Monday, November 19, 2007

My Father have been exercise a martial arts Grand Master thirty years ago।

MY FATHER!.....

He have been exercise a martial arts(무도 [武道]) and Bodybuilding over 40 years or more.


This little man is my father. He is small man but fast and strong than anyone else.














Center is my father(master) and disciples.













another...














and He was bodybuilding Chanpion Fourty years ago.

Sunday, November 18, 2007

Financial Technology Information(재테크 정보)

1. Precise details of preparation. 독하게 준비하라(자신의 재무상황을 정확히 파악하라)

2. Very savings. 독하게 절약하라(재테크는 습관이다.)

3. A precise plan. 독하게 계획하라.(재테크의 목표를 구체적으로 수립하라)

4. Be sure to run! 독하게 실천하라.(실천하라! 실천하라! 실천하라!)

5. A precise finish. 독하게 마무리하라.(변동되는 재무상황을 보완하라.)

Sunday, November 11, 2007

My Ruby Course..

- column add -

DBA typically use to Utility. As follows..
==> alter table productor add column price decimal(8,3);


But Ruby use MIGRATE(Modification and Connection DB)




and modify code




Again Migrate






Validity add - location app/models/product.rb







You can see this page



















Validates Method using
class Product < ActiveRecord::Base
validates_presence_of :title, :description, :image_url
validates_numericality_of :price
validates_uniqueness_of :title
validates_format_of :image_url,
:with => %r{\.(gif|jpg|png)$}i,
:message => "must be a URL for a GIF, JPG, or PNG image"

protected
def validate
errors.add(:price, "should be at least 0.01") if price.nil? || price < 0.01
end
end

Generate Dynamic scaffold
depot> ruvy script/generate scaffold product admin

Using following Source
http//media.pragprog.com/titles/rails2/code/depot_c/db/migrate/003_add_test_data.rb
http//media.pragprog.com/titles/rails2/code/depot_c/public/images
http//media.pragprog.com/titles/rails2/code/depot_c/public/stylesheets/depot.css


Enter: http://localhost:3000/admin/list You can see result










Create another Controller
depot> ruby script/generate controller store index

Request data from DB.
class StoreController < ApplicationController
def index
@products = Product.find_products_for_sale
end
end
=================product.rb======================>
def self.find_products_for_sale
find(:all, :order => "title")
end
=================add source======================>

Friday, November 9, 2007

Reading book(Economy - Business - Management - IT)


Do we must making Inovation or not?

















Six Sigma and IT Service: Inovation IT


















- Korea book about Asset Management - (:+ I need money!)


- Drucker tell me a lot of things(Inovation, Management, Business, Economic) -























- What is Negotiation? (It's very interesting subject)-




















- How do you create and management a good company? -

Wednesday, November 7, 2007

^ -^ Java Exam: Private courses

//HelloDate.java.....This exam is very famous. ^^;

import.java.util.*;
//exam's subject = class'name....
public class HelloDate{
public static void main(String[] args){
System.out.println("Hello, Today?");
System.out.print(new Date()); //Objects produce
System.out.print(".....");
}
}


//operators/Precedence.java

public class Precedence{
public static void main(String[] args){
int x = 1, y = 2, z = 3;
int a = x + y - 2/2 + z;
int b = x + (y - 2)/(2 + z);
System.out.println("a = " + a + " b = " + b);
}
}



//Assignment.java
//import static net.mindview.util.Print.*;
//This error..^^; I don't useing
.

class Tank{
int level;
}

public class Assignment{
public static void main(String[] args){
Tank t1 = new Tank();
Tank t2 = new Tank();
t1.level = 9;
t2.level = 47;

System.out.println("1: t1.level: " + t1.level +
", t2.level: " + t2.level);
t1 = t2;
System.out.println("2: t1.level: " + t1.level +
", t2.level: " + t2.level);
t1.level = 27;
System.out.println("3: t1.level: " + t1.level +
", t2.level: " + t2.level);
}
}



