Jump to content
xisto Community

phpphp

Members
  • Content Count

    113
  • Joined

  • Last visited

Posts posted by phpphp


  1. Theres this girl that i really love.... she was originally my GF..... and things were going right until the day i got to know that my friend was involved with her too and i also happen to know my friend's girlfriend who is also a very friend of my GF....... so when i knew i broke up with my GF and started asking out my guy's GF, so i could not get over my GF and i had to settle back and thats when my guy's GF agreed to date me...... so as it goes on my GF broke up later with me e heard a rumour that i was a double dater....... and i was in fully with my guy's GF............. right now my and my GF are friends and i have not even started to get over her at all.... am still in love with her................ and am dating a girl who cheats on her guy. someone please advice me on how to handle the situation cuz my ex GF now has a new BF... and yet i still want her back................ am confused

     

     

     

    if you dont understand just lemme know


    What i understand that Your friend tried to cheat and you took revenge and sacrifice your love. You current love is not your real love rather its revenge that you took from your friend. Maybe your friend's girl also wanted to make jelous your friend because you said that your friend start interested in your girl friend. But I think you should be straight farward, and you should ask both before break up. Sometimes emotional decision make situation more worst. If your girl friend was not loyal to you, then its good to leave her! If you really intrested in true love then find someone else....

  2. lol, that hilarious and bit ridiculous!Most european countries's prison has many facilities that common man may not enjoying in real life. Its funny one hostile fellow was caught by police and I visted him and astonished to see the facilities in sweden prisons :P. Many of mentioned facilities were avaliable and I thought its not bad idea to spend few days in prison.........:DDDD


  3. to be honest, today as memory size has inreased dramatically and companies dont bother to care about less memory size. So its very difficult to suggest you such program with low memory size requirement. Graphic works requires memory alot.


  4. I downloaded trial version.I scanned my HDD, and it detected a lot of trojans and backdoors, about 10.

    Anybody using it? KAV 2009 or KIS 2009

    Notice from rvalkass:

    Merged identical topics.

    I have used Kaspersky Internet Security for several months and found best Internet security solltution. I like the very intelligent virus detector and smart firewall. Another great feature is banner blocker that block every kind of advertisement unlike other advertisement blockers. In windows 7, the antivirus worked very well except few days ago I faced update problem due to unknown reason. But I am quite satisfied with this antivirus and recomoned this antivirus...

  5. I used to watch scary movie alot. But now my interest has change a little bit. The most scary movie I have seen so far is Mist. The creatures shown in this movie is very scary and different from other movie. Every scene is very scary. I like the last scene when dad kill his son and other two guys with him and then tried to kill himself to save from dreadful death. but bullets had finished and after few moments he saw rescue team has reached and they have saved alot of people. But the dad who has killed his son with his hand with very sad sound made me cry...Another scary movie which I liked is I am legend.


  6. A close friend of mine is very liberal and she sleeps with a different guy every week and continously sleeps with a few of them steadily. She's also very open about it and let's her friends know. This dosen't bother me much because shes a normal person otherwise and is great to talk to. But alot of people we know especially other girls call her a **** behind her back and constantly make fun of her. Is it really that bad to be open about sexuality, are social laws so unforgiving. I just want to know what some of you would think of her, and be realistic, like you know some of the guys who've she slept with and if you would act any different.

    Human is supposed to be honest and loyal to one partner so in this case people will definately call her ****. What I have learnt so far is that a human is recognized by character. If character is good, then people respect that person and if not then that person can never earn respect. you can ask her, what she expect from her partner?

  7. As nobel prized is distributed in Sweden and the decision was made in Oslo. The decision was shocking not only for world but also sweden. Many thinks its unfair decision and question for the credibility of Nobel Prize.
    you can read more how swedish are shocked to know about this decision...
    https://www.thelocal.se/20091009/22560
    I also dont understand what Obama has practically done for peace. The war in afghanistan and Iraq is going on same as in Bush period. Guantanamobe prison is still open as it was. Economic condition is being worst day by day. If Obama deserve this award then Bush also deserve for award for same decision.


