Skip to main content

Golden horse warrior forex


Notícia do mercado de ações de hoje & amp; Análise.


Roku mostra a volatilidade é seu amigo em ações individuais, também.


A Roku tem uma visão para o futuro.


Vídeos de notícias mais recentes.


Últimas notícias.


Procurar notícias por categoria.


Tecnologia.


Commodities.


Idéias de investimento.


Inteligência de mercado.


Fique à frente dos mercados com estes artigos de leitura obrigatória.


Mercado de ações hoje.


Ações para assistir.


Rally dos estoques conforme os investidores reavaliam o relatório do Fed.


História em destaque de.


Últimos artigos por Martin Tillier.


A nova coluna de leitura obrigatória de Martin Tiller nos mercados.


Esclarecedor. Divertido. Todo dia. Apenas na NASDAQ.


Editar favoritos.


Insira até 25 símbolos separados por vírgulas ou espaços na caixa de texto abaixo. Esses símbolos estarão disponíveis durante sua sessão para uso nas páginas aplicáveis.


Personalize sua experiência NASDAQ.


Selecione a cor de fundo de sua escolha:


Selecione uma página de destino padrão para sua pesquisa de cotação:


Por favor, confirme sua seleção:


Você selecionou para alterar sua configuração padrão para a Pesquisa de cotação. Esta será agora sua página de destino padrão; a menos que você altere sua configuração novamente ou exclua seus cookies. Tem certeza de que deseja alterar suas configurações?


Desative seu bloqueador de anúncios (ou atualize suas configurações para garantir que o JavaScript e os cookies estejam ativados), para que possamos continuar a fornecer a você as notícias e os dados de mercado de primeira linha que você espera de nós.


Canção de mim mesmo.


Por Walt Whitman.


E o que eu suponho, você deve assumir


Pois todo átomo que pertence a mim pertence a você.


Eu me inclino e seguro à minha vontade, observando uma lança de grama de verão.


Nascido aqui de pais nascidos aqui de pais o mesmo e o deles / delas.


pais o mesmo,


Eu, agora com trinta e sete anos em perfeita saúde,


Esperando não cessar até a morte.


Retirando-se um pouco, bastou o que eles são, mas nunca esquecidos,


Eu porto para o bem ou para o mal, eu permito falar em todos os perigos,


Natureza sem cheque com energia original.


Eu respiro a fragrância eu mesmo, conheço e gosto disso,


A destilação me intoxicava também, mas não deixarei.


destilação, é inodoro,


É para a minha boca para sempre, eu estou apaixonada por isso,


Eu irei ao banco perto da floresta e ficarei sem disfarces e nu


Eu sou louco por isso estar em contato comigo.


Ecos, ondulações, murmúrios, raiz amorosa, fio de seda, virilha e videira,


Minha respiração e inspiração, o bater do meu coração, a passagem.


de sangue e ar através dos meus pulmões,


O cheiro de folhas verdes e folhas secas, e da costa e.


rochas do mar de cores escuras e de feno no celeiro,


Alguns beijos leves, alguns abraços, um abraço de braços,


O jogo de brilho e sombra nas árvores como os ramos flexíveis abanam,


O prazer sozinho ou na pressa das ruas, ou ao longo dos campos.


A sensação de saúde, o trinado no meio-dia, a música de mim se elevando.


da cama e encontrando o sol.


Você tem praticado tanto tempo para aprender a ler?


Você se sentiu tão orgulhoso de entender o significado dos poemas?


Você deve possuir o bem da terra e do sol (há milhões.


Você não deve mais levar as coisas em segunda ou terceira mão, nem olhar através delas.


os olhos dos mortos, nem se alimentam dos espectros em livros,


Você não deve olhar através dos meus olhos, nem tirar as coisas de mim,


Você deve ouvir todos os lados e filtrá-los de si mesmo.


começo e fim,


Mas eu não falo do começo nem do fim.


Nem mais juventude ou idade do que existe agora,


E nunca haverá mais perfeição do que existe agora


Nem mais céu ou inferno do que existe agora.


Sempre o desejo procriador do mundo.


aumentar, sempre sexo,


Sempre uma ligação de identidade, sempre distinção, sempre uma espécie de vida.


Para elaborar não adiantou, aprendeu e desaprendeu sentir que é assim.


entretido, apoiado nas vigas,


Stout como um cavalo, carinhoso, altivo, elétrico,


Eu e este mistério estamos aqui.


Até que isso se torne invisível e receba a prova por sua vez.


Conhecendo a perfeita adequação e equanimidade das coisas, enquanto eles.


discuto que estou em silêncio e vou me banhar e me admirar.


Nem uma polegada nem uma partícula de uma polegada é vil, e nenhuma deve ser.


menos familiar do que o resto.


Como o abraço e amoroso companheiro de cama dorme ao meu lado durante a noite,


e se retira no peep do dia com passos furtivos,


Deixando-me cestas cobertas com toalhas brancas inchando a casa.


Devo adiar minha aceitação e realização e gritar aos meus olhos,


Que eles deixam de olhar para depois e para baixo na estrada,


E imediatamente cifra e mostre-me um centavo


Exatamente o valor de um e exatamente o valor de dois e que está à frente?


Pessoas que eu conheço, o efeito sobre mim da minha vida precoce ou da ala e.


cidade em que eu moro, ou a nação,


As últimas datas, descobertas, invenções, sociedades, autores antigos e novos,


Meu jantar, vestido, associados, olhares, elogios, dívidas,


A indiferença real ou imaginada de algum homem ou mulher que eu amo,


A doença de um dos meus pais ou de mim mesmo, ou doentio ou perda.


ou falta de dinheiro, ou depressões ou exaltações,


Batalhas, os horrores da guerra fratricida, a febre das notícias duvidosas,


os eventos intermitentes;


Estes vêm para mim dias e noites e vão de mim novamente,


Mas eles não são eu mesmo.


Está divertido, complacente, compassivo, ocioso, unitário,


Olha para baixo, está ereto, ou dobra um braço em um certo descanso impalpável,


Olhando com a cabeça curvada para o lado, curioso o que virá a seguir,


Tanto dentro quanto fora do jogo e observando e imaginando isso.


linguistas e contendores,


Não tenho escárnios ou argumentos, testemunho e espero.


E você não deve ser humilhado ao outro.


Não palavras, não música ou rima eu quero, não costume ou palestra, não.


Apenas a calma que eu gosto, o zumbido da sua voz valvulada.


Como você colocou sua cabeça em meus quadris e gentilmente se virou para mim,


E separei a camisa do meu peito e mergulhei sua língua.


para o meu coração nu,


E alcancei até que você sentiu minha barba e alcançou até que você segurou meus pés.


todo o argumento da terra,


E eu sei que a mão de Deus é a promessa da minha própria


E eu sei que o espírito de Deus é meu irmão,


E que todos os homens nascidos são também meus irmãos e as mulheres.


minhas irmãs e amantes


E que um kelson da criação é amor,


E ilimitadas são folhas duras ou caídas nos campos,


E formigas marrons nos pequenos poços abaixo deles,


E migalhas musgosas da cerca do verme, pedras empilhadas, ancinho, verbasco e.


Como eu poderia responder a criança? Eu não sei o que é mais do que ele.


Um presente perfumado e um lembrete projetado


Portando o nome do dono de alguma forma nos cantos, para que possamos ver.


e observe, e diga De quem?


E isso significa, brotando tanto em amplas zonas e zonas estreitas,


Crescendo entre negros como entre brancos,


Kanuck, Tuckahoe, congressista, Cuff, eu dou a eles o mesmo, eu


recebê-los o mesmo.


Pode ser que você transpire dos seios de homens jovens,


Pode ser que se eu os conhecesse eu os amaria,


Pode ser que você seja de pessoas idosas ou de filhos levados em breve.


dos colos de suas mães,


E aqui estão as voltas das mães.


Mais escuras do que as barbas incolores dos velhos,


Escuro para sair de baixo dos telhados vermelhos das bocas.


E percebo que eles não vêm dos tetos das bocas por nada.


E as dicas sobre homens e mães idosos, e a prole tomada.


logo fora de suas voltas.


E o que você acha que se tornou das mulheres e crianças?


O menor broto mostra que realmente não há morte


E se alguma vez houve levou vida, e não espera no.


fim de prendê-lo,


E ceas'd o momento em que a vida apareceria.


E morrer é diferente do que qualquer um supõe e tem mais sorte.


Eu apresso-me a informá-lo que tem a mesma sorte de morrer, e eu sei disso.


não estou contido entre o meu chapéu e botas,


E folhear objetos múltiplos, não dois iguais e todos bons,


A terra é boa e as estrelas são boas, e seus adjuntos são todos bons.


Eu sou o companheiro e companheiro de pessoas, tudo tão imortal e.


insondável como eu mesmo


(Eles não sabem como é imortal, mas eu sei.)


Para mim aqueles que foram meninos e que amam mulheres,


Para mim, o homem que se orgulha e sente como se magoa,


Para mim o doce coração e a velha empregada, para mim mães e os.


mães de mães,


Para mim lábios que sorriam, olhos que derramaram lágrimas,


Para mim, filhos e geradores de filhos.


Eu vejo através do pano largo e do guingão se ou não,


E estou por perto, tenaz, aquisitivo, incansável e não posso ser abalado.


Eu levanto a gaze e olho por um longo tempo, e silenciosamente afastei as moscas.


Eu peeringly os vejo do topo.


Eu testemunho o cadáver com seu cabelo enrolado, noto onde a pistola.


O pesado ônibus, o motorista com seu polegar interrogatório, o.


o barulho dos cavalos no chão de granito


Os trenós de neve, tinidos, gritos, peles de bolas de neve,


Os hurrahs de favoritos populares, a fúria de mobs


A aba da maca da cortina, um homem doente carregado para o hospital,


O encontro de inimigos, o juramento repentino, os golpes e a queda,


A multidão excitada, o policial com sua estrela rapidamente trabalhando a dele.


passagem para o centro da multidão,


As pedras impassíveis que recebem e devolvem tantos ecos,


Que gemidos de over-fed ou half-starv'd que caem sunstruck ou em ataques,


Que exclamações de mulheres levadas de repente que se apressam para casa e.


dê à luz bebês,


Que fala viva e enterrada está sempre vibrando aqui, o que uiva.


contido pelo decoro,


Detenção de criminosos, ofensas, ofertas adúlteras feitas, aceitações,


rejeições com lábios convexos,


Eu me importo com eles ou com o show ou a ressonância deles - eu venho e parti.


A grama seca do tempo de colheita carrega o vagão lento,


A luz clara toca no cinza marrom e verde intertidos,


As braçadas estão cheias do corte da queda.


Eu senti seus choques moles, uma perna reclinada na outra


Eu pulo das vigas e agarro o trevo e o timothy,


E role de ponta-cabeça e enrole meu cabelo cheio de mechas.


Vagando espantado com a minha própria leveza e alegria,


No final da tarde, escolhendo um local seguro para passar a noite,


Acendendo uma fogueira e assando o jogo recém-matado,


Adormecer nas folhas recolhidas com meu cachorro e arma ao meu lado.


Meus olhos assentam a terra, eu me inclino na proa ou grito alegremente do convés.


Eu coloquei minhas sandálias nas minhas botas e fui e me diverti;


Você deveria ter estado conosco naquele dia em volta da caldeira de chowder.


a noiva era uma menina vermelha


Seu pai e seus amigos sentaram-se perto de fumar de pernas cruzadas e


eles tinham mocassins em pé e grandes cobertores grossos.


pendurado em seus ombros,


Em um banco, o caçador, ele estava drogado, principalmente em peles, sua luxuriante.


barba e cachos protegiam o pescoço, ele segurava a noiva pela mão,


Ela tinha longos cílios, a cabeça estava nua, as mechas grossas e retas.


desceu sobre seus membros voluptuosos e alcançou seus pés.


Eu ouvi seus movimentos quebrando os galhos da pilha de lenha,


Através da meia porta da cozinha, eu o vi nervoso e fraco,


E foi onde ele se sentou em um tronco e o guiou e lhe assegurou,


E trouxe água e encheu uma banheira para seu corpo suado e pés machucados,


E deu-lhe um quarto que entrou no meu e deu-lhe um pouco.


roupa limpa grosseira,


E lembre-se perfeitamente bem de seus olhos revolvidos e sua falta de jeito


E lembre-se de colocar piasters nas pernas do pescoço e dos tornozelos;


Ele ficou comigo uma semana antes de se recuperar e passar para o norte,


Eu o fiz sentar ao meu lado na mesa, minha maçaneta de incêndio encostada no canto.


Vinte e oito jovens e todos tão amigáveis;


Vinte e oito anos de vida feminina e tudo tão solitário.


Ela se esconde bonita e ricamente abafada pelas persianas da janela.


Ah, o mais caseiro deles é lindo para ela.


Você borrifa na água lá, ainda fica estoque ainda em seu quarto.


O resto não a viu, mas ela os viu e os amou.


Pequenos riachos passavam por todo o corpo deles.


Ele desceu tremulamente de seus templos e costelas.


sol, eles não perguntam quem se agarra rápido a eles,


Eles não sabem quem puffs e declina com pingente e arco de flexão,


Eles não pensam quem eles usam com spray.


na barraca no mercado,


Eu perambulo aproveitando sua réplica e seu embaralhamento e desmembramento.


Cada um tem seu trenó principal, eles estão todos fora, há um grande calor dentro


O ágil de suas cinturas joga mesmo com seus braços maciços,


Overhand os martelos balançar, overhand tão lento, overhand tão certo,


Eles não se apressam, cada homem bate em seu lugar.


embaixo de sua corrente amarrada,


O negro que dirige a longa roda do pátio de pedra, firme e firme.


alto ele está parado em uma perna na corda,


Sua camisa azul expõe seu amplo pescoço e peito e solta mais.


Seu olhar é calmo e imponente, ele joga a aba do chapéu.


longe de sua testa,


O sol cai em seu cabelo crespo e bigode, cai no preto de.


seus membros polidos e perfeitos.


Eu também vou com a equipe.


Para nichos à parte e junior bending, não uma pessoa ou objeto em falta,


Absorvendo tudo para mim e para esta música.


é que você expressa em seus olhos?


Parece-me mais que toda a impressão que li em minha vida.


Eles se levantam juntos, eles lentamente circulam ao redor.


E reconhecer vermelho, amarelo, branco, jogando dentro de mim,


E considere verde e violeta e a coroa tufada intencional,


E não chame a tartaruga indigna porque ela não é outra coisa,


E o bosque nunca estudou a gama, ainda que trate muito bem para mim,


E o olhar da égua da baía envergonha minha tolice.


Ya-honk ele diz, e soa para mim como um convite,


O atrevido pode supor que não tem sentido, mas eu escuto perto,


Encontre seu propósito e coloque lá em cima em direção ao céu invernal.


chickadee, o cão da pradaria,


A ninhada da porca grunhida enquanto puxam suas tetas,


A ninhada da galinha de peru e ela com suas asas meio espalhadas,


Eu vejo nelas e em mim a mesma velha lei.


Eles desprezam o melhor que posso para relacioná-los.


Dos homens que vivem entre o gado ou o gosto do oceano ou da floresta,


Dos construtores e diretores de navios e os manejadores de machados e.


mauls e os condutores de cavalos,


Eu posso comer e dormir com eles semana após semana.


Eu indo em minhas chances, gastando por vastos retornos,


Adornando-me para me dar o primeiro que me levará,


Não pedindo ao céu para descer para a minha boa vontade,


Dispersando livremente para sempre.


O carpinteiro veste sua prancha, a língua do seu anteparo.


assobia sua língua ascendente selvagem,


Os filhos casados ​​e solteiros voltam para casa para o jantar de Ação de Graças,


O piloto pega o pino-rei, ele abaixa com um braço forte,


O companheiro está de pé no baleia, lança e arpão estão prontos,


O atirador de pato caminha por trechos silenciosos e cautelosos,


Os diáconos são ordenados com as mãos cruzadas no altar,


A fiação recua e avança para o zumbido da roda grande,


O fazendeiro para nas barras enquanto caminha no primeiro dia e no chão.


olha para a aveia e centeio,


O lunático é levado por fim ao asilo como um caso confirmado,


(Ele nunca mais vai dormir como no berço da mãe dele).


A impressora do jornal com cabeça cinzenta e mandíbulas magras trabalha no seu caso,


Ele se livra de tabaco enquanto seus olhos brilham com o manuscrito;


Os membros malformados estão amarrados à mesa do cirurgião,


O que é removido cai horrivelmente em um balde;


A garota quadrada é vendida no leilão, o bêbado concorda.


o fogão da sala de bar,


O maquinista arregaça as mangas, o policial viaja a sua batida,


as marcas do porteiro que passam,


O jovem dirige o vagão expresso (eu o amo, embora eu o faça).


As correias do mestiço nas botas leves para competir na corrida,


O tiroteio ocidental dos perus atrai velhos e jovens, alguns se inclinam sobre eles.


rifles, alguns sentam em toras,


Saindo da multidão, caminha o atirador, toma sua posição, nivela sua peça;


Os grupos de imigrantes recém-chegados cobrem o cais ou dique,


Como as patas de lã enxameavam no campo de açúcar, o superintendente as vê.


da sela dele


A corneta chama no salão de baile, os cavalheiros correm para o seu.


parceiros, os dançarinos se curvam,


A juventude jaz acordada no sótão do telhado de cedro e toca no.


O Wolverine põe armadilhas no riacho que ajuda a encher o Huron,


O squaw envolto em seu pano amarelo está oferecendo mocassins e.


sacos de pérolas para venda,


O conhecedor olha ao longo da galeria de exposições com metade do corpo fechado.


olhos curvados para os lados


Quando as mãos do convés aceleram o barco a vapor, a prancha é lançada.


os passageiros em terra,


A jovem irmã segura a meada enquanto a irmã mais velha a enrola.


fora em uma bola, e pára de vez em quando para os nós,


A esposa de um ano está se recuperando e feliz tendo uma semana passada.


seu primeiro filho


A garota ianque de cabelos limpos trabalha com sua máquina de costura ou no.


fábrica ou moinho,


O homem da calçada se apoia em seu compactador de duas mãos, o líder do repórter.


voa rapidamente sobre o livro de notas, o pintor de sinais está a rotular.


com azul e dourado


O menino do canal trota no caminho de reboque, o guarda-livros conta com o seu.


escrivaninha, o sapateiro enrola seu fio,


O maestro bate o tempo para a banda e todos os artistas o seguem,


A criança é batizada, o convertido está fazendo suas primeiras profissões,


A regata é espalhada na baía, a corrida é iniciada, (como o branco.


O tropeiro assistindo seu dirigido canta para eles que se desviariam,


O pedler sua com sua mochila nas costas, (o comprador desordenado.


sobre o centavo estranho;)


A noiva não enrola o vestido branco, o ponteiro dos minutos do relógio.


O comedor de ópio se reclina com a cabeça rígida e os lábios abertos,


A prostituta arrasta seu xale, seu gorro balança sobre ela embriagado e.


A multidão ri de seus juramentos de guarda, os homens zombam e piscam para.


(Miserável! Eu não rio de seus juramentos nem zombar de você;)


O presidente que ocupa um conselho de gabinete é cercado pelos grandes.


Na praça, três matronas imponentes e amistosas com braços entrelaçados.


A tripulação do bando de peixe repetiu camadas de alabote no porão,


O Missourian cruza as planícies carregando suas mercadorias e seu gado,


Quando o colecionador de passagens passa pelo trem, ele avisa pelo.


tilintar de mudanças frouxas,


Os homens do chão estão colocando o chão, os estanhados estão estanhando o chão.


telhado, os pedreiros estão pedindo argamassa,


Em arquivo único, cada um deles levava sua mão aos operários;


Estações perseguindo umas às outras a multidão indescritível é reunida.


é o quarto do sétimo mês, (que saudações de canhão e armas pequenas!)


Estações perseguindo umas às outras os arados mais resistentes, a segadeira corta,


e o grão de inverno cai no chão;


Nos lagos, o pescador vigia e espera no buraco.


a superfície congelada,


Os cotos ficam grossos ao redor da clareira, o invasor ataca profundamente.


Flatboatmen fazem rápido em direção ao anoitecer perto do algodão-madeira ou pecan-trees,


Os caçadores de coon atravessam as regiões do rio Vermelho ou atravessam.


aqueles drenados pelo Tennessee, ou através dos do Arkansas,


Tochas brilham no escuro que paira sobre o Chattahooche ou Altamahaw,


Patriarcas sentam-se no jantar com filhos, netos e bisnetos.


Em paredes de adobe, em tendas de lona, ​​caçadores de descanso e caçadores depois.


o esporte do dia deles


A cidade dorme e o país dorme


O sono vivo pelo tempo deles, os mortos dormem pelo tempo deles,


O velho marido dorme por sua esposa e o jovem marido dorme junto a sua esposa;


E estes tendem para dentro de mim, e eu tendem para fora para eles,


E como é ser desses mais ou menos eu sou,


E destes e todos eu tecer a canção de mim mesmo.


Independentemente dos outros, sempre respeitoso com os outros,


Materna e paterna, criança e homem


Coisas com o material que é grosso e coisas com as coisas.


Um dos Nação de muitas nações, o menor o mesmo e o.


maior o mesmo,


Um sulista logo como um nortista, um plantador indiferente e.


hospitaleiro pelo Oconee eu vivo,


Um ianque ligava o meu próprio caminho pronto para o comércio, minhas articulações eram as mais simples.


articulações na terra e as articulações mais severas na terra,


Um Kentuckian andando pelo vale dos Elkhorn na minha pele de cervo.


leggings, um Louisianian ou georgiano,


Um barqueiro sobre lagos ou baías ou ao longo das costas, um Hoosier, Badger, Buckeye;


Em casa, com sapatos de neve Kanadian ou no mato, ou com os pescadores.


Em casa, na frota de barcos de gelo, navegando com o resto e atacando,


Em casa nas colinas de Vermont ou nos bosques do Maine, ou no.


Camarada dos californianos, camarada dos ocidentais livres do norte, (amando.


suas grandes proporções)


Camarada de jangadas e carvoeiros, camarada de todos que apertam as mãos.


e bem-vindo a beber e carne,


Um aprendiz com o mais simples, um professor do mais pensativo,


Um principiante que está começando a experienciar miríades de estações,


De cada matiz e casta sou eu, de todo posto e religião,


Um agricultor, mecânico, artista, cavalheiro, marinheiro, quaker,


Prisioneiro, homem de fantasia, barulhento, advogado, médico, padre.


Respire o ar mas deixe a abundância atrás de mim


E não estou preso e estou no meu lugar.


Os sóis brilhantes que vejo e os sóis escuros que não posso ver estão em seu lugar,


O palpável está em seu lugar e o impalpável está em seu lugar.)


não são originais comigo


Se eles não são seus tanto quanto meus eles não são nada, ou quase nada,


Se eles não são o enigma e a desvinculação do enigma, eles não são nada,


Se eles não estão tão próximos quanto estão distantes, não são nada.


Este é o ar comum que banha o globo.


Eu não jogo marchas apenas para vencedores aceitos, eu faço passeatas.


conquistou e matou pessoas.


Eu também digo que é bom cair, batalhas são perdidas no mesmo espírito.


em que eles são ganhos.


Eu sopro através dos meus encaixes meu mais alto e mais alegre para eles.


E para aqueles cujos navios de guerra afundaram no mar!


E para aqueles que afundaram no mar!


E para todos os generais que perderam compromissos e todos superaram heróis!


E os incontáveis ​​heróis desconhecidos são iguais aos maiores heróis conhecidos!


É para os ímpios exatamente como os justos, eu faço compromissos.


Eu não vou ter uma única pessoa desprezada ou deixada de lado,


A mulher, esponja e ladrão é convidada,


O escravo pesado é convidado, a venerealee é convidada;


Não haverá diferença entre eles e o resto.


Esse é o toque dos meus lábios nos seus, esse o murmúrio de saudade,


Essa profundidade e altura distantes refletem meu próprio rosto,


Essa é a mescla pensativa de mim mesmo e a saída novamente.


Bem, eu tenho, para os chuveiros de quatro meses, e a mica no.


lado de uma rocha tem.


A luz do dia surpreende? faz o twitter inicial do redstart.


através da floresta?


Eu surpreendo mais do que eles?


Eu posso não contar a todos, mas vou te contar.


Como extrai força da carne que como?


Mais tempo foi perdido me ouvindo.


Esses meses são vácuos e o chão, mas chafurda e sujeira.


vai para o quarto-removido,


Eu uso meu chapéu como quiser dentro ou fora.


médicos e calculado perto,


Não encontro gordura mais doce do que paus nos meus próprios ossos.


E o bem ou o mal eu digo de mim mesmo eu digo deles.


Para mim, os objetos convergentes do universo fluem perpetuamente,


Todos estão escritos para mim e eu preciso entender o que a escrita significa.


Eu sei que esta minha órbita não pode ser varrida pela bússola de um carpinteiro,


Eu sei que não passarei como um carlacue de criança cortado com um queimado.


Eu não incomodo o meu espírito para se justificar ou ser entendido,


Eu vejo que as leis elementares nunca pedem desculpas,


(Eu acho que não me comporto mais do que o nível em que planto minha casa,


Se nenhum outro no mundo estiver ciente eu sento o conteúdo,


E se todos e cada um estiverem conscientes, sento-me contente.


E se eu chego ao meu dia de hoje ou em dez mil ou dez.


Eu posso alegremente aceitar isso agora, ou com a mesma alegria que posso esperar.


Eu rio do que você chama de dissolução,


E eu conheço a amplitude do tempo.


Os prazeres do céu estão comigo e as dores do inferno estão comigo,


O primeiro eu enxerto e aumento em mim, o último eu traduzo.


em nova língua.


E eu digo que é tão bom ser mulher quanto ser homem


E eu digo que não há nada maior que a mãe dos homens.


Nós nos esquivamos e depreciamos o suficiente


Eu mostro que tamanho é apenas desenvolvimento.


É uma ninharia, eles vão mais do que chegar lá cada um, e.


Eu chamo a terra e o mar pela metade à noite.


Noite dos ventos do sul - noite das grandes poucas estrelas!


Ainda acenando noite - noite de verão nua e louca.


Terra das árvores adormecidas e líquidas!


Terra do por do sol partido - terra das montanhas enevoadas-topt!


Terra do vítreo derramar da lua cheia apenas tingida de azul!


Terra de brilho e manchas escuras na maré do rio!


Terra do cinza límpido das nuvens mais brilhante e claro por minha causa!


Terra com cotoveladas remotas - terra rica de flores de maçã!


Sorria, para o seu amor vem.


O amor apaixonado indescritível.


Eu vejo da praia seus dedos tortos,


Eu acredito que você se recusa a voltar sem me sentir,


Devemos ter uma volta juntos, eu me despir, me apressar fora da vista da terra,


Almofada me suave, me balançar em sonolento billowy,


Me arremesse com amorosa molhada, eu posso te pagar.


O mar respira respirações amplas e convulsivas


Mar da salmoura da vida e de sepulturas ainda não preparadas,


Uivador e scooper de tempestades, mar caprichoso e delicado,


Eu sou integral com você, eu também sou de uma fase e de todas as fases.


Extendedor de amies e aqueles que dormem nos braços um do outro.


(Devo fazer minha lista de coisas na casa e pular a casa que.


da maldade também.


O mal me impulsiona e a reforma do mal me impulsiona, fico indiferente,


A minha marcha não é a marcha do descobridor de defeitos ou do rejetor,


Eu umedecer as raízes de tudo que cresceu.


Você adivinhou que as leis celestes ainda precisam ser trabalhadas e corrigidas?


Doutrina suave como ajuda constante como doutrina estável,


Pensamentos e ações do presente nosso despertar e começar cedo.


Não há melhor do que isso e agora.


A maravilha é sempre e sempre como pode haver um homem mau ou um infiel.


E o meu uma palavra do moderno, a palavra En-Masse.


Aqui ou daqui para frente é tudo a mesma coisa para mim, eu aceito o tempo absolutamente.


Só essa maravilha desconcertante mística completa tudo.


Materialismo primeiro e último imbuindo.


Buscar stonecrop mixt com cedro e ramos de lilás,


Este é o lexicógrafo, este químico, isso fez uma gramática de.


os velhos cartuchos


Esses marinheiros colocam o navio em perigosos mares desconhecidos.


Este é o geólogo, isso funciona com o scalper, e isso é um.


Seus fatos são úteis, e eles não são minha morada,


Eu, mas entrei por eles em uma área da minha morada.


E mais os lembretes da vida incontável, e da liberdade e extração,


E faça contas curtas de neutras e castrados, e favorece os homens e.


as mulheres se equipam totalmente,


E bater o gongo da revolta e parar com fugitivos e eles que.


conspirar e conspirar.


Turbulento, carnudo, sensual, comendo, bebendo e criando,


Nenhum sentimentalista, nenhum stander acima de homens e mulheres ou à parte deles,


Não mais modesto que imodesto.


Desaperte as portas dos batentes!


E tudo o que é feito ou dito retorna finalmente para mim.


Por Deus! Não aceitarei nada que nem todos possam ter.


em contrapartida nos mesmos termos.


Vozes das gerações intermináveis ​​de prisioneiros e escravos,


Vozes das doenças e desespero e dos ladrões e anões,


Vozes de ciclos de preparação e acréscimo,


E dos fios que conectam as estrelas, e dos úteros e dos.