//Relation operateor
public class Equivalence{
public static void main(String[] args){
Integer n1 = new Integer(46);
Integer n2 = new Integer(10);
System.out.println(n1 == n2); ==>boolen(false)
System.out.println(n1 != n2); ==>boolen(true)
}
}


//initializations/SimpleConstructor.java
class Rock{
Rock() { //initializations
System.out.print("Rock");
}
}

public class SimpleConstructor{
public static void main(String[] args){
for(int i = 0; i < 10; i++);
new Rock();
}
}


//OverloadingOrder.java:메소드 오버로딩

public class OverloadingOrder{
static void f(String s, int i)
{
System.out.println("String: " + s + ", int: " + 1);
}
static void f(int i, String s)
{
System.out.println("int: " + i + ",String: " +s);
}
public static void main(String[] args){
f("String first", 11);
f(15, "Int first");
}
}


//initialization/Leaf.java:Using This - This의 리턴문 사용.

public class Leaf{
int i = 0;
Leaf increment(){
i++;
return this;
}
void print(){
System.out.println(" i = " + i);
}
public static void main(String[] args){
Leaf X = new Leaf();
X.increment().increment().increment().print(); //Same method using <.>
}
}


//initialization/PassingThis.jsva - Class passed(This)- 다른 클래스의 메소드로 전달

class Person{
public void eat(Apple apple){
Apple peeled = apple.getPeeled();
System.out.println("Yummy");
}
}

class Peeler{
static Apple peel(Apple apple){
//....remove peel
return apple; //Peeled
}
}

class Apple{
Apple getPeeled(){
return Peeler.peel(this); //used this for pass to another method
}
}

public class PassingThis{
public static void main(String[] args){
new Person().eat(new Apple());
}
}

Tuesday, November 6, 2007

070-290 MCSE Exam Summary

- The Disk Defragment tool needs at least 15% of free disk space. This tool can run with less than 15%but ut will only defragment the disk partially.

- Plug-and-Play devices configure and install themselves automatically. when you switch of the device, the operating system will uninstall the device automatically. You need to scan for the hardware device.

- If a driver is disabled, the oprating system will remove the driver from the memory. When you determine the solution you can enable the driver and fix it or get an update driver from the vendor.

- Roll Back allows you to restore the previous version of USB scanner drivers that were compatible with Windows Server 2003.

- Microsoft tests drivers for their compatibility with Windows operating systems. The drivers that are certified by Microsoft are digitally assigned.If we block unsigned drivers, and then try to install the printer drivers, we'll learn if the drivers are signed or not.

Q) You need to ensure that Amy Walsh is able to install the printers on the print servers but you do not want to give Amy Walsh more permission than she requires.
What should you do?
- Log on as the local Administraotr and enable the driver signing option to ignore file signature verification.

- The Driver Signing Options on Server1 is set to block the installation of unsigned drivers but on server2 and server3 it is set to warn or ignore unsigned drivers. You must configure the Driver Signing options on server3 to also warn or ignore driver signing. This will allow you to install the drivers on server3.

- The driver file is an msi file. Therefore we need to use the Windows Installer(msiexec) to install the driver. We need to use the msiexec command rather than double clicking the msi file in order to use driver rollback.

- Physical hard disk performance improvement? Identical to Drive and create a stripped volume.

- During disk writes, data is written to each disk in the striped volume. Each disk controller writes part of the data to the related disk. This provides improved read/write performance.

- spanned volumes span multiple disks
- RAID-5 requires at least three physical disks.
- Simple volume cannot span multiple disks.

Q)COM1 messages when COM1 and COM2 messages are received at the same time. You need to set the response settings to achieve your objectve.
- Set the Interrupt Request (IRQ) level

Q)different desktop environments ==> standard desktop environments
- Specify a profile pathe to a network share for each employee. Assign only the Allow-Read permission for the share to the Authenticated Users group.
(A mandatory user profile can be used to enforce a uniform desktop environment for the users.)

- If you want to reset the password, you have to should right-click the account. In the scenario the account is disabled.

1. Create a template account named Default Domain User in Active Directory.
2. Log on to the domain as Default Domain User.
3. Configure the desktop and Start menu.
4. Copy the profile for Default Domain User to NETLOGON\Default User.


