Wednesday, September 29, 2010

Microsoft .net Framework 3.0 X86 Software Development In Vietnam


The technical skill factor has no longer remained the guarantee to primary success: collaboration, accountability, compliance, portfolio and resource management are all becoming key factors of the new Application Development Team.

We have expertise in building Enterprise class software solutions using technology from Microsoft .Net, Oracle and Java Platforms. Our software teams are bound by a single factor: dedication and loyalty that enables us to manage our resources effectively & efficiently. We believe in team work where every team member is accountable for his deeds.

TuVinhSoft's USP has the ability to deliver reliable and yet innovative offshore software solutions in a timely and cost effective manner. We have domain expertise in Textiles, Pharmaceuticals, e-Governance, School Management, Accounting, and Mobile Technologies.


We offer Application Development in following areas :

+ Java Technology :
  • Java, Swings, Applets, TCP/IP
  • Java Web Development
  • JSP, Servlet, Struts, Spring, Hibernate, EJB Web Services, JSTL, JSF
  • Component
  • J2EE, J2ME, Beans, EJB, Struts
  • Services
  • SOAP, XML, WSul
  • Servers
  • Tomcat, IBM Web-sphere, Oracle Application Server, Jboss
  • Java Mobile Application Development/ Device Application Development
  • J2ME (CLDC/CDC), J2MEPolish, Blackberry
  • Open Source Tools
  • Liferay, Alfresco, Compiere
  • Solutions
  • Web Application Development, Desktop Application Development, System Programming Solution, Java Embelied technology solution, Components, Class Utility.
+ PHP Development :
  • Framework
  • Zend, Cake PHP, CI, Symphony, Smarty, Ruby on Rails
  • Programming Language
  • PHP 4X, 5X, Java Script, XML, Flash Action script 2.0/3.0, MySQL 4X, 5X
  • Libraries
  • PHP, Pear, Tidy, Domxml, Java Script, Dojo, xLibrary, Prototype, xAJAX,
  • Open Source Solution
  • Joomla, Mamboo, Drupal, OsCommerce, Zendcart, X-Cart, Wordpress, Typo-3, PHP WCMS, V Bulletin, PHPBB Forum, PHP Motion, Dokeos, Geoclassified
  • OS
  • Windows, Linux
+ Oracle Application Development :
  • Programming Language
  • SQL, PL/SQL
  • Oracle Products
  • Oracle Forms 6i, Oracle Report6i, Oracle Forms 9i, Oracle Reports 9i, Oracle Forms 10g, Oracle Reports 10g.Oracle Application Server 10g Release 2Oracle Apps Customization, Oracle ERP CustomizationOracle Business IntelligenceOracle DBA ServicesForums migration - Forums 4.5 to Forums 10g, Forums 6i to Forums 10g MigrationOracle XE and Oracle lite database
  • Tools
  • TOAD, PL/SQL Editor
  • Database
  • Oracle Database 8i, Oracle Database 9i and Oracle Database 10g/11g
  • OS
  • Windows, Linux, UNIX
+ Microsoft.NET Technology :
  • Visual Studio 2005/2008.NET Framework 2.0/3.5, .Net Compact Framework
  • Languages
  • VB.NET, C#, AJAX, ASP.NET
  • Database
  • SQL Server 2000/2005
  • SQL Express
  • Others
  • Microsoft Office Sharpoint Server (MOSS)
  • Microsoft VSTS (Visual Studio Team Suite)
  • Dot Net Nuke (DNN)
  • OS
  • Window 2000/2003 Server
  • Window XP/ Vista
  • Windows Mobile
  • Web Server
  • IIS 6.0
  • Solution
  • Desktop Application, Windows Mobile Application, CMS, E-Commerce, Web Application
+ Web Design & Development :
  • Technology
  • Web 2.0, Flash
  • Languages
  • HTML, XHTML, DHTML, Java script, XML
  • Web Solution
  • Web 2.0 Website Design, Static Website Designing, CSS based website Design, SEO frienuly Website Design, Dynamic website Design, W3C Compliance, DIV Based Layout, Liquid Layout, CMS integration
  • Multimedia Development
  • Flash website development, Flash animation, Flash Action scripting, 3D animation, Banner ads, Flash Intro, Flyers
  • Print Media
  • Corporate Brochure Design
  • Logo Designing
  • Marketing Brochure Designing
  • Newsletters
  • Poster Designing
  • Email Template
  • Photo Editing
  • Image Editing

Tuesday, September 28, 2010

.net Framework 3.0 X86 Windows Server 2008 Standard For $109.23


Windows Server 2008 5 Client is the most robust Windows Server operating system to date. With built-in, enhanced Web and virtualization capabilities, it is designed to increase the reliability and flexibility of your server infrastructure while helping save time and reduce costs. Powerful tools give you greater control over your servers and streamline configuration and management tasks. Plus, enhanced security features work to harden the operating system to help protect your data and network and provide a solid, highly-dependable foundation for your business.

http://buydvdmart.com/product_info.php/windows-server-2008-standard-p-1082

<!-- .winserv {border: 1px solid #9999FF; font-size: .75em; margin: 20px; padding: 10px;} -->

 

Windows Server 2008 gives you the ability to deliver rich web-based experiences efficiently and effectively, with improved administration and diagnostics, development and application tools and lower infrastructure costs.

With its built-in server virtualization technology, Windows Server 2008 enables you to reduce costs, increase hardware utilization, optimize your infrastructure, and improve server availability.
Windows Server 2008 is the most secure Windows Server ever. Its hardened operating system and security innovations, including Network Access Protection, Federated Rights Management, and Read-Only Domain Controller, provide unprecedented levels of protection for your network, your data, and your business.

Microsoft Windows Server 2008 is the most advanced Windows Server operating system yet, designed to power the next-generation of networks, applications, and Web services. With Windows Server 2008 you can develop, deliver, and manage rich user experiences and applications, provide a secure network infrastructure, and increase technological efficiency and value within your organization.

Windows Server 2008 builds on the success and strengths of its Windows Server predecessors while delivering valuable new functionality and powerful improvements to the base operating system. New Web tools, virtualization technologies, security enhancements, and management utilities help save time, reduce costs, and provide a solid foundation for your information technology (IT) infrastructure:

Built for the Web
Windows Server 2008 comes with Internet Information Services 7.0 (IIS7), a Web server and security-enhanced, easy-to-manage platform for developing and reliably hosting Web applications and services. A major enhancement to the Windows Web platform, IIS7 includes a componentized architecture for greater flexibility and control. IIS7 also provides simplified management, powerful diagnostic and troubleshooting capabilities that save time, and comprehensive extensibility.

Internet Information Server IIS7 together with the .NET Framework 3.0 provide a comprehensive platform for building applications that connect users and data, enabling them to visualize, share, and act on information. Additionally, IIS7 plays a central role in unifying Microsoft's Web platform technologies--ASP.NET, Windows Communication Foundation Web services, and Windows SharePoint Services.

 

Virtual Server's Virtual Machine Monitor provides the software infrastructure to create, manage and interact with virtual machines on multiprocessor hardware.

 

Windows Server virtualization now provides the capability to allocate multiple CPU resources to a single virtual machine and enables virtualization of multithreaded applications.

 

System Center Virtual Machine Manager focuses on unique requirements of virtual machines and is designed to enable increased physical server utilization, centralized management of virtual machine infrastructure and rapid provisioning of new virtual machines.

 

Virtualization Built In
Microsoft Windows Server Hyper-V, the next-generation hypervisor-based server virtualization technology, allows you to make the best use of your server hardware investments by consolidating multiple server roles as separate virtual machines running on a single physical machine. You can also efficiently run multiple operating systems--Windows, Linux and others--in parallel on a single server. With virtualization built into the Windows Server 2008 operating system and simple licensing policies, it's now easier than ever to take advantage of the cost savings of virtualization.

