emails from different accounts from iTalk Whoa email.

It also provide real-time true push of emails & attachments, so you don’t have to worry about your emails being delayed or bounced back. It also works with IMAP, POP3, Exchange Servers and other standard protocols. Their RSS allows  the users to have a quick update on current news and entertainments as well.

Push Email

Another convenient thing about iTalk Whoa is that it enables enable emails to be pushed to your mobile. Everything is a real-time true push of emails & attachments, and the great thing about this that it works well with any mobile device without the need of a local client.

Calender and Task Organizer.

For those who are familiar with Google calendar will definitely be pleased to find that iTalk Whoa also enables you to organize your dates, appointments and whatnot. So… for those forgetful and empty headed men and women out there, go ahead and organize yourself with iTalk Whoa Calender and Task Organizer. With iTalk Calender and task Organizer, one should have no fear of being late for an appointment, a romantic date or even your own wedding anymore. Brides rejoice, no more late grooms making you stand at the altar, and you can now take your vows on time.

Instant Messaging (IM)

I have loads of IM accounts. I’ve been using Yahoo Messenger, Gtalk, as well as MSN Messenger, and I found that it’s annoying to login all of these accounts altogether to chat with my buddies online, as login in too many messenger all at once would make my PC lag. 🙁 So all these while, I’ve been using Pidgin to login all of my account and just use Pidgin to chat with my buddies who are using different kind of messenger.

iTalk Whoa IM is something like Pidgin messenger. All you need to do is just insert the login info of your various messenger and whoa, you get to just login one messenger to chat and yak non-stop with your buddies on different messengers. This is definitely better than logging into all of your messenger simultaneously. Admit it… it can get kinda confusing when you attempt to chat on your MSN, YM or even Gtalk simultaneously. With iTalk Whoa, you never have to fear sending wrong, embarrassing message to people whom you don’t intend to send the message to. Gosh, imagine sending “My boss is a complete bimbotic fool! I wish I can slap his face” to your boss when the message is originally intended to be sent to your BFF! Say no to those awkward situation anymore. Use iTalk Whoa instead!

Voice Call

Cyber lovers, and those who are in long distance relationship, iTalk Whoa is definitely for you. If you’re feeling lovesick and miss your darling who is oceans away, those sweet nothings and sexy whispers is just a few clicks away with iTalk Whoa. I did mentioned in my previous entries that I’m not quite a believer of a long distance relationship, right? Well, I still don’t believe it. Because I like physical affection. But with iTalk Whoa, perhaps long distance relationship might just work, as iTalk Whoa enables the users to communicate from PC to phone like Skype. You may ask me why use iTalk Whoa when you can use Skype. Well… iTalk Whoa gives you a lower rate. That’s why. That’s reason enough to use iTalk Whoa.

Web SMS

It is also interesting to note that iTalk also enables the users to send sms from it’s web portal. Convenient, isn’t it? Instead of typing on your mobile phone’s small keypad, you can just type your SMS directly from your keyboard and send your message to the number of your choice. It can be a local mobile, international mobile or even fixed line mobile.

Synchronization

iTalk Whoa also provides synchronization of data between desktop applications, mobile devices and vice-versa. The synchronization includes emails, contacts, calendar, notes, to-do lists as well as messages.

Social Networking Streams

Have no fear, facebook and twitter lovers. iTalk Whoa never forgets you. iTalk Whoa is integrated with most famous business and social networking services. You can point your various social networking site by using iTalk Whoa interface.

Security

Kindly note that iTalk Whoa is aimed for Windows users. I’ve tried to use other Operating System with other browsers besides Internet Explorer to test iTalk Whoa, but to no avail. It doesn’t work with browsers other than Internet Explorer, I’m afraid. I’m not quite sure why, cuz this stuff is supposed to be portal based and all web browsers should be able to access the iTalk website.  Couldn’t access the website with MAC OS either.