E dos direitos deles os outros estão em baixo,


Do deformado, trivial, chato, tolo, desprezado,


Nevoeiro no ar, besouros rolando bolas de estrume.


Vozes de sexos e luxúrias, vozes veladas e eu removo o véu,


Vozes indecentes por mim esclarecidas e transfiguradas.


Mantenho-me tão delicado ao redor das entranhas quanto na cabeça e no coração


A cópula não é mais importante para mim do que a morte é.


Vendo, ouvindo, sentindo, são milagres e cada parte e etiqueta de mim.


O aroma desses axilas é mais fino que a oração,


Esta cabeça mais que igrejas, bíblias e todos os credos.


meu próprio corpo, ou qualquer parte dele,


Mofo translúcido de mim será você!


Bordas sombreadas e descansa, será você!


Colter masculino firme será você!


O que quer que seja para o tilth de mim, será você!


Você meu rico sangue! seu fluxo leitoso, strippings pálidos da minha vida!


Mama que pressiona contra outros seios, será você!


Meu cérebro será suas circunvizinhas ocultas!


Raiz da bandeira doce lavada! lagoa-snipe timorosa! ninho de guardada.


ovos duplicados! será você!


Mix'd feno de cabeça, barba, músculos, será você!


Engordando seiva de bordo, fibra de trigo viril, será você!


Sol tão generoso será você!


Vapores iluminando e protegendo meu rosto, será você!


Você suado riachos e orvalhos ele será você!


Ventos cujos genitais suaves se esfregam contra mim, serão vocês!


Campos musculares largos, ramos de carvalho vivo, espreguiçadeira carinhosa na minha.


caminhos sinuosos, será você!


Mãos que eu tomei, cara que eu beijei, mortal que eu já toquei,


será você.


Cada momento e tudo o que acontece me emociona com alegria,


Eu não posso dizer como meus tornozelos se dobram, nem de onde a causa do meu menor desejo,


Nem a causa da amizade que eu emito, nem a causa do.


amizade eu levo de novo.


Uma glória da manhã na minha janela me satisfaz mais do que a metafísica.


A pouca luz desvanece as sombras imensas e diáfanas,


O ar é bom para o meu paladar.


Scooting obliquamente alta e baixa.


Mares de suco brilhante sufocam o céu.


O pesado desafio do leste naquele momento sobre minha cabeça


A provocação zombeteira, Veja então se você deve ser o mestre!


Se eu não pudesse agora e sempre mandar o nascer do sol para fora de mim.


Encontramos a nossa própria alma na calma e fresca do amanhecer.


Com o rodopio da minha língua, abarco mundos e volumes de mundos.


Isso me provoca para sempre, diz sarcasticamente,


Walt você contém o suficiente, por que você não deixa transparecer?


Você não conhece o discurso de como os botões abaixo de você estão dobrados?


Esperando na escuridão, protegido pelo gelo,


A sujeira recuando diante dos meus gritos proféticos


I causas subjacentes para equilibrá-los, finalmente,


Meu conhecimento minhas partes vivas, mantendo em concordância com o significado de todas as coisas,


Felicidade, (quem quer que me ouça deixe-o sair em busca.


Englobam mundos, mas nunca tentem me envolver,


Eu me amontoo mais rápido e melhor simplesmente olhando em sua direção.


Eu carrego o plenum da prova e tudo mais na minha cara,


Com o silêncio dos meus lábios eu confundo completamente o cético.


Para obter o que eu ouço nesta música, deixar os sons contribuírem para ela.


cacho de palitos cozinhando minhas refeições,


Eu ouço o som que eu amo, o som da voz humana


Eu ouço todos os sons correndo juntos, combinados, fundidos ou seguindo,


Sons da cidade e sons da cidade, sons do dia e da noite,


Jovens falantes para aqueles que gostam deles, o riso alto de.


pessoas que trabalham em suas refeições,


A base de raiva da amizade desarticulada, os tons fracos dos doentes,


O juiz com as mãos apertadas na mesa, seus lábios pálidos pronunciando.


O heave'e'yo de estivadores que descarregam navios pelo cais, o.


abster-se dos âncoras levantadores,


O anel de alarmes, o grito de fogo, o zumbido de estrias rápidas.


Motores e carros de mangueira com timbre premonitório e luzes coloridas,


O apito a vapor, o rolo sólido do trem de carros se aproximando,


A marcha lenta jogou na cabeça da associação marchando dois e dois,


(Eles vão guardar algum cadáver, os topos da bandeira são cobertos com musselina preta.)


Eu ouço a corneta com chave, ela desliza rapidamente pelos meus ouvidos,


Ele sacode as dores loucas e doces através da minha barriga e peito.


Ah, isso realmente é música - isso combina comigo.


O orbic flex de sua boca está derramando e me enchendo cheio.


A orquestra me gira mais do que Urano voa,


Arranca tais ardores de mim que eu não sabia que possuía,


Ele me navega, eu limpo com os pés descalços, eles são lambidos pelas ondas indolentes,


Eu sou cortado por granizo amargo e bravo, eu perco meu fôlego,


Íngreme em meio a morfina mel, minha traqueia estrangulada em falsas da morte,


Finalmente deixo de novo sentir o quebra-cabeça dos quebra-cabeças,


E isso nós chamamos de ser.


(Volta e volta nós vamos, todos nós, e sempre voltamos para lá)


Se nada mais se desenvolvesse, o quahaug em sua casca era suficiente.


Eu tenho condutores instantâneos em cima de mim, quer eu passe ou pare,


Eles apreendem cada objeto e conduzem-no inofensivamente através de mim.


Tocar minha pessoa na de outra pessoa é o máximo que posso suportar.


Chamas e éter fazendo uma corrida para minhas veias,


Ponto traiçoeiro de mim chegando e lotando para ajudá-los,


Minha carne e sangue jogando raios para atacar o que é dificilmente.


diferente de mim mesmo


Por todos os lados, provocadores provadores enrijecendo meus membros,


Esforçando o úbere do meu coração pelo gotejamento retido,


Se comportando licenciosamente para mim, não tendo nenhuma negação,


Me privando do meu melhor como para um propósito,


Desabotoando minhas roupas, segurando-me pela cintura nua,


Iludindo minha confusão com a calma da luz do sol e campos de pasto,


Imodestamente deslizando os outros sentidos,


Eles subornaram para trocar com o toque e ir pastar nas bordas de mim,


Nenhuma consideração, nenhuma consideração pela minha força drenante ou pela minha raiva,


Buscando o resto do rebanho para apreciá-los um pouco,


Então, tudo se unindo para ficar em um promontório e me preocupar.


Eles me deixaram impotente para um marauder vermelho,


Todos eles vêm ao promontório para testemunhar e ajudar contra mim.


Eu falo descontroladamente, eu perdi a minha inteligência, eu e mais ninguém sou o.


I went myself first to the headland, my own hands carried me there.


Unclench your floodgates, you are too much for me.


Did it make you ache so, leaving me?


Rich showering rain, and recompense richer afterward.


Landscapes projected masculine, full-sized and golden.


They neither hasten their own delivery nor resist it,


They do not need the obstetric forceps of the surgeon,


The insignificant is as big to me as any,


(What is less or more than a touch?)


The damp of the night drives deeper into my soul.


Only what nobody denies is so.)


I believe the soggy clods shall become lovers and lamps,


And a compend of compends is the meat of a man or woman,


And a summit and flower there is the feeling they have for each other,


And they are to branch boundlessly out of that lesson until it.


And until one and all shall delight us, and we them.


And the pismire is equally perfect, and a grain of sand, and the egg.


And the tree-toad is a chef-d'oeuvre for the highest,


And the running blackberry would adorn the parlors of heaven,


And the narrowest hinge in my hand puts to scorn all machinery,


And the cow crunching with depress'd head surpasses any statue,


And a mouse is miracle enough to stagger sextillions of infidels.


grains, esculent roots,


And am stucco'd with quadrupeds and birds all over,


And have distanced what is behind me for good reasons,


But call any thing back again when I desire it.


In vain the plutonic rocks send their old heat against my approach,


In vain the mastodon retreats beneath its own powder'd bones,


In vain objects stand leagues off and assume manifold shapes,


In vain the ocean settling in hollows and the great monsters lying low,


In vain the buzzard houses herself with the sky,


In vain the snake slides through the creepers and logs,


In vain the elk takes to the inner passes of the woods,


In vain the razor-bill'd auk sails far north to Labrador,


I follow quickly, I ascend to the nest in the fissure of the cliff.


I stand and look at them long and long.


They do not lie awake in the dark and weep for their sins,


They do not make me sick discussing their duty to God,


Not one is dissatisfied, not one is demented with the mania of.


Not one kneels to another, nor to his kind that lived thousands of.


Not one is respectable or unhappy over the whole earth.


They bring me tokens of myself, they evince them plainly in their.


Did I pass that way huge times ago and negligently drop them?


Gathering and showing more always and with velocity,


Infinite and omnigenous, and the like of these among them,


Not too exclusive toward the reachers of my remembrancers,


Picking out here one that I love, and now go with him on brotherly terms.


Head high in the forehead, wide between the ears,


Limbs glossy and supple, tail dusting the ground,


Eyes full of sparkling wickedness, ears finely cut, flexibly moving.


His well-built limbs tremble with pleasure as we race around and return.


Why do I need your paces when I myself out-gallop them?


Even as I stand or sit passing faster than you.


What I guess'd when I loaf'd on the grass,


What I guess'd while I lay alone in my bed,


And again as I walk'd the beach under the paling stars of the morning.


I skirt sierras, my palms cover continents,


I am afoot with my vision.


Along the ruts of the turnpike, along the dry gulch and rivulet bed,


Weeding my onion-patch or hosing rows of carrots and parsnips,


crossing savannas, trailing in forests,


Prospecting, gold-digging, girdling the trees of a new purchase,


Scorch'd ankle-deep by the hot sand, hauling my boat down the.


Where the panther walks to and fro on a limb overhead, where the.


buck turns furiously at the hunter,


Where the rattlesnake suns his flabby length on a rock, where the.


otter is feeding on fish,


Where the alligator in his tough pimples sleeps by the bayou,


Where the black bear is searching for roots or honey, where the.


beaver pats the mud with his paddle-shaped tall;


Over the growing sugar, over the yellow-flower'd cotton plant, over.


the rice in its low moist field,


Over the sharp-peak'd farm house, with its scallop'd scum and.


slender shoots from the gutters,


Over the western persimmon, over the long-leav'd corn, over the.


delicate blue-flower flax,


Over the white and brown buckwheat, a hummer and buzzer there with.


Over the dusky green of the rye as it ripples and shades in the breeze;


Scaling mountains, pulling myself cautiously up, holding on by low.


Walking the path worn in the grass and beat through the leaves of the brush,


Where the quail is whistling betwixt the woods and the wheat-lot,


Where the bat flies in the Seventh-month eve, where the great.


goldbug drops through the dark,


Where the brook puts out of the roots of the old tree and flows to.


Where cattle stand and shake away flies with the tremulous.


shuddering of their hides,


Where the cheese-cloth hangs in the kitchen, where andirons straddle.


the hearth-slab, where cobwebs fall in festoons from the rafters;


Where trip-hammers crash, where the press is whirling its cylinders,


Wherever the human heart beats with terrible throes under its ribs,


Where the pear-shaped balloon is floating aloft, (floating in it.


myself and looking composedly down,)


Where the life-car is drawn on the slip-noose, where the heat.


hatches pale-green eggs in the dented sand,


Where the she-whale swims with her calf and never forsakes it,


Where the steam-ship trails hind-ways its long pennant of smoke,


Where the fin of the shark cuts like a black chip out of the water,


Where the half-burn'd brig is riding on unknown currents,


Where shells grow to her slimy deck, where the dead are corrupting below;


Where the dense-starr'd flag is borne at the head of the regiments,


Approaching Manhattan up by the long-stretching island,


Under Niagara, the cataract falling like a veil over my countenance,


Upon a door-step, upon the horse-block of hard wood outside,


Upon the race-course, or enjoying picnics or jigs or a good game of.


At he-festivals, with blackguard gibes, ironical license,


bull-dances, drinking, laughter,


At the cider-mill tasting the sweets of the brown mash, sucking the.


juice through a straw,


At apple-peelings wanting kisses for all the red fruit I find,


At musters, beach-parties, friendly bees, huskings, house-raisings;


Where the mocking-bird sounds his delicious gurgles, cackles,


Where the hay-rick stands in the barn-yard, where the dry-stalks are.


scatter'd, where the brood-cow waits in the hovel,


Where the bull advances to do his masculine work, where the stud to.


the mare, where the cock is treading the hen,


Where the heifers browse, where geese nip their food with short jerks,


Where sun-down shadows lengthen over the limitless and lonesome prairie,


Where herds of buffalo make a crawling spread of the square miles.


Where the humming-bird shimmers, where the neck of the long-lived.


swan is curving and winding,


Where the laughing-gull scoots by the shore, where she laughs her.


Where bee-hives range on a gray bench in the garden half hid by the.


Where band-neck'd partridges roost in a ring on the ground with.


their heads out,


Where burial coaches enter the arch'd gates of a cemetery,


Where winter wolves bark amid wastes of snow and icicled trees,


Where the yellow-crown'd heron comes to the edge of the marsh at.


night and feeds upon small crabs,


Where the splash of swimmers and divers cools the warm noon,


Where the katy-did works her chromatic reed on the walnut-tree over.


Through patches of citrons and cucumbers with silver-wired leaves,


Through the salt-lick or orange glade, or under conical firs,


Through the gymnasium, through the curtain'd saloon, through the.


office or public hall;


Pleas'd with the native and pleas'd with the foreign, pleas'd with.


the new and old,


Pleas'd with the homely woman as well as the handsome,


Pleas'd with the quakeress as she puts off her bonnet and talks melodiously,


Pleas'd with the tune of the choir of the whitewash'd church,


Pleas'd with the earnest words of the sweating Methodist preacher,


impress'd seriously at the camp-meeting;


Looking in at the shop-windows of Broadway the whole forenoon,


flatting the flesh of my nose on the thick plate glass,


Wandering the same afternoon with my face turn'd up to the clouds,


or down a lane or along the beach,


My right and left arms round the sides of two friends, and I in the middle;


Coming home with the silent and dark-cheek'd bush-boy, (behind me.


he rides at the drape of the day,)


Far from the settlements studying the print of animals' feet, or the.


By the cot in the hospital reaching lemonade to a feverish patient,


Nigh the coffin'd corpse when all is still, examining with a candle;


Voyaging to every port to dicker and adventure,


Hurrying with the modern crowd as eager and fickle as any,


Hot toward one I hate, ready in my madness to knife him,


Solitary at midnight in my back yard, my thoughts gone from me a long while,


Walking the old hills of Judaea with the beautiful gentle God by my side,


Speeding through space, speeding through heaven and the stars,


Speeding amid the seven satellites and the broad ring, and the.


diameter of eighty thousand miles,


Speeding with tail'd meteors, throwing fire-balls like the rest,


Carrying the crescent child that carries its own full mother in its belly,


Storming, enjoying, planning, loving, cautioning,


Backing and filling, appearing and disappearing,


I tread day and night such roads.


And look at quintillions ripen'd and look at quintillions green.


My course runs below the soundings of plummets.


No guard can shut me off, no law prevent me.


My messengers continually cruise away or bring their returns to me.


pike-pointed staff, clinging to topples of brittle and blue.


I take my place late at night in the crow's-nest,


We sail the arctic sea, it is plenty light enough,


Through the clear atmosphere I stretch around on the wonderful beauty,


The enormous masses of ice pass me and I pass them, the scenery is.


plain in all directions,


The white-topt mountains show in the distance, I fling out my.


fancies toward them,


We are approaching some great battle-field in which we are soon to.


We pass the colossal outposts of the encampment, we pass with still.


feet and caution,


Or we are entering by the suburbs some vast and ruin'd city,


The blocks and fallen architecture more than all the living cities.


I turn the bridgroom out of bed and stay with the bride myself,


I tighten her all night to my thighs and lips.


They fetch my man's body up dripping and drown'd.


The courage of present times and all times,


How the skipper saw the crowded and rudderless wreck of the.


steamship, and Death chasing it up and down the storm,


How he knuckled tight and gave not back an inch, and was faithful of.


days and faithful of nights,


And chalk'd in large letters on a board, Be of good cheer, we will.


How he follow'd with them and tack'd with them three days and.


would not give it up,


How he saved the drifting company at last,


How the lank loose-gown'd women look'd when boated from the.


side of their prepared graves,


How the silent old-faced infants and the lifted sick, and the.


sharp-lipp'd unshaved men;


All this I swallow, it tastes good, I like it well, it becomes mine,


I am the man, I suffer'd, I was there.


The mother of old, condemn'd for a witch, burnt with dry wood, her.


children gazing on,


The hounded slave that flags in the race, leans by the fence,


blowing, cover'd with sweat,


The twinges that sting like needles his legs and neck, the murderous.


buckshot and the bullets,


All these I feel or am.


Hell and despair are upon me, crack and again crack the marksmen,


I clutch the rails of the fence, my gore dribs, thinn'd with the.


ooze of my skin,


I fall on the weeds and stones,


The riders spur their unwilling horses, haul close,


Taunt my dizzy ears and beat me violently over the head with whip-stocks.


I do not ask the wounded person how he feels, I myself become the.


My hurts turn livid upon me as I lean on a cane and observe.


Tumbling walls buried me in their debris,


Heat and smoke I inspired, I heard the yelling shouts of my comrades,


I heard the distant click of their picks and shovels,


They have clear'd the beams away, they tenderly lift me forth.


Painless after all I lie exhausted but not so unhappy,


White and beautiful are the faces around me, the heads are bared.


of their fire-caps,


The kneeling crowd fades with the light of the torches.


They show as the dial or move as the hands of me, I am the clock myself.


I am there again.


Again the attacking cannon, mortars,


Again to my listening ears the cannon responsive.


The cries, curses, roar, the plaudits for well-aim'd shots,


The ambulanza slowly passing trailing its red drip,


Workmen searching after damages, making indispensable repairs,


The fall of grenades through the rent roof, the fan-shaped explosion,


The whizz of limbs, heads, stone, wood, iron, high in the air.


He gasps through the clot Mind not me--mind--the entrenchments.


(I tell not the fall of Alamo,


Not one escaped to tell the fall of Alamo,


The hundred and fifty are dumb yet at Alamo,)


'Tis the tale of the murder in cold blood of four hundred and twelve.


Nine hundred lives out of the surrounding enemies, nine times their.


number, was the price they took in advance,


Their colonel was wounded and their ammunition gone,


They treated for an honorable capitulation, receiv'd writing and.


seal, gave up their arms and march'd back prisoners of war.


Matchless with horse, rifle, song, supper, courtship,


Large, turbulent, generous, handsome, proud, and affectionate,


Bearded, sunburnt, drest in the free costume of hunters,


Not a single one over thirty years of age.


massacred, it was beautiful early summer,


The work commenced about five o'clock and was over by eight.


Some made a mad and helpless rush, some stood stark and straight,


A few fell at once, shot in the temple or heart, the living and dead.


The maim'd and mangled dug in the dirt, the new-comers saw them there,


Some half-kill'd attempted to crawl away,


These were despatch'd with bayonets or batter'd with the blunts of muskets,


A youth not seventeen years old seiz'd his assassin till two more.


came to release him,


The three were all torn and cover'd with the boy's blood.


That is the tale of the murder of the four hundred and twelve young men.


Would you learn who won by the light of the moon and stars?


List to the yarn, as my grandmother's father the sailor told it to me.


His was the surly English pluck, and there is no tougher or truer,


and never was, and never will be;


Along the lower'd eve he came horribly raking us.


My captain lash'd fast with his own hands.


On our lower-gun-deck two large pieces had burst at the first fire,


killing all around and blowing up overhead.


Ten o'clock at night, the full moon well up, our leaks on the gain,


and five feet of water reported,


The master-at-arms loosing the prisoners confined in the after-hold.


to give them a chance for themselves.


They see so many strange faces they do not know whom to trust.


The other asks if we demand quarter?


If our colors are struck and the fighting done?


We have not struck, he composedly cries, we have just begun our part.


of the fighting.


One is directed by the captain himself against the enemy's main-mast,


Two well serv'd with grape and canister silence his musketry and.


clear his decks.


They hold out bravely during the whole of the action.


The leaks gain fast on the pumps, the fire eats toward the powder-magazine.


He is not hurried, his voice is neither high nor low,


His eyes give more light to us than our battle-lanterns.


Two great hulls motionless on the breast of the darkness,


Our vessel riddled and slowly sinking, preparations to pass to the.


one we have conquer'd,


The captain on the quarter-deck coldly giving his orders through a.


countenance white as a sheet,


Near by the corpse of the child that serv'd in the cabin,


The dead face of an old salt with long white hair and carefully.


The flames spite of all that can be done flickering aloft and below,


The husky voices of the two or three officers yet fit for duty,


Formless stacks of bodies and bodies by themselves, dabs of flesh.


upon the masts and spars,


Cut of cordage, dangle of rigging, slight shock of the soothe of waves,


Black and impassive guns, litter of powder-parcels, strong scent,


A few large stars overhead, silent and mournful shining,


Delicate sniffs of sea-breeze, smells of sedgy grass and fields by.


the shore, death-messages given in charge to survivors,


The hiss of the surgeon's knife, the gnawing teeth of his saw,


Wheeze, cluck, swash of falling blood, short wild scream, and long,


dull, tapering groan,


These so, these irretrievable.


In at the conquer'd doors they crowd! I am possess'd!


Embody all presences outlaw'd or suffering,


See myself in prison shaped like another man,


And feel the dull unintermitted pain.


It is I let out in the morning and barr'd at night.


and walk by his side,


(I am less the jolly one there, and more the silent one with sweat.


on my twitching lips.)


My face is ash-color'd, my sinews gnarl, away from me people retreat.


I project my hat, sit shame-faced, and beg.


Somehow I have been stunn'd. Stand back!


Give me a little time beyond my cuff'd head, slumbers, dreams, gaping,


I discover myself on the verge of a usual mistake.


That I could forget the trickling tears and the blows of the.


bludgeons and hammers!


That I could look with a separate look on my own crucifixion and.


I resume the overstaid fraction,


The grave of rock multiplies what has been confided to it, or to any graves,


Corpses rise, gashes heal, fastenings roll from me.


Inland and sea-coast we go, and pass all boundary lines,


Our swift ordinances on their way over the whole earth,


The blossoms we wear in our hats the growth of thousands of years.


Continue your annotations, continue your questionings.


Is he waiting for civilization, or past it and mastering it?


Is he from the Mississippi country? Iowa, Oregon, California?


The mountains? prairie-life, bush-life? or sailor from the sea?


They desire he should like them, touch them, speak to them, stay with them.


head, laughter, and naivete,


Slow-stepping feet, common features, common modes and emanations,


They descend in new forms from the tips of his fingers,


They are wafted with the odor of his body or breath, they fly out of.


the glance of his eyes.


You light surfaces only, I force surfaces and depths also.


Say, old top-knot, what do you want?


And might tell what it is in me and what it is in you, but cannot,


And might tell that pining I have, that pulse of my nights and days.


When I give I give myself.


Open your scarf'd chops till I blow grit within you,


Spread your palms and lift the flaps of your pockets,


I am not to be denied, I compel, I have stores plenty and to spare,


And any thing I have I bestow.


You can do nothing and be nothing but what I will infold you.


On his right cheek I put the family kiss,


And in my soul I swear I never will deny him.


(This day I am jetting the stuff of far more arrogant republics.)


Turn the bed-clothes toward the foot of the bed,


Let the physician and the priest go home.


O despairer, here is my neck,


By God, you shall not go down! hang your whole weight upon me.


Every room of the house do I fill with an arm'd force,


Lovers of me, bafflers of graves.


Not doubt, not decease shall dare to lay finger upon you,


I have embraced you, and henceforth possess you to myself,


And when you rise in the morning you will find what I tell you is so.


And for strong upright men I bring yet more needed help.


Heard it and heard it of several thousand years;


It is middling well as far as it goes--but is that all?


Outbidding at the start the old cautious hucksters,


Taking myself the exact dimensions of Jehovah,


Lithographing Kronos, Zeus his son, and Hercules his grandson,


Buying drafts of Osiris, Isis, Belus, Brahma, Buddha,


In my portfolio placing Manito loose, Allah on a leaf, the crucifix.


With Odin and the hideous-faced Mexitli and every idol and image,


Taking them all for what they are worth and not a cent more,


Admitting they were alive and did the work of their days,


(They bore mites as for unfledg'd birds who have now to rise and fly.


and sing for themselves,)


Accepting the rough deific sketches to fill out better in myself,


bestowing them freely on each man and woman I see,


Discovering as much or more in a framer framing a house,


Putting higher claims for him there with his roll'd-up sleeves.


driving the mallet and chisel,


Not objecting to special revelations, considering a curl of smoke or.


a hair on the back of my hand just as curious as any revelation,


Lads ahold of fire-engines and hook-and-ladder ropes no less to me.


than the gods of the antique wars,


Minding their voices peal through the crash of destruction,


Their brawny limbs passing safe over charr'd laths, their white.


foreheads whole and unhurt out of the flames;


By the mechanic's wife with her babe at her nipple interceding for.


every person born,


Three scythes at harvest whizzing in a row from three lusty angels.


with shirts bagg'd out at their waists,


The snag-tooth'd hostler with red hair redeeming sins past and to come,


Selling all he possesses, traveling on foot to fee lawyers for his.


brother and sit by him while he is tried for forgery;


What was strewn in the amplest strewing the square rod about me, and.


not filling the square rod then,


The bull and the bug never worshipp'd half enough,


Dung and dirt more admirable than was dream'd,


The supernatural of no account, myself waiting my time to be one of.


The day getting ready for me when I shall do as much good as the.


best, and be as prodigious;


By my life-lumps! becoming already a creator,


Putting myself here and now to the ambush'd womb of the shadows.


My own voice, orotund sweeping and final.


Come my boys and girls, my women, household and intimates,


Now the performer launches his nerve, he has pass'd his prelude on.


the reeds within.


climax and close.


Music rolls, but not from the organ,


Folks are around me, but they are no household of mine.


Ever the eaters and drinkers, ever the upward and downward sun, ever.


the air and the ceaseless tides,


Ever myself and my neighbors, refreshing, wicked, real,


Ever the old inexplicable query, ever that thorn'd thumb, that.


breath of itches and thirsts,


Ever the vexer's hoot! hoot! till we find where the sly one hides.


and bring him forth,


Ever love, ever the sobbing liquid of life,


Ever the bandage under the chin, ever the trestles of death.


To feed the greed of the belly the brains liberally spooning,


Tickets buying, taking, selling, but in to the feast never once going,


Many sweating, ploughing, thrashing, and then the chaff for payment.


A few idly owning, and they the wheat continually claiming.


Whatever interests the rest interests me, politics, wars, markets,


The mayor and councils, banks, tariffs, steamships, factories,


stocks, stores, real estate and personal estate.


I am aware who they are, (they are positively not worms or fleas,)


I acknowledge the duplicates of myself, the weakest and shallowest.


is deathless with me,


What I do and say the same waits for them,


Every thought that flounders in me the same flounders in them.


Know my omnivorous lines and must not write any less,


And would fetch you whoever you are flush with myself.


But abruptly to question, to leap beyond yet nearer bring;


This printed and bound book--but the printer and the.


The well-taken photographs--but your wife or friend close and solid.


The black ship mail'd with iron, her mighty guns in her turrets--but.


the pluck of the captain and engineers?


In the houses the dishes and fare and furniture--but the host and.


hostess, and the look out of their eyes?


The sky up there--yet here or next door, or across the way?


The saints and sages in history--but you yourself?


Sermons, creeds, theology--but the fathomless human brain,


And what is reason? and what is love? and what is life?


My faith is the greatest of faiths and the least of faiths,


Enclosing worship ancient and modern and all between ancient and modern,


Believing I shall come again upon the earth after five thousand years,


Waiting responses from oracles, honoring the gods, saluting the sun,


Making a fetich of the first rock or stump, powowing with sticks in.


the circle of obis,


Helping the llama or brahmin as he trims the lamps of the idols,


Dancing yet through the streets in a phallic procession, rapt and.


austere in the woods a gymnosophist,


Drinking mead from the skull-cap, to Shastas and Vedas admirant,


minding the Koran,


Walking the teokallis, spotted with gore from the stone and knife,


beating the serpent-skin drum,


Accepting the Gospels, accepting him that was crucified, knowing.


assuredly that he is divine,


To the mass kneeling or the puritan's prayer rising, or sitting.


patiently in a pew,


Ranting and frothing in my insane crisis, or waiting dead-like till.


my spirit arouses me,


Looking forth on pavement and land, or outside of pavement and land,


Belonging to the winders of the circuit of circuits.


man leaving charges before a journey.


Frivolous, sullen, moping, angry, affected, dishearten'd, atheistical,


I know every one of you, I know the sea of torment, doubt, despair.


How they contort rapid as lightning, with spasms and spouts of blood!


I take my place among you as much as among any,


The past is the push of you, me, all, precisely the same,


And what is yet untried and afterward is for you, me, all, precisely.


But I know it will in its turn prove sufficient, and cannot fail.


single one can it fall.