Applications can also be efficiently virtualized using Windows Server 2008 centralized application access technologies. Terminal Services Gateway and Terminal Services RemoteApp allow easy remote access to standard Windows-based programs from anywhere by running them on a terminal server instead of directly on a client computer--without the need for a complicated VPN.

Security
Windows Server 2008 is the most secure Windows Server yet. The operating system has been hardened to protect against failure and several new technologies help prevent unauthorized connections to your networks, servers, data, and user accounts. Network Access Protection (NAP) helps ensure that computers that try to connect to your network comply with your organization's security policy. Technology integration and several enhancements make Active Directory services a potent unified and integrated Identify and Access (IDA) solution. And Read-Only Domain Controller (RODC) and BitLocker Drive Encryption allow you to more securely deploy your AD database at branch office locations.

A Solid Foundation for Your Business Workloads
Windows Server 2008 provides a solid foundation for all of your server workload and application requirements while being easy to deploy and manage. The all-new Server Manager provides a unified management console that simplifies and streamlines server setup, configuration, and ongoing management. Windows PowerShell, a new command-line shell, enables administrators to automate routine system administration tasks across multiple servers. Windows Deployment Services provides a simplified, secure means of rapidly deploying the operating system via network-based installations. And Windows Server 2008 Failover Clustering wizards, and full IPv6 support plus consolidated management of Network Load Balancing, make high availability easy to implement even by IT generalists.

Finally, the new Server Core installation option of Windows Server 2008 allows for installation of server roles with only the necessary components and subsystems without a graphical user interface. Fewer roles and features means minimizing disk and service footprints while reducing attack surfaces. It also enables your IT staff to specialize according to the server roles they need to support.

Windows Server 2008 Product Overview
Microsoft Windows Server 2008 is the next generation of the Windows Server operating system that helps information technology (IT) professionals maximize control over their infrastructure while providing unprecedented availability and management capabilities, leading to a significantly more secure, reliable, and robust server environment than ever before. Windows Server 2008 delivers new value to organizations by ensuring all users regardless of location are able to get the full complement of services from the network. Windows Server 2008 also provides deep insight into the operating system and diagnostic capabilities to allow administrators to spend more time adding business value.

Windows Server 2008 builds on the success and strengths of the award-winning Windows Server 2003 operating system and on the innovations delivered in Service Pack 1 and Windows Server 2003 R2. However, Windows Server 2008 is far more than a refinement of predecessor operating systems. Windows Server 2008 is designed to provide organizations with the most productive platform for powering applications, networks, and Web services from the workgroup to the datacenter with exciting, valuable new functionality and powerful improvements to the base operating system.

Improvements to the Windows Server Operating System
In addition to new functionality, Windows Server 2008 provides powerful improvements to the base operating system over Windows Server 2003. Notable improvements include those to networking, advanced security features, remote application access, centralized server role management, performance and reliability monitoring tools, failover clustering, deployment, and the file system. These improvements and many others help organizations maximize the flexibility, availability, and control of their servers.

Benefits of Windows Server 2008 Windows Server 2008 delivers benefits in four primary areas:

http://buydvdmart.com/product_info.php/windows-server-2008-standard-p-1082

Web
Windows Server 2008 gives you the ability to deliver rich web-based experiences efficiently and effectively, with improved administration and diagnostics, development and application tools, and lower infrastructure costs.

  • Simplified Web server management with Internet Information Services 7.0, which is a powerful Web platform for applications and services. This modular platform provides a simplified, task-based management interface, greater cross-site control, security enhancements, and integrated health management for Web services.
  • Task based interface simplifies common management Web server tasks.
  • Cross-site copy allows you to easily copy Web site settings across multiple Web servers without additional configuration.
  • Delegated administration of applications and sites so you can give control to different parts of the Web server to those who need it.
  • Deliver flexible and comprehensive applications that connect users to each other and their data, enabling them to visualize, share, and act on information.

win-serv-4-th.jpg

The Initial Configuration Tasks window opens automatically after the operating system installation process is complete, and helps the administrator finish the setup and initial configuration of a new server.

win-serv-5-th.jpg

Server Manager in Windows Server 2008 provides a single source for managing a serverÕs identity and system information, displaying server status, identifying problems with server role configuration, and managing all roles installed on the server.

win-serv-6-th.jpg

The Backup feature in Windows Server 2008 provides a basic backup and recovery solution for the server it is installed on.

Virtualization
With its built-in server virtualization technology, Windows Server 2008 enables you to reduce costs, increase hardware utilization, optimize your infrastructure, and improve server availability.

  • Built-in virtualization to virtualize multiple operating systems--Windows, Linux and others--on a single server. With virtualization built into the operating system and with simpler, more flexible licensing policies, it's now easier than ever to take advantage of all the benefits and cost savings of virtualization.
  • Centralized application access and seamless integration of remotely published applications. Improvements also add the ability to connect to remote applications across firewalls and without the use of a VPN, so you can quickly respond to the needs of your users, regardless of their location.
  • New deployments options to provide the most suitable method for your environment.
  • Interoperability with your existing environment.
  • Robust and vibrant technical community to provide a rich experience throughout the product life cycle.

Security
Windows Server 2008 is the most secure Windows Server ever. Its hardened operating system and security innovations, including Network Access Protection, Federated Rights Management, and Read-Only Domain Controller, provide unprecedented levels of protection for your network, your data, and your business.

  • Protection of your server with security innovations that reduce attack surface area of the kernel, resulting in a more robust and secure server environment.
  • Protection of your network access with Network Access Protection that gives you the power to isolate computers that don't comply with security policies you set. The ability to enforce security requirements is a powerful means of protecting your network.
  • Enhanced solutions for intelligent rules and policies creation to increase control and protection over networking functions, allowing you to have a policy-driven network.
  • Protection of your data to ensure it can only be accessed by users with the correct security context, and to make it available when hardware failures occur.
  • Protection against malicious software with User Account Control with a new authentication architecture.
  • Increased control over your user settings with Expanded Group Policy.

Solid Foundation for Business Workloads
Windows Server 2008 is the most flexible and robust Windows Server operating system to date. With new technologies and features such as Server Core, PowerShell, Windows Deployment Services, and enhanced networking and clustering technologies, Windows Server 2008 provides you the most versatile and reliable Windows platform for all of your workload and application requirements.

  • Increased dependability with advanced reliability enhancements to reduce loss of access, work, time, data, and control.
  • Simplified management of your IT infrastructure by using new tools that provide a one-stop interface for server configuration and monitoring, as well as the ability to automate routine tasks.
  • Streamlined installation and management of Windows Server 2008 by installing only the roles and features you need. The customization of the server configuration simplifies ongoing maintenance by minimizing the attack surface area and reducing the need for software updates.
  • Effectively pinpointing and resolving trouble spots with powerful diagnostic tools that give you ongoing visibility into your server environment, both physical and virtual.
  • Increased control over servers located in remote locations, such as the branch office. With optimized server administration and data replication, you can provide users with better service while reducing management headaches.

Windows Server 2008 Technologies

Web
Windows Server 2008 gives you the ability to deliver rich Web-based experiences efficiently and effectively, with improved administration and diagnostics, development and application tools, and lower infrastructure costs.

Internet Information Services 7.0: Windows Server 2008 delivers a unified platform for Web publishing that integrates Internet Information Services (IIS) 7.0, ASP.NET, Windows Communication Foundation, Windows Workflow Foundation, and Windows SharePoint Services 3.0. IIS 7.0 is a major enhancement to the existing Windows Web server and plays a central role in integrating Web platform technologies. IIS 7.0 helps developers and administrators alike maximize their control over network/Internet interfaces through key functionality pillars that include delegated administration, enhanced security and a reduced attack surface area, integrated application and health management for Web services, and improved administration tools.

Virtualization
With its built-in server virtualization technology, Windows Server 2008 enables you to reduce costs, increase hardware utilization, optimize your infrastructure, and improve server availability.