- Universal Naming Convention(UNC) for the share file that will be used to host the user profiles. By typing this entry, Windows will automatically seek the profile folder named for the user account.

Q) You need to import these accounts to the Active Directory. The file is chown in the following exhibit.- import the computer account into Active Directory with the use of the CSVDE command.
CSVDE 형식은 사용자 개체와 다른 유형의 개체를 Active Directory에 추가할 때만 필요하다

Q) The manager wants you to pre-stage the computer accounts in Active Directory to minimize support that the users will require.
- In the TestDevOU, create the computer accounts.




Q) User A, is on vacation you need to ensure that the attempted intrusion is unsuccessful. Your solution must not compromise the other user's access to the domain.- Use Active Directory Users and Computers to disable the User account.


- Domain Group exam
1-case) Change the scope of the domain local group to global.
2-case) Create another domain group named Z-Z.==> This option will not work you need to keep the two groups synchronized as managers are added and removed from either groups.


- You need to create a group in testking.com so that you can give the appropriate permissions to the group. ==> Create a global security group in the testking.com domain.Place users from the testking.com domain in the new global security group and assign permissions to the group.

- When the functional is raised, only the incremental changes made to a universal group are replicated. When the domain is in Windows 2000 native mode, a cjange in universal group membership will force the entire group's membership information to be replicate across the domain.

- A global security group can be assign permissions anywhere in the forest or trusted domain. You have to change the distribution group to a security group. With a security group you can assign permissions.
- Domain Local group can include members from anywhere in the forest or trusted domain. Changing the scope is unnecessary.


Q)You need to this with the least amount of administrative effort.
- Open User's Properties page and examine the Members of tab.


Q) You create a global named TKMarketing in each office and add the user accounts in the Marketing department to the TKMarketing group. You want to assign permissions to the Marketing users to allow them access to all resources by using the minimum numbers oif group.
- Assign permissions for all appropriate resources throughout the forest th each TKMarketing group.(Domains at that functional level do not support universal security group.)


- Create separate global groups at each office and add user accounts of the Sales users at that office to the new global groups. Create a domain local group and add the global groups from each office to the domain local group. Then assign permissions to the domain local group.



- The functional level is set at Windows 2000 mixed.


- TKSales: Send and receive E-mail messages.(Distribution Group)
- TKAcc: To assign access to network resources.(Security Group)
- TKMrk: To assign access to network resources and distributing E-mail messages.(Security Group)
- TKFin: To assing access to network resources and distributing E-mail messages.(Security Group)


Q) A manager named Rory Allen wants you to set up a group named TestKingResDev, which will consist of the employees of the Research and a Development department. This group will be used to grant access to resources on TESTKING-SR25. They should get access to other resources on other computers. You need to set up a group strategy to meet the manager's requirements.
- Add the TestKing.com employees to the TestKingResDev group and creat a local group named TestKingResDev on TESTKING-SR.


Q) Now you need to apply these settings to the rest of the 12 application servers with the least amount of administrative effort. You export the security settings on TESTKING-SR to a template.
- Add the servers into an OU you have created. Create a GPO and import the template into the GPO and link it to the OU.


- EFS provides a transparent way of encrypting data on NTFS volumes. To use EFS the user must be issued a digital certificate. For the users to use EFS you should create an OU and pacle portable computers in the OU. And link a new GPO to the OU.


- The DSADD command is used to add users, computers, organizational, contacts, and groups to Active Directory.
- The SECEDIT command is used to configure security and compare current settings to a security template.
- The GPDUPATE command is used to refresh group policy setting on local.
- The DCPROMO command is used to promote a member server to a domain controller.


- The Active Directory Users and Computer MMC snap-in allows you to create, modify, move and delete user accounts, computer account, organizational units and groups.