Anyway, my PC is a dual-boot PC, so when I couldn’t access the iTalk website from my Ubuntu by using my Mozilla Firefox, I booted up my Windows to test it with Internet Explorer, and it seems to be fine. I have fear for viruses and trojans. Paranoid of them, actually, but security wise, iTalk is safe. It provides:

* Digital Certificates for establishing Network connection using Secure Sockets

* Layer (SSL) Protocol with end-point security management

* Stored data accessible by all users within or across security domains

* Full anti-virus, anti-spam controls

iTalk Whoa also supports:

* AES encryption

* Application Certificates

* Active Directory & Group Policy with role-based administration

* Secure / Multipurpose Internet Mail Extensions (S/MIME) encryption

Whoa… iTalk Whoa certainly have a lot of things to offer, isn’t it? I’ve tried it, and it made me say ‘Whoa’, all because of their all in one communication concept. With iTalk Whoa, staying connected is just clicks away, so what are you waiting for? CLICK HERE to go to the iTalk Whoa website and I believe you’ll say WHOA too!

Cleffairy: Please note that to use iTalk Whoa… you’ll need IE6. It doesn’t work with other browser.

ITalk Whoa is a Unified Messaging and Convergence platform providing single-point-access to Messaging & Collaboration systems. iTalk Whoa provides and interface that enables users to synchronize all the email accounts, social networking sites to enable them to connect, communicate and collaborate with their families and friends.

You can email, SMS, make calls, connect with instant messaging and even read your favorite news through just one portal.

Continue Reading

Secret Identity: Nothing is what they seems to be

Yesterday a group of bloggers played a somewhat organized prank on their unsuspecting blog  readers, fellow twitter followers, as well as facebook friends. A prank… that comes rather late, in my opinion. After all, April 1st is definitely over. This prank, would have inspired a smile or even laughter if it’s conjured on 1st April 2010, but unfortunately, it is not. Some of you might be wondering what sort of prank it was. Well…head over to Merryn’s blog, and follow Foongpc on twitter @foongpc. The main subject here is, Merryn and Foongpc. Foongpc is an anonymous blogger, who never plaster his pictures all over the net met up with Merryn, along with Iamthewitch and her husband, Saucer.

.

Then, after that, they decided to play a prank via Merryn’s blog where she proceed to write an entry by putting up Iamthewitch’s husband’s picture, Saucer and mislead the readers into thinking that Saucer is Foongpc’s husband.

.

In the beginning, nothing happened until Foongpc began to rant and rave that he didn’t give permission to her to put up the bloody pictures, and seems to be pissed to the extend that he’s going to take legal action against her. While it is a fact that Merryn did not exactly mention that the picture in her entry is Foongpc’s picture, Foongpc gave many comments both on his twitter as well as in Merryn’s blog to give the impression that he is the man in the picture. And many readers were enraged by Merryn’s action; exposing what she’s not supposed to exposed. From what I gather, she probably received many hate mails and hate comments for it, and I was horrified for her safety as well as her son’s safety.

.

I was horrified because of this; the threat for legal action by Foongpc as well as the haters. And my imagination started to run wild. People are hating her for what she did then.  I was thinking, it would be a shame if crazy haters get back at her through her sweet, innocent little boy Ethan. You see… Ethan is one of Merryn’s main subject in her blog. People actually knows how Ethan looks like. Gosh, I can’t imagine the poor thing being harmed or kidnapped just because people hate Merryn for what she did! God forbids that! I may sound paranoid, but this world is no heaven where everything is protected and loads of lunatics roam about.

. The next day, another entry was made, and apparently, everything is a hoax, and it seems that it is a joke made up at the expanse of the sympathetic and foolish readers. So… I kinda wonder why when everything was out in the open, Foongpc even dares to ask us why we fools thought that he is the man in the picture while he himself seems to imply it? I don’t quite get this part of the joke, though. Was he being sarcastic or did he not know that some of us are not only Merryn’s readers but his twitter follower as well? I’m not quite sure. 😛

.

Truth be told. I was one of those stupid fools, and should have laughed at myself for being foolish. However, I couldn’t really find the heart to laugh at this little conspiracy. Why? Easy. Firstly, it’s because, deep down, I am somewhat similar to those uptight British bitch, and I am slow at getting jokes to penetrate into my brain, and secondly because I am also an anonymous blogger.

.

This may be a playful, harmless joke played at the expanse of the innocent, unsuspecting readers, but to me… the effect is not quite those of a joke. I wish I could laugh with mirth, but I couldn’t find the laughter. Instead, the joke scares me. It scares me to my very core and made me shudder in fear.

.