Terminal Services: Windows Server 2008 introduces new functionality in Terminal Services to connect to remote computers and applications. Terminal Services RemoteApp completely integrates applications running on a terminal server with users' desktops such that they behave as if they were running on an individual user's local computer; users can run programs from a remote location side-by-side with their local programs. Terminal Services Web Access permits this same flexibility of remote application access via Web browser, granting an even wider variety of ways user can access and use programs executing on a terminal server. These features in conjunction with Terminal Services Gateway allow users to access remote desktops and remote applications via HTTPS in a firewall-friendly manner.

Security
Windows Server 2008 is the most secure Windows Server ever. Its hardened operating system and security innovations, including Network Access Protection, Federated Rights Management, and Read-Only Domain Controller, provide unprecedented levels of protection for your network, your data, and your business.

Network Access Protection (NAP): A new framework that allows an IT administrator to define health requirements for the network and to restrict computers that do not meet these requirements from communicating with the network. NAP enforces administrator-defined policies that describe the health requirements for the given organization. For example, health requirements may be defined to include all updates to the operating system be installed, or having antivirus or antispyware software installed and updated. In this way, network administrators can define the baseline level of protection all computers carry when connecting to the network.

Microsoft BitLocker provides additional security for your data through full volume encryption on multiple drives, even when the system is in unauthorized hands or running a different operating system time, data, and control.

Read-Only Domain Controller (RODC): A new type of domain controller configuration in the Windows Server 2008 operating system that makes it possible for organizations to easily deploy a domain controller in locations where the physical security of a domain controller cannot be guaranteed. An RODC hosts a read-only replica of the Active Directory directory services database for a given domain. Prior to this release, users who had to authenticate with a domain controller, but were in a branch office that could not provide adequate physical security for a domain controller, had to authenticate over a wide area network (WAN). In many cases, this was not an efficient solution. By placing a read-only Active Directory database replica closer to branch users, these users can benefit from faster logon times and more efficient access to authentication resources on the network, even in environments with inadequate physical security to deploy a traditional domain controller.

Failover Clustering: Improvements are aimed to makes it easier to configure server clusters while providing protection and availability of your data and applications. By using the new Validate Tool in failover clusters, you can perform tests to determine whether your system, storage, and network configuration is suitable for a cluster. With failover clusters in Windows Server 2008, administrators can carry out setup and migration tasks, as well as management and operations tasks more easily. Improvements to the cluster infrastructure help administrators maximize availability of the services they provide to users, achieve better storage and network performance and improve security.

win-serv-7.gif
Windows Server 2008 Hyper-V is the hypervisor-based virtualization feature included as a role of Windows Server 2008. It contains everything needed to support machine virtualization. Hyper-V enables IT organizations to reduce costs, to improve server utilization and to create a more-dynamic IT infrastructure. Hyper-V provides the greater flexibility because of dynamic, reliable and scalable platform capabilities combined with a single set of integrated management tools to manage both physical and virtual resources, which enables you to create an agile and dynamic datacenter and progress toward achieving self-managing dynamic systems.

In addition to Hyper-V, Microsoft is also releasing Microsoft Hyper-V Server. Microsoft Hyper-V Server provides a simplified, reliable, cost-effective and optimized virtualization solution enabling customers to reduce costs, to improve server utilization and to provision new servers rapidly. Microsoft Hyper-V Server easily plugs into customers' IT infrastructures as they can leverage their existing management tools and IT professional skill set with broad support from Microsoft and its partners.

Key Features of Windows Server 2008 Hyper-V
Hyper-V, the next-generation hypervisor-based server virtualization technology in Windows Server 2008, helps address many virtualization business challenges. You can now create virtual machines that can leverage available hardware, run multiple operating systems, and manage both virtual and physical resources using the same industry-standard tools.

Key Hyper-V features include:

  • New and improved architecture: New 64-bit micro-kernelized hypervisor architecture enables Hyper-V to provide a broad array of device support and improved performance and security.
  • Broad OS support: Broad support for simultaneously running different types of operating systems, including 32-bit and 64-bit systems across different server platforms, such as Windows and Linux.
  • SMP support: Ability to support up to 4 multiple processors (SMP) in a virtual machine environment to enable you to take full advantage of multi-threaded applications in a virtual machine.
  • Memory support: Support for large memory allocation per virtual machine enables you to now virtualize most workloads, making Hyper-V an ideal platform for both enterprises and small to medium businesses alike.
  • Improved storage access: With pass-through disk access and broad support for SAN and internal disk access, Hyper-V provides greater flexibility in configuring and utilizing storage environments optimally.
  • Network load balancing: With the new virtual service provider/virtual service client (VSP/VSC) architecture, Hyper-V provides improved performance and utilization of core resources such as disk, networking, video, etc.
  • New hardware sharing architecture: With the new virtual service provider/virtual service client (VSP/VSC) architecture, Hyper-V provides improved access and utilization of core resources such as disk, networking, video, etc.
  • Quick migration: Hyper-V enables you to rapidly migrate a running virtual machine from one physical host system to another with minimal downtime, leveraging familiar high-availability capabilities of Windows Server and System Center management tools.
  • Linux integration components: Beta Linux integration components are now available for SUSE Linux Enterprise Server 10 SP1 x86 and x64 Editions. These integration components enable Xen-enabled Linux to take advantage of the VSP/VSC architecture and provide improved performance. Beta Linux Integration components are available for immediate download through connect.microsoft.com.
  • Virtual machine snapshot: Hyper-V provides the ability to take snapshots of a running virtual machine so you can easily revert to a previous state and improve the overall backup and recoverability solution.
  • Scalability: With support for multiple processors and cores at the host level and improved memory access within virtual machines, you can now vertically scale your virtualization environment to support a large number of virtual machines within a given host and continue to leverage quick migration for scalability across multiple hosts.
  • Extensible: Standards-based Windows Management Instrumentation (WMI) interfaces and APIs in Hyper-V enable independent software vendors and developers to quickly build custom tools, utilities, and enhancements for the virtualization platform.

 

Solid Foundation for Business Workloads
Windows Server 2008 is the most flexible and robust Windows Server operating system to date. With new technologies and features such as Server Core, PowerShell, Windows Deployment Services, and enhanced networking and clustering technologies, Windows Server 2008 provides you the most versatile and reliable Windows platform for all of your workload and application requirements.

Server Core: Beginning with the Beta 2 release of Windows Server 2008, administrators can choose to install Windows Server with only the services required to perform the DHCP, DNS, file server, or domain controller roles. This new installation option will not install non-essential services and applications and will provide base server functionality without any extra overhead. While the Server Core installation option is a fully functioning mode of the operating system supporting one of the designate roles, it does not include the server graphic user interface (GUI). Because Server Core installations include only what is required for the designated roles, a Server Core installation will typically require less maintenance and fewer updates as there are fewer components to manage. In other words, since there are fewer programs and components installed and running on the server, there are fewer attack vectors exposed to the network, resulting in a reduced attack surface. If a security flaw or vulnerability is discovered in a component that is not installed, a patch is not required.

Windows PowerShell: A new command-line shell with over 130 tools and an integrated scripting language. It enables administrator to more easily control and securely automate routine system administration tasks, especially across multiple servers. Windows PowerShell does not require you to migrate your existing scripts, and it is ideally suited for automation of new Windows Server 2008 features. A new admin-focused scripting language, and consistent syntax and utilities, Windows PowerShell accelerates automation of system administration tasks--such as Active Directory, Terminal Server, and Internet Information Server (IIS) 7.0--and improves your organization's ability to address the unique system management problems of your environment.

Windows PowerShell is easy to adopt, learn, and use, because it does not require a background in programming, and it works with your existing IT infrastructure, existing scripts, and existing command-line tools.

Server Manager: A new feature that is included in Windows Server 2008. It is a "one-stop-shop" designed to guide Information Technology administrators through the end-to-end process of installing, configuring, and managing server roles and features that are part of Windows Server 2008. Server Manager replaces and consolidates a number of features from Microsoft Windows Server 2003 such as Manage Your Server, Configure Your Server, and Add or Remove Windows Components. You can use Server Manager to configure various "roles" and "features" on your machine.