Nor the young woman who died and was put by his side,


Nor the little child that peep'd in at the door, and then drew back.


and was never seen again,


Nor the old man who has lived without purpose, and feels it with.


bitterness worse than gall,


Nor him in the poor house tubercled by rum and the bad disorder,


Nor the numberless slaughter'd and wreck'd, nor the brutish koboo.


call'd the ordure of humanity,


Nor the sacs merely floating with open mouths for food to slip in,


Nor any thing in the earth, or down in the oldest graves of the earth,


Nor any thing in the myriads of spheres, nor the myriads of myriads.


that inhabit them,


Nor the present, nor the least wisp that is known.


I launch all men and women forward with me into the Unknown.


There are trillions ahead, and trillions ahead of them.


And other births will bring us richness and variety.


That which fills its period and place is equal to any.


I am sorry for you, they are not murderous or jealous upon me,


All has been gentle with me, I keep no account with lamentation,


(What have I to do with lamentation?)


On every step bunches of ages, and larger bunches between the steps,


All below duly travel'd, and still I mount and mount.


Afar down I see the huge first Nothing, I know I was even there,


I waited unseen and always, and slept through the lethargic mist,


And took my time, and took no hurt from the fetid carbon.


Faithful and friendly the arms that have help'd me.


For room to me stars kept aside in their own rings,


They sent influences to look after what was to hold me.


My embryo has never been torpid, nothing could overlay it.


The long slow strata piled to rest it on,


Vast vegetables gave it sustenance,


Monstrous sauroids transported it in their mouths and deposited it.


Now on this spot I stand with my robust soul.


O manhood, balanced, florid and full.


Crowding my lips, thick in the pores of my skin,


Jostling me through streets and public halls, coming naked to me at night,


Crying by day, Ahoy! from the rocks of the river, swinging and.


chirping over my head,


Calling my name from flower-beds, vines, tangled underbrush,


Lighting on every moment of my life,


Bussing my body with soft balsamic busses,


Noiselessly passing handfuls out of their hearts and giving them to be mine.


after and out of itself,


And the dark hush promulges as much as any.


And all I see multiplied as high as I can cipher edge but the rim of.


the farther systems.


Outward and outward and forever outward.


He joins with his partners a group of superior circuit,


And greater sets follow, making specks of the greatest inside them.


If I, you, and the worlds, and all beneath or upon their surfaces,


were this moment reduced back to a pallid float, it would.


not avail the long run,


We should surely bring up again where we now stand,


And surely go as much farther, and then farther and farther.


not hazard the span or make it impatient,


They are but parts, any thing is but a part.


Count ever so much, there is limitless time around that.


The Lord will be there and wait till I come on perfect terms,


The great Camerado, the lover true for whom I pine will be there.


never will be measured.


My signs are a rain-proof coat, good shoes, and a staff cut from the woods,


No friend of mine takes his ease in my chair,


I have no chair, no church, no philosophy,


I lead no man to a dinner-table, library, exchange,


But each man and each woman of you I lead upon a knoll,


My left hand hooking you round the waist,


My right hand pointing to landscapes of continents and the public road.


You must travel it for yourself.


Perhaps you have been on it since you were born and did not know,


Perhaps it is everywhere on water and on land.


Wonderful cities and free nations we shall fetch as we go.


And in due time you shall repay the same service to me,


For after we start we never lie by again.


And I said to my spirit When we become the enfolders of those orbs,


and the pleasure and knowledge of every thing in them, shall we.


be fill'd and satisfied then?


And my spirit said No, we but level that lift to pass and continue beyond.


I answer that I cannot answer, you must find out for yourself.


Here are biscuits to eat and here is milk to drink,


But as soon as you sleep and renew yourself in sweet clothes, I kiss you.


with a good-by kiss and open the gate for your egress hence.


Now I wash the gum from your eyes,


You must habit yourself to the dazzle of the light and of every.


moment of your life.


Now I will you to be a bold swimmer,


To jump off in the midst of the sea, rise again, nod to me, shout,


and laughingly dash with your hair.


He that by me spreads a wider breast than my own proves the width of my own,


He most honors my style who learns under it to destroy the teacher.


but in his own right,


Wicked rather than virtuous out of conformity or fear,


Fond of his sweetheart, relishing well his steak,


Unrequited love or a slight cutting him worse than sharp steel cuts,


First-rate to ride, to fight, to hit the bull's eye, to sail a.


skiff, to sing a song or play on the banjo,


Preferring scars and the beard and faces pitted with small-pox over.


And those well-tann'd to those that keep out of the sun.


I follow you whoever you are from the present hour,


My words itch at your ears till you understand them.


I wait for a boat,


(It is you talking just as much as myself, I act as the tongue of you,


Tied in your mouth, in mine it begins to be loosen'd.)


And I swear I will never translate myself at all, only to him or her.


who privately stays with me in the open air.


The nearest gnat is an explanation, and a drop or motion of waves key,


The maul, the oar, the hand-saw, second my words.


But roughs and little children better than they.


The woodman that takes his axe and jug with him shall take me with.


The farm-boy ploughing in the field feels good at the sound of my voice,


In vessels that sail my words sail, I go with fishermen and seamen.


On the night ere the pending battle many seek me, and I do not fail them,


On that solemn night (it may be their last) those that know me seek me.


My face rubs to the hunter's face when he lies down alone in his blanket,


The driver thinking of me does not mind the jolt of his wagon,


The young mother and old mother comprehend me,


The girl and the wife rest the needle a moment and forget where they are,


They and all would resume what I have told them.


And I have said that the body is not more than the soul,


And nothing, not God, is greater to one than one's self is,


And whoever walks a furlong without sympathy walks to his own.


funeral drest in his shroud,


And I or you pocketless of a dime may purchase the pick of the earth,


And to glance with an eye or show a bean in its pod confounds the.


learning of all times,


And there is no trade or employment but the young man following it.


may become a hero,


And there is no object so soft but it makes a hub for the wheel'd universe,


And I say to any man or woman, Let your soul stand cool and composed.


before a million universes.


For I who am curious about each am not curious about God,


(No array of terms can say how much I am at peace about God and.


Nor do I understand who there can be more wonderful than myself.


I see something of God each hour of the twenty-four, and each moment then,


In the faces of men and women I see God, and in my own face in the glass,


I find letters from God dropt in the street, and every one is sign'd.


And I leave them where they are, for I know that wheresoe'er I go,


Others will punctually come for ever and ever.


try to alarm me.


I see the elder-hand pressing receiving supporting,


I recline by the sills of the exquisite flexible doors,


And mark the outlet, and mark the relief and escape.


I smell the white roses sweet-scented and growing,


I reach to the leafy lips, I reach to the polish'd breasts of melons.


(No doubt I have died myself ten thousand times before.)


O suns--O grass of graves--O perpetual transfers and promotions,


If you do not say any thing how can I say any thing?


Of the moon that descends the steeps of the soughing twilight,


Toss, sparkles of day and dusk--toss on the black stems that decay.


Toss to the moaning gibberish of the dry limbs.


I perceive that the ghastly glimmer is noonday sunbeams reflected,


And debouch to the steady and central from the offspring great or small.


I sleep--I sleep long.


It is not in any dictionary, utterance, symbol.


To it the creation is the friend whose embracing awakes me.


It is not chaos or death--it is form, union, plan--it is eternal.


life--it is Happiness.


And proceed to fill my next fold of the future.


Look in my face while I snuff the sidle of evening,


(Talk honestly, no one else hears you, and I stay only a minute longer.)


Very well then I contradict myself,


(I am large, I contain multitudes.)


Who wishes to walk with me?


and my loitering.


I sound my barbaric yawp over the roofs of the world.


It flings my likeness after the rest and true as any on the shadow'd wilds,


It coaxes me to the vapor and the dusk.


I effuse my flesh in eddies, and drift it in lacy jags.


If you want me again look for me under your boot-soles.


But I shall be good health to you nevertheless,


And filter and fibre your blood.


Missing me one place search another,


I stop somewhere waiting for you.


DayPoems Poem No. 1900.


Comment on DayPoems?


Se você é como nós, você tem fortes sentimentos sobre a poesia e sobre cada poema que você lê. Bota tudo pra fora! Comment on this poem, any poem, DayPoems, other poetry places or the art of poetry at DayPoems Feedback .


Won't you help support DayPoems?


Click here to learn more about how you can keep DayPoems on the Web . . .


O site DayPoems, daypoems, é copyright 2001-2005 por Timothy K. Bovee. Todos os direitos reservados.


Os autores da poesia e outros materiais que aparecem nos DayPoems retêm todos os direitos ao seu trabalho. Quaisquer pedidos de publicação noutros locais devem ser negociados separadamente com os autores. O editor do DayPoems terá o prazer de ajudar a colocar as partes interessadas em contato com os autores.


Anti-Cyber ​​Forense & # 8211; A Arte da Contra-Ciência Forense.


O Estado da Arte de uma Sinfonia Perfeita para Hackers e Code Crackers & # 8211; Cognição Científica a priori Sublimes em Manisfestations da Verdade a posteriori.


Posted in Chaos Theory.


MYR313,713,713,713.13 – July 13, 2014: Endgame – On Chaotic Ratio – The Spiral of Fibonacci On The Avalanche of Chaotic Universe – The Cause of Avalanche is The Avalanche Itself – N-Person Game Theory – Lanchester Theory.


MYR313,713,713,713.13 – On Self-Agitated (Self-Perturbed) Prime Numbers of My Civil Suit Dated 6.3.2014 (March 6, 2014): Mohamad Izaham Bin Mohamed Yatim v Attorney-General (Tan Sri Abdul Gani Patail) and Government of Malaysia plus Anors (Norina Zainol Abidin, Inspektor Siti Mazira Zakaria, Inspektor Mohd Razif Md Zahid, Mazelan Jamaluddin, Nurul Ashiqin Zulkifli, Nur Wahida Md Khairuddin and Zaki Asyraf Zubir). The Philosophy of Mathematics (Mother of All Sciences and Human Thoughts) vs The Philosophy of Law (The Jurisprudence / Scientia Juris (Juristic Theories)). This Civil Suit is About Such A Totally and Purely Malicious Prosecution Had Happened with Absence of All Jurisdiction That Crowning (On Top Of It) The Criminal Trial before “Super-Glamour-You-Magistrate” Zaki Asyraf Zubir. Method of Attack is Based On Deontological Dialectic Approaches (Used by Karl Marx, Immanuel Kant, Georg Wilhelm Friedrich Hegel, Sir Karl Popper and etc.) That Related To Logic and Its Philosophical Logic, Metaphysics and Epistemology of Being, Absence and Nothingness (Nihilism – The Mathematical Theory of Nothing vs Absence of All Jurisdiction), (The Philosophy of Null Set Theory vs The Nullity (Void) of Malaysian Federal Constitution): Socrates, Euclid of Alexandria, Plotinus, Plato, Aristotle, Augustine of Hippo, Thomas Aquinas, Avicenna (Ibnu Sina – Alī al-Ḥusayn ibn ʿAbd Allāh ibn Al-Hasan ibn Ali ibn Sīnā), Ibn Arabi (Abū ʿAbd Allāh Muḥammad ibn ʿAlī ibn Muḥammad ibn al-ʿArabī al-Ḥātimī aṭ-Ṭāʾī ), Henry of Ghent, Duns Scotus, William of Ockham, Francisco Suárez, Immanuel Kant, Georg Wilhelm Friedrich Hegel, Gottfried Wilhelm von Leibniz, Baruch Spinoza (born Benedito de Espinosa), Friedrich Heinrich Jacobi, René Descartes, Friedrich Nietzsche, Martin Heidegger, John Locke FRS, David Hume, Bertrand Arthur William Russell The 3rd Earl Russell, Willard Van Orman Quine, Paul Celan, Jacques Derrida, Jean-Paul Sartre, Alfred Thompson “Tom” Denning, Baron Denning OM PC DL QC, . Want of / Lack of / Absence of Scientific Laws (or Theories / Principles) and Evidence: Scientific Evidence – Scientific Testimonies – Expert Evidence – The Logic of Scientific Discoveries – The Metaphysics of Scientific Phenomena – The Epistemology of Scientific Observations (Empirical Observations / Scientific Methodology / Scientific (or Mathematical) Induction and Deduction: Euclid of Alexandria, Plato, Aristotle, Ibn Haytham – Alhazen (Abū ʿAlī al-Ḥasan ibn al-Ḥasan ibn al-Haytham), Abū Naṣr Muḥammad ibn Muḥammad Fārābī (al-Fārābī / Alpharabius), Abū ʿAbdallāh Muḥammad ibn Mūsā al-Khwārizmī (Algoritmi or Algaurizin – where the word “algorithm” basically came from), Abū al-Rayhān Muhammad ibn Ahmad al-Bīrūnī, Abu Mūsā Jābir ibn Hayyān (Geber), Muhammad ibn Zakariyā Rāzī (Rhazes or Rasis), Roger Bacon O. F.M., The Bernoullis (The Bernoulli family), Sir Karl Popper, Jules Henri Poincaré, Charles Sanders Peirce, Hermann Ludwig Ferdinand von Helmholtz, Ludwig Eduard Boltzmann, Thomas Samuel Kuhn, Albert Einstein, Niels Henrik David Bohr, Erwin Rudolf Josef Alexander Schrödinger, Ian Hacking CC FRSC FBA, Aleksandr Mikhailovich Lyapunov, Hilary Putnam, Pierre-Simon marquis de Laplace (Celestial Mechanics), Ernst Friedrich Ferdinand Zermelo, Andrey Nikolaevich Kolmogorov, Andrey (Andrei) Andreyevich Markov, James Clerk Maxwell FRS FRSE, Ernst Waldfried Josef Wenzel Mach, Bruce Schneier (The Shifu of Cryptography) – Rationalistic Theology, Skepticism, Logical Positivism, Legal Positivisim, Positivism, – Comte, (Isidore-) Auguste (-Marie-François-Xavier), Theology (a priori) ==> Rationalistic Theology ==> Metaphysical Theology ==> Metaphysics ==> Scientific Metaphysics ==> Scientific / Empirical Observations ==> Positivism ==> Logical Positivism ==> Legal Positivism ==> (Positivism vs Realism) ==> Logical Realism ==> Scientific / Legal Realism ==> “Absolute” Realism (a posteriori) – “Keadilan ialah Meletakkan Kebenaran di Tempat Yang Sepatutnya”.


“Keadilan ialah Meletakkan Kebenaran di Tempat Yang Sepatutnya” – October 2011 Mohamad Izaham Bin Mohamed Yatim. – (In Bahasa Malaysia)


Article 145(3) Federal Constitution of Malaysia:


Article 145(3): The Attorney General shall have power, exercisable at his discretion, to institute, conduct or discontinue any proceedings for an offence, other than proceedings before a Syariah court, a native court or a court-martial.


“ Where there is no jurisdiction, there can be no discretion, for discretion is incident to jurisdiction. ” Piper v. Pearson, 2 Gray 120, cited in Bradley v. Fisher, 13 Wall. 335, 20 L. Ed. 646 (1872)


Act 620 FILM CENSORSHIP ACT 2002 Incorporating all amendments up to 1 January 2006.


Prosecution 43. No prosecution in respect of any offence under this Act or any regulations made under this Act shall be instituted except by or with the written consent of the Public Prosecutor.


DALAM MAHKAMAH TINGGI MALAYA DI KUALA LUMPUR.


GUAMAN SIVIL NO. TAHUN 2014.


MOHAMAD IZAHAM BIN MOHAMED YATIM … PLAINTIF.


1. NORINA BINTI ZAINOL ABIDIN.


2. INSPEKTOR SITI MAZIRA BINTI ZAKARIA.


3. INSPEKTOR MOHD RAZIF BIN MD ZAHID.


4. MAZELAN BIN JAMALUDDIN.


5. NURUL ASHIQIN BINTI ZULKIFLI.


6. NUR WAHIDA BINTI MD. KHAIRUDDIN.


7. TAN SRI ABDUL GANI PATAIL, PEGUAM NEGARA.


8. ZAKI ASYRAF BIN ZUBIR.


9. KERAJAAN MALAYSIA … DEFENDAN-DEFENDAN.


KUALA LUMPUR, March 6 — A former director of a computer software company today filed a suit against Magistrate Zaki Asyraf Zubir, Attorney-General Tan Sri Abdul Gani Patail and seven others for false imprisonment concerning the charge of possession of 106 pornographic video clips in 2011. Mohamad Izaham Mohamed Yatim, 42, filed the suit through Messr A S Dhaliwal at the High Court’s Registrar Office here, and named three deputy public prosecutor Norina Zainol Abidin, Mazelan Jamaluddin and Nurul Ashiqin Zulkifli as defendants.


& # 8230; Kuala Lumpur: Seorang bekas pengarah syarikat perisian komputer memfailkan saman terhadap seorang majistret dan lapan yang lain termasuk Peguam Negara dan Kerajaan Malaysia terhadap dakwaan memenjarakannya secara salah bagi tuduhan memiliki 106 klip video lucah, lima tahun lalu. Mohamad Izaham Mohamed Yatim, 42, selaku plaintif memfailkan saman itu di Pejabat Pendaftar Mahkamah Tinggi, di sini, semalam menerusi firma guaman Tetuan AS Dhaliwal. Plaintif menamakan Timbalan Pendakwa Raya di Pejabat Penasihat Undang-Undang Pulau Pinang Norina Zainol Abidin, pegawai polis Inspektor Siti Mazira Zakaria dan Inspektor Mohd Razif Zahid, Timbalan Pendakwa Raya Wilayah Persekutuan Kuala Lumpur Mazelan Jamaluddin serta Nurul Ashiqin Zulkifli sebagai defendan pertama hingga kelima. Mohamad Izaham turut menamakan Pembantu Undang-undang di Jabatan Peguam Negara Wilayah Persekutuan Kuala Lumpur Nur Wahida Md Khairuddin, Peguam Negara Tan Sri Abdul Ghani Patail, Majistret Mahkamah Majistret Jenayah 2 Kuala Lumpur Zaki Asyraf Zubir dan Kerajaan Malaysia selaku defendan keenam hingga kesembilan.


“43. Tiada pendakwaan berkenaan dengan apa-apa kesalahan d bawah Akta ini atau mana-mana peraturan yang dibuat di bawah Akta ini boleh dimulakan kecuali oleh atau dengan keizinan bertulis Pendakwa Raya.”


22. Sepanjang prosiding perbicaraan di hadapan Majistret, Mahkamah Majistret Jenayah 2, Kuala Lumpur, pihak pendakwaan tidak mengemukakan izin pendakwaan secara bertulis dan ini adalah bercanggah dengan peruntukkan Seksyen 43 Akta Penapisan Filem 2002. Ini dibuktikan dengan senarai ekshibit Jilid 2 Rekod Rayuan-izin pendakwaan tidak dikemukakan kepada Mahkamah dan ditanda sebagai ekshibit.


23. Walaubagaimanapun setelah menerima Rekod Rayuan pada 5.5.2011, pihak Perayu mendapati bahawa salinan izin pendakwaan telah dimasukkan ke dalam Lampiran Dokumen ( mukasurat 115 Rekod Rayuan Jilid 1 ) dan ini merupakan kali pertama pihak Perayu melihat salinan izin pendakwaan tersebut.


24. Terdapat kecacatan material pada izin pendakwaan tersebut di mana izin pendakwaan diberi oleh seorang timbalan pendakwaraya yang bernama Mazelan Jamaludin tetapi ditandatangani oleh seorang timbalan pendakwaraya bernama Nor Aizam.


25. Adalah menjadi hujahan Perayu bahawa izin pendakwaan mengikut peruntukkan Seksyen 43 Akta Penapisan Filem 2002 adalah mandatori dan ketinggalan untuk mengemukakannya menjadikan prosiding perbicaraan Kes Tangkap Tersebut satu (dengan izin) ‘nullity’.


26. Pihak Perayu merujuk kepada kes Abdul Hamid v PP [1956] MLJ 231 (di mukasurat 3 Ikatan Otoriti Pihak Perayu) Smith J membuat pemerhatian seperti berikut:


“There is an essential difference to my mind between a sanction and a consent. A prosecution can be sanctioned without any deep consideration of the particular case : full consideration is required for consent since “consent” is an act of reason, accompanied with deliberation, the mind weighing, as in a balance, the good and evil on each side (Stround 3 rd Ediiton vol 1 page 582). The sanction was therefore no evidence of consent.”


27. Pihak Perayu turut bersandarkan kepada kes Public Prosecutor v Lee Chwee Kiok [1979] 1 MLJ 45 (di mukasurat 2 Ikatan Otoriti Pihak Perayu) di mana mahkamah telah memutuskan bahawa prosiding adalah terbatal apabila tiada kebenaran untuk pertuduhan yang dipinda :


“The question is whether the court has jurisdiction to proceed with the trial on the amended charge without a fresh consent by the Public Prosecutor. As the matter is res integra I proceeded with the trial to save the public expense, the witnesses and jury being present in court. It will be observed that although the original and amended charges are two distinct offences, they are both created by the same section of the law viz. section 39B(1) and both carry the same penalty. Both require the consent of the Public Prosecutor under section 39B(3). The learned Deputy Public Prosecutor argued that the amendment was technical and as the Public Prosecutor had given his consent on the original charge he was at liberty to amend the charges in the manner he did. I do not think so. It was held in Abdul Hamid v Public Prosecutor [1956] MLJ 231 that a consent to prosecute “is an act of reason, accompanied with deliberation, the mind weighing, as in a balance, the good and evil on each side”. The Public Prosecutor has clearly exercised his mind in respect of the original charge when he gave his consent to prosecute some four months after the alleged offence. It was incumbent on him however to exercise the same degree of deliberation in respect of the amended charge. He has not done so. In Lim Seo v Regina [1962] MLJ 304 counsel was given sanction to prosecute undersection 379 of the Penal Code but he proceeded under section 381 of the Penal Code instead. It was held that counsel cannot depart from the specific authorisation of the Public Prosecutor. It seems to me that the same principles apply here. The facts of the case were fully before the Public Prosecutor at the time of giving his consent and he could have elected to proceed on the amended charge then. He did not do so. It would appear therefore that the Public Prosecutor has not given his consent to prosecute under the amended charge. That being so, the trial is a nullity on the authority of Lyn Hong Yap v Public Prosecutor [1956] MLJ 226.”


The American Heritage® Dictionary of the English Language, Fourth Edition copyright ©2000 by Houghton Mifflin Company. Updated in 2009. Published by Houghton Mifflin Company. Todos os direitos reservados.


3. the fact of being without something; falta.


Collins English Dictionary – Complete and Unabridged © HarperCollins Publishers 1991, 1994, 1998, 2000, 2003 thefreedictionary/absence Nothing is no thing, [1] denoting the absence of something. Nothing is a pronoun associated with nothingness , [1] , is also an adjective, and an object as a concept in the Frege-Church ontology. In nontechnical uses, nothing denotes things lacking importance, interest, value, relevance, or significance. [1] Nothingness is the state of being nothing, [2] the state of nonexistence of anything, or the property of having nothing.


The Philosophy of Null Set Theory (Empty Set <>): The Cardinality of Being the Nothingness.


September 29, 2009 in Generalized Set Theory, The Anthropic Cosmological Principles Tags: The Philosophy of Set Theory.


The mathematical theory of nothing is the theory about nihilism, which the verdicts of quantum theory, general relativity theory and grand unified field theory have concluded that the universe as Non-Existence of the universe itself. The Universe, which, so elegant and self-contained fashionably explained in higher dimensions of mathematically topological spaces, is the creations out of nothingness. Indeed, the explanation demands, such diversification of “nothingness” in creativity. Whereas, the diversification of “nothingness” itself is creativity of God, is basically the fundamental of all forces and matters. For thousands of years, philosophers have tried to clarify, “Creator” and “Creations”, just like ancient cosmological argument about “Chicken and Egg”. The philosophies of eternity and the philosophies of nothingness rebut about the mathematical concept of energy and its equilibrium in the First Law of Thermodynamics. The law, which states that, “Energy can neither be created nor destroyed” is absolutely twaddling. The concept of the energy equilibrium is the logic that defines energy as eternal, no beginning and no end. Metaphysically and ontologically speaking, the conceptual logic of Eternity and the conceptual logic of Nihilism (Creations), will always contradict each other, as mathematicians and scientists used the the concepts of both logic vice versa. Likely, the hypothetical analysis, that all sciences are either “Cosmology” or “Kama Sutra”. Cosmological mind or cosmological forces and matters that either will be used to define the structure of our universe, when scientists started to gain entertainment upon such vague, yet substantial evidence of the “Non-Existence of Beings” (The Universe) against “The Absolute Existence of Being” (The Creator). Most of them suffer from a form of amnesia. Thus, the mathematical logic of Eternity and the mathematical logic of Nihilism can be distinguished between. Meanwhile, the concept of energy equilibrium, which used before, will be replaced from conceptual “zero” as the point of equilibrium into an “Empty Set” as new “Absolute Point of Equilibrium” with respect to “The Absolute Static Point of Equilibrium of Universe”.


Mohamad Izaham Bin Mohamed Yatim, and special words of thanks to Mick Mattis (of St. Leonards on Sea, Hastings, United Kingdom) for proof reading this Abstract and the whole thesis, September 2002, Faculty of Mathematics, University of Cambridge, 15 JJ Thomson Avenue, Cambridge CB3 9EW United Kingdom. Mohamad Izaham Mohamed Yatim, “The Mathematical Theory of Nothing”, September 2002, Faculty of Mathematics, University of Cambridge, 15 JJ Thomson Avenue, Cambridge CB3 9EW United Kingdom.


For a statement P(x) that is false for every possible value of x , nothing within the universe can pass the elementhood test for the truth set of P(x) , and so, therefore, this truth set must have no elements.


Since the truth set of P(x) has no element, this result of.


statement, which is always false.


Any theory T generated from this statement including basic arithmetical nihilism and T will always contradict to almost all Physics Laws and Cosmological Principles.


(Mohamad Izaham Bin Mohamed Yatim , First Published January, 1992) Mohamad Izaham Mohamed Yatim, “The Mathematical Theory of Nothing”, September 2002, Faculty of Mathematics, University of Cambridge, 15 JJ Thomson Avenue, Cambridge CB3 9EW United Kingdom.


(Proof of this mathematical theorem will not be shown in this blog).


This Theorem is dedicated To:


M. J. Giles, Department of Mathematics and Statistics, Faculty of Engineering, Science and Technology, Ellison Building, The University of Northumbria, Newcastle-upon-Tyne NE1 8ST, UK *******************************************************************************************************


“Time present and time past The end precedes the beginning And the beginning were always there Before the beginning and after the end And All is always now”.


(“Time”, By Mohamad Izaham Bin Mohamed Yatim, First Published September 6, 1991) Mohamad Izaham Mohamed Yatim, “The Mathematical Theory of Nothing”, September 2002, Faculty of Mathematics, University of Cambridge, 15 JJ Thomson Avenue, Cambridge CB3 9EW United Kingdom. *******************************************************************************************************


Nothingness manifests itself into the diversification of elements (how to substantiate),


Substance (Essence) reveals itself into the origination of spaces (how to materialize),


Matter corroborates itself into the emanation of time (how to curve),


Curvature oscillates itself unto the emergence of energy (how to equalibrize),


Equilibrium annihilates itself onto the Nullity of Universe (how to vanish ).


Mohamad Izaham Mohamed Yatim, “The Mathematical Theory of Nothing”, September 2002, Faculty of Mathematics, University of Cambridge, 15 JJ Thomson Avenue, Cambridge CB3 9EW United Kingdom. *******************************************************************************************************


“[N]othingness is the highest dimension of mathematically topological spaces.”


Mohamad Izaham Mohamed Yatim, “The Mathematical Theory of Nothing”, September 2002, Faculty of Mathematics, University of Cambridge, 15 JJ Thomson Avenue, Cambridge CB3 9EW United Kingdom. *******************************************************************************************************


Die mathematische Theorie von nichts ist die Theorie über nihilism, dem die Urteilssprüche der Quantentheorie, der allgemeinen Relativität Theorie und der großartigen vereinheitlichten Feldtheorie daß das Universum als Nicht-Bestehen des Universums selbst festgestellt haben. Das Universum, das, also elegant und selbständiges fashionably erklärt in den höheren Maßen der mathematisch topologischen Räume, die Kreationen aus Nichtse heraus ist. In der Tat verlangt die Erklärung, solche Diversifikation “des Nichtses” in der Kreativität. Während, die Diversifikation “des Nichtses” selbst Kreativität des Gottes ist, im Allgemeinen ist die Grundlage aller Kräfte und Angelegenheiten. Für Tausenden Jahre, haben Philosophen versucht, zu erklären, “Schöpfer” und “Kreationen”, gerade wie altes kosmologisches Argument über “Huhn und Ei”. Die Philosophien der Ewigkeit und die Philosophien des Nichtses widerlegen über das mathematische Konzept von Energie und von seinem Gleichgewicht im ersten Gesetz von Thermodynamik. Das Gesetz, das das angibt, “Energie machen weder wird verursacht ein, noch zerstört” twaddling absolut. Das Konzept des Energiegleichgewichts ist die Logik, die Energie definiert, wie ewig, kein Anfang und kein Ende. Metaphysisch und ontologically der Ewigkeit sprechen, die Begriffs-Logik und die Begriffs-Logik von Nihilism (Kreationen), widersprechen sich immer, wie Mathematiker und Wissenschaftler die Konzepte von beiden Logik umgekehrt verwendeten. Wahrscheinlich die hypothetische Analyse, daß alle Wissenschaften entweder “Kosmologie” oder “Kama Sutra” sind. Kosmologischer Verstand oder kosmologische Kräfte und Angelegenheiten, daß irgendein verwendet wird, um die Struktur unseres Universums zu definieren, als Wissenschaftler begannen, Unterhaltung nach solchem vagem zu gewinnen, dennoch überzeugender Beweis des “Nicht-Bestehens der Wesen” (das Universum) gegen “das absolute Bestehen des Seins” (der Schöpfer). Die meisten ihnen leiden unter einer Form von Amnesia. So können die formale Logik der Ewigkeit und die formale Logik von Nihilism bemerkenswert zwischen sein. Unterdessen wird das Konzept des Energiegleichgewichts, dem vor verwendete, von Begriffs”null” als der Punkt des Gleichgewichts in “leeren Satz” als neuer “absoluter Punkt des Gleichgewichts” in Bezug auf “den absoluten statischen Punkt des Gleichgewichts des Universums” ersetzt.