- Dsquer user searches Active Directory for users that match specified credentials. You can use dsquery to findusers and then send a list of those users to another command. Dsmod user modifies the attributes of users in Active Directory.
exam) 1. DSQUERY USER OU=TK_Mrk DC=testking DC=msft|
2. DSMOD USER-PROFILE "\\TESTKING-SR15\Mrk_Profiles\$usemame$"



- You should use the dsadd command to add users to Active Directory from the command line. The dsadd command is used to add new objects to Active Directory, such as users, group or computers.


- User templates so that share common settings can be replicate using a minimum of administrative effort. The commonly userd attribute are transferred by default during the copy operation. The Sales department users are members of common global groups and are allowed to connect to the network using remote dial-in connection.


- You need to configure the Temporary User account to expire in three months.
==> Create a saved LDAP query that will return user accounts. Select all of the user accounts returned by the query and at the same time modify the expired date in their accounts properties.
(Windows Server 2003 supports the configuration of common properties for multiple selected objects. You should create a saved query that will return all temporary user accounts.


- All the properties of an Active Directory object are kept when the objects is moved to another OU whether you use the DSMOVE command or the Active Directory Users and computers MMC snap-in.


- You should use the dsadd command to add users to Active Directory from the command line. The dsadd command is used to add new objects to Active Directorym such as users, group or computers.


- The CSVED command allows you to import and export Active Directory object to and from Active Directory. Too successfully import object you must define it in a comma-dellimited ASCII text file.


- You need to unlock the account. To protect the domain form brute force attackes, account policies can be created using group poplicy to lock a user account if a specified number of failed attempts occur during a specified period of time.


- You are going to store the reaming profiles on a server named TESTKING-SR26. You configure a template user account as in the exhibit.
















Q) You need to accomplish this task without disturbing the other client computers. You also want to accomplsh this task using the least amount of administrative effort.
- Configure auditing of the Everyone group for the files and folders you suspect are being accessed and enable an audit policy for the Finance department OU.


To allow Remote Assistance sessions between the desktop support personnel and users in the other buildings, the firewall between the buildings must be configured to allow Terminal Services traffic to pass on TCP port 3389. Terminal Service traffic uses TCP port 3389.


The issue you have arose because of Clive Wilson and probably other members of the web development team using the local Administrator account of TESTKING-SR23 when wanting to use a Remote Desktop connection to log on to TESTKING-SR32. For security purposes,Remote Desktop Connection does not authenticate any local users that have a blank password. You can resolve this by configuring a password for the local Administrator acount or by informing web developers to use their respective domain user account to log on to TESTKING-SR23.


Q) You want to configure the RDP-Tcp Properties sesstion and time-out settings for all terminal servers by using the minimum amount of administrative effort.
- Create a new OU named TerminalServers.--> Add all terminal servers to the OU
--> Create a new GPO and configure it with the appropriate session and time-out settings. --> Link the GPO to the TerminalSerbers OU.

Who's next President United of America?


I have interest about this Issue.
Black man(Barack Obama)? or Women(Hillary Clinton)?

Both Man and Women have Strong, ability and New. One year in the time left,
but Preliminary election candidate is very hot and interesting.

Personally, I support Obama. but I hope they have worked hard for more great people be elected.

Monday, November 5, 2007

070-290 Managing and Maintaining A Microsoft Windows Server 2003 Environment




I start MCSE first test 070-290 Managing and Maintaining A Microsoft Windows Server 2003 Environment.
Searching web and I find 070-290 last version v56. ^^;
If Someone need this version, send mail to me. so I will send you a file(PDF) with please.

Sunday, November 4, 2007

[SOCCER] - Earsenal Vs manutd PL 12R H/L

Allways they show us Good playing game.




03/11/2007 15:48, Report by Adam BostockSir Alex: We threw it awaySir Alex Ferguson was fuming after United's failure to keep the lead cost them dear in a dramatic draw at the Emirates Stadium.

The boss believes his team threw away a great chance to beat their rivals, and pointed to the first of two Arsenal equalisers as the source of his irritation.

"We threw it away, we were in a winning position twice," Sir Alex told MUTV.

"The goal that angered me most was the goal we gave away after half-time. To lose a goal from taking a throw-in at their corner flag was criminal."