Windows Deployment Services (WDS): An updated and redesigned Windows Server 2008 version of Remote Installation Services (RIS), WDS assists with the rapid adoption and deployment of image-based Windows operating systems. WDS allows network-based installation of Windows Vista and Windows Server 2008 to "bare metal" computers (no operating system installed), and even supports mixed environments including Microsoft Windows XP and Microsoft Windows Server 2003. Windows Deployment Services thus provides an end-to-end solution for deployment of Windows operating systems to client and server computers and reduces the total cost of ownership (TCO) and complexity of Windows Server 2008 and Windows Vista deployments.

http://buydvdmart.com/product_info.php/windows-server-2008-standard-p-1082

Windows Server 2008 and Windows Vista Better Together
Windows Vista and Windows Server 2008 originally began as part of a single development project, and as such they share a number of new technologies across networking, storage, security and management. Although the development of Windows Vista and Windows Server 2008 have branched into separate releases with different release cycles, many of these enhancements apply to both Windows Vista and Windows Server 2008. When organizations deploy both operating systems, they will see how the combined client-server infrastructure provides even greater advantages.

Buy cheap and high quality dvd box set(http://www.buydvdmart.com) All DVDs are 100% brand

new, and factory sealed! Good quality and cheap price! FOR IMMEDIATE RELEASE Please

visit:www.buydvdmart.com


Monday, September 27, 2010

Smsc.exe How To Fix The RunDLL Error


The RunDLL error has been a big issue for many computers for over a decade now. It's a big problem with older computers and seems to be less common with the likes of Windows 7 & Windows Vista. Fortunately, there's a simple way to fix these errors.

What Is The RunDLL Error?

This error is caused by a file called "RunDLL". RunDLL is a file which calls other.dll files to help software programs perform different tasks. It's best described as being like a telephone switchboard - linking the function the program wants to do with the.dll file that it needs. The RunDLL file is used constantly to help your system run, but if you have any problems with it, then it will just show the Rundll error. This error is typically caused by certain dll files being unreadable or corrupted and is quite easy to fix.

How To Fix The RunDLL Error

Fixing this error is quite simple if you follow a basic method, which removes all possible problems that could cause it. Here's how to do it:

Step 1 - Reinstall any offending program

Many programs will cause the RunDLL error to appear as it will be unable to load the.dll files that it needs. If you keep seeing this error whilst opening / using a certain program, then you need to remove that program from your PC and reinstall it. This will put a series of fresh new files on your system which might cure the issue.

Step 2 - Clean out the registry

It's often the case that DLL files are mis-labeled or misplaced inside a part of Windows called the 'registry'. This is a database which stores information and settings about your computer, keeping it running as smoothly as possible. It also includes a series of "File / Path References" which tell your PC where certain.dll files are kept. It's often the case that these paths / settings become damaged or corrupted, making your computer unable to locate the.dll file it needs. To fix this, you need to scan through the registry with a registry cleaner. This is a program which will fix any errors that are inside the registry database, stopping the RunDLL error from loading up again.

 


Sunday, September 26, 2010

Smsc.exe Funny Scandal Ust Virus


Funny UST Scandal.exe (Sdbot-DIQ, Imaut-A) is a worm that usually spread by e-mail attachments. After installation Funny UST Scandal.exe turns of antivirus programs. Also it can download different malware programs from Internet and install it without your knowledge. This worm infects Yahoo Messenger and may block every application running on PC. Funny UST Scandal.exe may in fect network computers, through network shares and infected e-mails.

Software used to build the virus= AutoIt V3




he virus, it seems, creates three files on all your root drives: A fake .avi file named "Funny UST Scandal.avi.exe", an smss.exe file, and an autorun.ini to automatically start the virus when it's on a new inserted drive.

Seems this problem is relatively new, as I haven't been able to find any sort of help for it anywhere, other than the usual "scan with AdAware and Norton". It automatically closes programs that are "threats" to it, it seems: I can't keep any anti-spyware programs open long enough to scan for it. AVG Free doesn't detect it, either. Safe mode doesn't stop it from starting up with the OS either.

Hoping you guys could help? Here's the HJT log:


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 1:19:06 AM, on 11/9/2007
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16544)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
C:\WINDOWS\System32\ACS.exe
C:\WINDOWS\system32\ZoneLabs\vsmon.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
C:\WINDOWS\System32\DVDRAMSV.exe
C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Wacom_Tablet.exe
C:\Program Files\TOSHIBA\TOSHIBA Applet\TAPPSRV.exe
C:\Program Files\Tenable\Nessus\nessusd.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\WTablet\Wacom_TabletUser.exe
C:\WINDOWS\system32\Wacom_Tablet.exe
C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe
C:\WINDOWS\system32\TPSBattM.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\DAEMON Tools\daemon.exe
C:\PROGRA~1\Intel\Wireless\Bin\1XConfig.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\WINDOWS\system32\RAMASST.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\TOSHIBA\IVP\ISM\ivpsvmgr.exe
C:\Program Files\MediaMonkey\MediaMonkey.exe
C:\Program Files\BitTorrent\bittorrent.exe
C:\Program Files\Mozilla Firefox\firefox.exe
G:\smss.exe **Here it is... strange though, seeing as G was assigned to my USB drive which I've already removed.**
G:\smss.exe
C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Downloads\aaw2007.exe
C:\WINDOWS\system32\MSIEXEC.exe
C:\WINDOWS\System32\msiexec.exe
C:\WINDOWS\System32\MsiExec.exe
C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Program Files\HijackThis!\HiJackThis.exe


R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
F2 - REG:system.ini: Shell=explorer.exe, killer.exe
O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: Cole2k Media Toolbar Helper - {5499BCB1-5641-4A4C-9F75-462D4D8D0DA0} - C:\Program Files\Cole2k Media Toolbar\v3.2.0.0\Cole2k_Media_Toolbar.dll
O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\PROGRA~1\MICROS~2\Office12\GRA8E1~1.DLL
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O3 - Toolbar: Cole2k Media Toolbar - {8AE33802-00D3-4F1B-B5C7-6FEE34E402CE} - C:\Program Files\Cole2k Media Toolbar\v3.2.0.0\Cole2k_Media_Toolbar.dll
O4 - HKLM\..\Run: [IntelWireless] C:\Program Files\Intel\Wireless\Bin\ifrmewrk.exe /tf Intel PROSet/Wireless
O4 - HKLM\..\Run: [PINGER] C:\TOSHIBA\IVP\ISM\pinger.exe /run
O4 - HKLM\..\Run: [TPSMain] TPSMain.exe
O4 - HKLM\..\Run: [Logitech Utility] Logi_MwX.Exe
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [SoundMAX] C:\Program Files\Analog Devices\SoundMAX\Smax4.exe /tray
O4 - HKLM\..\Run: [AVG7_CC] C:\PROGRA~1\Grisoft\AVG7\avgcc.exe /STARTUP
O4 - HKLM\..\Run: [GrooveMonitor] "C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_03\bin\jusched.exe"
O4 - HKLM\..\Run: [ZoneAlarm Client] "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
O4 - HKLM\..\Run: [HP Software Update] "c:\Program Files\HP\HP Software Update\HPWuSchd2.exe"
O4 - HKCU\..\Run: [DAEMON Tools] "C:\Program Files\DAEMON Tools\daemon.exe" -lang 1033
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [Vidalia] "C:\Program Files\Vidalia\vidalia.exe"
O4 - HKCU\..\Run: [BitTorrent] "C:\Program Files\BitTorrent\bittorrent.exe" --force_start_minimized
O4 - HKCU\..\Run: [DietPower 4.4 Update Setup] C:\Documents and Settings\Joel Casimir\Local Settings\Application Data\{5C0E52B3-AD33-4D51-B6BF-5B701DDC6CD8}\DietPowerSetup.exe /updatesetup
O4 - HKCU\..\Run: [DietPower 4.4 Update Setup for All Users] C:\Documents and Settings\All Users\Application Data\{5C0E52B3-AD33-4D51-B6BF-5B701DDC6CD8}\DietPowerSetup.exe /updatesetup
O4 - HKCU\..\Run: [Runonce] C:\WINDOWS\smss.exe
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKUS\S-1-5-19\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [AVG7_Run] C:\PROGRA~1\Grisoft\AVG7\avgw.exe /RUNONCE (User 'Default user')
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: lsass.exe
O4 - Global Startup: RAMASST.lnk = C:\WINDOWS\system32\RAMASST.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.6.0_03\bin\ssv.dll
O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe

O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\PROGRA~1\MICROS~2\Office12\GR99D3~1.DLL
O23 - Service: Atheros Configuration Service (ACS) - Unknown owner - C:\WINDOWS\System32\ACS.exe
O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: AVG7 Alert Manager Server (Avg7Alrt) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgamsvr.exe
O23 - Service: AVG7 Update Service (Avg7UpdSvc) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgupsvc.exe
O23 - Service: AVG E-mail Scanner (AVGEMS) - GRISOFT, s.r.o. - C:\PROGRA~1\Grisoft\AVG7\avgemc.exe
O23 - Service: ##Id_String1.6844F930_1628_4223_B5CC_5BB94B879762## (Bonjour Service) - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: ConfigFree Service (CFSvcs) - TOSHIBA CORPORATION - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
O23 - Service: DVD-RAM_Service - Matsubleepa Electric Industrial Co., Ltd. - C:\WINDOWS\System32\DVDRAMSV.exe
O23 - Service: EvtEng - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe
O23 - Service: RegSrvc - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - CACE Technologies - C:\Program Files\WinPcap\rpcapd.exe
O23 - Service: Spectrum24 Event Monitor (S24EventMonitor) - Intel Corporation - C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Program Files\Analog Devices\SoundMAX\SMAgent.exe
O23 - Service: TabletServiceWacom - Wacom Technology, Corp. - C:\WINDOWS\system32\Wacom_Tablet.exe
O23 - Service: TOSHIBA Application Service (TAPPSRV) - TOSHIBA Corp. - C:\Program Files\TOSHIBA\TOSHIBA Applet\TAPPSRV.exe
O23 - Service: Tenable Nessus - Tenable Network Security - C:\Program Files\Tenable\Nessus\nessusd.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - C:\WINDOWS\system32\ZoneLabs\vsmon.exe


Script file
[autorun]open=smss.exe
shell\Open\Command=smss.exe
shell\open\Default=1
shell\Explore\Command=smss.exe
shell\Autoplay\command=smss.exe
Remove Funny UST Scandal.exe system processes:
Funny UST Scandal.exe
killer.exe
xmss.exe
smss.exe



drop Files-

killer.exe (4084 kb) in c:\windows\
lsass.exe (3920kb) in c:\documents and settings\all users\start menu\programs\startup
smss.exe (4088kb) in all root drives and in c:\windows
autorun.inf (1kb) in all root drives with a script
Funny UST Scandal.avi.exe (228kb)



Remove Funny UST Scandal.exe files:



Funny UST Scandal.avi.exe
Funny UST Scandal.exe
killer.exe
xmss.exe
smss.exe
Remove Funny UST Scandal.exe registry values:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL
CheckedValue 0
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Runonce Windows>\smss.exe


Saturday, September 25, 2010

Visual C 2008 Express China's Handmade Embroidery - Embroidered Silk Visual Art


Hisotry of Chinese Handmade Embroidery



China has always been famous for its silk and its handmade silk embroidery. For millennia, the renowned "Silk Road" brought Chinese silk and embroidery to Central Asia, Western Asia, Europe and Africa. The silk trade created exchanges between China, India, Greece and Rome and acted as a link between these four ancient civilizations.


Since the earliest fabric samples of 3000 B.C. People in China realise that human beings have wanted to enliven their surroundings clothing, toiletries and linens by adding hand work of some kind over the woven fabrics.


Different areas of the devised their own peculiar styles. The type of thread, colors, motifs and presentation of each area and style are unique. Each region had a few stitches unique to their style. The motifs were related to nature and religion and everyday life of people.


Religious embroideries spanned the breadth of the age of the many religious organizations and royal courts. Handmade Embroidery art had patrons just like other art forms. These embroideries include gold threads or zardosi, chikankari, kasuti and kashmiri.


Chikankari is said to have a Turkish impression though it is mentioned in the records of Megasthenes in 3rd century B.C. Kashmiri embroidery is colorful with symbols like chinar leaf, apple blossom, lily, the saffron flower and the fauna of the region. Phulkari has brightly colored flowers on coarse cotton. Beadwork and Zardosi are Mughal introductions where as mirror work is typical to Gujarat and Rajasthan. Kantha' Embroidery of Bengal makes imaginative use of waste rugs and Kasuti is famous for religious themes.


- Styles of Chinese Silk Embroidery Art



There are several different levels of Chinese embroidered silk visual art:


• Antique (all handmade obviously)


• High quality, classical handmade


• Ordinary quality handmade


• Machine made


As corresponding, Suzhou embroidery (Su embroidery for short), Hunan embroidery (Xiang embroidery for short), Sichuan embroidery (Shu embroidery for short) and Guangdong embroidery (Yue embroidery for short) are the four most famous styles of embroidery in China.


The city of Suhou is the center of the Chinese handmade embroidered silk visual art. From there the silk industry spreads west to other cities including Suzhou and it extends to Shanghai, Wuxi, etc. and now includes Beijing, Guangxi, Guangdong. Shenzhen, Zhejiang, Shanxi, Shandong, Hubei, Anhui and other places.


Merits of Chinese Handmade Embroidery



Handmade classical silk embroidery is alive. The high quality work looks lifelike. It's been created with loving care by an individual artist. These people are masters of their trade.


They have incredible skill and their work is stunningly beautiful. But it looks alive. The machine made versions look stiff and unnatural. It's quite easily distinguishable.


Handmade embroidery is done with pure silk thread. It has an exquisite, glossy feel to it. Real silk thread will break when used in a sewing machine. So the thread that is used in a machine is thicker and has an artificial fiber feel to it because it is a mix. It is not pure silk.


Chinese handmade silk embroidery is highly collectible. There are many collectors in Germany, the rest of Europe, the USA, Japan, Africa and in other countries, usually the affluent art aficionados all over the world. The embroidered silk is truly representative of Chinese art.


Authentic antique silk embroidered visual art sells for anywhere between $35,000 and $125,000, and is an excellent investment as their prices continue to rise. Over the long term (hundreds of years) the value has increased by as much as 50 times. These pieces are on display in museums and exist in private collections and become available for sale in much the same way any antique art does: dealers, auctions and so on, with the usual problems of verifying authenticity and provenance.


But machine embroidery may have become common these days and perhaps more economical but theuniqueness, variety, intricacy, art and fineness of hand embroidery is unmatched and as yet unchallenged. Today you can also buy modern, hand embroidered silk of the type that is being produced. This varies greatly in quality. At one extreme there is ordinary handmade silk embroidery which you can buy for as little as $100 for a piece. Then there is high quality, classical embroidered silk being produced at higher prices. These pieces tend to sell at auction and therefore the prices can go very high and be somewhat unpredictable.


A Special Kind of Chinese Handmade Embroidery - Chinese Double Sided Embroidery



The double sided embroidery is a technique in which stitching takes place on both sides of a single transparent silk fabric. The design shows on both sides (front and reverse). Such a piece is normally mounted on a wooden frame as a screen, one really can't tell which side is the front or the back.


Most of the double sided embroideries, almost all, people see in shops have the same images on both sides. However there are a few double sided embroideries that have two different images on both sides. It's a mystery and secret how this kind of works are made.


Fine Works of Chinese Handmade Embroidery


People from different countries have different tastes. A silk handmade embroidery popular in one country is not necessarily popular in another country. But there are some silk embroideries that seem almost everyone likes them.