Mohamad Izaham bin Mohamed Yatim und spezielle Wörter des Dankes Mick Mattis (von Str. Leonards auf Meer, Hastings, Vereinigtes Königreich) für Beweismesswert dieses abstrakte und die vollständige These, September 2002, Faculty of Mathematics, University of Cambridge, 15 JJ Thomson Avenue, CB3 9EW Vereinigtes Königreich.


Nihili Algebra <>-Generated By Distributive Lattices in Null Set Theory (Hybridized Null Set Theory with Fuzzy Set Theory on The Application of Artificial Intelligence and Neural-Null-Fuzzy Systems)


themathematicaltheoryofnothing. wordpress/2010/07/23/nihili-algebra-generated-by-distributive-lattices-in-null-set-theory/ The Prime Number for this case are 13 and 7. Basic List of Prime Numbers: 2, 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41, 43, 47, 53, 59, 61, 67, 71, 73, 79, 83, 89, 97, 101, 103, 107, 109, 113, 127, 131, 137, 139, 149, 151, 157, 163, 167, 173, 179, 181, 191, 193, 197, 199, 211, 223, 227, 229, 233, 239, 241, 251, 257, 263, 269, 271, 277, 281, 283, 293, 307, 311, 313, 317, 331, 337, 347, 349, 353, 359, 367, 373, 379, 383, 389, 397, 401, 409, 419, 421, 431, 433, 439, 443, 449, 457, 461, 463, 467, 479, 487, 491, 499, 503, 509, 521, 523, 541, 547, 557, 563, 569, 571, 577, 587, 593, 599, 601, 607, 613, 617, 619, 631, 641, 643, 647, 653, 659, 661, 673, 677, 683, 691, 701, 709, 719, 727, 733, 739, 743, 751, 757, 761, 769, 773, 787, 797, 809, 811, 821, 823, 827, 829, 839, 853, 857, 859, 863, 877, 881, 883, 887, 907, 911, 919, 929, 937, 941, 947, 953, 967, 971, 977, 983, 991, 997, …


Goldbach’s Conjecture On Prime Numbers.


A Espiral de Arquimedes


God Encrypted The Secret of The Victory within “generalia specialibus non derogant” of 7, 13 and 43 (vs. “self-defeating” 107) where those are the Prime Numbers for this civil suit 2014: So I Decrypted It.


22. Bagi menjawab perenggan 29 dan 30 Pembelaan, Plaintif mengulangi perenggan 28 dan 29 Pernyataan Tuntutan dan Plaintif menafikan pernyataan-pernyataan di perenggan 29 dan 30 Pembelaan dan Defendan-Defendan dikehendaki membuktikannya dengan kukuh. Plaintif turut memplidkan prinsip undang-undang dalam maxim undang-undang “generalia specialibus non derogant” dan terpakai di mana seksyen 43 Akta Penapisan Filem 2002 sebagai undang-undang yang spesifik mengatasi seksyen 107 Akta Mahkamah Rendah 1948 dan seksyen 5 dan 6 Akta Prosiding Kerajaan 1965.


***** Lord Denning was a mathematician before he turned up to be Master of the Rolls.


List of Fibonacci numbers.


The first 21 Fibonacci numbers F n for n = 0, 1, 2, …, 20 are:


A sequência também pode ser estendida para o índice negativo n usando a relação de recorrência reorganizada.


which yields the sequence of “negafibonacci” numbers satisfying.


Assim, a sequência completa é.


A Espiral de Arquimedes


Pi on Combinatorics and Permutation of Sets of Elements and the Relations with Very Huge Gigantic Blocks of Prime Numbers at the decimal number from its fractional part of (Circumference/Diameter) Ratio.


Período Orbital 3 Diagrama de Bifurcação do Mapa Logístico & # 8211; & # 8220; O período 3 implica o caos & # 8221;


Contempt without Jurisdiction – & # 8220; This would be a recipe for chaos “


M. v. HOME OFFICE AND ANOTHER 1991 Nov. 11, 12, 13, 14, 15; 29 Lord Donaldson of Lymington M. R., McCowan and Nolan L. JJ.


An order which is made by a court with unlimited jurisdiction is binding unless and until it is set aside. Common sense suggests that this must be so. Were it otherwise court orders would be consistently ignored in the belief, sometimes justified, that at some time in the future they would be set aside. This would be a recipe for chaos . If authority be required, it is provided by the opinion of the Judicial Committee of the Privy Council delivered by Lord Diplock in Isaacs v. Robertson [1985] A. C. 97, 102-103:


A sequência também pode ser estendida para o índice negativo n usando a relação de recorrência reorganizada.


que produz a sequência de números “negafibonacci” satisfatórios.


Assim, a sequência completa é.


*** “Where there is no jurisdiction, there can be no discretion, for discretion is incident to jurisdiction.” Piper v. Pearson, 2 Gray 120, cited in Bradley v. Fisher, 13 Wall. 335, 20 L. Ed. 646 (1872) A judge must be acting within his jurisdiction as to subject matter and person, to be entitled to immunity from civil action for his acts. Davis v. Burris, 51 Ariz. 220, 75 P.2d 689 (1938) Generally, judges are immune from suit for judicial acts within or in excess of their jurisdiction even if those acts have been done maliciously or corruptly; the only exception being for acts done in the clear absence of all jurisdiction. Gregory v. Thompson, 500 F2d 59 (C. A. Ariz. 1974) When a judicial officer acts entirely without jurisdiction or without compliance with jurisdiction requisites he may be held civilly liable for abuse of process even though his act involved a decision made in good faith, that he had jurisdiction. State use of Little v. U. S. Fidelity & Guaranty Co., 217 Miss. 576, 64 So. 2d 697. “… the particular phraseology of the constitution of the United States confirms and strengthens the principle, supposed to be essential to all written constitutions, that a law repugnant to the constitution is void, and that courts, as well as other departments, are bound by that instrument.” Marbury v. Madison, 1 Cranch 137 (1803). ** “The doctrine of judicial immunity originated in early seventeenth-century England in the jurisprudence of Sir Edward Coke. In two decisions, Floyd & Barker and the Case of the Marshalsea, Lord Coke laid the foundation for the doctrine of judicial immunity.” Floyd & Barker, 77 Eng. Rep. 1305 (1607; The Case of the Marshalsea, 77 Eng. Rep. 1027 (1612) were both cases right out of the Star Chamber. Coke’s reasoning for judicial immunity was presented in four public policy grounds: 1. Finality of judgment; 2. Maintenance of judicial independence; 3. Freedom from continual calumniations; and, 4. Respect and confidence in the judiciary. The Marshalsea presents a case where Coke denied a judge immunity for presiding over a case in assumpsit. Assumpsit is a common-law action for recovery of damages for breach of contract. Coke then explained the operation of jurisdiction requirement for immunity: . “[W]hen a Court has (a) jurisdiction of the cause, and proceeds iverso ordine or erroneously, there the party who sues, or the officer or minister of the Court who executes the precept or process of the Court, no action lies against them. But (b) when the Court has not jurisdiction of the cause, there the whole proceeding is [before a person who is not a judge], and actions will lie against them without any regard of the precept or process…” Although narrowing the availability of judicial immunity, especially in courts of limited jurisdiction, Coke suggested that there was a presumption of jurisdiction and that the judge must have been aware that jurisdiction was lacking. Thus, questions of personam, rem and res jurisdiction are always a proper issue before the court to obviate the defense that the court had no way to know they lacked jurisdiction. ** SUBJECT-MATTER JURISDICTION If a judge acts without subject-matter jurisdiction, the judge is acting unlawfully, he/she has committed an unlawful interference with one’s person, property, or rights. Is the judge who acts without subject-matter jurisdiction then anything but a common criminal? And all orders and judgments issued by a judge who acts without subject-matter jurisdiction are, as a matter of law, void . clr/smj. html …


Listen to the pouring rain Listen to it pour, And with every drop of rain You know I love you more.


Let it rain all night long, Let my love for you go strong, As long as we’re together Who cares about the weather?


Listen to the falling rain, Listen to it fall, And with every drop of rain, I can hear you call, Call my name right out loud, I can here above the clouds And I’m here among the puddles, You and I together huddle.


Listen to the falling rain, Listen to it fall.


It’s raining, It’s pouring, The old man is snoring, Went to bed And bumped his head, He couldn’t get up in the morning,


Listen to the falling rain, Listen to the rain.


Paese mio che stai sulla collina, disteso come un vecchio addormentato la noia, l’abbandono, il niente son la tua malattia, paese mio ti lascio io vado via.


Che sarà, che sarà, che sarà. Che sarà della mia vita chi lo sa. So far tutto o forse niente, da domani si vedrà, e sarà, sarà quel che sarà.


Gli amici miei son quasi tutti via.


e gli altri partiranno dopo me. Peccato perché stavo bene in loro compagnia, ma tutto passa, tutto se ne và.


Che sarà, che sarà, che sarà. Con me porto la chitarra e se la notte piangerò, una nenia di paese suonerò.


Amore mio ti bacio sulla bocca che fu la fonte del mio primo amor, ti do L’appuntamento dove e quando non lo so, ma so soltanto che ritornerò.


Che sarà, che sarà……


Empty spaces fill me up with holes Distant faces with no place left to go Without you within me, I can find no rest Where I’m goin’ is anybody’s guess.


I tried to go on like I never knew you I’m awake but my world is half asleep I pray for this heart to be unbroken But without you, all I’m going to be is incomplete.


Voices tell me I should carry on But I am swimming in an ocean all alone Baby, my baby, it’s written on your face You still wonder if we made a big mistake.


I tried to go on like I never knew you I’m awake but my world is half asleep I pray for this heart to be unbroken But without you, all I’m going to be is incomplete.


I don’t mean to drag it on But I can’t seem to let you go I don’t want to make you face this world alone I want to let you go (Alone)


I tried to go on like I never knew you I’m awake but my world is half asleep I pray for this heart to be unbroken But without you, all I’m going to be is incomplete Incomplete.


KUALA LUMPUR, March 6 — A former director of a computer software company today filed a suit against Magistrate Zaki Asyraf Zubir, Attorney-General Tan Sri Abdul Gani Patail and seven others for false imprisonment concerning the charge of possession of 106 pornographic video clips in 2011.


Mohamad Izaham Mohamed Yatim, 42, filed the suit through Messr A S Dhaliwal at the High Court’s Registrar Office here, and named three deputy public prosecutor Norina Zainol Abidin, Mazelan Jamaluddin and Nurul Ashiqin Zulkifli as defendants. & # 8211; See more at: themalaymailonline/malaysia/article/ex-director-sues-a-g-magistrate-and-seven-more-for-false-imprisonment#sthash. myi8a42E. dpuf.


Prelude into The Greatness of Human Civilization; Mathematics is The Mother of All Sciences and Human Thoughts – Mathematics and Its Mathematical Logic Subdue (both) a priori and a posteriori Truths into the Manifestation of The Theory of Propositional Knowledge – Logic and Philosophical Logic, Metaphysics and Epistemology. Only The Real Pure Mathematicians Who Merely Subdue (both) a priori and a posteriori Truths (Absence of Jurisdiction and Absence of All Jurisdictions In The Sense of Evidential and Mathematical Proofs). Synthetic a priori Judgment vs Analytic Judgment; Synthetic Truth vs a posteriori – a priori Truth; Analytical Judgment vs. Synthetical Judgment; The Principle of All Analytical Judgments is The Law of Contradiction; Empirical Judgments are always Synthetical; Mathematical Judgment are All Syntheticals. The Supreme Principle of Law Was Rather Analytic Than That of Morals Is Synthetic (Thus, So-Called Jurisprudence / Scientia Juris (Juristic Theories)); Metaphysics of Ethics = (Metaphysical Elements of Laws + Metaphysical Elements of Morals) to constitute “The Fundamental” (or “Foundation”) between the Metaphysical Elements of Natural Philosophy (Physics or Cosmology or Scientific Knowledge (or Scientific Phenomena or Scientific (Empirical) Observations)) and Jurisprudence / Scientia Juris (The Science of Law), Positivism, Logical Positivism – “Keadilan ialah Meletakkan Kebenaran di Tempat Yang Sepatutnya”.


“Keadilan ialah Meletakkan Kebenaran di Tempat Yang Sepatutnya” – October 2011 Mohamad Izaham Bin Mohamed Yatim. – (In Bahasa Malaysia)


Article 145(3) Federal Constitution of Malaysia:


Article 145(3): The Attorney General shall have power, exercisable at his discretion, to institute, conduct or discontinue any proceedings for an offence, other than proceedings before a Syariah court, a native court or a court-martial .


“ Where there is no jurisdiction, there can be no discretion, for discretion is incident to jurisdiction .” Piper v. Pearson, 2 Gray 120, cited in Bradley v. Fisher, 13 Wall. 335, 20 L. Ed. 646 (1872)


ACT CENSORSHIP FILM 2002.


Incorporando todas as alterações até 1 de Janeiro de 2006.


43. No prosecution in respect of any offence under this Act or.


any regulations made under this Act shall be instituted except by.


or with the written consent of the Public Prosecutor.


26. Pihak Perayu merujuk kepada kes Abdul Hamid v PP [1956] MLJ 231 (di mukasurat 3 Ikatan Otoriti Pihak Perayu) Smith J membuat pemerhatian seperti berikut:


“There is an essential difference to my mind between a sanction and a consent. A prosecution can be sanctioned without any deep consideration of the particular case : full consideration is required for consent since “consent” is an act of reason, accompanied with deliberation, the mind weighing, as in a balance, the good and evil on each side (Stround 3 rd Ediiton vol 1 page 582). The sanction was therefore no evidence of consent.”


SR. VADIVELLU: THANK YOU, YOUR HONOUR! THANK YOU…


I am doing a proper research on relations of The Mathematical Theory of Nothing vs. The Mathematical and Philosophical Logic, Metaphysics and Epistemology of The Absence of All Jurisdictions . The Nullity that will cancel out at the end of basic algebra but actually will remain intact within the sublimation of the highest dimensional topological spaces in the nullitiness of nihilic algebra.


Akta Penapisan Filem 2002.


Incorporando todas as alterações até 1 de Janeiro de 2006.


Seksyen 42 Akta Penapisan Filem 2002.


Tiagou kos atau gantirugi yang berbangkit deuipada penyitaan boleh didapatkan.


42. “ Tiada seorang pun boleh, dalam apa-apa prosiding di hadapan mana-mana mahkamah berkenaan dengan penyitaan apa-apa filem, bahan publisiti filem, buku, dokumen atau benda lain yang disita pada menjalankan atau berupa sebagai penjalanan mana-mana kuasa yang diberikan di bawah Akta ini, berhak mendapat kos prosiding itu atau apa-apa gantirugi atau relief lain melainkan jika penyitaan itu dibuat tanpa sebab yang munasabah.”


ACT CENSORSHIP FILM 2002.


Incorporando todas as alterações até 1 de Janeiro de 2006.


Nenhum custo ou dano resultante da apreensão pode ser recuperado.


42. Nenhuma pessoa, em qualquer processo perante um tribunal em relação à apreensão de qualquer filme, material de filme-publicidade, livro, documento ou outra coisa apreendida no exercício ou o pretenso exercício de quaisquer poderes conferidos sob esta Lei, terá direito. às custas de tais processos ou a quaisquer danos ou outras medidas de segurança, a menos que tal apreensão tenha sido feita sem causa razoável.


(3) A Força deverá sujeitar esta Lei a ser empregada em e por toda a Malásia (incluindo suas águas territoriais) para a manutenção da lei e da ordem, a preservação da paz e segurança da Malásia, a prevenção e detecção do crime, a apreensão. e acusação de infratores e coleta de inteligência de segurança.


Não responsabilidade por ato realizado sob autorização.


32. (1) Quando a defesa de qualquer processo instaurado contra um policial, um policial extra, um policial voluntário ou um policial auxiliar é que o ato denunciado foi feito em obediência a um mandado que se pretende emitir por qualquer autoridade competente, o tribunal deve, mediante a apresentação do mandado contendo a assinatura de tal autoridade e após a prova de que o ato denunciado foi feito em obediência a tal mandado, entrar em julgamento em favor de tal policial, policial extra, polícia de reserva voluntária oficial ou auxiliar de polícia.


(2) Nenhuma prova da assinatura de tal autoridade será requerida, a menos que o tribunal tenha razões para duvidar de sua genuinidade; e quando for provado que tal assinatura não é genuína, o julgamento deve, no entanto, ser dado em favor de tal policial ou policial extra, se for provado que, no momento em que o ato denunciado foi cometido, ele acreditava em motivos razoáveis ​​que tal assinatura era genuína.


§ Primeiro Relatório de Informação (FIR)


§ A Teoria Matemática do Nada vs. Ausência de Todas as Jurisdições.


& # 8211; A lógica do ser, a ausência e o nada.


& # 8211; A metafísica do ser, a ausência e o nada.


& # 8211; The Epistemology of Being, Absence and Nothingness.


§ Princípios que regem a ação penal mal-intencionada.


§ Desejo de causa razoável e provável.


§ Acusação Maliciosa e Malícia em si.


§ Violação e nulidade (vazio) das Constituições federais da Malásia.


§ Lei do Tribunal de Justiça (Lei 91) + Lei dos Tribunais Subordinados de 1948 (Lei 92) & amp; Lei das Leis dos Tribunais Subordinados de 1955 (Lei 55) + Jurisdição dos Tribunais de Syariah.


§ Violação e má conduta dos deveres do magistrado.


§ Violação e má conduta dos deveres da acusação.


§ Violação e má conduta dos deveres do oficial de investigação.


§ Violação e má conduta dos deveres dos especialistas.


§ Desejo / falta / ausência de leis e evidências científicas:


§ Evidência Científica & # 8211; Testemunhos Científicos - Evidências de Especialistas - A Lógica das Descobertas Científicas - A Metafísica dos Fenômenos Científicos - A Epistemologia das Observações Científicas (Observações Empíricas / Metodologia Científica)


§ Invasão de privacidade.


§ Danos no processo malicioso.


in a lost and lonely part of town.


In a world of tears I slowly drown.


I just can’t make it all alone.


I really should be holding you.


Loving you loving you.


When the feeling’s gone and you can’t go on.


When the morning cries and you don’t know why.


It’s hard to bear.


With no-one to love you you’re.


When you lose control and you got no soul.


When the morning cries and you don’t know why.


It’s hard to bear.


With no-one beside you you’re.


When the feeling’s gone and you can’t go on.


there’s a burning down inside of me.


With a yearning that won’t let me be.


and I just can’t take it all alone.


I really should be holding you.


Loving you loving.


When the feeling’s gone and you can’t go on.


When the morning cries and you don’t know why.


It’s hard to bear.


With no-one to love you you’re.


When you lose control and you got no soul.


When the morning cries and you don’t know why.


It’s hard to bear.


With no-one beside you you’re.


Listen to the ground, there is movement all around.


There is something going down and I can feel it.


On the waves of the air, there is dancing out there.


If it’s something we can share, we can steal it.


And that sweet city woman, she moves through the light.


Controlling my mind and my soul.


When you reach out for me yeah, and the feeling is bright.


Then I get night fever, night fever, we know how to do it.


Gimme that night fever, night fever, we know how to show it.


Here I am, praying for this moment to last.


Living on the music so fine.


Borne on the wind, making it mine.


Night fever, night fever, we know how to do it.


Gimme that night fever, night fever, we know how to show it.


In the heat of our love, don’t need no help for us to make it.


Gimme just enough to take us to the morning.


I got fire in my mind, I got higher in my walking.


And I’m glowing in the dark, I give you warning.


And that sweet city woman, she moves through the light.


Controlling my mind and my soul.


When you reach out for me yeah, and the feeling is bright.


Then I get night fever, night fever, we know how to do it.


Gimme that night fever, night fever, we know how to show it.


Here I am, praying for this moment to last.


Living on the music so fine.


Borne on the wind, making it mine.


Night fever, night fever, we know how to do it.


Gimme that night fever, night fever, we know how to show it.


Such Beautiful Korean Pussies: (But This Ugly Fat Horse (PSY) is Wandering Around Those Girls)


CALL MY NUMBER MAYBE (++60-19-2787830)


Full Definition of SYNTHETIC.


b : devised, arranged, or fabricated for special situations to imitate or replace usual realities.


Examples of SYNTHETIC.


<that organic farm doesn’t use any pesticides or synthetic fertilizers> <boots of waterproof synthetic leather>


Origin of SYNTHETIC.


Related to SYNTHETIC.


Definition of ANALYTIC.


b of a function of a complex variable : differentiable at every point in some neighborhood of a given point.


Variants of ANALYTIC.


Examples of ANALYTIC.


<presented a very analytical argument for the defendant’s guilt>


Origin of ANALYTIC.


Late Latin analyticus, from Greek analytikos, from analyein.


CodeGenius V7.0.13 Neural Fuzzy of The Fuzziness: Jimmy Choronology In Da Middle… of Disco Party? & # 8211; Ei! Jimmy In Da Club – Mere Zindagi Mere Hindustani = Jimmy… Jimmy… Jimmy… (Echoing), Aadja… Aadja… Aadja… (Echoing) – Zindagi Mera Gana…


I am running several tests on Instaforex demo accounts:


Please download Instaforex multiterminal or Instaforex MT4 trading software to view the results in real-time.


Special Words of Thanx to Mr. John Bollinger for his very useful Bollinger Bands:


// | CodeGenius V7.0.1 June 23 2013.mq4 |


// | Copyright © 2013, MOHAMAD IZAHAM BIN MOHAMED YATIM |


#property copyright “Copyright © 2013, MOHAMAD IZAHAM BIN MOHAMED YATIM”


// Settings and Parameters.


extern bool DynamicLotSize = false;


extern double EquityPercent = 1.0;


extern int MagicNumber = 313;


extern int Slippage = 3;


double TakeProfit = 0.00;


double StopLoss = 0.00;


extern double MaxSpread = 4;


extern int NumbersOfPairs = 8;


extern double MaxEquity = 13000000;


double MinAmount = 0;


double MarginLevel = 50;


int TradeUpPoint = 17;


double MinEquityStopLossPercentage = 30;


//—- Input Initialized Parameters.


color pivotColor = Blue;


color pivotlevelColor = Blue;


int ChannelPeriod = 24;


int EMAPeriod = 120;


int StartEMAShift = 6;


int EndEMAShift = 0;


double AngleTreshold = 0.32;


string note1=”Change font colors automatically? True = Yes”;


string note2=”Default Price Font Color”;


color CandleTimeColor = Blue;


int signalcondition = 0;


int signalcondition2 = 0;


bool BuySignal = FALSE;


bool SellSignal = FALSE;


bool BuySignal2 = FALSE;


bool SellSignal2 = FALSE;


bool CloseBuySignal = FALSE;


bool CloseSellSignal = FALSE;


double Slwsignal = 9;


int Barcount = 2000;


// | Special Conversion Functions |


bool BuyAlert=false, SellAlert=false;


bool BuyAlert2=false, SellAlert2=false;


bool BuyAlert3=false, SellAlert3=false;


void SetLoopCount(int loops)


void SetIndexValue(int shift, double value)


// Print (“ExtHistoBuffer :”,value); // green.


void SetIndexValue2(int shift, double value)


// Print (“ExtHistoBuffer2 :”,value); // green.


double GetIndexValue(int shift)


double GetIndexValue2(int shift)


double PipValue=1; // this variable is here to support 5-digit brokers.


bool Terminated = false;


string LF = “\n”; // use this in custom or utility blocks where you need line feeds.


int NDigits = 4; // used mostly for NormalizeDouble in Flex type blocks.


int ObjCount = 0; // count of all objects created on the chart, allows creation of objects with unique names.


int LastTradeUpTicket48 = -1;


int LastTradeUpTicket53 = -1;


if (false) ObjectsDeleteAll(); // clear the chart.


ArrayCopyRates(barvalue, Symbol(), PERIOD_D1);


if (DayOfWeek() == 1)


if (TimeDayOfWeek(iTime(Symbol(), PERIOD_D1, 1)) == 5)


if (TimeDayOfWeek(iTime(Symbol(), PERIOD_D1, j)) == 5)


double rangehl = high – low;


double pivot = (high + low + close) / 3.0;


double R3 = pivot + 1.0 * rangehl;


double R2 = pivot + 0.618 * rangehl;


double R1 = pivot + rangehl / 2.0;


double S1 = pivot – rangehl / 2.0;


double S2 = pivot – 0.618 * rangehl;


double S3 = pivot – 1.0 * rangehl;


int counted_indicators = IndicatorCounted();


if (Bars <= ChannelPeriod) return (0);


if (counted_indicators >= ChannelPeriod) start = Bars – counted_indicators – 1;


else start = Bars – ChannelPeriod – 1;


double loopbegin = 0;


double loopbegin2 = 0;


double loopbegin3 = 0;


bool first = True;


double prevbars = 0;


double smconst = 0;


double smconst1 = 0;


double prev1 = 0;


double prev2 = 0;


double prev3 = 0;


double weight = 0;


double linear = 0;


double MAValue = 0;


double MAValue2 = 0;


double mavalue3 = 0;


double MyHigh = 0;


double MyLow = 0;


double Price = 0;


double Price1 = 0;


double tmpDevAA = 0;


smconst = 2 / (1+Slw);


smconst1 = 2 / (1+Slwsignal);


for(shift =Barcount;shift >=0 ;shift –)


// Yousky 15/05/2006 – Change to avoid Zero divide exception.


MAValue2 = smconst * (AA-prev) + prev;


for(shift =Barcount-Pds;shift >=0 ;shift –)


for(counter =shift;counter <=Pds + shift ;counter ++)


if( Price > MyHigh )


if( Price < MyLow )


// Yousky 15/05/2006 – Change to avoid Zero divide exception.


if ((MyHigh-MyLow) != 0)


MAValue = smconst * (bb-prev1) + prev1;


//Print (MAValue); // green.


for(shift =Barcount;shift >=0 ;shift –)


mavalue3= smconst1 * (prev3-prev2) +prev2;


// BEGIN OF GENERALIZED DECISION FUNCTIONS.