  8. You website is okay. you have chosed godo template. Contents are pretty easy to access. Every section is seprate. Inshort website is simple and easy to use. But as its very small website with few contents and I know you will work in future...I oepend your website in firefox as website has almost half screen size header with logo, I think you can improve by reducing its size. in this way you will have extra size for even advertisement. moreover I have best internet speed, and found your website little slow to download contents. Instead of adding only one content(news) per page, you can add different catagories news or more news on home page. Because when new user comes he must be attracted with lot of material as you want to people spend their time on your website. You need to match color of your website and forum with the same logo, as people feel they are surfing same website. I think its good to have same plateform instead new page. you can add catagories section too....


  9. These companies only offer limited time hosting for spcified files size. Humyo.com is best wesite to host files. You can share files and you can do colaborated work free of cost. Moreover there is no time limitation and file size limitation as you can host files upto 5GB. I search for many free file sharing and found this best. They offer very good downloading uploading speed. You can even do you work online thorugh JAVA interface. You can even just through your files on the interface and files will start uploading like you do in your Operating system. You may get alot of space from microsoft but they have size limitation upto 20 MB. similarly google has file size limitation. But Humyo.com is best!


  10. Penny Sized nuclear battery has ben demonstrated by researchers that produces energy from the decay of radioisotopes. As radioactive substances decay, they release charged particles that when properly harvested can create an electrical current .These barries were being used in Army weapons but in this size, it is first time demonstrating. The University of Missouri team says that the batteries hold a million times as much charge as standard batteries. The means to power such devices has been a subject of study as vigorous as the development of the devices themselves.
    Dr Jae said, "People hear the word 'nuclear' and think of something very dangerous,"


    However, nuclear power sources have already been safely powering a variety of devices, such as pacemakers, space satellites and underwater systems."

    Notice from jlhaslip:
    copied from http://forums.xisto.com/no_longer_exists/Quote tags added. We treat Spam seriously here. Next occurrence will be a warning issued.


  11. According to a latest climate change report, these twenty cities are likely to experience catastrophic consequences of climate change. Be warned if you're living in any one of them.
    Manila, Philippines

    Lagos, Nigeria

    Monrovia, Liberia

    Karachi, Pakistan

    Aden, Yemen

    Jakarta, Indonesia

    Port Said, Egypt

    Khulna, Bangladesh

    Kolkata, India

    Bangkok, Thailand

    Abidjan, Cote d'Ivoire

    Cotonou, Benin

    Chittagong, Bangladesh

    Ho Chi Minh, Vietnam

    Yangon, Myanmar

    Conakry, Guinea

    Luanda, Angola

    Rio de Janeiro, Brazil

    Dakar, Senegal

    Its pitty, most of these cities belong to developing countries when all item which produce dangerous wastage in these countries are being used all over the world especially developed countries. Take example of leather, textile etc which produce dangerous wastages are prepared in these countries but most of the product sell to developed countries and pricess are very normal due to tough compitetion and companies cannot make enough money to process wastage. and Goverment is also poor so life of many poeple are at stake.
    I think this matter should be taken on international level and all the developed countries should help these countries. After all, these climate change will not only affect these cities it will affect sorrounding even other countres.

  12. I was reading about the popular (well I guess it's popular, I had never heard of it before) encryption software called Pretty Good Privacy, also known as PGP. I was surprised to read about the legal concerns around this software and the controversy around it. Apparently, it's banned from being "exported" outside of USA and Canada because as we all know, anyone outside of North America is a terrorist. I'm just kidding guys, but really the US Government doesn't want people in other countries to use this powerful software because it could be used against them. Terrorists and other generally bad guys could exchange undecipherable messages. The creator of this software apparently fought a lot of legal battles for our rights to privacy. He got into legal trouble by attempting to share his software with the international community.
    While it's "illegal" to export this software, I'm assuming people outside of N.A. can download it these days.

    The software seems to be so controversial, that it's illegal to use it in some countries. Encrypting your private e-mails could be punishable by law.