Have you ever seen such a beautiful painting on a piece of silk satin? Just imagine embroidering such a delicate figure with threads and needles! But such exquisite embroidery has been one of China's most famous art forms for many centuries, and four main schools of embroidery have established with their unique techniques.



Picture: The Chinese Art of Painting with Silk Threads


Remark: Clever photographer, Nancy Fox, recently returned from a tour of mainland China. A visit to an embroidery factory in Suzhou was high on her list of places to see. She was not disappointed. When she arrived, the artists were hard at work producing these paintings. They readily consented to let Nancy photograph them while they worked.


* Last, if you interests, you can find all kinds of Chinese silk handmade silk embroidery art for sale on the Internet(http://www.made-in-china.com/products-search/hot-china-products/Handmade_Embroidery.html) like any other modern or old art.


Friday, September 24, 2010

Powerstrip 3.75 Visit Cyprus For A Memorable Holiday


I visited Cyprus a couple of years back and had a truly memorable holiday experience. Cyprus offers around 300 days of sunshine each year with temperatures reaching thirty degrees in each of the summer months. Ayia Napa was where I stayed which has been known as the alternative to Ibiza however is now turned itself into a more family orientated place.

However still offers magnificent nightlife. Some of the best nightclubs worth checking out including the Castle Club, Hollywood Boulevard, BedRock Inn and Club Abyss, the latter being a club like nothing else you will probably have experienced.

Paphos is situated on the west of the island and is the place to go for a cultural experience. You can learn about Greek gods that are related to the island including Aphrodite which is the Greek Goddess of love. Starting out the Greek God Cronus threw something into the sea which turned out to be something that turned into Aphrodite. It was then carried by the waves to Cyprus and has received many visitors over the years that have come to pay their respects.

Paphos is also popular for its beautiful old harbour as well as its lovely promenade and archaeological museum, the Byzantine castle of Paphos, the temple of Aphrodite and the Tombs of Kings and St Paul’s Pillar.

Cyprus has many attractive beaches to tempt you as well as ancient ruins and beautiful mountains, amazing smelling olive trees and citrus groves. The mountain ranges are a great place to visit in the cooler winter months as they offer great walks and perfect for cycling, the views are simply stunning.

For me visiting the old wine-producing villages was a fantastic experience, seeing the primitive ways of living with only the basics and how they go about producing the wine in their own traditional methods.

Cyprus is ideally situated as a jump off point for visiting other exotic locales situated nearby the island. You can find short cruises that leave Cyprus most days to the Greek Islands or you could visit Egypt or the Middle East.

Holidays to Cyprus would mean you experience an amazing cultural place rich in history, with beautiful beaches and sweet smelling mountain ranges.


Thursday, September 23, 2010

Smsc.exe Do You Desire To Fix Runtime Error 134 In Minutes?


Runtime error 134 is one of the many runtime errors a user of the Microsoft Windows XP or Vista operating system might face from time to time when using his or her computer. Indeed, runtime errors effectively prevent the computer from carrying out operations such as loading a program or file. Inability or inadequate knowledge to solve runtime errors prevents effective use of the computer as a work or entertainment tool.

When a computer faces Runtime Error 134, it displays the following message, "Runtime error '134': File not found (your file.dll)". These fateful words may be familiar to some. As one of the most common runtime errors, Runtime Error 134 occurs when the DLL file of particular software is not in the search path. This typically happens when you try to run a new hardware or software upon its successful installation. It means that one or more files expected by windows to be in place in a specific location and needed to run the application is either missing, not installed or corrupted. This in turn produces the runtime error message as the hardware or software is unable to run as a result of the missing files.

Simple methods can be used to solve Runtime Error 134 to ensure that your software or hardware runs smoothly as planned. The easiest method would be to do a full un-installation of the relevant software or hardware followed by a reinstallation. You can do this by going to the "Control Panel" menu found on your Windows "Start" menu. Click on "Control Panel" before clicking on the "Add/Remove Program" option found there. Uninstall the relevant item before going in for a fresh installation. Check out the version of your installed software before going over the product's homepage to see if that particular version is the latest. If it is not, update your software or hardware to the latest version by means of an upgrade from the product's website. In most cases, the problem should be solved with just this as the updated version together with the fresh installation should do the trick in fixing the missing file that caused the Runtime Error 134. However, in the event that such a method does not work, it would be a good idea to contact the company from which you purchased our hardware or software for technical assistance.

Alternatively, it would also be a good idea to check out if the hardware or software that you are installing has any compatibility issues with other hardware or software you might have on your computer or even the operating system itself. One way to go about doing it is to scour the internet for computer forums to check if the hardware or software has any conflicting issues. You could even visit the developer's website to check with their technical support team to determine if there are any known problems of running that particular hardware or software with other hardware or software. Furnish them with the full details of your computer system.

Do you desire to fix runtime error 134 in minutes? Why don't you try a free registry scan for your computer? Just CLICK HERE to view my No.1 solution for you and it is guaranteed to help you fix PC errors and enhance the computer performance in just 5 minutes.
 


Wednesday, September 22, 2010

Alg.exe Microsoft Alg.exe Definition Error - Fix It Right Now !


articlesbase-exe.jpg

You may have already discovered that your windows system has a few flaws; if it's urgent that you repair an alg.exe error, i'll tell you about the best technique for this. Even if you are very diligent about your pc's upkeep, the sad truth is that at unexpected (and inconvenient) moments you will run into windows glitches. Would you like to know how to repair those irritating problems with almost no effort on your part? The solution is coming right up!

Click here to repair an alg.exe error now!

First of all, know that any time you come across a computer error it has to be dealt with right away, otherwise it may bring more problems. We now know, based on findings from the experts, that a defective registry system can give rise to numerous computer errors, especially the error messages which probably led to your search for help. Perhaps you haven't learned this yet, but lots of problems arise via damage to the registry brought on by incorrect installation and/or uninstall of software. Happily, the internet currently offers an assortment of effective applications which give you the power to find and fix those errors both quickly and - very important - safely. The best option out there, repair tools are great when you want to check out your computer and obtain a detailed 'health' report about the source of your pc's existing problems.

Within the registry are diverse data types, for instance: Reg_binary; this concept may be foreign to you, but it is crucial to preserve your registry's original values. The solution may be found in these utilities, especially for all of us who aren't technical experts and who don't want to solve these frustrating issues with the windows os. Watch out for suspect or unknown files - besides infecting your pc with malicious codes, all too often these harmful files can impair your windows registry db as well.

It appears that these utilities are "all the rage" as an increasing number of users employ the above method in order to repair an alg.exe error as well as assorted other troubles. Keep in mind the fact that although anti-virus programs are essential for removing infected files, they won't repair the mess that viruses cause in your registry system. Take it from me, if you come across pc errors it is always recommended to immediately verify that your windows is up-to-date with the latest available patches. In these modern times, with students getting comfortable with pcs at a very young age, naturally they'd like to know how to resolve whatever troubles they might have all by themselves, whenever possible. I am sure that by observing the guidelines provided in this article i'm confident that you will be rewarded in your productivity, and most importantly, your satisfaction.


Tuesday, September 21, 2010

Net Frame V2 Using Perception And Third Eye Part 3 -How To Hone Your Skills


Not all people have consciously worked on accessing third eye wisdom or perception. Many are very frightened of their ability to access wisdom, or information that seems to come from the unknown. Others don't question where it comes from but they just access it.

Now when you work long periods of time with the third eye you develop your ability to access psychic channels but also it can make you tired if you do not work with balance. I feel it is like a door that you can't leave open all the time. It is necessary to close the door and rest. When you wish to close down the area, put my hand on your forehead and move it from top to bottom and imagine that you're closing a great big gate or a drawbridge door in the same manner.

Then say to yourself "shutting down now." Then take great big breaths into that area like a psychic wash. With each breath you wash that area mentally with light. Sometimes you can imagine that you are turning off a light bulb by pulling an old fashion chain. The area goes dark. But just like that light bulb, you can switch it on again very quickly.