The goal in question, scored by Cesc Fabregas, came only three minutes after Wayne Rooney had given United the lead - albeit with the half-time interval inbetween.

"It was a marvellous time for us to score, just before half-time. We should have been buoyed by that and we did start the second half well with good possession. Then we gave the goal away and for the next five to ten minutes after that they got at us."

United weathered that early second-half storm and the score remained at 1-1 for the next half-hour. Sir Alex was then as surprised as anyone when the Reds broke through again.

"I couldn’t see either team scoring a second goal. To then score our second when we did and give it away in injury time is hard to take, really hard to take. Arsenal got out of jail.

"The result doesn’t tell you anything as both teams are going to be challenging. But the draw's good for Chelsea and Liverpool and there are a lot of twists and turns to come."

2007 FINA 400m 200m Final

400M


200M

Search engine optimization for Google(구글을 위한 검색엔진 최적화)

I explain Search engine optimization

1. Back Link age
2. Contents
3. Search result and Site relation

- Back link says inbound links to other websites - link age is important it show true value later six month- b, strong ,i ,em using...Google robot find that- site is important quality but not amount.- Consideration important Keyword for upload contents - title tag


Why Hire a Search-Engine Optimization (SEO) Professional?
Internet search-engines are the primary vehicle by which consumers search and find what they are looking for. In fact:

"Surveys show that over 85% of internet users find new Web sites by using search-engines. Other surveys show that after email, search-engines are the most popular activity on the web. It's a fact, Search Engine Optimization must be a necessary part of your online marketing strategy."

Industry-leading experts such as U.S. Bancorp Piper Jaffray Senior Research Analyst Safa Rashtchy recently professed that "the search market has become the Holy Grail of Internet advertising and continues to grow faster than our expectations." It is becoming increasingly well-known that website ranking on the first or second page on one or more of the major search engines can translate into enormous increases in sales, leads and quality traffic. There has never been a more opportune time to develop an effective search-engine marketing strategy.

Pepperjam's Search Engine Optimization Services are top in the industry and we have been recognized as one of the top 10 SEO firms in the Unites States.

The undeniable popularity and efficiency of utilizing search-engines to find products or services demands that a business develop an effective search-engine marketing strategy, which includes both professional Search Engine Optimization and paid search or PPC Management. Unlike e-mail advertising or banner placements on high-traffic websites like YAHOO, MSN, or AOL, search-engine traffic tends to be highly qualified since the content of your website determines your ranking - therefore, you have the ability to control the kind of traffic that is generated from search-engines.

One of the primary components of an effective search-engine marketing strategy is a well managed pay-per-click (PPC) program. An equally important strategy for increasing quality website traffic, sales, and leads is through ethical search-engine optimization.

Search-Engine Optimization is the process of designing /structuring a website in such a way as to rank high in search-engine results. Unlike paid search-engine placements that typically appear as "sponsored listings" at the top or side of a search results page, "organic listings" appear in the body of the search results page and are ranked based upon complex ranking systems or algorithms, which are uniquely determined by each particular search-engine. Organic listings typically make up the majority of the search results page and can be ethically manipulated by experts through proven search-engine optimization techniques.

Demonoid key


Many people find....

1. l1n1dj5tywbk91a1la85vn748fz3o3gdy9kf
2. c9v9k1am1o0epi0gqtgsgv05am81t28r2
3. xhzdrd30sh45yg8e3ozl3rl6m7sv74i92so1fvzdl
4. zwom5ov7hbb40kbdvge88uilxozm4r0ou1e1ku
Good using ㅎㅎ

SItemap Create site: xxx.XML








You Can easy Create yourblogaddress/site.XML
Just click... I use this time
Our Sitemap Generator now supports sitemaps in ROR format (both Free Online version and Unlimited Standalone generator). ROR Sitemaps (ROR - Resources of a Resource) is an independent XML format for describing any object of your content in a generic fashion, so any search engine can better understand that content.

Additionally to Google sitemaps and Yahoo sitemaps, the generator also will optionally create HTML sitemap for human visitors with the whole site structure.