    You may not have the need to encrypt your emails or anything, but I found the story of this humble software kind of interesting. In case this post bored the heck out of you, I have a general question to ask as an amendment to this post -

    Do you think it's right to create something if it has the potential to be misused for crime/terrorism/immoral things? For example, do you think it's acceptable to create a website with detailed instructions on how to make bombs? Do you think it's right for a genius man in a high tech laboratory to create an biological "virus" (I can't think of a nicer word for it) that could spread fast and cure all cancer, if a some-what smart bio-terrorist , incapable of doing it all himself, but capable of understanding things, could simply modify it and create a fast spreading plague that could wipe out a country or be used by dictators like the late S. Hussein for genocide? Do you think scientists should stop researching things like nuclear power, black holes etc. less they be used for evil ? Imagine the benefits of scientific research into these new areas, but imagine also that this knowledge in the wrong hands could wipe out humanity? Hmmm.. interesting questions.


    I am wandering US has no problem in selling dangerous weapon to world and feel fear on such matters.
    The recent example related to this topic would be, deportation of students from UK. They only share a email that was encypted. Agency tried to decode it and maybe they failed so they just ordered the student get of this country. After investigation, couldn't get proof but decision was done to prevent any possible terrorism activity. So it could be more dangerous than we can even think.

  13. This tutorial will give you the code needed and tell you how to implement it.

     

    First off you need to create a file called mailing.php this will be the file that processes the adding of emails to the list.

    <?php $email = $_POST['email']; $file = fopen("mailing.txt", "a"); fwrite($file, "\n" . $email); fclose($file);  header("Location: mailing_thankyou.php"); ?>

    Next you need to create a file called mailing_thankyou.php, simple a page thanking them for signing up.

     

    Now create a file called mailing.txt with nothing in it, when uploaded to the server set it writable (chmodd 666 or 777).

     

    Now you need to form for teh people to enter their email address, put this on any page

    <form action="mailing.php" method="post" class="style16"> <input type="text" name="email" size="30" value="your email here!"> <input type="submit" value="GO!" name="submit"> </form>

    Now you need a file to send the newsletter, create a file called anything you want.

    <?php $send = $_POST['send']; if($send){		 $email = $_POST['email'];		 		 $emailfile = file_get_contents("mailing.txt");		 $emaillist = explode("\n", $emailfile);		 		 foreach ($emaillist as $value)		 {		 mail($value, $_POST['subject'], $_POST['message'], "From: $email");		 }		 		 echo "<b>Email sent!</b><br />"; } ?> <form action="<?php $_SERVER['PHP_SELF']; ?>" method="post">   <table width="481" border="0" cellspacing="0" cellpadding="0">				 <tr valign="top">				   <td width="84" align="right" valign="top" class="style32">Subject:</td>				   <td width="397" align="left" class="style32">					   <input name="subject" type="text" id="subject" size="41" maxlength="100">				   </td>				 </tr>				 <tr valign="top">				   <td width="84" align="right" valign="top" class="style32">From:</td>				   <td align="left" class="style32"><input name="email" type="text" id="email" size="41" maxlength="100"></td>				 </tr>				 <tr valign="top">				   <td align="right" valign="top" class="style32">Message:</td>				   <td align="left" class="style32">					   <textarea name="message" cols="37" rows="4" id="message"></textarea>				   </td>				 </tr>				 <tr valign="top">				   <td align="right" valign="top" class="style32"> </td>				   <td align="left" class="style32">					   <input name="send" type="submit" id="send" value="SUBMIT">					   <input name="Reset" type="reset" id="Reset" value="RESET">				   </td>				 </tr>   </table> </form>

    Thats you all done, to send the newsletter, simply go to the file you just created fill in the spaces, and click send, there is no warning/confirmation. so check before you send!

     

    Please note: I will be improving on this script as time goes on, hopefuly to make it able to remove people from the list too, So check back soon!

    I wanted this script for my website so now I will not have search the sollution it seems simple. Thanks for tutorial...

  14. Net comes on the display soon my laptop is on

    Nvidia Display Driver Problem

     

    My laptop window vista three years old, last month installed Kasper anti virus, since few days soon the laptop is put on initially NET like objectes forms on the display covering full screen nothing works finally after shut down. It goes off, on one occasion seen display drive is currept. I have removed the kasper anti virus, still this probelm is on. Kindly any one help me to guide to recover my laptop to work again perfecely. Thanks & Regards.