// END OF GENERALIZED DECISION FUNCTIONS.


if (Terminated == true)


if (true == false && true) PipValue = 10;


if (true && (NDigits == 3 || NDigits == 5)) PipValue = 10;


double ACc = iAC(NULL, 0, 1);


double rsi_sig = iRSI(NULL, 0, 14, PRICE_CLOSE, 0);


double CCI_SIG = iCCI(NULL, 0, 14, PRICE_CLOSE, 0);


double WPR_SIG = iWPR(NULL, 0, 14, 0);


double WPR_SIG = iATR(NULL, 0, 14, 0);


// | The EMA50 – a function |


double EMA50CLOSEPRICE = iMA(NULL,0,50,0,MODE_SMMA, PRICE_CLOSE,0);


// | The Close Price – a function |


double CLOSEPRICE = double iClose(NULL, 0, 0);


// | The Open Price – a function |


double OPENPRICE = double iOpen(NULL, 0, 0);


double val=iDeMarker(NULL, 0, 14, 1);


double adxer = iADX(NULL,0,14,PRICE_HIGH, MODE_MAIN,0) –


double Osama = (iOsMA(NULL,0,12,26,14,PRICE_OPEN,1)) –


double val2=(iForce(NULL, 0, 13,MODE_SMA, PRICE_CLOSE,0));


double MOMENT = (iMomentum(NULL,0,12,PRICE_CLOSE,0) –


double val5 = (iVolume(Symbol(),0,i));


double psar = (Close[0] – iSAR(NULL,0,0.02,0.2,0));


double macd = (iMACD(NULL,0,12,26,9,PRICE_CLOSE, MODE_MAIN,0) –


double macdmain = (iMACD(NULL,0,12,26,9,PRICE_CLOSE, MODE_MAIN,0));


double macdsignal = (iMACD(NULL,0,12,26,9,PRICE_CLOSE, MODE_SIGNAL,0));


int bar = WindowFirstVisibleBar();


double val6 = High[iHighest(NULL,0,MODE_HIGH, bar-1, 1)];


int bar = WindowFirstVisibleBar();


double val7 = Low[iLowest(NULL,0,MODE_LOW, bar-1, 1)];


double ranger = MathAbs((highest() – lowest()));


double w1 = x1 – 100.0;


double w2 = x2 – 100.0;


double w3 = x3 – 100.0;


double w4 = x4 – 100.0;


double a1 = iAC(Symbol(), 0, 0);


double a2 = iAC(Symbol(), 0, 7);


double a3 = iAC(Symbol(), 0, 14);


double a4 = iAC(Symbol(), 0, 21);


double ackohonensqrt = (w1 * a1 + w2 * a2 + w3 * a3 + w4 * a4);


double w11 = x1 – 100.0;


double w12 = x2 – 100.0;


double w13 = x3 – 100.0;


double w14 = x4 – 100.0;


double a11 = iAC(Symbol(), 0, 0);


double a12 = iAC(Symbol(), 0, 7);


double a13 = iAC(Symbol(), 0, 14);


double a14 = iAC(Symbol(), 0, 21);


double achebbiansqrt = (w11 * a11 + w12 * a12 + w13 * a13 + w14 * a14);


double achebbiansqr = ((achebbiansqrt*achebbiansqrt)/2);


double wmacdk1 = x1 – 100.0;


double wmacdk2 = x2 – 100.0;


double wmacdk3 = x3 – 100.0;


double wmacdk4 = x4 – 100.0;


double amacdk1 = iMACD(NULL,0,12,26,9,PRICE_CLOSE, MODE_MAIN,0) – iMACD(NULL,0,12,26,9,PRICE_CLOSE, MODE_SIGNAL,0);


double amacdk2 = iMACD(NULL,0,12,26,9,PRICE_CLOSE, MODE_MAIN,7) – iMACD(NULL,0,12,26,9,PRICE_CLOSE, MODE_SIGNAL,7);


double amacdk3 = iMACD(NULL,0,12,26,9,PRICE_CLOSE, MODE_MAIN,14) – iMACD(NULL,0,12,26,9,PRICE_CLOSE, MODE_SIGNAL,14);


double amacdk4 = iMACD(NULL,0,12,26,9,PRICE_CLOSE, MODE_MAIN,21) – iMACD(NULL,0,12,26,9,PRICE_CLOSE, MODE_SIGNAL,21);


double macdkohonensqrt = (wmacdk1 * amacdk1 + wmacdk2 * amacdk2 + wmacdk3 * amacdk3 + wmacdk4 * amacdk4);


double wmacdh11 = x1 – 100.0;


double wmacdh12 = x2 – 100.0;


double wmacdh13 = x3 – 100.0;


double wmacdh14 = x4 – 100.0;


double amacdh11 = iMACD(NULL,0,12,26,9,PRICE_CLOSE, MODE_MAIN,0) – iMACD(NULL,0,12,26,9,PRICE_CLOSE, MODE_SIGNAL,0);


double amacdh12 = iMACD(NULL,0,12,26,9,PRICE_CLOSE, MODE_MAIN,7) – iMACD(NULL,0,12,26,9,PRICE_CLOSE, MODE_SIGNAL,7);


double amacdh13 = iMACD(NULL,0,12,26,9,PRICE_CLOSE, MODE_MAIN,14) – iMACD(NULL,0,12,26,9,PRICE_CLOSE, MODE_SIGNAL,14);


double amacdh14 = iMACD(NULL,0,12,26,9,PRICE_CLOSE, MODE_MAIN,21) – iMACD(NULL,0,12,26,9,PRICE_CLOSE, MODE_SIGNAL,21);


double macdhebbiansqrt = (wmacdh11 * amacdh11 + wmacdh12 * amacdh12 + wmacdh13 * amacdh13 + wmacdh14 * amacdh14);


double macdhebbiansqr = ((macdhebbiansqrt*macdhebbiansqrt)/2);


double wbek1 = x1 – 100.0;


double wbek2 = x2 – 100.0;


double wbek3 = x3 – 100.0;


double wbek4 = x4 – 100.0;


double abek1 = iBearsPower(NULL, 0, 13,PRICE_CLOSE,0);


double abek2 = iBearsPower(NULL, 0, 13,PRICE_CLOSE,7);


double abek3 = iBearsPower(NULL, 0, 13,PRICE_CLOSE,14);


double abek4 = iBearsPower(NULL, 0, 13,PRICE_CLOSE,21);


double bearkohonensqrt = (-1)*(wbek1 * abek1 + wbek2 * abek2 + wbek3 * abek3 + wbek4 * abek4);


double wbeh11 = x1 – 100.0;


double wbeh12 = x2 – 100.0;


double wbeh13 = x3 – 100.0;


double wbeh14 = x4 – 100.0;


double abeh11 = iBearsPower(NULL, 0, 13,PRICE_CLOSE,0);


double abeh12 = iBearsPower(NULL, 0, 13,PRICE_CLOSE,7);


double abeh13 = iBearsPower(NULL, 0, 13,PRICE_CLOSE,14);


double abeh14 = iBearsPower(NULL, 0, 13,PRICE_CLOSE,21);


double bearhebbiansqrt = (wbeh11 * abeh11 + wbeh12 * abeh12 + wbeh13 * abeh13 + wbeh14 * abeh14);


double bearhebbiansqr = ((bearhebbiansqrt*bearhebbiansqrt)/2);


double wbuk1 = x1 – 100.0;


double wbuk2 = x2 – 100.0;


double wbuk3 = x3 – 100.0;


double wbuk4 = x4 – 100.0;


double abuk1 = iBullsPower(NULL, 0, 13,PRICE_CLOSE,0);


double abuk2 = iBullsPower(NULL, 0, 13,PRICE_CLOSE,7);


double abuk3 = iBullsPower(NULL, 0, 13,PRICE_CLOSE,14);


double abuk4 = iBullsPower(NULL, 0, 13,PRICE_CLOSE,21);


double bullkohonensqrt = (wbuk1 * abuk1 + wbuk2 * abuk2 + abuk3 * abuk3 + wbuk4 * abuk4);


double wbuh11 = x1 – 100.0;


double wbuh12 = x2 – 100.0;


double wbuh13 = x3 – 100.0;


double wbuh14 = x4 – 100.0;


double abuh11 = iBullsPower(NULL, 0, 13,PRICE_CLOSE,0);


double abuh12 = iBullsPower(NULL, 0, 13,PRICE_CLOSE,7);


double abuh13 = iBullsPower(NULL, 0, 13,PRICE_CLOSE,14);


double abuh14 = iBullsPower(NULL, 0, 13,PRICE_CLOSE,21);


double bullhebbiansqrt = (wbuh11 * abuh11 + wbuh12 * abuh12 + wbuh13 * abuh13 + wbuh14 * abuh14);


double bullhebbiansqr = ((bullhebbiansqrt*bullhebbiansqrt)/2);


// | The Slippage Function and PipPoint |


// Pip Point Function.


double PipPoint(string Currency)


int CalcDigits = MarketInfo(Currency, MODE_DIGITS);


if(CalcDigits == 2 || CalcDigits == 3) double CalcPoint = 0.01;


else if(CalcDigits == 4 || CalcDigits == 5) CalcPoint = 0.0001;


// Get Slippage Function.


int GetSlippage(string Currency, int SlippagePips)


int CalcDigits = MarketInfo(Currency, MODE_DIGITS);


if(CalcDigits == 2 || CalcDigits == 4) double CalcSlippage = SlippagePips;


else if(CalcDigits == 3 || CalcDigits == 5) CalcSlippage = SlippagePips * 10;


void SpreadFilter39()//SPREAD FILTER BUY ORDER.


if (MarketInfo(Symbol(), MODE_SPREAD)/PipValue < MaxSpread)


bool exists = false;


for (int i=OrdersTotal()-1; i >= 0; i–)


if (OrderSelect(i, SELECT_BY_POS, MODE_TRADES))


if (OrderType() == OP_BUY && OrderSymbol() == Symbol() && OrderMagicNumber() == MagicNumber)


Print(“OrderSelect() error – “, ErrorDescription(GetLastError()));


if (exists == false)


void TechnicalAnalysis2xOr37()// TECHNICAL ANALYSIS OPEN BUY ORDER.


// Begin of LotSize Calculation.


double RiskAmount = AccountEquity() * (EquityPercent / 100);


double TickValue = MarketInfo(Symbol(),MODE_TICKVALUE);


if(Point == 0.001 || Point == 0.00001) TickValue *= 10;


double CalcLots = (RiskAmount / StopLoss) / TickValue;


double LotSize = CalcLots;


else LotSize = LotSizeOnEquity;


// Lot size verification.


else if(LotSize > MarketInfo(Symbol(),MODE_MAXLOT))


else LotSize = NormalizeDouble(LotSize,2);


// End of LotSize Calculation.


double SL = Ask – StopLoss*PipValue*Point;


if (StopLoss == 0) SL = 0;


double TP = Ask + TakeProfit*PipValue*Point;


if (TakeProfit == 0) TP = 0;


ticket = OrderSend(Symbol(), OP_BUY, LotSize, Ask, Slippage, 0, 0, “CodeGenius™ V7.0 IfGap”, MagicNumber, 0, Blue);


ticket = OrderSend(Symbol(), OP_BUY, LotSize, Ask, Slippage, SL, TP, “CodeGenius™ V7.0 IfGap”, MagicNumber, 0, Blue);


bool ret = OrderModify(OrderTicket(), OrderOpenPrice(), SL, TP, 0, Blue);


Print(“OrderModify() error – “, ErrorDescription(GetLastError()));


Print(“OrderSend() error – “, ErrorDescription(GetLastError()));


string temp = “Mohamad Izaham Bin Mohamed Yatim – Copyright © 1990 & # 8211; 2013, CodeGenius™ (United Kingdom) Limited\nCodeGenius™ V7.0 : Executed : ” + Count13 + “, SPREAD : ” + DoubleToStr(MarketInfo(Symbol(), MODE_SPREAD)/PipValue, 2) +


+ “EMA50 : ” + DoubleToStr(EMA50(), 4)+ “, MACD (12,26,9) : ” + DoubleToStr(MACD(), 4)+ “, OPEN PRICE : ” + DoubleToStr(OPEN(), 4)+ “, CLOSE PRICE : ” + DoubleToStr(CLOSE(), 4)+ “, CLOSE – OPEN : ” + DoubleToStr(CLOSE() – OPEN(), 4)+ “\n”


+ “MARKET STABILITY : ” + Symbol() + “, CLOSE PRICE – PSAR (0.02,0.2) : ” + DoubleToStr(PSAR(), 4)+ “, CLOSE PRICE – EMA(50) : ” + DoubleToStr(CLOSE() – EMA50(), 4)+ “\n”


+ “STOCHASTIC (5,3,3) : ” + DoubleToStr(Stochastic(), 4)+ “, STOCHASTICMAIN(5,3,3) : ” + DoubleToStr(StochasticMain(), 4)+ “, STOCHASTICSIGNAL(5,3,3) : ” + DoubleToStr(StochasticSignal(), 4)+ “\n”


+ “MACD (12,26,9) : ” + DoubleToStr(MACD(), 4)+ “, MACDMAIN (12,26,9) : ” + DoubleToStr(MACDMAIN(), 4)+ “, MACDSIGNAL (12,26,9) : ” + DoubleToStr(MACDSIGNAL(), 4)+ “, FORCE (14) : ” + DoubleToStr(FORCE(), 4)+ “\n”


+ “DeMarker (14) : ” + DoubleToStr(DeMarker(), 4)+ “, OsMA (14) : ” + DoubleToStr(OsMA(), 4)+ “, Volume : ” + DoubleToStr(volume(), 0)+ “, MOMENTUM (14) : ” + DoubleToStr(MOM(), 4)+ “, Equity / Balance : ” + DoubleToStr(AccountEquity()/AccountBalance(), 2) + “\n”


+ “NEURAL FUZZY NETS AND CHAOS THEORETICAL ANALYSES:\n”


+ “Node 01 AC Kohonen : ” + DoubleToStr(ackohonen(), 4)+ ” Node 05 BEAR Kohonen : ” + DoubleToStr(bearkohonen(), 4)+ “\n”


+ “Node 02 AC Hebbian : ” + DoubleToStr(achebbian(), 4)+ ” Node 06 BEAR Hebbian : ” + DoubleToStr(bearhebbian(), 4)+ “\n”


+ “Node 03 MACD Kohonen : ” + DoubleToStr(macdkohonen(), 4)+ ” Node 07 BULL Kohonen : ” + DoubleToStr(bullkohonen(), 4)+ “\n”


+ “Node 04 MACD Hebbian : ” + DoubleToStr(macdhebbian(), 4)+ ” Node 08 BULL Hebbian : ” + DoubleToStr(bullhebbian(), 4)+ “\n”


+ “Fibonacci 0.00 R % : ” + DoubleToStr(Retrace000, 4)+ “, Fibonacci 23.6 R % : ” + DoubleToStr(Retrace236, 4)+ “\n”


+ “Fibonacci 38.2 R % : ” + DoubleToStr(Retrace382, 4)+ “, Fibonacci 50.0 R % : ” + DoubleToStr(Retrace50, 4)+ “\n”


+ “Fibonacci 61.8 R % : ” + DoubleToStr(Retrace618, 4)+ “, Fibonacci 100.0 R % : ” + DoubleToStr(Retrace1000, 4)+ “\n”


+ “Fibonacci 61.8.0 E % : ” + DoubleToStr(Extend618, 4)+ “, Fibonacci 100.0 E % : ” + DoubleToStr(Extend1000, 4)+ “\n”


+ “Fibonacci 138.2 E % : ” + DoubleToStr(Extend1382, 4)+ “, Fibonacci 161.8 E % : ” + DoubleToStr(Extend1618, 4)+ “\n”


+ “Fibonacci 261.8 E % : ” + DoubleToStr(Extend2618, 4)+ “, Fibonacci 423.6 E % : ” + DoubleToStr(Extend4236, 4)+ “\n”


*/ + “Lowest Peak: ” + DoubleToStr(lowest(), 4)+ “, Highest Peak: ” + DoubleToStr(highest(), 4)+ “, Range: ” + DoubleToStr(range(), 4)+ “\n”


+ “Account Leverage: ” + DoubleToStr(AccountLeverage(), 0)+ “\n”


+ “Account Balance: ” + DoubleToStr(AccountBalance(), 2)+ “\n”


+ “Free Margin: ” + DoubleToStr(AccountFreeMargin(), 2)+ “\n”


void CheckEquity46()//CHECK EQUITY TO CLOSE ORDERS WHEN REACHES 13,000,000.00.


if (AccountEquity() > MaxEquity)


int orderstotal = OrdersTotal();


for (int i = 0; i < orderstotal; i++)


OrderSelect (i, SELECT_BY_POS, MODE_TRADES);


if (OrderType() != OP_SELL || OrderSymbol() != Symbol() || OrderMagicNumber() != MagicNumber)


if (OrderProfit() > MinAmount)


for (i = 0; i < orders; i++)


if (OrderSelect(ordticket[i][1], SELECT_BY_TICKET) == true)


bool ret = OrderClose(OrderTicket(), OrderLots(), OrderClosePrice(), Slippage, Red);


Print(“OrderClose() error – “, ErrorDescription(GetLastError()));


int orderstotal = OrdersTotal();


for (int i = 0; i < orderstotal; i++)


OrderSelect (i, SELECT_BY_POS, MODE_TRADES);


if (OrderType() != OP_BUY || OrderSymbol() != Symbol() || OrderMagicNumber() != MagicNumber)


if (OrderProfit() > MinAmount)


for (i = 0; i < orders; i++)


if (OrderSelect(ordticket[i][1], SELECT_BY_TICKET) == true)


bool ret = OrderClose(OrderTicket(), OrderLots(), OrderClosePrice(), Slippage, Red);


Print(“OrderClose() error – “, ErrorDescription(GetLastError()));


bool exists = false;


for (int i=OrdersTotal()-1; i >= 0; i–)


if (OrderSelect(i, SELECT_BY_POS, MODE_TRADES))


if (OrderType() == OP_SELL && OrderSymbol() == Symbol() && OrderMagicNumber() == MagicNumber)


Print(“OrderSelect() error – “, ErrorDescription(GetLastError()));


void TechnicalAnalysis24()// TECHNICAL ANALYSIS CLOSE ORDER?


void TechnicalAnalysis47()// TECHNICAL ANALYSIS TRADE UP OPEN ORDER.


// Begin of LotSize Calculation.


double RiskAmount = AccountEquity() * (EquityPercent / 100);


double TickValue = MarketInfo(Symbol(),MODE_TICKVALUE);


if(Point == 0.001 || Point == 0.00001) TickValue *= 10;


double CalcLots = (RiskAmount / StopLoss) / TickValue;


double LotSize = CalcLots;


else LotSize = LotSizeOnEquity;


// Lot size verification.


else if(LotSize > MarketInfo(Symbol(),MODE_MAXLOT))


else LotSize = NormalizeDouble(LotSize,2);


// End of LotSize Calculation.


bool exists = false;


if (LastTradeUpTicket48 != -1)


for (int j=OrdersTotal()-1; j >= 0; j–)


if (OrderSelect(j, SELECT_BY_POS, MODE_TRADES))


if (OrderTicket() == LastTradeUpTicket48)


Print(“OrderSelect() error – “, ErrorDescription(GetLastError()));


if (exists == false) LastTradeUpTicket48 = -1; // reset Ticket Id so trade-up would be possible.


double takeprofit = 0;


double stoploss = 0;


for (int i=OrdersTotal()-1; i >= 0; i–)


if (OrderSelect(i, SELECT_BY_POS, MODE_TRADES))


if (OrderSymbol() == Symbol() && OrderMagicNumber() == MagicNumber && LastTradeUpTicket48 == -1)


if (OrderType() == OP_BUY && Ask – OrderOpenPrice() > TradeUpPoint*PipValue*Point)


if (TakeProfit == 0) takeprofit = OrderTakeProfit();


if (StopLoss == 0) stoploss = OrderStopLoss();


ticket = OrderSend(Symbol(), OP_BUY, LotSize, Ask, Slippage, 0, 0, “CodeGenius™ V7.0 IfGap”, MagicNumber, 0, White);


ticket = OrderSend(Symbol(), OP_BUY, LotSize, Ask, Slippage, stoploss, takeprofit, “CodeGenius™ V7.0 IfGap”, MagicNumber, 0, White);


bool ret = OrderModify(OrderTicket(), OrderOpenPrice(), stoploss, takeprofit, 0, White);


Print(“OrderModify() error – “, ErrorDescription(GetLastError()));


if (OrderType() == OP_SELL && OrderOpenPrice() – Bid > TradeUpPoint*PipValue*Point)


takeprofit = Bid – TakeProfit*PipValue*Point;


if (TakeProfit == 0) takeprofit = OrderTakeProfit();


if (StopLoss == 0) stoploss = OrderStopLoss();


ticket2 = OrderSend(Symbol(), OP_SELL, LotSize, Bid, Slippage, 0, 0, “CodeGenius™ V7.0 IfGap”, MagicNumber, 0, White);


ticket2 = OrderSend(Symbol(), OP_SELL, LotSize, Bid, Slippage, stoploss, takeprofit, “CodeGenius™ V7.0 IfGap”, MagicNumber, 0, White);


bool ret4 = OrderModify(OrderTicket(), OrderOpenPrice(), stoploss, takeprofit, 0, White);


Print(“OrderModify() error – “, ErrorDescription(GetLastError()));


Print(“OrderSelect() error – “, ErrorDescription(GetLastError()));


bool exists = false;


for (int i=OrdersTotal()-1; i >= 0; i–)


if (OrderSelect(i, SELECT_BY_POS, MODE_TRADES))


if (OrderType() == OP_BUY && OrderSymbol() == Symbol() && OrderMagicNumber() == MagicNumber)


Print(“OrderSelect() error – “, ErrorDescription(GetLastError()));


void TechnicalAnalysis27()// TECHNICAL ANALYSIS CLOSE ORDER?


void TechnicalAnalysis51()// TECHNICAL ANALYSIS TRADE UP OPEN ORDER?


// Begin of LotSize Calculation.


double RiskAmount = AccountEquity() * (EquityPercent / 100);


double TickValue = MarketInfo(Symbol(),MODE_TICKVALUE);


if(Point == 0.001 || Point == 0.00001) TickValue *= 10;


double CalcLots = (RiskAmount / StopLoss) / TickValue;


double LotSize = CalcLots;


else LotSize = LotSizeOnEquity;


// Lot size verification.


else if(LotSize > MarketInfo(Symbol(),MODE_MAXLOT))


else LotSize = NormalizeDouble(LotSize,2);


// End of LotSize Calculation.


bool exists = false;


if (LastTradeUpTicket53 != -1)


for (int j=OrdersTotal()-1; j >= 0; j–)


if (OrderSelect(j, SELECT_BY_POS, MODE_TRADES))


if (OrderTicket() == LastTradeUpTicket53)


Print(“OrderSelect() error – “, ErrorDescription(GetLastError()));


if (exists == false) LastTradeUpTicket53 = -1; // reset Ticket Id so trade-up would be possible.


double takeprofit = 0;


double stoploss = 0;


for (int i=OrdersTotal()-1; i >= 0; i–)


if (OrderSelect(i, SELECT_BY_POS, MODE_TRADES))


if (OrderSymbol() == Symbol() && OrderMagicNumber() == MagicNumber && LastTradeUpTicket53 == -1)


if (OrderType() == OP_BUY && Ask – OrderOpenPrice() > TradeUpPoint*PipValue*Point)


takeprofit = Ask + TakeProfit*PipValue*Point;


if (TakeProfit == 0) takeprofit = OrderTakeProfit();


if (StopLoss == 0) stoploss = OrderStopLoss();


ticket = OrderSend(Symbol(), OP_BUY, LotSize, Ask, Slippage, 0, 0, “CodeGenius™ V7.0 IfGap”, MagicNumber, 0, White);


ticket = OrderSend(Symbol(), OP_BUY, LotSize, Ask, Slippage, stoploss, takeprofit, “CodeGenius™ V7.0 IfGap”, MagicNumber, 0, White);


bool ret = OrderModify(OrderTicket(), OrderOpenPrice(), stoploss, takeprofit, 0, White);


Print(“OrderModify() error – “, ErrorDescription(GetLastError()));


if (OrderType() == OP_SELL && OrderOpenPrice() – Bid > TradeUpPoint*PipValue*Point)


takeprofit = Bid – TakeProfit*PipValue*Point;


if (TakeProfit == 0) takeprofit = OrderTakeProfit();


if (StopLoss == 0) stoploss = OrderStopLoss();


ticket2 = OrderSend(Symbol(), OP_SELL, LotSize, Bid, Slippage, 0, 0, “CodeGenius™ V7.0 IfGap”, MagicNumber, 0, White);


ticket2 = OrderSend(Symbol(), OP_SELL, LotSize, Bid, Slippage, stoploss, takeprofit, “CodeGenius™ V7.0 IfGap”, MagicNumber, 0, White);


bool ret4 = OrderModify(OrderTicket(), OrderOpenPrice(), stoploss, takeprofit, 0, White);


Print(“OrderModify() error – “, ErrorDescription(GetLastError()));


Print(“OrderSelect() error – “, ErrorDescription(GetLastError()));


void SpreadFilter35()//SPREAD FILTER SELL ORDER.


if (MarketInfo(Symbol(), MODE_SPREAD)/PipValue < MaxSpread)


bool exists = false;


for (int i=OrdersTotal()-1; i >= 0; i–)


if (OrderSelect(i, SELECT_BY_POS, MODE_TRADES))


if (OrderType() == OP_SELL && OrderSymbol() == Symbol() && OrderMagicNumber() == MagicNumber)


Print(“OrderSelect() error – “, ErrorDescription(GetLastError()));


if (exists == false)


void TechnicalAnalysis2xOr33()// TECHNICAL ANALYSIS OPEN SELL ORDER.


// Begin of LotSize Calculation.


double RiskAmount = AccountEquity() * (EquityPercent / 100);


double TickValue = MarketInfo(Symbol(),MODE_TICKVALUE);


if(Point == 0.001 || Point == 0.00001) TickValue *= 10;


double CalcLots = (RiskAmount / StopLoss) / TickValue;


double LotSize = CalcLots;


else LotSize = LotSizeOnEquity;


// Lot size verification.


else if(LotSize > MarketInfo(Symbol(),MODE_MAXLOT))


else LotSize = NormalizeDouble(LotSize,2);


// End of LotSize Calculation.


double SL = Bid + StopLoss*PipValue*Point;


if (StopLoss == 0) SL = 0;


double TP = Bid – TakeProfit*PipValue*Point;


if (TakeProfit == 0) TP = 0;


ticket = OrderSend(Symbol(), OP_SELL, LotSize, Bid, Slippage, 0, 0, “CodeGenius™ V7.0 IfGap”, MagicNumber, 0, Red);


ticket = OrderSend(Symbol(), OP_SELL, LotSize, Bid, Slippage, SL, TP, “CodeGenius™ V7.0 IfGap”, MagicNumber, 0, Red);


bool ret = OrderModify(OrderTicket(), OrderOpenPrice(), SL, TP, 0, Red);


Print(“OrderModify() error – “, ErrorDescription(GetLastError()));


Print(“OrderSend() error – “, ErrorDescription(GetLastError()));


void CheckMarginLevel57()// TECHNICAL ANALYSIS CHECK MARGIN LEVEL.


if ((AccountEquity() / AccountMargin()) * 100 > MarginLevel)


void CheckEquity55()// TECHNICAL ANALYSIS CHECK MINEQUITYSTOPLOSS.


if (AccountEquity() < (MinEquityStopLossPercentage/100)*AccountBalance())


int orderstotal = OrdersTotal();


for (int i = 0; i < orderstotal; i++)


OrderSelect (i, SELECT_BY_POS, MODE_TRADES);


if (OrderType() != OP_BUY || OrderSymbol() != Symbol() || OrderMagicNumber() != MagicNumber)


for (i = 0; i < orders; i++)


if (OrderSelect(ordticket[i][1], SELECT_BY_TICKET) == true)


bool ret = OrderClose(OrderTicket(), OrderLots(), OrderClosePrice(), Slippage, Red);


Print(“OrderClose() error – “, ErrorDescription(GetLastError()));


int orderstotal = OrdersTotal();


for (int i = 0; i < orderstotal; i++)


OrderSelect (i, SELECT_BY_POS, MODE_TRADES);


if (OrderType() != OP_SELL || OrderSymbol() != Symbol() || OrderMagicNumber() != MagicNumber)


for (i = 0; i < orders; i++)


if (OrderSelect(ordticket[i][1], SELECT_BY_TICKET) == true)


bool ret = OrderClose(OrderTicket(), OrderLots(), OrderClosePrice(), Slippage, Red);


Print(“OrderClose() error – “, ErrorDescription(GetLastError()));


void TechnicalAnalysis56()// TECHNICAL ANALYSIS CUSTOM 1.


// Neural Fuzzy Algorithm 1 Source Codes.


void TechnicalAnalysis72()// TECHNICAL ANALYSIS CUSTOM 2.


// Neural Fuzzy Algorithm 2 Source Codes.


if (false) ObjectsDeleteAll();


13 de julho de 2012: Na relação caótica & # 8211; Estamos preparando nosso terno civil & # 8211; Constituições federais como as leis supremos & # 8211; Sobre a ausência de todas as jurisdições e processos judiciais "# 8211; Princípio que rege a acusação maliciosa & # 8211; Provas (Provas Matemáticas e Evidenciais) & # 8211; Quer de causa razoável e provável & # 8211; Na acusação maliciosa e Malice Itselves & # 8211; Violação e inconsistências com as Constituições federais da Malásia & # 8211; Court of Judicature Act – Falta / Ausência de Leis e Evidências Científicas & # 8211; Scientific Evidence – Testemunhos Científicos & # 8211; Explicações Científicas & # 8211; Evidência Especialista & # 8211; A lógica das descobertas científicas & # 8211; A Metafísica dos Fenômenos Científicos & # 8211; A epistemologia das observações científicas (observações empíricas) & # 8211; Invasão de Privacidade & # 8211; Danos na acusação maliciosa & # 8211; Responsabilidade Vicária & # 8211; Recurso Criminal do Supremo Tribunal 41-21-2011 Contra Decisão do Tribunal de Magistrado por Malicioso e Má Conduta de um Magistrado Recalcitrante e Procuradores em Caso: 2-83-7119-2009 & # 8211; Os métodos de ataque serão baseados na dialética deontológica que uma vez usada por Immanuel Kant, W. F. Hegel, Sir Karl Popper e filósofos anteriores.


Akta Penapisan Filem 2002.


Incorporando todas as alterações até 1 de Janeiro de 2006.


Seksyen 42 Akta Penapisan Filem 2002.


Tiagou kos atau gantirugi yang berbangkit deuipada penyitaan boleh didapatkan.


42. & # 8220; Tiaram-se, trocaram-se, mantiveram-se apoderando-se de hadapan, mana-mana, mahkamah, berço, apanharam-se, apa filem, bahan, publicaram filem, buku, dokumen, bain lain yang, disita pada, mana-mana, kuasa yang diberikan di bawah Akta ini, berhak mendapat kos prosiding itu atau apa-apa gantirugi atau alívio lain melainkan jika penyitaan itu dibuat tanpa sebab yang munasabah. ”


ACT CENSORSHIP FILM 2002.


Incorporando todas as alterações até 1 de Janeiro de 2006.


Nenhum custo ou dano resultante da apreensão pode ser recuperado.


42. Nenhuma pessoa, em qualquer processo perante um tribunal em relação à apreensão de qualquer filme, material de filme-publicidade, livro, documento ou outra coisa apreendida no exercício ou o pretenso exercício de quaisquer poderes conferidos sob esta Lei, terá direito. às custas de tais processos ou a quaisquer danos ou outras medidas de segurança, a menos que tal apreensão tenha sido feita sem causa razoável.


(3) A Força deverá sujeitar esta Lei a ser empregada em e por toda a Malásia (incluindo suas águas territoriais) para a manutenção da lei e da ordem, a preservação da paz e segurança da Malásia, a prevenção e detecção do crime, a apreensão. e acusação de infratores e coleta de inteligência de segurança.