Yes. Shudder in fear. I experience many near-death experience before, however, it doesn’t come close to scaring me like this. Being somewhat anonymous in the world wide web all these while, I felt as if I’ve been doused by a bucket of ice through this entry, making me realized many things.

.

Things that I have somewhat neglect to delve into since earlier of this year where I am determined to lead a happier and more fulfilling life by opening up my hearts to more people, and be a better me. Through this entry, I realized that… I MUST be extremely careful when I meet people next time. Or better still… don’t bother to meet strangers at all.

.

Merryn’s entry may come out as a well organized joke, but in truth, such thing similar to the jokes she played might be real one day. It may not be from her, but I can’t honestly say others won’t do it for real-reveal one’s identity and expose what’s preferred to be private and confidential in the first place, just because they thought it’s not important and it’s funny or just because they thought it can bring traffics to their blogs.

.

If I am not careful enough while meeting strangers, they might do what Merryn did in her entry-expose someone’s identity to the public without permission. While hers is meant to be a joke, such thing might not be a joke when it’s done on me, and that, wouldn’t be a laughing matter anymore.

.

It will be an invasion of privacy in the most awful and cruel way, and if it happens to me, I’d be sure the one who did it pays dearly for the damage that has been done to me. I don’t tolerate invasion of privacy well. To me, it is a form of rape. Kindly do not ask me to chill or tell me that I think too much, because I value privacy very much.

.

Merryn’s little joke really made me think how dangerous the world wide web is, and I must thread carefully. Plastering my own pictures with my freaking face all over the net is a no, no for me. And I definitely don’t allow anyone to do it without my permission as well. If you do that… I’ll file a lawsuit. Why? Well, you wouldn’t understand it, so, let me explain. This is not going to be a pretty post, and I am somewhat prepared for flames. Well, do your worst but I’m still going to discuss this issue. It’s been in my head for quite some time, but apparently, nothing actually triggered me to write it.

.

Let me start with some questions. Do you know why Superman kept his identity a secret? Why Spiderman wears a mask covering his face? And why terrorists NEVER ever carry the picture of their family and children in their wallet?

.

The reason is extremely simple. The superheroes, and the terrorists alike have something that others do not have, which is something to protect. By not exposing themselves… their true identity to the friends and foes alike, they are protecting something precious to them, which is their loved ones.

.

Imagine everyone who knows who is Superman in his world…he may be a superhero with super powers, but the ones he loved, Lois Lane and his parents are just mere human. If the bad people finds out who is related to Superman, what would they do? Kill his family of course, cuz they are weak and powerless. They might need a kryptonite to weaken and kill Superman, but they don’t exactly need anything much to kill his human family.

.

Killing Superman’s family members is as good as having a revenge on him. I am sure many bad guys out there agree with me on this. If you can’t get the bastard, get his family. That would be good enough. This world is not exactly paradise or a heaven on earth, if you ask me. I may not be Superman, or Batman, or any being with super power.

.

I am just a normal human, but I have something to protect, which is my family. All of you may have nothing to loose by plastering the pictures of yourself and your children online and have no qualms of letting people know who you are, but I do. I don’t exactly write sweetly pleasant things that makes people happy all the time. More often than not, my writing is somewhat free… I am a very opinionated person, and what I write may hurt people’s feelings rather than not. My writing provoke people’s thoughts,and God knows how many people out there is waiting to strangle me to death for being rather peculiar and opinionated.

.

And so… I don’t quite appreciate it when people ask me why I never reveal my face online. I read a comment in Merryn’s page where someone asked Foongpc… why he doesn’t want to show his picture? He looks fine and handsome, and he shouldn’t be shy about it. This freaking stupid, brainless, bimbo-ish question irks me to death. Do you know why?

.

Because….you fools… sometimes, people kept their identity a secret not because they are not-photogenic, camera shy or they look fucking ugly. It is because they value their privacy and realize how important it is not to have unnecessary exposure in the public. They, unlike you who exposed yourself, have something important to protect, and they prefer to remain safe than sorry. One may say that they are just pictures… what harm can it do? I say many. People can recognize you on the street while you have no idea who they are. And I shudder to think that some losers out there are looking at your pictures while masturbating.

.