Pakistan's Musharraf Declares Emergency



Police block roads leading to the administrative center of the capital Islamabad, Pakistan, Saturday, Nov। 3, 2007। President Gen। Pervez Musharraf declared a state of emergency in Pakistan on Saturday ahead of a crucial Supreme Court decision on whether to overturn his recent election win and amid rising Islamic militant violence. (AP Photo/Wally Santana) By MATTHEW PENNINGTON Associated Press WriterISLAMABAD, Pakistan Nov 3, 2007 (AP)
Gen. Pervez Musharraf declared a state of emergency on Saturday, ahead of a crucial Supreme Court ruling on his future as president, thrusting the country deeper into political turmoil as it struggles with spreading Islamic militancy.
Seven Supreme Court judges immediately rejected the emergency, which suspended the current constitution. The government blocked transmissions of private news channels in several cities and telephone services in the capital, Islamabad, were cut.

Saturday, November 3, 2007

Kangwon National university(국립 강원대학교): Program of Computer and Communication Engineering


The College of Information Technology is playing a leadership role in shaping the electrical and computer engineering education and research by providing a state-of-the-art education with an integrated core curriculum, hands-on and computer-intense laboratories, development of communications and leadership skills, teamwork and practical experience.
The College comprises of 4 programs in the Department of Electric & Electronic Engineering and the Department of Computer Science & Engineering as follows:

* Department of Electric & Electronic Engineering
-> Program of Electrical & Electronic Engineering
-> Program of Electronic & Communications Engineering
* Department of Computer Science & Engineering
->Program of Computer and Communications Engineering
->Program of Computer Science

Currently, the college of IT has 46 faculty members and about 1,200 undergraduate students and 100 graduate students enrolled in programs leading to the degrees: Bachelor of Science(B.S.), Master of Science(M.S.) and Doctor of Philosophy (Ph.D.).



If you want to know about our Majors, Click subject or link.http://computer.kangwon.ac.kr


Seo, Ju-Ha, Professor, Ph.D.(Nantes University, France)
Multimedia Communications, Computer Networks.
mailto:Networks.jhseo@kangwon.ac.kr



Kim, Hwa-Jong, Professor, Ph.D. (KAIST)
Data Communications, Computer Networksmailto:Networkshjkim3@gmail.com




Kwon, Ho-Yeol, Professor, Ph.D.(KAIST)
Digital Communications, Mobile Networks.mailto:Networks.hoyeolk@kangwon.ac.kr




Choi, Hwang-Kyu, Professor, Ph.D.(KAIST)
Database Systems, Multimedia Systems.mailto:Systems.hkchoi@kangwon.ac.kr




Whang, Whan-Kyu, Professor, Ph.D. (Florida University, U.S.A)
DBMS, Multimedia Data Processing wkwhang@kangwon.ac.kr




Kim, Young-Seok, Professor, Ph.D.(KAIST)
Operating Systems, Real Time Systems.mailto:Systems.yskim@kangwon.ac.kr





Jeong, Choong-Kyo, Professor, Ph.D.(KAIST)
Communication Protocol, Performance Analysis of Communication Networksmailto:Networksckjeong@kangwon.ac.kr




Lee, Goo-Yeon, Professor, Ph.D. (KAIST)
Computer Network, ATM Switch Structure, BISDN leegyeon@kangwon.ac.kr




Lee, Heon-Guil, Professor, Ph.D. (KAIST)
Distribute Process, Information Securitymailto:Securityhglee@kangwon.ac.kr




Ha, Jin-Young, Professor, Ph.D. (KAIST)
Pattern Recognition, HCI jyha@kangwon.ac.kr






Kim, Man-Bae, Associate Professor, Ph.D. (Washington University, U.S.A)
Visual Data Processing, Visual Communication, Computer Visionmailto:Visionmanbae@kangwon.ac.kr




Choi, Chang-Yeol, Associate Professor, Ph.D. (Seoul National University)
Computer Architecture, Mobile and Ubiquitous Computing cychoi@kangwon.ac.kr