Não responsabilidade por ato realizado sob autorização.


32. (1) Quando a defesa de qualquer processo instaurado contra um policial, um policial extra, um policial voluntário ou um policial auxiliar é que o ato denunciado foi feito em obediência a um mandado que se pretende emitir por qualquer autoridade competente, o tribunal deve, mediante a apresentação do mandado contendo a assinatura de tal autoridade e após a prova de que o ato denunciado foi feito em obediência a tal mandado, entrar em julgamento em favor de tal policial, policial extra, polícia de reserva voluntária oficial ou auxiliar de polícia.


(2) Nenhuma prova da assinatura de tal autoridade será requerida, a menos que o tribunal tenha razões para duvidar de sua genuinidade; e quando for provado que tal assinatura não é genuína, o julgamento deve, no entanto, ser dado em favor de tal policial ou policial extra, se for provado que, no momento em que o ato denunciado foi cometido, ele acreditava em motivos razoáveis ​​que tal assinatura era genuína.


§ Primeiro Relatório de Informação (FIR)


§ A Teoria Matemática do Nada vs. Ausência de Todas as Jurisdições.


& # 8211; A lógica do ser, a ausência e o nada.


& # 8211; A metafísica do ser, a ausência e o nada.


& # 8211; The Epistemology of Being, Absence and Nothingness.


§ Princípios que regem a ação penal mal-intencionada.


§ Desejo de causa razoável e provável.


§ Acusação Maliciosa e Malícia em si.


§ Violação e nulidade (vazio) das Constituições federais da Malásia.


§ Lei do Tribunal de Justiça (Lei 91) + Lei dos Tribunais Subordinados de 1948 (Lei 92) & amp; Lei das Leis dos Tribunais Subordinados de 1955 (Lei 55) + Jurisdição dos Tribunais de Syariah.


§ Violação e má conduta dos deveres do magistrado.


§ Violação e má conduta dos deveres da acusação.


§ Violação e má conduta dos deveres do oficial de investigação.


§ Violação e má conduta dos deveres dos especialistas.


§ Desejo / falta / ausência de leis e evidências científicas:


§ Evidência Científica & # 8211; Testemunhos Científicos - Evidências de Especialistas - A Lógica das Descobertas Científicas - A Metafísica dos Fenômenos Científicos - A Epistemologia das Observações Científicas (Observações Empíricas / Metodologia Científica)


Блокнот.


В июле 2012 года Блокнот Google был закрыт и все данные из него теперь хранятся в Документах Google. Как уже сообщалось, в большинстве случаев все файлы из Блокнота были автоматически экспортированы в Документы Google. В связи с этим необходимо обновить все закладки и ссылки для Блокнота: теперь они должны вести на Документы Google.


Ниже приведены ответы на некоторые вопросы по этому переходу. Время от времени список вопросов может пополняться.


Как найти данные из моих блокнотов, которые были автоматически экспортированы?


Для каждого из них создан отдельный файл в Документах Google. Название этих файлов начинается со слов "Импортировано из Блокнота Google". Исходные названия блокнотов также сохраняются. Все ваше прежнее содержание (в том числе ярлыки, комментарии и URL) представлено в этих документах. Как и все прочие, их можно удалять или изменять, а также открывать к ним доступ другим пользователям.


Если вы ве можете найти эти документы в списке, выполните поиск по запросу "Импортировано из Блокнота Google".


Что произошло с общедоступными блокнотами?


Доступ ко всем общедоступным блокнотам закрыт.


То произошло с закладками, сохраненными на странице bookmarks. google?


Ти данные не будут затронуты. Вы по-прежнему сможете пользоваться своими закладками на bookmarks. google. Однако страница notebook. google/bookmarks станет недоступна.


Я не умею пользоваться Документами Google. Как научиться работе с этой службой?


Команда Документов Google разработала страницу с вводной информацией, которая находится здесь.


То делать, если у меня возникли проблемы с данными?


Для начала убедитесь, что мы не экспортировали ваши данные. Поищите их в Документах Google по запросу "Импортировано из Блокнота Google".


Если проблему с экспортом данных так и не удалось устранить (содержание дублируется или его невозможно найти), оставьте сообщение на форуме обсуждений Документов Google. Мы постараемся вам помочь.


С чем связано решение о переходе?


Нам нравится Блокнот Google, однако иногда приходится принимать непростые решения, чтобы сосредоточиться на разработке продуктов и технологий, которые принесут наибольшую пользу в долгосрочной перспективе. А последние несколько лет Документы Google стали намного мощнее и функциональнее, поэтому мы считаем, что они будут достойной заменой Блокнота Google.


Switzerland Will Never Be Conquered In War.


An ageing millennial, recently red pilled and on a mission to restore common sense and promote traditional values. Fairly well travelled and bilingual with an interest in history and currently living in the UK.


Switzerland is in a unique position in Europe. It is landlocked and borders three potential big players in an all-out war. Besides its neutrality, which would by no means guarantee protection from an invasion (e. g., Netherlands in WW2), there are many practical reasons why this small country can offer shelter and safety from an armed conflict even if the country were to be invaded.


It has a small but highly trained military.


The Swiss army is made up of 21,000 active personnel and another 150,000 in reserve. National service is mandatory for every able-bodied male citizen, making just about every man in the country having a basic level of combat training and the ability to use a firearm. At age 35 you become part of the reserve and the government issued assault rifle is given to you. The idea behind your assault rifle being so readily accessible is for the scenario where in the event of war each civilian becomes a soldier almost immediately, making mobilisation very fast and efficient.


The Stgw 57. Although no longer in production or used by the army this assault rifle is widely owned privately.


An armed population.


Gun ownership is extremely high. Unlike most other countries in Europe, the Swiss government encourages an armed populous and requires active personnel to store their assault rifle at home and, up until 2008, even store live ammunition. Over 600,000 citizens belong to shooting clubs, including children.


The population of Switzerland stands at around 8.2 million, of this 2.7 million are male aged between 15 and 64. With 3.4 million guns this makes for an impressive force for an invading army to face.


However, with globalism and the cancer that it is spreading to all corners of the planet, gun rights are being eroded and limitations are slowly being implemented. In just 20 years, the militia has shrunk from 600,000 to less than 200,000. Every time there is a shooting, the subject resurfaces and there is a knee-jerk reaction of some who want a total gun ban. With guns so deep rooted into Swiss culture, every referendum so far has failed, but small changes have been made. This being said, crime is very low and the high number of guns does not correlate with the number of homicides, as the left loves to claim.


The entire southern border is made up of the Alpine mountain range, with most of the highest peaks concentrated in this region and forming the natural divide between Switzerland and Italy. An invading army would simply not be able to enter through this formidable obstacle with heavily armed defenders on every cliff edge.


Yes, Napoleon marched his Grand armee up and through the St Bernard pass but there was no opposition to hamper his progress.


The Northwestern border is also protected by mountains, much smaller but still a logistical headache for an invader. Along the North and East, you have the Rhine river and lake Constance, so this leaves very few flat entry points. The only realistic routes are in and around Geneva and Basal, but even these are quite narrow and would bottleneck the invaders. Monumental efforts would be needed to either navigate through mountain passes or cross large rivers and lakes.


Disguised bunkers like this are dotted all across the mountains.


Eventually, a well-equipped and determined army would probably breach the border in combination of full frontal attacks in the urban areas mentioned above and amphibious assaults across the Rhine. This would only be the start however as Swiss militia and regulars retreat into their natural defenses, trying to flush them out will be nearly impossible short of dropping nuclear weapons.


This would eventually descend into guerrilla warfare which could last for years. It is unlikely that the occupiers could be pushed out and defeated without some kind of foreign intervention depending on the belligerents involved. For example, Italy and Austria would not stand a chance of even invading in the first place due to the Alps. France and Germany would also have a hard time but would probably be able to invade and hold at least part of the country.


Individual nations invading is very unlikely, though the EU could turn tyrannical and mount an invasion. Russia would be a distant second and I don’t see any other foreign powers capable of reaching Switzerland to invade.


A well-built fallout infrastructure.


There are enough nuclear fallout bunkers to shelter the entire population. Regulations since 1963 made it compulsory for every new building to have such shelters.


If Switzerland is left alone and the war takes place just outside its borders but involves nuclear weapons, the large mountains will offer good protection from such strikes. Large cities are the primary targets of nuclear attacks, so if we look at which cities are the closest to Switzerland, this can help to work out where the safest place would be.


If we assume the worst case scenario and a 50 megaton warhead is dropped, Paris, Berlin, and London are all far enough away to escape the blast and even the thermal radiation. Therefore the safest places are the towns and villages directly behind mountains deep within the Alpine regions away from the borders, mainly the South and Central parts.


Conclusão.


Entering Switzerland now is very easy since it is a part of Schengen and one can literally walk across the border with seldom checks at crossing points that are actually manned. For those who think all-out war is just not going to happen, don’t be surprised when it does, especially with the polarisation we’re currently seeing. At best there will be armed insurrections across Europe, which will be mostly isolated but numerous and could easily escalate. Worst case is of nuclear bombs leveling the entire continent. Either way I predict most survivors will find themselves in Switzerland.


43 respostas.


The Zurich Axioms.


Damn book changed my life.


I googled and about the third result related to forex. How did it change your life? I presume we are talking about finance?


It is more than just finance. It is about how to take and manage risk. Something that should be taught instead of treating it like some disease and plague. Knowing how to take risks means you don’t overextend yourself and come out ahead. This is not just about money but in life in general.


thanks, I will check it out if I can get hold of a copy.


I’d say geography is the main advantage. Mountains are a serious headache for an invasion. Hell, the jihadis in Afghanistan were able to repel the Soviets.


The Confederates thought about a guerrilla campaign in the Appalachians at the end of the war, but dropped the idea. Otherwise, their well-armed and well-trained population didn’t repel the invasion.


Its strange how even in this day and age a simple thing like geography – mountains, rough terrain – is still the thing which defeats advancing military titans.


Aerial drone warfare may change that perhaps, but beyond that it may be a while before you get any of those google developed military robots you see on youtube climbing the alps on their clever little legs.


No they weren’t. The Soviets were slaughtering them wholesale until the CIA provided weaponry to take out armor and aircraft. Alexander also conquered large portions of Afghanistan. The notion that those flintstones are somehow unbeatable is completely false.


Itz coming because lefty rat subhuman commie globalist ballwasher pieces of shit can’t coexist with humans.


Any given country allowing its citizens to possess firearms like Switzerland does becomes a nut harder to crack for any invading army.


Never conquered, but easily bullied by the Nazis.


Butthurt German cuck spotted.


It helps that the NAZI’s bank and the Bank of the Central Banks is located there – the BIC.


Switzerland is best described as a golden cage!


I like these kind of informative articles, and it actually got me thinking that, in war if bad came to worse, wouldn’t Switzerland be simply raid-bombed or nuked today?


if it would be a war against americans, sure.


The Swiss got rekt by the French once. The French!


the french! built your nation of idiots.


I like Switzerland a lot. I’ve been quite a few times for skiing trips and their national policies are very logical. That said, if the US enforced a lax R. O.E., they could invade and massacre every single Swiss citizen in a matter of hours. Guerrilla warfare is largely predicated on the invading force being concerned about influencing the local populace and minimizing casualties. Which is why it is much more effective during occupation - where you’ll notice the US military has struggled in recent conflicts. Don’t conflate that with warfare waged during invasion - where the US military is peerless in any historical context.


Well if you killed every Swiss what would you have left, some mountains and a few milka-cows? then why bother invading in the 1st place?


Ski resorts and scenery would still be pretty great. Like I said, I wouldn’t want to kill the Swiss. They are one of the few remaining vestiges of logic in the modern world.


I just watched an interesting video on this exact subject:


Definitely some good points made in this article. As for the certainty of some of these claims we would need to see Switzerland put to the test to get the factual results. Switzerland is badass though, not a fatty or an ugly woman in sight for the most part. Its excellent.


The single best way for any nation to get conquered.


is to embrace liberalism. Just ask Ancient Rome.


I’ve recently been switzerland. Load of complete nonsense, Switzerland can be taken over in a day and is full of third world immigrants i. e arabs/africans mixed with mega rich bankers. least sense of pride out of any country i’ve ever been to in my life (and i’m a londoner) (didn’t see single swiss flag outside the airport in geneva). Switzerland is as bad as France but with soulless globalist megarich banks and £7 / $11 for a small shitty Mcdonalds meal.


The countries actually showing balls and fighting against Islamofascism, PC, etc are Hungary, Poland, Czech etc.


You clearly never left Geneva.


The USA could have it made just as well. With an ocean on each coast, a weak friendly neighbor to the north, and a poor weak neighbor to the south, who could invade the USA?


But rather than focus on peace, the politicians and bankers in America stir up strife around the globe. Not to mention, too many ass clowns run things in America.


My opinion is screw Europe and Asia. We have to stand on our own. They can do the same.


This is true, something like 20 percent of the pop are immigrants, granted many germans, italians, etc.


There was a phipina chick i’d let flash me i met online–her ‘citizenship’–yup, Swiss. Meanwhile I live in a provincial hole in the U. S. with none of the free services or rights the pinoy has…


If you like to live in an army that became a country, where democracy is fare more important that freedom itself, it might be for you.


I know Switzerland well, it’s a beautiful country, but it’s not for everybody. It has its own issues, and you’d beter FIT to the lifestyle of your neighboors. Or else…


Yes I agree completely, Swiss people can be a pain in the ass.


How about these?


and of course for logictics:


and some of these too:


Frankly, I think switzerland is easy prey. This is not 1942.


By that logic, the Feds should have easily won Vietnam.


So why did Adolf call off his invasion of Switzerland?


He had a superior military force.


He knew that he could roll in the troops and the tanks…but he also realized that men from all the surrounding towns would start picking off his soldiers with their marksmanship and their love of their land.


The purpose of warmongering empires like the Feds and “defense” contractors cronies is to control the resources of the places they conquer.


The conquerors must win the hearts of a significant amount of the people for a true victory.


That is why there were many Scot soldiers in the British Empire and many Southern soldiers in today’s military.


That is also why Vietnam was lost and why Switzerland was not conquered.


As far as Vietnam, Geneva Conventions and the trojan horse that are the liberals within who opposed it.


Technologically, it should definitely have been a breeze to conquer it.


That is the Pentagon/Rush Limbaugh spin that so many parrot…


“We could have won Vietnam but the Liberals, Hippies, UN, Geneva Convention, Draft Dodgers, Watergate, etc. stopped us!”


If Vietnam was so easy to conquer, it should have been conquered by about 1962.


Hmmm…govt forces people at gunpoint to join a military (the draft) and send them to rough, unfamiliar land to kill people who are no threat to them…what could possibly go wrong?


Technologically, it should definitely have been a breeze for the mighty British Empire (and its Hessian mercenaries) to conquer its rebellious 13 colonies…but they didn’t, did they?


(Only about 20% of the colonists even opposed Great Britain)


Never underestimate the willingness of a people to fight for their lands.


idk why there’s no reply button after a certain depth so I have to answer here instead…


The colonies could also be conquered easily but weren’t for the same reasons, that whites are way too compassionate.


All other cultures in history before conquered, killed all men, raped or stole all women, looted everything and moved on. Not whites.


Also, I don’t see you offer a different explanation. Are you a cultural relativist? An aboriginal who loves his land could fight a modern Airforce?


@Big D…uh, not only did we hold back on the North for many years because of our “police doctrine”, but we wholesale slaughtered the North Vietnamese and the VC whenever they attacked. We brought them to the table and actually got a cease fire (the Paris Peace accords). The north won against the US because we had a bunch of faggot hippies and other degenerates in this country. Not only that but the North had PLENTY of help from the soviets and the Chinese. When Nixon finally unleashed american forces, started bombing the hell out of their bases in Cambodia, their cities in the north, and started more offensive operations….lol…the North got their ASSESS handed to them. The only thing that kept them going was the pussyshit politics in America. Most of Nixon’s presidency was just trying to hide operation from the population, while also constantly dealing with hippie bullshit.


American forces fought in Vietnam to make arms makers and bankers rich. Also, to divert attention away from civil rights marches and riots in the streets. The fabric of America was coming apart at the seams. But, hey look, it’s the Beatles. Now off to Vietnam!


No need to “conquer ” something that’s owned….it’s where the money is.


Foolish article. The reason Switzerland has never been conquered, and does not need to be conquered, is that the area is small and without great strategic value (unless you want to have a pretty mountain chalet). Hitler had a solid plan for occupying Switzerland and could have made it happen but by 1940, the strategic value of Switzerland was declared moot. What is the point of this article?


Did you read the article properly? Hitler also had a plan to invade Great Britain…


Switzerland will never be touched because the elites will not allow it. Most of the world’s poweful, wealthy hold their fortunes in Swiss banks. While everyone is busy killing each other, the (((puppeteers))) pile up the gold in the vaults.


No guys, nothing is happening without the zionist jews. It was always the heaven for the criminal money of all criminal people even thought they have amazing products. The zinoists prepare the 3rd world war. They have everywhere cultural marxism and leftist politic there too. The military is near 40% imigrants and a especially muslim albans and turks, so you can see how loyal they will be to the swiss country, they will need help from the outside especially the people are there to comforted and dekadent in the past decades. Not one country in the west is prepared for a collaps, economicly and military. People today are only defending selfish interests like the pension etc. It needs a really hard crash in every aspect of life.


And they have one of the lowest tolerable EMF levels…the central bankers don’t like brain cancer apparently.


Really good article, which elaborates on some of the aspects that I only slightly shed light upon in my article on Switzerland.


Top 5 Most Popular Posts.


ROK Donation Drive.


If you’re getting value from ROK, consider making a donation through the Roosh Booster Club to help us publish better articles and compensate our writers. Your donation is crucial in the face of Silicon Valley’s cockblocking campaign against us. Click here to learn full details .


chek4you.


Apenas outro site WordPress.


Daily Archives: March 10, 2011.


Software Hacking.


Bagi kalian yang doyan dengan software yang ada bau-bau ngehack, ni sya cantumkan ditambah dengan sedikit tutorial. Bila ngerasa lom puas, tanya aja mbah google langsung yah,….


& # 8211; Kumpulan Anti Virus lokal.


ANSAV ANTIVIRUS Engine Version 1.9.3 + Plugins RegistryFX. zip & SOR. zip.


X-Code Terminator 2.1.


PCMAV 1.9 Build 2 (PCMAV + Update)


& # 8211; Kumpulan Artikel dan tutor.


Tutorial PHP Shell Lengkap.


& # 8211; tutor lengkap pasang backdoor. txt 14,350.


& # 8211; tutor nembak ip. zip 4,973.


& # 8211; unicode tutor. zip 3,549.


Kecoak Toket Ezine.


Booklet Internet Sehat.


Belajar Bisnis di Internet.


& # 8211; Tutorial Streamster Marketiva.


& # 8211; Kamus Pasar Modal.


& # 8211; Cara Daftar Google Adsense.


& # 8211; Daftar Istilang Eng vs Indo.


& # 8211; Data Ekonomi & Pengaruhnya Terhadap US Dollar.


& # 8211; Nama Negara & Mata Uangnya.


& # 8211; Berbagai Macam Peluang Bisnis Di Internet.


& # 8211; Cara Download Video Di YouTube.


& # 8211; Tips Sukses Berbisnis dan Bekerja di Internet.


& # 8211; Devinisi dan Tutorial Paypal.


& # 8211; Kamus AdSense Dan Perihal Banned.


& # 8211; Langkah Gampang Pasang AdSense Pada BlogSpot.


& # 8211; GNU/Linux bukan sekedar suatu sistem operasi alternatif.


& # 8211; Administrasi Sistem Linux.


& # 8211; Hal yang Sering Ditanyakan (FAQ) (Seputar Linux)


& # 8211; Tuntunan Praktis Pemprograman Perl.


& # 8211; SQL DENGAN POSTGRES.


& # 8211; Membuat grafik penggunaan Web server secara on-line.


& # 8211; ADMINISTRASI JARINGAN LINUX.


& # 8211; Membuat Router Dengan Linux SUSE 9.3.


& # 8211; Membangun Router dengan Mikrotik Router OS.


& # 8211; Memilih aplikasi perkantoran (Office Application)


& # 8211; GNUPLOT UNTUK ORANG LUGU.


& # 8211; membuat dokumen online.


& # 8211; Pengenalan TEX dan LATEX.


& # 8211; Panduan pengembang Public License di Indonesia.


& # 8211; Undang-undang Hak Cipta.


& # 8211; 37 Howto Linux versi bahasa Indonesia.


& # 8211; Panduan Windows Xp – 2 Buku.


& # 8211; Menginstal XAMPP, untuk aplikasi Web Server, Database.


& # 8211; Panduan Bahasa C.


& # 8211; Chroot login di Linux dengan menggunakan sshd.


& # 8211; Chroot login di Linux dengan menggunakan sudo.


& # 8211; Instalasi Monitoring Jaringan Dengan SMSterm.


& # 8211; Instalasi Qmail, Vmailmgr, Omail Admin, Courier Imap, dan Squirrelmail.


& # 8211; Instalasi Qmail, Vpopmail, Qmailadmin, Courier Imap, dan Squirrelmail.


& # 8211; Instalasi Squid, Banner Filter, Porn Filter, Limit Bandwith, Transparan Proxy.


& # 8211; Instalasi Apache 2.0.47 (DSO+suexec)+PHP 4.3.2.


& # 8211; Kompilasi kernel 2.4.x di Linux.


& # 8211; Konsep DNS dan tutorial instalasi BIND.


& # 8211; Menggunakan SMTP Auth (qmail-smtpd-auth) di vpopmail dan vmailmgr.


& # 8211; Membuat CD album dari file MP3 dengan menggunakan cdrdao.


& # 8211; Tutorial instalasi Qmail, Courier Imap, dan Squirrelmail.


& # 8211; Virtual domain di postfix dengan tpop3d, courier-imap dan squirrelmail.


& # 8211; Membuat metalic texture.


Cara menjebol proteksi WEP.


Cyber Samarinda Article.


Echo Ezine (1-19) 08/08/08 updated.


Exploit Book (Exploit-exploit)


E-book Password Series.


Spyrozone + Update (ratusan artikel)


xpl. web. id exploit (Kumpulan exploit utk hacking)


exploit utk ngeroot (for 2.0.34 – 2.7.x)


ICT Watch Article.


Indonesian Linux Article.


& # 8211; Bab11.Seni Internet_2.rar 767,950.


& # 8211; Seni Teknik Hacking – Demo. rar 1,013,670.


& # 8211; jasakom_tutor 3.zip 292,295.


Jelaga IT Information.


Update Jasakom tutor terbaru 27 Januari 2007 update.


Kecoak Elektronik Article.


Kumpul Bocah Tutor (Disertai R57, C99. etc)


Kumpulan perintah DALnet.


Linux Shell Scripting Tutorial.


Load BOT Netgate (Tutor + BOT)


M tak Project E-book.


& # 8211; Migrasi ASP ke ASP 1.0.


& # 8211; Migrasi COMActiveX ke Komponen 1.0.


& # 8211; Migrasi Java ke C# 1.0.


& # 8211; Migrasi PHP ke ASP 1.0.


& # 8211; Migrasi VB6 ke VB 1.0.


& # 8211; Pemrograman Dasar Socket Dengan C# 1.0.


& # 8211; Pemrograman Email Dengan C# 1.0.


& # 8211; Pemrograman Game Tetris Dengan C# 1.0.


& # 8211; Pemrograman XML Web Service Dengan VB 1.1.


& # 8211; Pengenalan Bahasa C# 1.0.


Panduan membuat virus.


Panduan Membuat Antena Kaleng.


Panduan proteksi CD (Agar CD tidak bisa dicopy)


Phrack E-Magazine [1 – 56]


Phrack E-magazine [57 – 65] – terbaru.


Secret Colony Tutor.


Secure Coding – E-book.


Sejarah Internet Indonesia.


Tips Menghadapi Brontok C.


Tutorial cara Install OpenBSD.


Tutorial bikin USB Extender.


Tutor hack Friendster (1 – 3) Updated.


Wireless Security – hacking wifi.


YogyaCarding old Article.


Review Brontok bahasa Indonesia.


& # 8211; analisa dan pengolahan data dengan excel.


& # 8211; belajar dasar pemograman.


& # 8211; dasar pemograman visual basic.


& # 8211; pemanfaatan datagrid dan truedbgrid pada vb.


& # 8211; pemakaian datareport pada VB.


& # 8211; pemanfaatan asp untuk web programming.


& # 8211; pemanfaatan crystal report pada vb6.


& # 8211; pemanfaatan database server open source.


& # 8211; pemanfaatan sql server dengan vb6.


& # 8211; pemograman database dengan ADO pada VB.


& # 8211; pemograman database dengan DAO pada VB.


& # 8211; pengantar algoritma dan pemograman komputer.


& # 8211; pengenalan email dengan telkomnet-mail.


& # 8211; bahasa pemograman vb.


& # 8211; pemograman form pada vb.


& # 8211; pemograman gdi+ pada vb.


& # 8211; pemograman berorientasi objek pada vb.


Cara Membuat Distro Linux Floppy Sendiri.


Teknik Pembuatan Virus Komputer.


Ubuntu WEP Hack.


Tutor hack winxp sp2 – bhs indo.


& # 8211; Organisasi Komputer : sebuah pengantar.


& # 8211; Pengantar Jaringan Syaraf Tiruan.


& # 8211; Capability Maturity Model Sebagai Mekanisme Kualifikasi Sebuah Software Development House.


& # 8211; Struktur Data dengan Bahasa C.


& # 8211; Pengenalan Sistem Biometrik.


& # 8211; Aplikasi Akuntansi Menggunakan Microsoft Excel.


& # 8211; Pengenalan Dasar-dasar PHP.


& # 8211; Kumpulan Program PASCAL.


& # 8211; Keamanan Jaringan Wireless.


& # 8211; Bagaimana Bluetooth Bekerja.


& # 8211; Koneksi ke Jaringan Wireless dari PC.


& # 8211; Jaringan Komputer Gigabit Ethernet.


& # 8211; Teknologi Bluetooth Wireless.


& # 8211; Kumpulan Port Number.


& # 8211; Teknologi dan Privacy Data Web User.


& # 8211; Instalasi Apache, MySQL, SSL, PHP pada Sistem Operasi FreeBSD.


& # 8211; Weblog : Mengembangkan Situs Pribadi Murah Meriah.


& # 8211; The Blaster Worm : Then And Now.


& # 8211; Modul Penggunaan Partition Magic 8.0 dan Virtual PC 2004.


& # 8211; Menggunakan Ad-Aware untuk Melindungi Komputer Anda dari Ancaman Spyware.


& # 8211; Menyembunyikan File Rahasia di Dalam Gambar.


& # 8211; Mengembangkan Aplikasi GIS Berbasis Web Untuk Informasi Gempa Bumi.


& # 8211; Membangun Jaringan Komputer Menggunakan Komunikasi Powerline (PLC)


& # 8211; End User Development.


& # 8211; Nilai Informasi Bagi Pengambil Keputusan.


& # 8211; Exploitasi Buffer Overflow (Studi Kasus : pada Linux RedHat 6 Kernel 2.2.5.15)


& # 8211; Pengenalan Sistem Operasi.


& # 8211; Server Virtual pada Sistem Operasi FreeBSD dengan Samba.


& # 8211; Sistem Operasi Symbian.


& # 8211; Sistem Operasi Windows 2000 dan Security.


& # 8211; Panduan Windows XP.


& # 8211; Sistem Manajemen Basis Data.


& # 8211; Siklus Hidup Perancangan Basis Data.


& # 8211; Mengakses Database MS. SQL Server 2000 Menggunakan ADO di MS. Visual FoxPro 9.0.


& # 8211; Mengenal SQL Dasar.


& # 8211; Pemrograman Basis Data : Koneksi database menggunakan VB dengan ActiveX Data Object.


& # 8211; Pemrograman Basis data : Koneksi database menggunakan VB dengan ADODB Connection.


& # 8211; Pemrograman Basis data : Membuat Form Penanganan Transaksi (Multi Table)


& # 8211; MYSQL Bekerja dengan Tanggal dan Waktu.


& # 8211; MYSQL, Membuat Ringkasan.


& # 8211; MYSQL Mengurutkan Hasil Query.


& # 8211; Keamanan Pada Perancangan Basisdata.


Auto Complete, Kemudahan atau Kerawanan.


Review Search Engine Google bahasa Indonesia.


& # 8211; Kumpulan Exploit for hacking.


MT Exploit Pack (Kumpulan exploit MT)


Exploit Injection etc.


kumpulan tools exploit for web scan.


Windows Exploit 2006.


& # 8211; Windows Exploit for C.


& # 8211; Windows Exploit for Perl.


& # 8211; Windows Exploit for Web.


Exploit for Joomla.


Exploit for Mozilla Firefox.


Exploit for phpBB.


Exploit for WordPress.


Exploit for Mambo.


Exploit for Opera.


Exploit for vBulletin.


Script All Hype MD5 Encryption Tool.


Microsoft DNS Server Remote Code execution Exploit and analysis.


Milw0rm Archieve (paket exploit terbanyak – Update November 2008 – 7000 lebih Exploit)


Script untuk mail bomb.


Halflife Exploit pack.


Scanner bug baru – Perl.


Exploits, scripts, tools untuk web hacking.


& # 8211; c99.txt 167,398 (100% tested)


& # 8211; hack. txt 2,385 (100% tested)


& # 8211; r57.txt 89,673 (100% tested)


& # 8211; DarkC0de – Pyhton Exploit, Perl Exploit Etc.