Absolutely freaky, if you ask me. You may say they don’t know your address, your phone number. Oh…they do know…this is the information technology era. They can trace you through Facebook… through advertising companies READ: Nuffnang and so on. Maybe you don’t get me yet, but you have to key in your IC number, address andmany other confidential details in order for you to receive payments for those ads, am I right?

.

What if some sex maniac and pedophiles reads your blog and wants you and your children so bad and they happen to have access to your confidential profiles?

.

I dare not imagine, but I shall say prayers for you and hopes nothing bad happens to you. Seriously, do you think that everything is secure? I say no. Because I live in a world where black hat hackers as well as white hat hackers exists, and breaking into people’s facebook accounts and whatnot is a piece of cake for them. Some even work as programmers…who laugh at the security of these social networking sites. By the way, did you know that in some sites, your password are visible to administrators?Am I bullshitting? No… I am not bullshitting… sometimes, to site admins, they don’t even have to see your passwords to be able to login into your accounts. They have a universal password for it. In other words, the only thing that kept these people from harassing you is just their work ethics and moral.

.

Nothing, dear readers, nothing is really secure. Anyway…please allow me to openly apologize to my former journalism lecturer as well as mass communication lecturer. I am so sorry that I did not pay much attention in class when you mention about not trusting whatever we read as well as rumours, noise and miscommunication. I’ve learn my lesson now. The hard way. I am so, so sorry and this will not be repeated on my part ever again. I promise I will try to differentiate  between white noise and the real news instead of just believing. Shame on me…and I dare to call myself a journalism grad. I don’t deserve that.

.

Cleffairy: Fame comes with a price that I am not willing to pay, because I saw first hand…that nothing is actually 100% secure in the first place. Do I sound paranoid? Childish and immature? Imagination too wild? Well, excuse me while I go and play Maplestory using a level 135 Bishop to boom at some stupid skellies by using Genesis. And maybe after that, I’ll go watch Sailormoon and waste away by reading Doraemon and Dragonball! You people go ahead and do whatever makes you happy.

.

ps: Thank you Merryn, for reminding me how dangerous the Internet can be. Your joke made me realize that not everybody is as nice as you and won’t expose people’s identity. From this day forward, only the privileged few will know who I am 😀

Continue Reading

Protect yourself with…

Not condoms, but Creative Commons.

Protect yourself, or rather, your work with Creative Commons. This is not a paid posting, but this is something I’d like to share with all of you out there. Originally, I intend to write about something else, but after reading Eric’s most recent blog entry, I can’t help but post up this one first. LOL…

No, Eric didn’t plagiarize my work or anything close to that, but his funny statement on he dare not a title that I used for my blog entry cuz he’s afraid that he might ended up selling his ass on the street because he thought that I might charged him royalty for using a sentence from my blog made me giggle non-stop, and it got me thinking about copyright.

Eric was joking, of course, but his little joke got me thinking and wonder. How many of you are concern about copyright and Fair Use when you are writing your entries? And how many of you knows that you could actually copyright your blog?

As a writer, I’ve always been concern about copyright and royalty. More often than not, I try not to use excerpts or pictures from the net, as it doesn’t belong to me, and for what it’s worth, it’s licensed and not royalty free. In other words, you cannot use it without paying or without permission, and if you did, you can be subjected to lawsuit.

I told Eric that he may use whatever he can find in my blog as long as he give credit to me as my blog is protected or rather, licensed under Creative Commons.

All right, ladies and gentlemen, what is Creative Commons? Allow me to elaborate. Creative Commons is a nonprofit corporation dedicated to making it easier for people to share and build upon the work of others, consistent with the rules of copyright.

They provide free licenses and other legal tools to mark creative work with the freedom the creator wants it to carry, so others can share, remix, use commercially, or any combination thereof.

Creative Commons defines the spectrum of possibilities between full copyright and the public domain. From all rights reserved to no rights reserved.

Creative Commons licenses help you keep your copyright while allowing certain uses of your work — a “some rights reserved” copyright.

If you scroll down, you’d notice that on the bottom right of my blog, there’s this logo:

My blog, Over A Cuppa Tea is is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 2.5 Malaysia License. And permissions beyond the scope of this license is available at cleffairy@gmail.com.

That would mean, you are free to copy and share my work with others, as long as you give the credits to me and not making money out of it.