     

    -Question by Rameshan


    It sounds like your hardrive got bad sectors. I experienced these kind of problem when my harddrive was suffering from bad sector problem. other problem would be some other hardware malfunctioning, like display driver fan stops sometimes etc..... or some virus.... only test can show the real problem. First scan your computer to know some possible hardware problem that can be achieved by vendor published testing software or third party software then scan for possible spyware or virus....

     

    best of luck


  15. The topic was improtant so thougth I should share it with you guys. As its written by me with all reference and never publish anywhere so no copyright issue:)

    I have share important section here, rest you can read from attached file...

     

    Abstract

     

    Malicious software is referred to spyware that affects privacy and confidentiality of individuals and corporations and poses security risks. In this research paper, we presented different types of spywares, their behavior, how spyware works and spread? This paper also discussed the potentials of spyware to damage the computers. This report also shows investigative results of an experiment we conducted; to know the infections and risks of spyware in a computer with and without antispyware. It also includes some recommendation to prevent the spyware.

     

    1. Introduction

     

    Spyware is any technology which helps organization to gather information about a person or an organization without their knowledge [1]. There are large numbers of synonyms of spyware including sneakware, stealthware, snoopware, trackware, thiefware, scumware [2], that have popped up in the past year or so. Spyware gathers sensitive data or secretly monitor user's activities, especially the typing of passwords, PINs and credit cards numbers, email addresses and sends to individual or company through user's internet connection (backchannel)

     

    [2]. Spyware is a package which contains two separate software components that perform two types of functionality. One component performs core functionality for which user has installed the software and second component perform gathering of information functionality and act as spyware [3]. Today spyware has become a big security risk that is effecting and damaging computers very rapidly. It is a relatively new phenomenon, and according to users of Microsoft, it affects more than 50 percent of Windows operating systems failures [3]. Dell estimated that 90% of Windows PCs have at least one spyware program on the base of a survey conducted on September 2004 [4]. Spyware can perform different function like capturing information, displaying ads, dialing a number etc by one program, but usually different types of spywares perform different functions. There are various types of spywares and a lot of such programs exist throughout the internet today. Spyware does not spread automatically, but mostly users themselves open the door [4]. Spyware can get or install into the computer with free downloads like screensavers, accounting software, games, movies players, web browsers, peer to peer file sharing etc that are bundled with some spywares or through ActiveX controls that are hidden in the source code of websites or pop-up advertisements while you browse the websites. These bundled programs and ActiveX controls can open doors to install a wide range of spyware programs onto a user's computers [6]. Spyware are evolving very rapidly and effecting not only individual but also corporations. If spyware is installed on the client user workstations, can significantly impact on business confidentiality of stored information. Spyware can also impact on the users' privacy, connected to the internet or intranet both at home or corporate environment [7]. America Online and the National Cyber Security Alliance (AOL/NCSA) performed spyware scan on 329 customer's computer and reported that 80% were infected with spyware programs and each customer's computer contained average of 93 spyware components [8]. The spyware have severe impacts on Reliability, Annoyance, Privacy, Security and Performance of user computers.

     

    The goals and objectives of this study were as follows:

     

     

     

    ? To explore and analyze behavior of different types of spywares

     

    ? Identify the risks of spywares to individuals and corporations

     

    ? To Explore the potential of spyware to effect or damage the computers

     

    ? Scanning Selected computers for spyware

     

    ? Compiling and analyzing scanning result.

     

     

     

    4.0 How Spyware works?

     

     

    Spyware effect or attack on computer from different levels [15][16]. The levels vary from low to high security risks

     

    for individuals and corporations. The low security risk level is simple cookie, in which user?s website information

     

    stores, such as user name and password through which user can access the website without entering password

     

    again and again. This level has minimal risk. But it is a security risk and in some situation we cannot tolerate this

     

    kind of risk The other level of security risks is more dangerous for individual and corporations. The second level of security risk is associated cookies that can track and capture important information from user?s computer. The third

     

    level is application based. It has severe security risks e.g. it can gain the control of the system.

     

    4.1 First level: Basic cookies

     

    The first level of spyware or low level spyware is considered simple cookie identification for single and specific site. Different websites require storing user information to identify the user from specific computer, when the user uses the website in future. The cookie identification allows this. In most cases it is useful because user agree before storing information and sharing it with the site. However it is considered type of spyware with low level security risks. Because user identification information is stored in the cookie that would be abused

     

    [15].