Perl (Ratusan source code perl terdiri scan, exploit, bruteforce, etc )


Pyhton (70 source code pyhton lebih dari Friendster bruteforce, wordpress bruteforce, gmail bruteforce, ssh bruteforce, cpanel bruteforce, etc.


txt (tutorial-tutorial serta source c untuk hacking)


wordlist (Kumpulan files kamus untuk dictionary attack / bruteforce attack)


Other (Puluhan paket untuk hacking seperti ASP bypass, hacker webkit, sqlmap, keylogger, etc)


& # 8211; Simple DNS Plus 5.04.1 remote Denial of Service exploit.


& # 8211; Kumpulan Hacking Tools.


007 Password Recovery (Utk hack dial up windows)


Advanced LAN Scanner.


Advanced Port Scanner.


A Mac Address change.


AWRC dengan KUDETA.


Anoymizer TotalNet Shield.


Advanced Rar Password Recovery v1.11.


Anonymous Mail Bomber.


XRemote 2.0 (Trojan Windows terbaru dengan fitur pasang keylogger di target)


BSS – Bluetooth Stash Smasher.


Buka Fitur Windows.


CommView for WIFI.


Cain & Abel v4.9.24 (untuk mendapatkan berbagai password dijaringan dengan sniff)


Daftar Password Default AP.


Denial of Service for IIS.


Digital Blaster v1.2 – Internet & amp; Network Flooder + Source code program (update versi baru)


EtherDetect (Utk sniffing)


ELSAVE (penghapus log)


Golden eye 2005 (keylogger)


Hack Billing Explorer.


Hack Forum phpBB.


IE PassView v1.10.


Igmpnuke (untuk nuke win 95)


IRC Script for Attack old mIRC version.


JPS VirusMaker 3.0.


John the Ripper.


Kismet 2007 & airpcap for windows.


Trojan R3C for WinXP + Source.


Trojan R3C for Win9x + Source.


Mac Addreas Changer v4.5.


memhack (utk hack games)


Metasploit Framework 3.2 (Baru – Nov 2008)


Hack Pass WinBoost.


NMAP 4.53 (terbaru)


OGC Speedhack v1.0 for Windows 2000 or xp.


Passware Kit Enterprise Edition 8.


PayPal Database Hacker.


PHP Injection – Mass Scanner.


Reset XP Administrator Password.


Remote IceLan 1.9.9.


Rampok 2.0 (Tool sedot isi USB)


Protected Storage PassView v1.63.


SMBDIE (utk denial of service win xp rc 1)


SoftIce 4.05 - Win 2000-XP.


SQL Injection Scan v1.2.


Script utk jebakan denial of service di web.


Super Bluetooth Hack v1.07.


USB Dumper (utk sedot isi flashdisk)


Void Eye (IIS scanner)


Vadim (tool yg byk ditakuti ISP & warnet..)


Visual Basic VIrus Maker32 RC 03 (Utk membuat virus scr instant) + tutor.


TeraBIT Virus Maker v2.8.


W32Romdil (Rahasia W32/Romdil)


Windows NT2k/XP/Vista Change Password / Registry Editor / Boot CD (ISO Linux)


Aircrack-ng v1.0 for Windows.


hack billing explorer (008)


TLOGSPY By Tomero (18/04/2007)


Apache Hacker Tool v 2.0.


Apache Chunked Scanner.


iis5dav-scan-exploit-2006-2 Shared By Hacking-Truths.


PHPAttacker Shared By Hacking-Truths.


casi4.0_Shared_By__Hacking-Truths Security Forum.


SQL-XSS TooL Shared BY Hacking-Truths.


XML-RPC Scanner & Exploiter Shared By Hacking-Truths.


Windows 2000 SP 4 Hack Tool + tutor.


Google Hacks Tool.


Web Vulnerability Scanner 5.


Yersinia (DHCP Flooder)


Etherflood (Flood for switch)


Cisco PIX Firewall Password Calculator.


creddump – Credential Manager Password Dumper for Windows XP/2003.


Mozilla Password Recovery.


Passcape Internet Explorer Password Recovery.


TcpDump for DOS.


TcpDump for Linux.


& # 8211; Kumpulan Hacking Tools 2.


BIOS Password Remover.


CGI Vulnerability Scan.


Crack FTP Password.


Dr. VBS Virus Maker.


FTP Brute Forcer.


Fuck Mail Bomber.


Google Hacker 1.2 (Kumpulan Dork)


Hackers Assistant (Membuat hacking jaringan lebih terbantu)


Hotmail Hacker Gold.


Hotmail Scam Page.


Legion NetBios Scanner.


MSN Messenger Account Cracker.


NetBios Name Scanner.


NoLimit Cracker 2.0.


Panther2 – simple Denial of service UDP based attack.


Php Nuke Hacker v11.0.


phpBB E-mail Harvester.


phpBB Exploit Pack.


phpBB Pass Extractor.


Port Listener XP.


Source Code Hacker Tools.


Sprut – Multisystem TCP Denial of Service Attacker.


Stealth HTTP Security Scanner.


THunder – Pemburu macam-macam trojan.


Yahoo Mail Bomb 2.0.


Yahoo Ultra Cracker.


& # 8211; Kumpulan Source Code.


Source code ANSAV.


visual basic worm generator.


Source Code Program Demo Speak.


Source Code WinDump.


Dav Delphi Worm_Generator.


Delphi Bouncer v0.1.


Kumpulan Script Pascal (Source code dibagi 13 bab)


Kumpulan souce code virus.


Source untuk ip jebak penyusup.


Source code AntiVirus MultiKiller3.


Kumpulan Source Code PHP.


Source code SMS gratis dengan IM3.


Source code keylogger.


Source Code dari VBBEGO.


& # 8211; daftaruser. ZIP (Source code tool utk tampilin user computer)


& # 8211; sambadie. ZIP (Source code ddos tool for win xp)


& # 8211; sms. zip (Source code SMS Polling)


& # 8211; telnetserver. ZIP (Source code telnet server)


& # 8211; sharefolder. ZIP (Source code tool utk membuat share folder)


& # 8211; sqlserver2000.ZIP (Source Code SQL Server Exploit)


& # 8211; ymbomber. ZIP (Source utk bikin tool ym bomber)


Source code cacing & anti cacing.


Source Code Game Rosetta.


Source Code Program SPRITE EDITOR Version 2.00.


Source Code aplikasi angsuran barang.


Kumpulan source code baru :


& # 8211; automatic shutdown (source code)


& # 8211; billing local (source code)


& # 8211; brontok[1].c remover ii (source code)


& # 8211; class finder & generator (source code)


& # 8211; crack me -1 (source code)


& # 8211; koneksi database (script advance) (source code)


& # 8211; lockunlock window (source code)


& # 8211; membuat tts digital (source code)


& # 8211; messenger exploit-overflow tanpa winsock (source code)


& # 8211; morse translator (source code)


& # 8211; ramalan jawa (berdasarkan primbon) (source code)


& # 8211; remote procedure call exploit (source code)


& # 8211; remover for virus kspoold (source code)


& # 8211; run with new desktop (source code)


& # 8211; virus 4k51k4 (source code)


& # 8211; virus start kiddies (source code)


& # 8211; window locker (source code)


& # 8211; wktvbdebugger (source code)


& # 8211; zip repair (utk perbaiki file zip) Source Code BASIC.


Source Code VB pilihan.


Source Code VB virus pilihan.


Source Code VB for Security.


Source Code virus VB (update)


& # 8211; Melisa Source Code.


VB Source pilihan.


& # 8211; 3XTR3M3 4NT! V!RU$ Source Code.


& # 8211; CODE WARRIOR (sebuah DLL dengan fungsi tentu saja untuk menjaga serial number)


& # 8211; PQWAK3 (Pass : vbbego)


& # 8211; INF20060723130605.RAR (Patch Task Manager)


& # 8211; INF20060821133508.RAR (SMS Encoder & Decoder)


& # 8211; software20060618132535.RAR (Sorted file or directory)


& # 8211; software20060618133854.RAR (Zip Repair)


& # 8211; VB6Decompiler. ZIP (VB 6 Decompiler Source Code)


& # 8211; Anti W32.Rontok. ZIP (SOurce Code Anti W32.Rontok)


& # 8211; database nfsu. rar (Source Code Login Need For Speed UnderGround II)


& # 8211; hajarbro. rar (Source Code Remover Brontok by Anti Hacker)


& # 8211; INF20060730010913.RAR (Membuat Form Transparant dst)


& # 8211; p3kdiary. ZIP (Source Code P3K Document Word Virus Diary. exe)


& # 8211; software20060618132914.RAR (Vbbego ClassFinder)


& # 8211; software20060714042045.RAR (SQL Crack)


& # 8211; vbrdemo. zip (VB RezQ – Source Recovery for Visual Basic)


Source dari Ninja-Ceria.


& # 8211; grosir. zip (Source code MADINA GROSIR SYSTEM)


& # 8211; penterjemah. zip (Source code program penterjemah)


& # 8211; kamus_t. zip (Source code program kamus)


Source code VB Lainnya.


Source Code Virus Cintaku. A.


Source Code OS Sederhana.


Source Code Wedash AntiVirus 2005.


Source Code IndoProgSMS.


Source Code Tool Denial of Service.


Source code web SMS Mentari.


Source Code Shadow Thief.


& # 8211; Kumpulan tools untuk security.


HTTP Spy 4.0.


Nikto 2.02 (versi terbaru – Untuk memeriksa keamanan website)


Security Task Manager 1.6.


TLOGSPY By Tomero.


radmin_2.2 (Untuk remote PC)


Windows Vulnerability Scanner.


& # 8211; Kumpulan Video komputer dan hacking.


Video Hacking Friendster 1.


Video Hacking Friendster 2.


Video dari PusHm0v.


Video Hack Billing Explorer.


Video Hacking Pilihan.


& # 8211; JOHN THE RIPPER 1.7 PASSWORD CRACKER INSTALLATION INSTRUCTION VIDEO. ZIP 2,597,592.


& # 8211; Default Password Modem Router ADSL. rar.


& # 8211; Video Cara jadi admin di PHP Nuke.


& # 8211; Video ngeroot – Allnone.


& # 8211; Video SQL Injection – Paman.


& # 8211; Video Komputer dan Hacking 2.


Video Hacking Windows 2003.


Video hack blog.


Video Clickjacking Joomla.


Video Hacking Web.


Video Cracking MD5 Password Hashes.


Video Cracking Syskey and the SAM on Windows.


Video Cracking Windows Password with BackTrack.


Video Mac Bridging with Windows XP & Sniffing.


Video Make your own VMs with hard drive for free VMware Player and VMX Builder.


Video Metasploit Framework.


Video Remote Password auditing THC-Hydra.


Video Recovering Deleted Files.


Video Root Kits.


Video Sniffing Voip Using Cain.


Video Using Cain and the AirPcap USB adapter to crack WPA or WPA2.


Video War Driving Tools.


Video Filtering di e-mail Yahoo by Adi [First Edition]


Video Filtering di e-mail Yahoo by Adi [New Edition]


Video MacChanger by Adi.


Video Install Ubuntu by Adi.


Video Elinks by Adi.


Video Hacking password GMAIL dengan bruteforce.


Video Linux Rooting.


Video Get Connect Back via NC in Linux.


Video Video NC – How to bind port in linux – part2.


Video Vulnerability file upload.


Video WMF File Code Execution Vulnerability (Remote win xp sp2)


Video Hacking Windows XP SP2 by Adi (remote win xp sp2)


& # 8211; Kumpulan Web Protection Tools.


Source Code JavaScript for Security.


& # 8211; Kumpulan tools untuk security.


DecaffeinatID – A Very Simple IDS – Log Watching App – ARPWatch For Windows.


HTTP Spy 4.0.


Nikto 2.02 (versi terbaru – Untuk memeriksa keamanan website)


Security Task Manager 1.6.


TLOGSPY By Tomero.


radmin_2.2 (Untuk remote PC)


Windows Vulnerability Scanner.


& # 8211; Kumpulan Virus lokal dan perusak Windows.


& # 8211; Programming language plus tools.


BAT_2_COM (file. bat menjadi )


Power Basic 6.0 Beta.


VbReFormer 2007 (VB Decompiler)


& # 8211; Patch for Windows XP SP2 & SP3.


X-Code Logo (updated 08.2008)


& # 8211; xcode_magazine_10.zip (Ada bonus)


X-Code Video Fun.


X-Code Wallpaper (Updated 01.2008)


Winamp XCode Skin (+Leopard)


Special Yogyafree Stuff.


BeeTrap. zip (Simple Honeypot)


UC. zip (Underground Chat Yogyafree)


xcode. xpi for mozilla firefox.


theme xcode for Symbian 60.


Yahoo Scam Page.


Yahoo Administrator Booter.


Tracks Eraser 4.10.


Tar for Windows.


psyBNC for Windows.


Oripa Yahoo Recorder.


Kumpulan YM Tools.


Kode Area utk HP.


Advanced Email Extractor.


Imaginary Telnet Server.


Kumpulan ratusan foto-foto demo dan seminar Yogyafree, foto-foto gathering Yogyafree, dsb (updated 12 Agustus 2008)


THE ONE PAGE LINUX MANUAL. PDF.


LINUX Admin Quick Reference.


windows 2000 sp4 remote (Exploit)


bugs CSRF di Friendster. rar.


Mengenali Virus Lewat Checksum Error dengan metode CRC32.rar.


Mengenal RC4 STREAM CIPHER. rar.


bermain dengan registry. doc.


Cara Sederhana membuat virus PHP. doc.


Cerita hack billing. pdf 263,911.


Demystifying Google Hacks. zip 62,715.


Evil Ping v0.3b. zip 104,532.


Update Jasakom tutor – Juli – September 2007.


Konsep Virus VB. RAR 9,569.


Perintah-perintah UNIXes Dasar. mht.


Mengenai Ngembom E-Mai Lewat E-Maill. zip 442,120.


Menjebol Password Network Neigborhoud. zip 267,250.


onno. rar (Konfigurasi N E61 dst)


seminar ubuntu yogyafree.


NEMESIS – TCP/IP Packet Injection.


rohitab_com – Forums my delphi virus. htm 24,536.


Panduan Step By Step Hacking WEP dgn Linux Backtrack. pdf.


Demo Network Security. pdf.


Presentation Wireless Network. pdf.


System and Network Hacking. pdf.


EliteHackers_info – Default Password List. htm.


Jogjalover_v7_tanpa_mIRC. rar (Copy file mirc. exe anda ke Jogjalover)


yahoopasscrack. exe (Hack password Yahoo dengan dictionary pass Attack)


virus_hp. rar (Kumpulan beberapa virus HP)


thumbscrew. zip (Membuat USB Flashdisk Read Only)


ICMP Tunnel – itun-04-10-2005.tar. gz.


Tutor reset Deepfreeze 5 dan 6.


04012007-Animated_Cursor_Exploit (Windows Vista Exploit)


T-Sight tutorial (Telnet Hacking)


Indolover Extreme + pass.


PsExec – execute processes remotely.


& # 8211; PsFile – shows files opened remotely.


& # 8211; PsGetSid – display the SID of a computer or a user.


& # 8211; PsInfo – list information about a system.


& # 8211; PsKill – kill processes by name or process ID.


& # 8211; PsList – list detailed information about processes.


& # 8211; PsLoggedOn – see who’s logged on locally and via resource sharing.


& # 8211; PsLogList – dump event log records.


& # 8211; PsPasswd – changes account passwords.


& # 8211; PsService – view and control services.


& # 8211; PsShutdown – shuts down and optionally reboots a computer.


& # 8211; PsSuspend – suspend and resume processes.


artikel bonus (puluhan)


Kumpulan Anti Virus lokal.


ANSAV ANTIVIRUS Engine Version 1.9.3 + Plugins RegistryFX. zip & SOR. zip.


X-Code Terminator 2.1.


PCMAV 1.5 Build 4 (PCMAV + Update)


& # 8211; Kumpulan Artikel dan tutor.


Tutorial PHP Shell Lengkap.


& # 8211; tutor lengkap pasang backdoor. txt 14,350.


& # 8211; tutor nembak ip. zip 4,973.


& # 8211; unicode tutor. zip 3,549.


Kecoak Toket Ezine.


Booklet Internet Sehat.


Belajar Bisnis di Internet.


& # 8211; Tutorial Streamster Marketiva.


& # 8211; Kamus Pasar Modal.


& # 8211; Cara Daftar Google Adsense.


& # 8211; Daftar Istilang Eng vs Indo.


& # 8211; Data Ekonomi & Pengaruhnya Terhadap US Dollar.


& # 8211; Nama Negara & Mata Uangnya.


& # 8211; Berbagai Macam Peluang Bisnis Di Internet.


& # 8211; Cara Download Video Di YouTube.


& # 8211; Tips Sukses Berbisnis dan Bekerja di Internet.


& # 8211; Devinisi dan Tutorial Paypal.


& # 8211; Kamus AdSense Dan Perihal Banned.


& # 8211; Langkah Gampang Pasang AdSense Pada BlogSpot.


& # 8211; GNU/Linux bukan sekedar suatu sistem operasi alternatif.


& # 8211; Administrasi Sistem Linux.


& # 8211; Hal yang Sering Ditanyakan (FAQ) (Seputar Linux)


& # 8211; Tuntunan Praktis Pemprograman Perl.


& # 8211; SQL DENGAN POSTGRES.


& # 8211; Membuat grafik penggunaan Web server secara on-line.


& # 8211; ADMINISTRASI JARINGAN LINUX.


& # 8211; Membuat Router Dengan Linux SUSE 9.3.


& # 8211; Membangun Router dengan Mikrotik Router OS.


& # 8211; Memilih aplikasi perkantoran (Office Application)


& # 8211; GNUPLOT UNTUK ORANG LUGU.


& # 8211; membuat dokumen online.


& # 8211; Pengenalan TEX dan LATEX.


& # 8211; Panduan pengembang Public License di Indonesia.


& # 8211; Undang-undang Hak Cipta.


& # 8211; 37 Howto Linux versi bahasa Indonesia.


& # 8211; Panduan Windows Xp – 2 Buku.


& # 8211; Menginstal XAMPP, untuk aplikasi Web Server, Database.


& # 8211; Panduan Bahasa C.


& # 8211; Chroot login di Linux dengan menggunakan sshd.


& # 8211; Chroot login di Linux dengan menggunakan sudo.


& # 8211; Instalasi Monitoring Jaringan Dengan SMSterm.


& # 8211; Instalasi Qmail, Vmailmgr, Omail Admin, Courier Imap, dan Squirrelmail.


& # 8211; Instalasi Qmail, Vpopmail, Qmailadmin, Courier Imap, dan Squirrelmail.


& # 8211; Instalasi Squid, Banner Filter, Porn Filter, Limit Bandwith, Transparan Proxy.


& # 8211; Instalasi Apache 2.0.47 (DSO+suexec)+PHP 4.3.2.


& # 8211; Kompilasi kernel 2.4.x di Linux.


& # 8211; Konsep DNS dan tutorial instalasi BIND.


& # 8211; Menggunakan SMTP Auth (qmail-smtpd-auth) di vpopmail dan vmailmgr.


& # 8211; Membuat CD album dari file MP3 dengan menggunakan cdrdao.


& # 8211; Tutorial instalasi Qmail, Courier Imap, dan Squirrelmail.


& # 8211; Virtual domain di postfix dengan tpop3d, courier-imap dan squirrelmail.


& # 8211; Membuat metalic texture.


Cara menjebol proteksi WEP.


Cyber Samarinda Article.


Echo Ezine (1-19) 08/08/08 updated.


Exploit Book (Exploit-exploit)


E-book Password Series.


Spyrozone + Update (ratusan artikel)


xpl. web. id exploit (Kumpulan exploit utk hacking)


exploit utk ngeroot (for 2.0.34 – 2.7.x)


ICT Watch Article.


Indonesian Linux Article.


& # 8211; Bab11.Seni Internet_2.rar 767,950.


& # 8211; Seni Teknik Hacking – Demo. rar 1,013,670.


& # 8211; jasakom_tutor 3.zip 292,295.


Jelaga IT Information.


Update Jasakom tutor terbaru 27 Januari 2007 update.


Kecoak Elektronik Article.


Kumpul Bocah Tutor (Disertai R57, C99. etc)


Kumpulan perintah DALnet.


Linux Shell Scripting Tutorial.


Load BOT Netgate (Tutor + BOT)


M tak Project E-book.


& # 8211; Migrasi ASP ke ASP 1.0.


& # 8211; Migrasi COMActiveX ke Komponen 1.0.


& # 8211; Migrasi Java ke C# 1.0.


& # 8211; Migrasi PHP ke ASP 1.0.


& # 8211; Migrasi VB6 ke VB 1.0.


& # 8211; Pemrograman Dasar Socket Dengan C# 1.0.


& # 8211; Pemrograman Email Dengan C# 1.0.


& # 8211; Pemrograman Game Tetris Dengan C# 1.0.


& # 8211; Pemrograman XML Web Service Dengan VB 1.1.


& # 8211; Pengenalan Bahasa C# 1.0.


Panduan membuat virus.


Panduan Membuat Antena Kaleng.


Panduan proteksi CD (Agar CD tidak bisa dicopy)


Phrack E-Magazine [1 – 56]


Phrack E-magazine [57 – 65] – terbaru.


Secret Colony Tutor.


Secure Coding – E-book.


Sejarah Internet Indonesia.


Tips Menghadapi Brontok C.


Tutorial cara Install OpenBSD.


Tutorial bikin USB Extender.


Tutor hack Friendster (1 – 3) Updated.


Wireless Security – hacking wifi.


YogyaCarding old Article.


Review Brontok bahasa Indonesia.


& # 8211; analisa dan pengolahan data dengan excel.


& # 8211; belajar dasar pemograman.


& # 8211; dasar pemograman visual basic.


& # 8211; pemanfaatan datagrid dan truedbgrid pada vb.


& # 8211; pemakaian datareport pada VB.


& # 8211; pemanfaatan asp untuk web programming.


& # 8211; pemanfaatan crystal report pada vb6.


& # 8211; pemanfaatan database server open source.


& # 8211; pemanfaatan sql server dengan vb6.


& # 8211; pemograman database dengan ADO pada VB.


& # 8211; pemograman database dengan DAO pada VB.


& # 8211; pengantar algoritma dan pemograman komputer.


& # 8211; pengenalan email dengan telkomnet-mail.


& # 8211; bahasa pemograman vb.


& # 8211; pemograman form pada vb.


& # 8211; pemograman gdi+ pada vb.


& # 8211; pemograman berorientasi objek pada vb.


Cara Membuat Distro Linux Floppy Sendiri.


Teknik Pembuatan Virus Komputer.


Ubuntu WEP Hack.


Tutor hack winxp sp2 – bhs indo.


& # 8211; Organisasi Komputer : sebuah pengantar.


& # 8211; Pengantar Jaringan Syaraf Tiruan.


& # 8211; Capability Maturity Model Sebagai Mekanisme Kualifikasi Sebuah Software Development House.


& # 8211; Struktur Data dengan Bahasa C.


& # 8211; Pengenalan Sistem Biometrik.


& # 8211; Aplikasi Akuntansi Menggunakan Microsoft Excel.


& # 8211; Pengenalan Dasar-dasar PHP.


& # 8211; Kumpulan Program PASCAL.


& # 8211; Keamanan Jaringan Wireless.


& # 8211; Bagaimana Bluetooth Bekerja.


& # 8211; Koneksi ke Jaringan Wireless dari PC.


& # 8211; Jaringan Komputer Gigabit Ethernet.


& # 8211; Teknologi Bluetooth Wireless.


& # 8211; Kumpulan Port Number.


& # 8211; Teknologi dan Privacy Data Web User.


& # 8211; Instalasi Apache, MySQL, SSL, PHP pada Sistem Operasi FreeBSD.


& # 8211; Weblog : Mengembangkan Situs Pribadi Murah Meriah.


& # 8211; The Blaster Worm : Then And Now.


& # 8211; Modul Penggunaan Partition Magic 8.0 dan Virtual PC 2004.


& # 8211; Menggunakan Ad-Aware untuk Melindungi Komputer Anda dari Ancaman Spyware.


& # 8211; Menyembunyikan File Rahasia di Dalam Gambar.


& # 8211; Mengembangkan Aplikasi GIS Berbasis Web Untuk Informasi Gempa Bumi.


& # 8211; Membangun Jaringan Komputer Menggunakan Komunikasi Powerline (PLC)


& # 8211; End User Development.


& # 8211; Nilai Informasi Bagi Pengambil Keputusan.


& # 8211; Exploitasi Buffer Overflow (Studi Kasus : pada Linux RedHat 6 Kernel 2.2.5.15)


& # 8211; Pengenalan Sistem Operasi.


& # 8211; Server Virtual pada Sistem Operasi FreeBSD dengan Samba.


& # 8211; Sistem Operasi Symbian.


& # 8211; Sistem Operasi Windows 2000 dan Security.


& # 8211; Panduan Windows XP.


& # 8211; Sistem Manajemen Basis Data.


& # 8211; Siklus Hidup Perancangan Basis Data.


& # 8211; Mengakses Database MS. SQL Server 2000 Menggunakan ADO di MS. Visual FoxPro 9.0.


& # 8211; Mengenal SQL Dasar.


& # 8211; Pemrograman Basis Data : Koneksi database menggunakan VB dengan ActiveX Data Object.


& # 8211; Pemrograman Basis data : Koneksi database menggunakan VB dengan ADODB Connection.


& # 8211; Pemrograman Basis data : Membuat Form Penanganan Transaksi (Multi Table)


& # 8211; MYSQL Bekerja dengan Tanggal dan Waktu.


& # 8211; MYSQL, Membuat Ringkasan.


& # 8211; MYSQL Mengurutkan Hasil Query.


& # 8211; Keamanan Pada Perancangan Basisdata.


Auto Complete, Kemudahan atau Kerawanan.


Review Search Engine Google bahasa Indonesia.


& # 8211; Kumpulan Exploit for hacking.


MT Exploit Pack (Kumpulan exploit MT)


Exploit Injection etc.


kumpulan tools exploit for web scan.


Windows Exploit 2006.


& # 8211; Windows Exploit for C.


& # 8211; Windows Exploit for Perl.


& # 8211; Windows Exploit for Web.


Exploit for Joomla.


Exploit for Mozilla Firefox.


Exploit for phpBB.


Exploit for WordPress.


Exploit for Mambo.


Exploit for Opera.


Exploit for vBulletin.


Script All Hype MD5 Encryption Tool.


Microsoft DNS Server Remote Code execution Exploit and analysis.


Milw0rm Archieve (paket exploit terbanyak – Update Agustus 2008 – 6000 lebih Exploit)


Script untuk mail bomb.


Halflife Exploit pack.


Scanner bug baru – Perl.


Exploits, scripts, tools untuk web hacking.


& # 8211; c99.txt 167,398 (100% tested)


& # 8211; hack. txt 2,385 (100% tested)


& # 8211; r57.txt 89,673 (100% tested)


& # 8211; DarkC0de – Pyhton Exploit, Perl Exploit Etc.


Perl (Ratusan source code perl terdiri scan, exploit, bruteforce, etc )


Pyhton (70 source code pyhton lebih dari Friendster bruteforce, wordpress bruteforce, gmail bruteforce, ssh bruteforce, cpanel bruteforce, etc.


txt (tutorial-tutorial serta source c untuk hacking)


wordlist (Kumpulan files kamus untuk dictionary attack / bruteforce attack)


Other (Puluhan paket untuk hacking seperti ASP bypass, hacker webkit, sqlmap, keylogger, etc)


& # 8211; Simple DNS Plus 5.04.1 remote Denial of Service exploit.


& # 8211; Kumpulan Hacking Tools.


007 Password Recovery (Utk hack dial up windows)


Advanced LAN Scanner.


Advanced Port Scanner.


A Mac Address change.


AWRC dengan KUDETA.


Anoymizer TotalNet Shield.


Advanced Rar Password Recovery v1.11.


Anonymous Mail Bomber.


XRemote 2.0 (Trojan Windows terbaru dengan fitur pasang keylogger di target)


BSS – Bluetooth Stash Smasher.


Buka Fitur Windows.


Cain & Abel (untuk mendapatkan berbagai password dijaringan dengan sniff)


Daftar Password Default AP.


Denial of Service for IIS.


Digital Blaster v1.2 – Internet & amp; Network Flooder + Source code program (update versi baru)


EtherDetect (Utk sniffing)


ELSAVE (penghapus log)


Golden eye 2005 (keylogger)


Hack Billing Explorer.


Hack Forum phpBB.


Igmpnuke (untuk nuke win 95)


IRC Script for Attack old mIRC version.


JPS VirusMaker 3.0.


John the Ripper.


Kismet 2007 & airpcap for windows.


Trojan R3C for WinXP + Source.


Trojan R3C for Win9x + Source.


Mac Addreas Changer v4.5.


memhack (utk hack games)


Metasploit Framework 2.7.


Metasploit Framework 3.1.


Hack Pass WinBoost.


NMAP 4.53 (terbaru)


OGC Speedhack v1.0 for Windows 2000 or xp.


Passware Kit Enterprise Edition 8.


PayPal Database Hacker.


PHP Injection – Mass Scanner.


Reset XP Administrator Password.


Remote IceLan 1.9.9.


Rampok 2.0 (Tool sedot isi USB)


SMBDIE (utk denial of service win xp rc 1)


SoftIce 4.05 - Win 2000-XP.