Become as sensitive to subtle changes in energy, as you can, ask yourself if this is coming from you or someone else. Also put out a feeler if this is trustworthy or false. Ask questions about the information that is coming in. "How should I use this?" "Who is this for?" "What do you want me to do with the knowledge?"

When you are consciously working with your third eye drop your gaze to a place that is out on the bridge, or tip of your nose. Half close the eyes so that you can allow the opening and unobstructed view into the psychic realm through the third eye and then let this area begin to open. Imagine the draw bridge door slowly drawing up and open. The column of light then begins to expand out into the universe, as long or short as need be.

You might feel like the light emanates only out the front of your forehead. Or you may feel more like an egg with a major crack all around the circumference and tiny cracks on top and in back. The light that is contained within can emanate out from all the cracks from the front, back, top, sides, at the same time, allowing you to see all around at the same time. The major portion comes from the front or third eye area, but it is not limited by that.

When you become aware of the energetic shifts, you can then begin to direct your channel. You could think on a certain subject or person and ask questions. As you ask the questions, continue to breathe through each. Allow some time in between each question to register the information. You could also think of someone or something and feel what impressions come to you immediately and first. Do this without judgment. Trust yourself that the right answer is coming for you. You could ask a question like "What am I missing here?" or "What it the key element?" You could allow an open flow to direct you -"Direct me to the person or group that is most able to help me." Then expect to be guided and then proceed as if you are already on the way. copyright 2006 Yoga Kat


Monday, September 20, 2010

Visual C 2008 Express Pet Portraits Are Very Personalized And Can Be Customized


Pet portraits have become one of the trends to most pet lovers in order to capture their moments with their valued pets in the most special way. Although memories can be captured readily with digital photos, fine arts have been reestablished by making handmade images of beloved pets.

Whether it is a cat or a dog or whatever animal species that you prefer, we always want to share experiences with them. With pet portraits, each detail of your pet is remade to life by oil and canvas. Artists have several styles in painting which you can choose from. Some may offer Warhol style which has been made popular in 1998 as recognition to Andy Warhol, others may offer painterly style through the medium of watercolor.

The best thing about pet portraits is that they are very personalized and can be customized. You may request photo to paint mode where the artist would just need to copy the photo of your pet while you may also request for actual scenario painting or choose the background of the painting that you may find suitable.

Oil in canvas or watercolor painting, whatever the style or the medium that you may prefer, it is then made more long-lasting with a frame customized according to your preference. You may ask the service provider to do the framing for you while some may leave the decision to you as they find it a personal preference. If they can do it for you, why take the hassle. Besides, you are ensured that they only use frames of the highest quality to fit your painting.

We owe a lot of the happiness we get to our pets and it is due that we give them value by a simple means like pet portraits. A fine arts painting makes a great deal of difference when it comes to originality and capturing the spark or spirit of each moment that you cherish.

Make it personal and celebrate each moment you have with your pet. Cherish each moment with pet portraits but choose the artist that could make this experience satisfying.


Sunday, September 19, 2010

Lrc Maker 16GB MP4/MP3 Player With 3 Inch LCD - Video File King Edition


16GB MP4/MP3 Player with 3 Inch LCD - Video File King Edition. This portable media player (PMP) includes an easy to use interface for easily accessing your collection of music, videos, pictures, e-books, and plays all of today's popular video and music file formats (including youtube FLV files).

If you want an MP4 player perfect for all your digital videos (MPEG4, RM, RMVB, FLV, WMV, AVI), then the crisp 3.0 inch TFT screen on this unit is a beautiful thing for your eyes to behold. Reading e-text and viewing pictures is also a pleasure with the bright and clear LCD screen, and can be easily shared with friends sitting next to you. Playing your digital music collection (MP3, WMA, FLAC, APE, OGG, AAC, WAV) is simple and fun with the easy load and go file manager of the unit. This is a portable media player (PMP) with an incredible amount of potential for fun and for practical applications, and is available for a much lower price than you would ever get for a branded PMP with only some of the same functions.

Everything that anyone could possibly want in portable digital products is once again available at a low wholesale cost and with no minimum order quantity (M.O.Q.) from the leader in direct from China electronics, Chinavasion. Secure some new sales for yourself by stocking up on this new large screen PMP to sell at your online / physical store or feature it in your latest eBay, Amazon or uBid listings and use our reliable dropshipping service to maximize your limited resource of time. Bonus: Premium quality gold plated earphones now included!

At a Glance...
  • 16GB MP4/MP3 Player with 3 inch LCD.
  • Compatible with a wide range of file formats; more than in any "famous brand" players.
  • Don't let its size fool you, beautiful 3" screen is great for viewing e-books and videos.
  • Simply hook up the CVSC-221 to your computer via the high speed USB 2.0 connection and load it up just like any other folder or flash drive.

16GB MP4/MP3 Player with 3 Inch LCD - Video File King Edition 16GB MP4/MP3 Player with 3 Inch LCD - Video File King Edition 16GB MP4/MP3 Player with 3 Inch LCD - Video File King Edition
16GB MP4/MP3 Player with 3 Inch LCD - Video File King Edition 16GB MP4/MP3 Player with 3 Inch LCD - Video File King Edition 16GB MP4/MP3 Player with 3 Inch LCD - Video File King Edition
16GB MP4/MP3 Player with 3 Inch LCD - Video File King Edition

China Manufacturer Specifications

  • Main Function: 16GB MP4/MP3 Player with 3 Inch LCD - Video File King Edition
  • Internal Memory: 16GB
  • Optional External Memory: TF Card (2GB max)
  • Display: 3 inch true color TFT LCD
    - Size: 3" Screen, 67mm x 40mm viewable area (L x W)
    - Resolution: 800 x 480
  • Video Formats: MPEG4, RM, RMVB, FLV, AVI, WMV
  • Music Formats: MP3, WMA, FLAC, APE, OGG, WAV
  • Picture Formats: JPEG, GIF, BMP
  • E-Book Formats: TXT, LRC
  • FM Radio: 87.9 ~ 107.9MHz (worldwide)
  • Built in MIC Recording Format: WAV
  • Earphone Jack: 3.5 mm
  • Earphone Jack Output: 2 x 10mW (32Ohm)
  • Earphones: Upgraded earphones included FREE (model CVHU-G37)
  • Languages: English, French, German, Italian, Spanish, Dutch, Portuguese, Chinese
  • USB: High Speed 2.0
  • Systems: Windows 2000 / XP / Vista
  • Power Source: Built-in Rechargeable Li-Ion Battery
  • Dimensions: 88mm x 55mm x 10mm (L x W x H)
  • Manufacturer Ref: EB99DE259788

Product Notes

  • Long battery life - 2 hours for video and 8 hours for music
  • Portable file storage like USB flash drive; electronic file storable and readable
  • Eight selectable background themes and colors
  • Rugged painted metal case is tough and durable compared to similar sized MP4 players
  • Built-in speaker
  • Capable of storing over four thousand songs and pictures, or over 40 hours of video (depending on bit rates)

Package Contents

  • Model CVSC-221-ORANGE-16GB PMP
  • Earphones: Upgraded high quality earphones included FREE (see package contents picture above)
  • Mini-USB to USB Cable (for data transfer and recharging)
  • User Manual - English
  • Keychain USB adapter

  • Login for Wholesale Discount Price
  • Catalog Ref: MP3 + MP4 + MP5 + MP6 Player

Visit the website: http://www.boutic.power-heberg.com
You will find much more.

Current Reviews:    This product was added to our catalog on Friday 09 January, 2009.

Saturday, September 18, 2010

Visual C 2008 Express A To Z Of Photojournalism


A for “Art?”
Photojournalism clearly contains an aesthetic element characteristic to art. But some observers object to the idea of photojournalism as art. Journalism in general is about reporting facts. Does Art connote something artificial? Or is it simply putting style over content? If photojournalism is art, does it necessarily become more of a commodity, more “entertainment” and less “truth”? – In other words, is it appropriate to look at photos of human suffering while sipping champagne in an art gallery or lattés over a photo book? There is no short and definite answers to these questions, so let the debate rage on!