In other words, you are not allowed to use plagiarize my article and claim it as yours and make money out of it. You are also not allowed to use my work for commercial use. You are also not allowed to modify or change my articles and claim it as yours, unless you’re using it for Fair Use.

So, to put it simply…I don’t allow the plagiarism of my work, and the use of my work without permission and if I found out you’ve been doing hanky panky stuff with my articles, your ass might be screwed.

So, my dear precious ones… if you are concern about people copying your work and making money out of it, or using your masterpiece without your permission to taint your good name, head over to Creative Commons and protect your blog, your images as well as your media under it.

For those who already knew about Creative Commons, thank you very much for bearing with me. 😀

Cleffairy: I hate plagiarism… that’s why I protect my blog under Creative Commons.

Continue Reading

Uh oh! I Seek You to Pidgin…



Uh oh! Uh oh! Uh oh!Uh oh! Uh oh!

Now, don’t go and let your imagination runs wild. That’s not my voice expressing my pleasure behind the closed door. But it’s the sound of ICQ. 😛

ICQ, pronounced as ‘I Seek You’. ICQ used to be very famous 10 years back. It’s the first IM that I used back then in the year 2000. I was introduced to the world of chatrooms back then in 2000 by my daddy, and he helped me installed my first IM ever in my PC, and I remembered how excited I got to be able to chat online with my friends from school.

Actually, he didn’t ‘introduced’ it to me, but I coerced him to install it for me cuz I thought it was fun. Hey… he can playfully flirt with ladies online behind my mummy’s back, why can’t I do the same with the boys in school using some fancy and cute nicknames?  Well, to cut the long story short, daddy dearest finally relented and sulkily installed ICQ for me in my PC so that I’d shut my mouth in front of my mum.

I remember ICQ. It was an in thing back then before MSN Messenger , Yahoo Messenger, AIM, MIRC and etcetera started to take over and dominate the world of Instant Messenger.

ICQ is a popular instant messaging computer program, which was first developed by  an Israeli company known as Mirabilis which is now taken over by AOL.

The first version of the program was released in November 1996 if my memories serves me right, and ICQ became one of the first Internet-wide instant messaging services.

I used to chat on ICQ with my friends from school and people from the net, but as time goes by ICQ somewhat faded into the background, and people started to use other IM like MSN Messenger and whatnot to communicate with each other real time on the net.

ICQ was the very first IM that I used. Then MSN messenger started to make it’s grand entrance and I got attracted to it’s cute emoticon and interface. When I started to use MSN Messenger, I found that it is more convenient and user friendly, and much more quiet… there was no sexy ‘Uh oh’ sound when someone sends me a message and therefore, I got stuck to using it for a couple of years until other messengers came along.

As time goes by I no longer use MSN Messenger full time. Partly because my friends were scattered everywhere on the net, using different kind of IM. Some of them are using other messengers, and I found it’s quite confusing to login into various type of IMs.

I don’t quite like to login into various messenger simultaneously and let them run just to wait for messages from my online friends, cuz for what it’s worth, those messengers really consume RAM, and my PC memories were never enough.

I like speed when I’m using my PC, so when I login into too many messengers at once and the PC lag, I kinda got fed up with it, and stopped chatting on most messengers including MSN messenger for a couple of years, until I discovered that there are universal chat platform that allows us to login in all of IM account at once.

One of the famous multi-platform IM client is Pidgin. Like other chat client, it is free. If you are interested, you can check it out. Just click the Pidgin to find out more about it.

Pidgin is an easy to use and free chat client used by millions.  It allows the users to connect to AIM, MSN, Yahoo, and more chat networks all at once. Pidgin supports multiple operating systems, including Windows as well as many Unix-like systems such as Linux, BSD, as well as Mac OS X.

Great, convenient IM, and Pidgin supported the chat networks below:

* AIM

* Bonjour

* Gadu-Gadu

* Google Talk

* Groupwise

* ICQ

* IRC

* MSN

* MXit

* MySpaceIM

* QQ

* SILC

* SIMPLE

* Sametime

* XMPP

* Yahoo!

* Zephyr

Pidgin is a great solution to those who have various kind of IM accounts and wanted to chat on all of these IMs without needing to login into all of those accounts at once. With Pidgin, I never had to worry about sending the wrong message to unintended recipient, as turning on too much IM surely can make me feel blur at times.