Jung, Inbum, Assistant Progessor, Ph.D.(KAIST)
Parallel Processing, Embedded Systemsmailto:Systemsibjung@kangwon.ac.kr






Kim, Yoon, Assistant Professor, Ph.D.(Korea University)
Digital Image Processing, Multimedia Communicationmailto:Communicationyooni@kangwon.ac.kr




Kim, Hark-Soo, Full-time lecturer, Ph.D.(Sogang University)
Digital Image Processing, Multimedia Communicationnlpdrkim@kangwon.ac.kr

Homepage, Personal Blog free record Site list (홈페이지, 개인블로그 무료 등록 사이트 정리)

네이버 http://submit.naver.com/basic_req/reg_step1.php?dir=
구글: http://www.google.co.kr/intl/ko/add_url.html
다음
: http://help.search.daum.net/help/register.html
블로거기자단: http://bloggernews.media.daum.net/user/join
엠파스 http://add.empas.com/regi2.html
야후 https://kr.suggest.yahoo.com/apply/index.php ->
구글 ADSense 사용자는 등록불가야후https://siteexplorer.search.yahoo.com/submit
야후RSS
Feed 등록 https://siteexplorer.search.yahoo.com/submit
MSN http://search.msn.co.kr/docs/submit.aspx?FORM=WSDD2
파란닷컴 http://add.paran.com/normal_info.php
40개 이상의 검색엔진에 무료등록 http://www.submitexpress.com/?source=google
네이트닷컴 http://reghome.nate.com/comReg/common_01.asp
네이트닷컴 (기등록자 수정) http://reghome.nate.com/request/request_01.asp
구글 http://www.google.co.kr/intl/ko/add_url.html
네이트 http://reghome.nate.com/
드림위즈 http://request.dreamwiz.com/BIN/register.cgi
구글2 http://dmoz.org/World/Korean
아이윙크 http://www.iwink.com/suggest/suggest2.html
가나넷 http://www.gana.net/add.php
고쟁이 http://goji.co.kr/Index.html?subP=SiteEntry
천리안 http://dir.chol.com/service/request/reqregister.php
신문가게 http://www.newspaper.co.kr/register/index.php
아이포유 http://www.iforu.com/
(회원가입필) 해적코리아 http://kr.haejuk.com/route/route_nomal.asp
top100 http://www.top100.cc/member/add.html?ADDCID=
개미넷 http://www.gaemi.net/ 뻠프 http://www.ppump.com/
지우 http://www.gioo.com/
인포헬프 http://www.infohelp.co.kr/kr/add.php
가자아이 http://sc.gajai.com/search/express/index.php
PC 8282 http://www.pc8282.co.kr/link/add.php
사이트탑 http://www.sitetop.net/cgi-bin/links/add.cgi
아이윙크 http://www.iwink.com/
아이플 http://www.eyeple.net/
http://www.zip.org/services/normal/normalservice.asp?c=
웹서치 http://www.websearch.co.kr/
탑100 http://www.top100.cc/member/add.html
엔진코리아 http://nzinekorea.com/main.php
(회원가입필) 티아이 http://www.teye.co.kr/
인터넷쇼핑몰검색 http://www.gotocom.net/
키사이트 http://www.keysite.co.kr/
조비즈 http://www.zo.bz/ 단짝 http://danjjak.com/

Friday, November 2, 2007

Computer assembling? ^ _^ -Welcome!

Please Write to Board :
1 - Total predictive price? Low - Normal - High (예상하는 구매 가격)
2 - When take (언제 받기를 원하는지)and Please write down as much detail as possible your wants (더 상세한 요구사항을 적어주셔도 됩니다) Basic Selection Model(Except Shipping Fees) - 배송비를 제외하고 순수하게 최저 부품비

(ex)


World Bodybuilding Championship



Smile man!




Great mans.....what Can I do that eating?


^:^ Impossible body॥














60Kg Gold Medal : JO Wang Bong

Michael Jackson - Will You Be There





He is older but always My Hero. (강원대학교 한번 와서 공연해줬으면 ㅡㅡ;;)






Hold me Like the river Jordan And I will then say to thee
You are my friend Carry me Like you are my brother Love me like a mother Will you be there? When weary Tell me will you hold me When wrong Will you scold me?