B for “Black & White”

This was pretty much all there was during the first hundred years of photojournalism. When color photojournalism started appearing more regularly in print, from the 1960s and onwards, it was initially met with some resentment, even accusations of vulgarity. During the 1980s photojournalism was more dominated by color photos and today, interestingly, black and white is again in, not from inevitability any longer, but as an accepted stylistic choice. An argument often heard is that black and white photos focuses the viewers attention on the content of the photo, rater than the photo itself.

C for “Canon vs. Nikon”

Two of the biggest camera manufacturers in the world today. Photojournalists often engage in friendly mud-throwing contests between the Canonians and Nikonians. Both camera systems are excellent though, with a big catalogue of lenses to go along and service centers located around the world.

D for “Digital Photography”

Digital cameras have had a profound impact on photojournalism. No more darkroom maneuvers are needed. Photos can now be delivered almost instantaneous from anywhere in the world. You don’t have to choose between color or black/white film before you shoot. And you can have 20 “rolls” of film on a memory card the size of a stamp. But in spite of all these helpful improvements, has the actual quality of photojournalism improved as a result? It has certainly led to a flooding of the photo-market, and the fear is that prices dwindle to a point where it’s no longer economically viable for many professionals to make a living of it. The line between professionals and amateurs starts to blur.

E for “Eddie Adams”
(1933-2004)
American photojournalist who is perhaps most famous for his chocking photo of the Vietnamese police chief executing a captured Viet Cong suspect on the street of Saigon, at point-blank range (1968). The photo won Adams both a World Press Photo Award and a Pulitzer Prize, but Adams later apologized to the police chief for the damage he had done to his honor by taking the photo.

F for “flickr”

Pioneering web-site, allowing free online storage of images. With about 30 million users and nearly 4 billion images (numbers not confirmed), it’s probably the largest image collection in the world today. It is both loved and hated. Many of its users like to have their work seen and praised by others. But it becomes problematic for more professional users, since copyright and licensing options are not very well implemented, or respected, to say the least.

G for “Google Images”

An even larger image collection than flickr. Except it isn’t really a collection per se, but rather an index of images on the web. Its potential for influencing stock photography is huge but it is currently of little professional use - the search quality is bad, most of the images are appalling and you aren’t necessarily allowed to use them anyway. With time, that might of course change, and perhaps we’ll look back at it the way we look back at Daguerreotypes as the forerunner of photography today!

H for “Henri Cartier-Bresson”
(1908-2004)
Hugely influential French photojournalist whose trademark was capturing iconic, black-and-white, candid photos in what he called “the decisive moment”.

I for “iPhone ®”

The iPhone (and many other cell-phones now) have a decent miniature camera build into it. So suddenly, everyone with a cell-phone is a potential news photographer! More and more spot news are being shot by “citizen journalists” with their cell-phone cameras. But for pro photojournalists its main feats are still the slick and convenient ways to check email, calendar, maps, record audio etc. - not to mention speaking on the phone with people!

J for “Jacob Riis”

A Danish-American photography pioneer (1849-1914) who’s images of slum dwellings in New York, entitled “How The Other Half Lives”, led to some political improvements. Although many of his photos were staged, they became inspirational for many later photojournalists.

K for “Kodachrome”

The film that enabled us to see the world in color! Kodachrome, introduced in 1935, was the first mass produced color film. In the wake of the digital revolution, the Kodachrome film was discontinued in mid 2009

L for “Leica”

Legendary German camera maker whose small and high-quality cameras made it possible for photojournalism to take a leap forward in the 1920s and 1930s. Leica cameras became household items for professional photojournalists for half a century and are still today adored for the handling, the image quality, the brand history etc.

M for “Magnum”

A photographers’ cooperative founded in 1947. It continues to be the home for a range of international top photojournalists, both living and dead. Magnum can  probably be said to be emphasizing the purely visual aspect of photography over the more narrative aspect.

N for “National Geographic Magazine”

One of the oldest magazines out there, started in the late 19th century and still published today, in the 21st century. Famous for many things, but perhaps most notably for its quality photos and stories. During its heydays, the magazine became a worldwide collectors item, with stories and photos of exotic people and places. Its status as one of the “gold-standards” of photojournalism has suffered somewhat since the brand was restructured to be multi-lingual and span travel, adventure, tv, children’s toys etc. But the characteristic yellow border on its cover remains as it has always been.

O for “On Photography”

A ground-breaking book by Susan Sontag, analyzing the changes photos have made in our way of looking at the world. Simply stated, she argues that photography has made us superficial and overly concerned with appearance to a point where images have subconsciously replaced reality as reality.

P for “Paparazzi”

A special form of photojournalists, often despised for chasing and taking candid photos of celebrities when they least expect it. Respect for privacy is a human right (Article 12 of the UN Human Rights Declaration). On the other hand, celebrities need media exposure to remain celebrities and a vast number of magazine readers are attracted to pictures of famous people.

Q for “Quad-sided”

Strangely, all lens apertures are round and all photos are quad(4)-sided! Ever wonder why? (Sorry, ‘Q’ was a tough one!)

R for “Royalty Free”

A method of buying / licensing photos that is preferred by many buyers for its simplicity. And equally despised by many photographers, since the price is calculated without regards to usage, placement, number of times used etc. The broad usage rights should logically result in a higher image price, but often (read: microstock) it is quite opposite!

S for “SEO”

A.k.a. “search engine optimization”, a technique that is increasingly used among photojournalists trying to attract new clients and opportunities over the Internet. SEO techniques can greatly improve the chances for a web site portfolio to show up in top of a Google search result page.

T for “TIME Magazine”

Weekly news magazine published since 1923. Has a history of giving prominence to photojournalistic pieces. Although it has high standards and is a global brand, like many other magazines, it is now facing a falling number of subscribers and advertising revenue.

U for “UV Filter”

Filter put in front of the camera lens to guard against ultra-violet light. In high altitude, strong UV light can degrade the colors and exposure of a photo. However, the primary use of UV filters is often simply to protect the front element of expensive lenses from getting damaged.

V for “Visa pour l’Image”

International photojournalism festival held every summer in the French city of Perpignan.

W for “World Press Photo”
Probably the most prestigious press photo award in the world. With a few exceptions, it’s been held since 1955. Recently it has been criticized by some of its own jurors for “reflecting a form of photojournalism that is more romantic than functional” (Stephen Mayes) which, I suppose, take root in the kind of submissions they receive. Another (anonymous) juror said that “90% of the pictures [in the competition] are about 10% of the world.”

X for “Xpro”
A.k.a. cross-processing. From the days of film, when the ‘wrong’ chemicals were used to develop a color negative. Intentionally used to give the picture a certain surreal / stylish look.

Y for “Yann Arthus-Bertrand” (b. 1946)
French photographer most famous for his aerial photos of nature around the world, compiled in the project “Earth From Above”. As a traveling exhibition, it has been seen by more than 100 million people. While his work is far from classic photojournalism, it has a strong component of “environmental photojournalism”.

Z for “Zoom vs. Prime”
A question that never ceases to pop up in photojournalist discussions: “Do you prefer to use a zoom or a prime lens?” There’s both tech and non-tech issues to consider. Zooms are generally more practical and flexible to work with, good for all-round work and while covering news, events and short assignments where you only get one chance of getting the shot you want. They’re lighter to work with compared to carrying two bodies / multiple primes, but primes in themselves are usually smaller, lighter, faster, more robust and optically superior - which is why some tech aficionados prefer them. But there’s also the question about your working methods. Some prefer primes because they don’t have to think about cropping but can concentrate on the timing. They know exactly what the frame will hold and so they move around more, perhaps with better results. And finally, using just one prime gives some consistency, while a zoom can give more variety in a series of photos.