It is amazing how the Internet and IM had evolved. There used to be only one famous IM…which was ICQ. ICQ have a sentimental value to me, and I even wrote a novel loosely themed around ICQ back in 2001.

Now there’s not only ICQ serving us as an IM, but loads of IM that I couldn’t even remember the names, and things get too overwhelmed for me til I had to resort to using a multi-platform chat client in order to get all my contacts and conversation organized.

It is a wonder… how complicated Internet and things that’s related to it can be, but at the end of the day, all we want is convenience and simplicity. At least, I know I want convenience and and simplicity, that is why when it comes to IM, I choose to use Pidgin instead of login into various messengers all at once. See…. below is the screenshot of Pidgin on my desktop.

Pidgin not only spare me the confusions and headache, but it spare my system from being overloaded as well.

ICQ was the first IM that I used. My knowledge in chatting online started from there. I don’t use it anymore because people started to use other IM and I had no one to talk to on ICQ, and so, I began to use other IMs.

Currently, I’m using Pidgin. What about you? What was the first IM that you used to chat with your friends back then, and what is the current IM that you’re using now? Care to share with me?

Cleffairy: Back to basic, ladies and gentlemen.

ps: You’d notice that as of late, my entries are becoming abit techie…well…I’m in the mood for techie stuff these days, so bear with me, cuz I kinda got bored of just ranting my ass out.

Continue Reading

Coupon Heaven: Coupon Chief

I’m not quite a fan of buying things online. Seriously. I’ll be very honest with you on that. I thought that sometimes, items are somewhat expensive, and I often wonder if buying from online stores is reliable. I don’t quite like the feeling of buying things and waiting for them to arrive at my doorsteps via courier as well. I’m never good at waiting, and somehow, anticipation kills! 🙁

But as of late, after being involved in NaNoWriMo and Script Frenzy, I have been exposed to online book publishing as well as ordering online ML kits where I’m required to make some payments in order to get some stuff to work, and I found myself wishing from the bottom of my heart that I have a discount code or some sort to enable me to enjoy lower prices and rates when I desperately need to buy things online. I wish for this especially when I was shopping for royalty free pictures to be used for my book cover design. I felt that it is not worth paying for such an expensive price for just a simple picture. It’s a royal pain in my PayPal account 🙁

I browsed around and found that actually there are loads of websites that offers free coupons for the online consumers to use, though not all of them is suitable for me to use. Among them is Couponchief.com.

Coupon Chief is one of the fastest growing coupon sites, with over 250k visitors/month. They have over 50k coupons for over 15000 stores, and the coupons are free for consumers to use. Talk about frugal online shopping. Honestly, I never really knew that there are such website out there that offers so many coupons for various online shops in just one database, and best part of it that it’s all completely free to use.

Some online stores really goes for the jugular, and I believe, if you’ve been doing online shopping all these while without any discount coupons during the checkout of your shopping cart, you have been wasting quite a decent amount of money. Trust me on this. I’ve been there, and burnt a hole in my pocket.

Next time you shop online, try checking out Coupon Chief, they have loads of coupons giveaways that will entitle you for discounts for various online shops and boutique. One of the many coupons over there might be the right one for you.

Coupon Chief is a website where you can browse and find coupons, discounts and deals for thousands of stores. The site lets you search for coupons and browse them by stores and popular product tags. All listed coupons are up to date and rated by community so that you don’t have to waste your time on expired coupons.

If you are an online entrepreneur, you might want to check their website as well. With Coupon Chief, you can also make money just by uploading coupons and sharing the savings. You can check it out further in their website on how to do it.

If you are a facebook or twitter user, you can consider being their  facebook fan or their twitter follower as well. They post their updates and special offers frequently on their facebook page as well.

People who practices frugal living often take time to do coupon clippings to save on their purchases. I used to do that when I was still studying in college. I tend to collect McD’s coupons… you know… buy one Big Mac free one Fillet O Fish kinda coupons. I’m still doing coupon clippings, though not McD’s.

I’m quite amazed, actually, that now if you shop online, you can also use coupons to save on your online purchase. Trust me… when you use coupons, you can actually save heaps when buying from online stores.

Cleffairy: Every penny counts. Save up, folks.

Continue Reading