When lost Will you find me? But they told me A man should be faithful And walk when not able And fight till the end But I'm only human Everyone's taking control of me Seems that the world's got a role for me I'm so confused Will you show it to me
You'll be there for me And care enough to bear me

(Hold me) (Lay your head lowly) (Softly then boldly) (Carry me there) (Hold me) (Love me and feed me) (Kiss me and free me) (I will feel blessed) (Carry) (Carry me boldly) (Lift me up slowly) (Carry me there) (Save me) (Heal me and bathe me) (Softly you say to me) (I will be there) (Lift me) (Lift me up slowly) (Carry me boldly) (Show me you care) (Hold me) (Lay your head lowly) (Softly then boldly) (Carry me there) (Need me) (Love me and feed me) (Kiss me and free me) (I will feel blessed)

In our darkest hour In my deepest despair Will you still care? Will you be there? In my trials and my tribulations Through our doubts and frustrations In my violence In my turbulence Through my fear And my confessions In my anguish and my pain Through my joy and my sorrow In the promise of another tomorrow I'll never let you part For you're always in my heart

Ad-Aware 2007 Free, Plus, and Pro.


This free antispyware program with a solid scanning engine has a significantly improved UI. Lavasoft's Ad-Aware Free includes better detection of adware and malware, a scanning engine that goes easy on your PC's system resources, and a snazzy new interface. The updates apply to all three versions of Ad-Aware, which now go by the names Ad-Aware 2007 Free, Plus, and Pro.
In my evaluation of Ad-Aware 2007 Free, I found that the program lived up to its promise of cutting scan time on my PC; for me, this time went down from 7 minutes to 4 minutes। Harder to test was the program's new ability to seek and delete rootkits and other threats that burrow deep into your PC. For that, I take Lavasoft's word when it says earlier versions of Ad-Aware weren't equipped to handle today's threats.


Also new is the program's new interface, which is available in all three versions. Finding tools and tweaking configuration have been made much easier.
Premium Versions Deliver More A big advantage of the Plus version, which costs $27, is the real-time protection of your system that nips adware, spyware, and malware problems in the bud before they become serious। Though real-time protection isn't new for the Plus and Pro versions, this feature may still convince you to upgrade.


Note: Existing users of Ad-Aware Plus and Pro will be able to upgrade to the new versions for free.
good Utility but I like kasperskylab ^ ^;

Bonjovi - Always

This Romeo is bleedingBut you can't see his bloodIt's nothing but some feelings That this old dog kicked up
It's been raining since you left meNow I'm drowning in the flood You see I've always been a fighter But without you, I give up Now, I can't sing a love Song

Like the way it's meant to beWell, I guess I'm not that good anymore But baby, that's just me
CHORUSYeah I will love you baby-alwaysAnd I'll be there forever and a day-always

I'll be there 'til the stars don't shine'Til the heavens burst and the words don't rhyme And I know when I die, you'll be on my mind And I'll love you-always


Now your pictures that you left behindAre just memories of a different life Some that made us laugh, some that made us cry One that made you have to say goodbye What I'd give to run my fingers through your hairTo touch your lips, to hold you near

When you say your prayersTry to understand, I've mode mistakes, I'm just a manWhen he holds you close, when he pulls you near When he says the words you've been needing to hear I'll wish

I was him, cause those words are mineTo say to you 'til the end of timeYeah, I will love you baby-always And I'll be here forever and a day-always If you hold me to cry for you, I could

If you told me to die for you, I wouldTake a look at my face There's no price I won't pay To say these words to you Well, there ain't no luck in these loaded dice But baby if you give me just one more try We can pack up our old dreams and our old lives We'll find a place where the sun still shines

Thursday, November 1, 2007

Frank Shamrock Vs Renzo Grace ...me and you!



Elite XC MainEvent in California San Jose


Who prey ?
2008 January...We will know Who winner.