     

    4.2 Second level: Associated cookies

     

    Associated cookies are great security risks for individuals and corporation. These cookies are associated with member site to identify a single user every time when user connects to the site. The user?s activities are tracked in the result of user?s interaction with the each member site.

     

    These stored data can be shared with advertising companies that form an agreement with the member site. The member site gives a reference of advertising site on their site that can be in the form of an image or pixel. These are actually reference to the spyware data server. These references cause to connect the spyware data server to the user?s computer. The spyware server then looks for the recognizable cookie. If server fails to find the cookie, server sends a cookie with Unique ID that is called Global Unique Identifier (GUID) to recognize the object every time when connect to the member site. Now the spyware data server can track and capture different kinds of user?s activities exchanged with the member site through GUID. It can capture username, password, credit card, keystroke, email or any other information stored in the associated cookie through member site. The advertising company can share this information without the permission of the users. The worst thing in this scenario is user unawareness from these activities performed by member and spyware sites. Advertising company can use this information for direct marketing or can sell to any concern companies. The major security risk is that if sensitive data about an individual or corporation is exposed, the advertising company has no obligation to inform the users. As the advertising company don?t show their intent to capture the sensitive data [15].

     

    4.3 Third level: Application based

     

    The third level application based spyware cause severe security exposures and risks to individual and corporation.

     

    The application based spywares gain the full control of the system without allowing user to restrict their functionality. As the user starts the computer, spyware activates. Spyware can get all types of data and can send it to the other sources. This type of spyware have not only the characteristics of first and second level spywares but also have abilities to install new application, upgrade new version and generate new advertisement without the user?s permission. Anyone can buy application based spyware to spy on anyone, widely available on internet. Mostly intelligence agencies and hacker communities use application for their concerns [15].

    Final_version.pdf


  16. Man you should learn cooking, its my suggestion. In my home i never cook even never ever saw how everything become eatable and delicious after cooking. When I moved to other country for studies then I came to know, oh to eat anything we have to cook :-). Not even cook in certain way in certain timing. When you are dying with hunger and noone here to help then you will find the improtance of cooking :-). You can lively solely on burgers and already cooked things. you must have to cook yourself that I experienced abroad.


  17. I just tested your chat box. First thing is you haven't make good interface. you should make table or something to make a sofisticated interface and secondly you need to use pagination to show history after 10 posts. there are many ways for the pagination. the simplest way is use some classes widely available on different website.


  18. So the past 2 months I've been applying everywhere for a job..I'm 17 and I have had lots of previous experinces working at places like Dairy Queen and Burgur king..
    but for some odd reason NOONE would hire me!!
    even though I have my OWN website designed and hand-coded by myself included in my resume!
    I don't understand..how hard could it be to get a frigging entry level job?
    i mean seirously do you need a god damn degree to get a minimum wage job??
    a job is all i ask for I don't even care if its minimum wage and i'm pretty sure my experinces and my skillset is more than enough for these entry level jobs..
    rant over


    this is the worst economy condition! In US unemployement reached more than 9 percent. Millions of poeple are losing their jobs wihout any reason. Here in sweden, freinds are applying for the job, and the condition is, employer dont even bother to call for interview. Few friends got job by reference (consider it most important factor). But I dont know our fault for this worst conditno of economy. I was reading that situation is being changed and thing are coming back to normal state. May be next year we can see some good change. Hope for the best.

  19. Sometimes i wonder why.... scientist think that the eclipse is when the moon covers the sun and it happens only once in 45 years........... activists and critsists thinks its a mythology.......
    What do you all think is the cause of the eclipse?


    scientific reason is straight farward when moon come between earth and sun then eclipse occur and i think this reason is very simple to undertand. you have mentioned activists and critics, what are their claim? how its myth?

  20. its amazing that it is standing there from 75 years in the desert. But there must be some reason that ACLU dont want it standing. Apart religon, if this cross is reminding the war that caused millions of people death for no reason and for peace process, then its okay to remove this sign. because WW1 and WW ll both caused Millions of innocent people death. I dont think WW l war fought for any freedom except some crazy reasons.

×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.