SQL Injection Scan v1.2.


Script utk jebakan denial of service di web.


Super Bluetooth Hack v1.07.


USB Dumper (utk sedot isi flashdisk)


Void Eye (IIS scanner)


Vadim (tool yg byk ditakuti ISP & warnet..)


Visual Basic VIrus Maker32 RC 03 (Utk membuat virus scr instant) + tutor.


TeraBIT Virus Maker v2.8.


W32Romdil (Rahasia W32/Romdil)


Windows NT2k/XP/Vista Change Password / Registry Editor / Boot CD (ISO Linux)


Aircrack-ng v1.0 for Windows.


hack billing explorer (008)


TLOGSPY By Tomero (18/04/2007)


Apache Hacker Tool v 2.0.


Apache Chunked Scanner.


iis5dav-scan-exploit-2006-2 Shared By Hacking-Truths.


PHPAttacker Shared By Hacking-Truths.


casi4.0_Shared_By__Hacking-Truths Security Forum.


SQL-XSS TooL Shared BY Hacking-Truths.


XML-RPC Scanner & Exploiter Shared By Hacking-Truths.


Windows 2000 SP 4 Hack Tool + tutor.


Google Hacks Tool.


Web Vulnerability Scanner 5.


Yersinia (DHCP Flooder)


Etherflood (Flood for switch)


Cisco PIX Firewall Password Calculator.


creddump – Credential Manager Password Dumper for Windows XP/2003.


Mozilla Password RecoveryPasscape Internet Explorer Password Recovery.


TcpDump for DOS.


TcpDump for Linux.


& # 8211; Kumpulan Source Code.


Source code ANSAV.


visual basic worm generator.


Source Code Program Demo Speak.


Source Code WinDump.


Dav Delphi Worm_Generator.


Delphi Bouncer v0.1.


Kumpulan Script Pascal (Source code dibagi 13 bab)


Kumpulan souce code virus.


Source untuk ip jebak penyusup.


Source code AntiVirus MultiKiller3.


Kumpulan Source Code PHP.


Source code SMS gratis dengan IM3.


Source code keylogger.


Source Code dari VBBEGO.


& # 8211; daftaruser. ZIP (Source code tool utk tampilin user computer)


& # 8211; sambadie. ZIP (Source code ddos tool for win xp)


& # 8211; sms. zip (Source code SMS Polling)


& # 8211; telnetserver. ZIP (Source code telnet server)


& # 8211; sharefolder. ZIP (Source code tool utk membuat share folder)


& # 8211; sqlserver2000.ZIP (Source Code SQL Server Exploit)


& # 8211; ymbomber. ZIP (Source utk bikin tool ym bomber)


Source code cacing & anti cacing.


Source Code Game Rosetta.


Source Code Program SPRITE EDITOR Version 2.00.


Source Code aplikasi angsuran barang.


Kumpulan source code baru :


& # 8211; automatic shutdown (source code)


& # 8211; billing local (source code)


& # 8211; brontok[1].c remover ii (source code)


& # 8211; class finder & generator (source code)


& # 8211; crack me -1 (source code)


& # 8211; koneksi database (script advance) (source code)


& # 8211; lockunlock window (source code)


& # 8211; membuat tts digital (source code)


& # 8211; messenger exploit-overflow tanpa winsock (source code)


& # 8211; morse translator (source code)


& # 8211; ramalan jawa (berdasarkan primbon) (source code)


& # 8211; remote procedure call exploit (source code)


& # 8211; remover for virus kspoold (source code)


& # 8211; run with new desktop (source code)


& # 8211; virus 4k51k4 (source code)


& # 8211; virus start kiddies (source code)


& # 8211; window locker (source code)


& # 8211; wktvbdebugger (source code)


& # 8211; zip repair (utk perbaiki file zip) Source Code BASIC.


Source Code VB pilihan.


Source Code VB virus pilihan.


Source Code VB for Security.


Source Code virus VB (update)


& # 8211; Melisa Source Code.


VB Source pilihan.


& # 8211; 3XTR3M3 4NT! V!RU$ Source Code.


& # 8211; CODE WARRIOR (sebuah DLL dengan fungsi tentu saja untuk menjaga serial number)


& # 8211; PQWAK3 (Pass : vbbego)


& # 8211; INF20060723130605.RAR (Patch Task Manager)


& # 8211; INF20060821133508.RAR (SMS Encoder & Decoder)


& # 8211; software20060618132535.RAR (Sorted file or directory)


& # 8211; software20060618133854.RAR (Zip Repair)


& # 8211; VB6Decompiler. ZIP (VB 6 Decompiler Source Code)


& # 8211; Anti W32.Rontok. ZIP (SOurce Code Anti W32.Rontok)


& # 8211; database nfsu. rar (Source Code Login Need For Speed UnderGround II)


& # 8211; hajarbro. rar (Source Code Remover Brontok by Anti Hacker)


& # 8211; INF20060730010913.RAR (Membuat Form Transparant dst)


& # 8211; p3kdiary. ZIP (Source Code P3K Document Word Virus Diary. exe)


& # 8211; software20060618132914.RAR (Vbbego ClassFinder)


& # 8211; software20060714042045.RAR (SQL Crack)


& # 8211; vbrdemo. zip (VB RezQ – Source Recovery for Visual Basic)


Source dari Ninja-Ceria.


& # 8211; grosir. zip (Source code MADINA GROSIR SYSTEM)


& # 8211; penterjemah. zip (Source code program penterjemah)


& # 8211; kamus_t. zip (Source code program kamus)


Source code VB Lainnya.


Source Code Virus Cintaku. A.


Source Code OS Sederhana.


Source Code Wedash AntiVirus 2005.


Source Code IndoProgSMS.


Source Code Tool Denial of Service.


Source code web SMS Mentari.


Source Code Shadow Thief.


& # 8211; Kumpulan tools untuk security.


HTTP Spy 4.0.


Nikto 2.02 (versi terbaru – Untuk memeriksa keamanan website)


Security Task Manager 1.6.


TLOGSPY By Tomero.


radmin_2.2 (Untuk remote PC)


Windows Vulnerability Scanner.


& # 8211; Kumpulan Video komputer dan hacking.


Video Hacking Friendster 1.


Video Hacking Friendster 2.


Video dari PusHm0v.


Video Hack Billing Explorer.


Video Hacking Pilihan.


& # 8211; JOHN THE RIPPER 1.7 PASSWORD CRACKER INSTALLATION INSTRUCTION VIDEO. ZIP 2,597,592.


& # 8211; Default Password Modem Router ADSL. rar.


& # 8211; Video Cara jadi admin di PHP Nuke.


& # 8211; Video ngeroot – Allnone.


& # 8211; Video SQL Injection – Paman.


& # 8211; Video Komputer dan Hacking 2.


Video Cracking MD5 Password Hashes.


Video Cracking Syskey and the SAM on Windows.


Video Cracking Windows Password with BackTrack.


Video Mac Bridging with Windows XP & Sniffing.


Video Make your own VMs with hard drive for free VMware Player and VMX Builder.


Video Metasploit Framework.


Video Remote Password auditing THC-Hydra.


Video Recovering Deleted Files.


Video Root Kits.


Video Sniffing Voip Using Cain.


Video Using Cain and the AirPcap USB adapter to crack WPA or WPA2.


Video War Driving Tools.


Video Filtering di e-mail Yahoo by Adi [First Edition]


Video Filtering di e-mail Yahoo by Adi [New Edition]


Video MacChanger by Adi.


Video Install Ubuntu by Adi.


Video Elinks by Adi.


Video Hacking password GMAIL dengan bruteforce.


Video Linux Rooting.


Video Get Connect Back via NC in Linux.


Video Video NC – How to bind port in linux – part2.


Video Vulnerability file upload.


Video WMF File Code Execution Vulnerability (Remote win xp sp2)


Video Hacking Windows XP SP2 by Adi (remote win xp sp2)


& # 8211; Kumpulan Web Protection Tools.


Source Code JavaScript for Security.


& # 8211; Kumpulan tools untuk security.


DecaffeinatID – A Very Simple IDS – Log Watching App – ARPWatch For Windows.


HTTP Spy 4.0.


Nikto 2.02 (versi terbaru – Untuk memeriksa keamanan website)


Security Task Manager 1.6.


TLOGSPY By Tomero.


radmin_2.2 (Untuk remote PC)


Windows Vulnerability Scanner.


& # 8211; Kumpulan Virus lokal dan perusak Windows.


& # 8211; Programming language plus tools.


BAT_2_COM (file. bat menjadi )


Cavaj Java Decompiler.


Delphi to C++ Builder 1.5.


JCavaj Java Decompiler.


Power Basic 6.0 Beta.


VbReFormer (VB Decompiler)


X-Code Logo (updated 08.2008)


& # 8211; xcode_magazine_10.zip (Ada bonus)


X-Code Video Fun.


X-Code Wallpaper (Updated 01.2008)


Winamp XCode Skin (+Leopard)


Special Yogyafree Stuff.


BeeTrap. zip (Simple Honeypot)


UC. zip (Underground Chat Yogyafree)


xcode. xpi for mozilla firefox.


theme xcode for Symbian 60.


Adobe Acrobat Reader v8.1.1 (tool melihat PDF)


KLCODEC (codec utk nonton video)


Yahoo Scam Page.


Yahoo Administrator Booter.


Tracks Eraser 4.10.


Tar for Windows.


psyBNC for Windows.


Oripa Yahoo Recorder.


Kumpulan YM Tools.


Kode Area utk HP.


Hide IP Platinum.


Advanced Email Extractor.


Imaginary Telnet Server.


PHP Triad (for DNS Spoofing)


Kumpulan ratusan foto-foto demo dan seminar Yogyafree, foto-foto gathering Yogyafree, dsb (updated 12 Agustus 2008)


THE ONE PAGE LINUX MANUAL. PDF.


LINUX Admin Quick Reference.


windows 2000 sp4 remote (Exploit)


bugs CSRF di Friendster. rar.


Mengenali Virus Lewat Checksum Error dengan metode CRC32.rar.


Mengenal RC4 STREAM CIPHER. rar.


bermain dengan registry. doc.


Cara Sederhana membuat virus PHP. doc.


Cerita hack billing. pdf 263,911.


Demystifying Google Hacks. zip 62,715.


Evil Ping v0.3b. zip 104,532.


Update Jasakom tutor – Juli – September 2007.


Konsep Virus VB. RAR 9,569.


Perintah-perintah UNIXes Dasar. mht.


Mengenai Ngembom E-Mai Lewat E-Maill. zip 442,120.


Menjebol Password Network Neigborhoud. zip 267,250.


onno. rar (Konfigurasi N E61 dst)


seminar ubuntu yogyafree.


NEMESIS – TCP/IP Packet Injection.


rohitab_com – Forums my delphi virus. htm 24,536.


Panduan Step By Step Hacking WEP dgn Linux Backtrack. pdf.


Demo Network Security. pdf.


Presentation Wireless Network. pdf.


System and Network Hacking. pdf.


EliteHackers_info – Default Password List. htm.


Jogjalover_v7_tanpa_mIRC. rar (Copy file mirc. exe anda ke Jogjalover)


yahoopasscrack. exe (Hack password Yahoo dengan dictionary pass Attack)


virus_hp. rar (Kumpulan beberapa virus HP)


thumbscrew. zip (Membuat USB Flashdisk Read Only)


ICMP Tunnel – itun-04-10-2005.tar. gz.


Tutor reset Deepfreeze 5 dan 6.


04012007-Animated_Cursor_Exploit (Windows Vista Exploit)


T-Sight tutorial (Telnet Hacking)


PsExec – execute processes remotely.


& # 8211; PsFile – shows files opened remotely.


& # 8211; PsGetSid – display the SID of a computer or a user.


& # 8211; PsInfo – list information about a system.


& # 8211; PsKill – kill processes by name or process ID.


& # 8211; PsList – list detailed information about processes.


& # 8211; PsLoggedOn – see who’s logged on locally and via resource sharing.


& # 8211; PsLogList – dump event log records.


& # 8211; PsPasswd – changes account passwords.


& # 8211; PsService – view and control services.


& # 8211; PsShutdown – shuts down and optionally reboots a computer.


& # 8211; PsSuspend – suspend and resume processes.


artikel bonus (puluhan)


CD Yogyafree Express v11.0 x2:


& # 8211; Kumpulan Anti Virus lokal dan Interlokal.


ANSAV ANTIVIRUS Engine Version 1.9.3 + Plugins RegistryFX. zip & SOR. zip.


AVINDO – AntiVirus Indonesia.


Kumpulan AntiVirus Lokal.


& # 8211; AntiBrontok 1.01 – AntiVirus. zip 87,331.


& # 8211; AntiMyHeart AntiVirus. zip 229,349.


& # 8211; AntiPesin – AntiVirus. zip 11,345.


& # 8211; Antivirus Brontok. A Ultimate Edition. zip 1,407,126.


& # 8211; BrontokCleaner v2.0 AntiVirus. zip 8,642.


& # 8211; BrontokCleaner v3.1 movzx – AntiVirus. rar 44,142.


& # 8211; BrontokEraser – AntiVirus. zip 3,250.


& # 8211; BrontoKiller – AntiVirus. zip 217,962.


& # 8211; HalloKill – AntiVirus. zip 44,094.


& # 8211; Wedash AntiVirus 2005.zip 352,463.


Gucup Antivirus 2.8.4.


ANTI-INDOVIR By Tomero (21-4-2007)


The Killer machine 4.


Gasak Virus Registry v1.55.


IndoProg Virus Scanner.


AVB Scanner 32bit.


Kick The Worm AntiVirus v1.5.0.


& # 8211; Kumpulan Artikel dan tutor.


& # 8211; tutor lengkap pasang backdoor. txt 14,350.


& # 8211; tutor nembak ip. zip 4,973.


& # 8211; unicode tutor. zip 3,549.


Kecoal Toket Ezine.


Booklet Internet Sehat.


Belajar Bisnis di Internet.


& # 8211; Tutorial Streamster Marketiva.


& # 8211; Kamus Pasar Modal.


& # 8211; Cara Daftar Google Adsense.


& # 8211; Daftar Istilang Eng vs Indo.


& # 8211; Data Ekonomi & Pengaruhnya Terhadap US Dollar.


& # 8211; Nama Negara & Mata Uangnya.


& # 8211; Berbagai Macam Peluang Bisnis Di Internet.


& # 8211; Cara Download Video Di YouTube.


& # 8211; Tips Sukses Berbisnis dan Bekerja di Internet.


& # 8211; Devinisi dan Tutorial Paypal.


& # 8211; Kamus AdSense Dan Perihal Banned.


& # 8211; Langkah Gampang Pasang AdSense Pada BlogSpot.


& # 8211; GNU/Linux bukan sekedar suatu sistem operasi alternatif.


& # 8211; Administrasi Sistem Linux.


& # 8211; Hal yang Sering Ditanyakan (FAQ) (Seputar Linux)


& # 8211; Tuntunan Praktis Pemprograman Perl.


& # 8211; SQL DENGAN POSTGRES.


& # 8211; Membuat grafik penggunaan Web server secara on-line.


& # 8211; ADMINISTRASI JARINGAN LINUX.


& # 8211; Membuat Router Dengan Linux SUSE 9.3.


& # 8211; Membangun Router dengan Mikrotik Router OS.


& # 8211; Memilih aplikasi perkantoran (Office Application)


& # 8211; GNUPLOT UNTUK ORANG LUGU.


& # 8211; membuat dokumen online.


& # 8211; Pengenalan TEX dan LATEX.


& # 8211; Panduan pengembang Public License di Indonesia.


& # 8211; Undang-undang Hak Cipta.


& # 8211; 37 Howto Linux versi bahasa Indonesia.


& # 8211; Panduan Windows Xp – 2 Buku.


& # 8211; Menginstal XAMPP, untuk aplikasi Web Server, Database.


& # 8211; Panduan Bahasa C.


& # 8211; Chroot login di Linux dengan menggunakan sshd.


& # 8211; Chroot login di Linux dengan menggunakan sudo.


& # 8211; Instalasi Monitoring Jaringan Dengan SMSterm.


& # 8211; Instalasi Qmail, Vmailmgr, Omail Admin, Courier Imap, dan Squirrelmail.


& # 8211; Instalasi Qmail, Vpopmail, Qmailadmin, Courier Imap, dan Squirrelmail.


& # 8211; Instalasi Squid, Banner Filter, Porn Filter, Limit Bandwith, Transparan Proxy.


& # 8211; Instalasi Apache 2.0.47 (DSO+suexec)+PHP 4.3.2.


& # 8211; Kompilasi kernel 2.4.x di Linux.


& # 8211; Konsep DNS dan tutorial instalasi BIND.


& # 8211; Menggunakan SMTP Auth (qmail-smtpd-auth) di vpopmail dan vmailmgr.


& # 8211; Membuat CD album dari file MP3 dengan menggunakan cdrdao.


& # 8211; Tutorial instalasi Qmail, Courier Imap, dan Squirrelmail.


& # 8211; Virtual domain di postfix dengan tpop3d, courier-imap dan squirrelmail.


& # 8211; Membuat metalic texture.


Cara menjebol proteksi WEP.


Cyber Samarinda Article.


dr Iwan Consultant.


Exploit Book (Exploit-exploit)


E-book Password Series.


Spyrozone + Update (ratusan artikel)


FAT32 and Hard Disk Guide.


xpl. web. id exploit (Kumpulan exploit utk hacking)


exploit utk ngeroot (for 2.0.34 – 2.7.x)


ICT Watch Article.


Indonesian Linux Article.


& # 8211; Bab11.Seni Internet_2.rar 767,950.


& # 8211; Seni Teknik Hacking – Demo. rar 1,013,670.


& # 8211; jasakom_tutor 3.zip 292,295.


Jelaga IT Information.


Update Jasakom tutor terbaru 27 Januari 2007 update.


Kecoak Elektronik Article.


Kumpul Bocah Tutor (Disertai R57, C99. etc)


Kumpulan perintah DALnet.


Linux Shell Scripting Tutorial.


Load BOT Netgate (Tutor + BOT)


Otak Project E-book.


& # 8211; Migrasi ASP ke ASP 1.0.


& # 8211; Migrasi COMActiveX ke Komponen 1.0.


& # 8211; Migrasi Java ke C# 1.0.


& # 8211; Migrasi PHP ke ASP 1.0.


& # 8211; Migrasi VB6 ke VB 1.0.


& # 8211; Pemrograman Dasar Socket Dengan C# 1.0.


& # 8211; Pemrograman Email Dengan C# 1.0.


& # 8211; Pemrograman Game Tetris Dengan C# 1.0.


& # 8211; Pemrograman XML Web Service Dengan VB 1.1.


& # 8211; Pengenalan Bahasa C# 1.0.


Panduan membuat virus.


Panduan Membuat Antena Kaleng.


Panduan proteksi CD (Agar CD tidak bisa dicopy)


Phrack E-Magazine [1 – 56]


Phrack E-magazine [57 – 65]


Secret Colony Tutor.


Secure Coding – E-book.


Sejarah Internet Indonesia.


Sony AK-Cakram 1 (Full Artikel dan tutor)


Tips Menghadapi Brontok C.


Tutorial cara Install OpenBSD.


Tutorial bikin USB Extender.


Tutor hack Friendster (1 – 3) Updated.


& # 8211; Aneka Tips Dan Trik VB. zip 998,940.


& # 8211; Applet Glide Navigation Pro. zip 843,583.


& # 8211; Contoh 1. Membuat Buku Tamu Dengan PHP. zip 86,514.


& # 8211; Contoh 1. Membuat Jam Digital Dengan Visual Basic. zip 31,445.


& # 8211; Contoh 1. Menghitung Faktorial Dengan Bahasa C. zip 138,693.


& # 8211; Contoh 2. Membuat Aplikasi Jajak Pendapat Dengan PHP. zip 215,516.


& # 8211; Contoh 2. Membuat Fungsi Terbilang Dengan Visual Basic. zip 99,357.


& # 8211; Contoh 2. Mencari Nilai Maksimum atau Minimum Dengan Bahasa. zip 144,880.


& # 8211; Contoh 3. Fitur Login-Logout Halaman Web Dengan PHP. zip 88,922.


& # 8211; Contoh 3. Metoda Pengurutan Bubble Sort Dengan Bahasa C. zip 249,362.


& # 8211; Contoh 3. Program Konversi Warna Dengan Visual Basic. zip 47,563.


& # 8211; Contoh 4. Membuat Fungsi Terbilang di Excel dengan VBA. zip 577,255.


& # 8211; Contoh 4. Metoda Pengurutan Quick Sort Dengan Bahasa C. zip 200,479.


& # 8211; Contoh 5. Metoda Pengurutan String Dengan Bahasa C. zip 139,736.


& # 8211; Contoh 6. Mencari Bilangan Prima Dengan Bahasa C. zip 123,784.


& # 8211; Contoh 7. Menentukan Palindrome Dengan Bahasa C. zip 89,853.


& # 8211; Petunjuk Instalasi Compiler C. zip 259,876.


& # 8211; Petunjuk Instalasi PHP. zip 524,616.


Wireless Security – hacking wifi.


YogyaCarding old Article.


Review Brontok bahasa Indonesia.


& # 8211; analisa dan pengolahan data dengan excel.


& # 8211; belajar dasar pemograman.


& # 8211; dasar pemograman visual basic.


& # 8211; pemanfaatan datagrid dan truedbgrid pada vb.


& # 8211; pemakaian datareport pada VB.


& # 8211; pemanfaatan asp untuk web programming.


& # 8211; pemanfaatan crystal report pada vb6.


& # 8211; pemanfaatan database server open source.


& # 8211; pemanfaatan sql server dengan vb6.


& # 8211; pemograman database dengan ADO pada VB.


& # 8211; pemograman database dengan DAO pada VB.


& # 8211; pengantar algoritma dan pemograman komputer.


& # 8211; pengenalan email dengan telkomnet-mail.


& # 8211; bahasa pemograman vb.


& # 8211; pemograman form pada vb.


& # 8211; pemograman gdi+ pada vb.


& # 8211; pemograman berorientasi objek pada vb.


Cara Membuat Distro Linux Floppy Sendiri.


Teknik Pembuatan Virus Komputer.


Ubuntu WEP Hack.


Tutor hack winxp sp2 – bhs indo.


& # 8211; Organisasi Komputer : sebuah pengantar.


& # 8211; Pengantar Jaringan Syaraf Tiruan.


& # 8211; Capability Maturity Model Sebagai Mekanisme Kualifikasi Sebuah Software Development House.


& # 8211; Struktur Data dengan Bahasa C.


& # 8211; Pengenalan Sistem Biometrik.


& # 8211; Tutorial Ms. PowerPoint.


& # 8211; Aplikasi Akuntansi Menggunakan Microsoft Excel.


& # 8211; Pengenalan Dasar-dasar PHP.


& # 8211; Kumpulan Program PASCAL.


& # 8211; Keamanan Jaringan Wireless.


& # 8211; Bagaimana Bluetooth Bekerja.


& # 8211; Koneksi ke Jaringan Wireless dari PC.


& # 8211; Jaringan Komputer Gigabit Ethernet.


& # 8211; Teknologi Bluetooth Wireless.


& # 8211; Kumpulan Port Number.


& # 8211; Teknologi dan Privacy Data Web User.


& # 8211; Instalasi Apache, MySQL, SSL, PHP pada Sistem Operasi FreeBSD.


& # 8211; Weblog : Mengembangkan Situs Pribadi Murah Meriah.


& # 8211; The Blaster Worm : Then And Now.


& # 8211; Modul Penggunaan Partition Magic 8.0 dan Virtual PC 2004.


& # 8211; Menggunakan Ad-Aware untuk Melindungi Komputer Anda dari Ancaman Spyware.


& # 8211; Menyembunyikan File Rahasia di Dalam Gambar.


& # 8211; Mengembangkan Aplikasi GIS Berbasis Web Untuk Informasi Gempa Bumi.


& # 8211; Membangun Jaringan Komputer Menggunakan Komunikasi Powerline (PLC)


& # 8211; End User Development.


& # 8211; Nilai Informasi Bagi Pengambil Keputusan.


& # 8211; Exploitasi Buffer Overflow (Studi Kasus : pada Linux RedHat 6 Kernel 2.2.5.15)


& # 8211; Pengenalan Sistem Operasi.


& # 8211; Server Virtual pada Sistem Operasi FreeBSD dengan Samba.


& # 8211; Sistem Operasi Symbian.


& # 8211; Sistem Operasi Windows 2000 dan Security.


& # 8211; Panduan Windows XP.


& # 8211; Intuitive Graphics Design With Photoshop.


& # 8211; Panduan Menggunakan Photoshop 7 – Bab 1.


& # 8211; Panduan Menggunakan Photoshop 7 – Bab 2.


& # 8211; Panduan Menggunakan Photoshop 7 – Bab 3.


& # 8211; Panduan Menggunakan Photoshop 7 – Bab 4.


& # 8211; Sistem Manajemen Basis Data.


& # 8211; Siklus Hidup Perancangan Basis Data.


& # 8211; Mengakses Database MS. SQL Server 2000 Menggunakan ADO di MS. Visual FoxPro 9.0.


& # 8211; Mengenal SQL Dasar.


& # 8211; Sistem Basis Data dengan Ms. Access (dilengkapi dgn referensi perintah SQL)


& # 8211; Pemrograman Basis Data : Koneksi database menggunakan VB dengan ActiveX Data Object.


& # 8211; Pemrograman Basis data : Koneksi database menggunakan VB dengan ADODB Connection.


& # 8211; Pemrograman Basis data : Membuat Form Penanganan Transaksi (Multi Table)


& # 8211; MYSQL Bekerja dengan Tanggal dan Waktu.


& # 8211; MYSQL, Membuat Ringkasan.


& # 8211; MYSQL Mengurutkan Hasil Query.


& # 8211; Keamanan Pada Perancangan Basisdata.


Review Search Engine Google bahasa Indonesia.


& # 8211; Kumpulan Bussines Tools.


Advanced Email Extractor.


SoftPerfect Bandwidth Manager v2.2.


& # 8211; Kumpulan Chat dan IRC Tools.


Join Me (IRC Server)


Kumpulan IRC Scripts.


PsyBNC for Windows.


Fomine LAN Chat (Tool chat via LAN)


Kumpulan Yahoo Messenger Tools.


& # 8211; remote webcam server and remote webcam cliente.


& # 8211; Diffusion4-1-Anti Boot Protection.


Mr^P^ IRC Script (Fitur lengkap)


Y! Messenger Plus v1.7.0.7.


Yahoo Messenger 8.1.


ORipa Yahoo Recorder (Untuk merekam video webcam teman chat)


Yahoo Messenger Monitor Sniffer.


& # 8211; Kumpulan CMS dan forum.


AuraCMS v1.62 + bugs.


AuraCMS v2.0 BETA.


CMS Made Simple.


SmallIMS plus updatetan baru.


eNdonesia CMS 8.4 + bugs.


& # 8211; Kumpulan Distro Linux dan lainnya.


Apple II Emulator for Windows.


& # 8211; Kumpulan Documents Tools.


Adobe Acrobat Reader v7.0.


Advanced PDF to Text Coverter.


PDF Factory 3.02.


& # 8211; Kumpulan Editor Tools.


CSS Button Designer 1.0.


EditPlus Text Editor.


& # 8211; Kumpulan Exploit for hacking.


MT Exploit Pack (Kumpulan exploit MT)


Exploit Injection etc.


kumpulan tools exploit for web scan.


Windows Exploit 2006.


& # 8211; Windows Exploit for C.


& # 8211; Windows Exploit for Perl.


& # 8211; Windows Exploit for Web.


Exploit for Joomla.


Exploit for Mozilla Firefox.


Exploit for phpBB.


Exploit for WordPress.


Exploit for Mambo.


Exploit for Opera.


Exploit for vBulletin.


Script All Hype MD5 Encryption Tool.


Microsoft DNS Server Remote Code execution Exploit and analysis.


Milw0rm Archieve (paket exploit terbanyak – Agustus 2008) Script untuk mail bomb.


Halflife Exploit pack.


Scanner bug baru – Perl.


Exploits, scripts, tools untuk web hacking.


& # 8211; c99.txt 167,398 (100% tested)


& # 8211; hack. txt 2,385 (100% tested)


& # 8211; r57.txt 89,673 (100% tested)


& # 8211; DarkC0de – Pyhton Exploit, Perl Exploit Etc.


Perl (Ratusan source code perl terdiri scan, exploit, bruteforce, etc )


Pyhton (70 source code pyhton lebih dari Friendster bruteforce, wordpress bruteforce, gmail bruteforce, ssh bruteforce, cpanel bruteforce, etc.


txt (tutorial-tutorial serta source c untuk hacking)


wordlist (Kumpulan files kamus untuk dictionary attack / bruteforce attack)


Other (Puluhan paket untuk hacking seperti ASP bypass, hacker webkit, sqlmap, keylogger, etc)


& # 8211; Kumpulan Hacking Tools.


007 Password Recovery (Utk hack dial up windows)


Anoymizer TotalNet Shield.


Advanced Rar Password Recovery v1.11.


Anonymous Mail Bomber.


XRemote 2.0 (Trojan utk Windows)


BSS – Bluetooth Stash Smasher.


Buka Fitur Windows.


Cain & Abel (untuk mendapatkan berbagai password dijaringan dengan sniff)


Daftar Password Default AP.


Denial of Service for IIS.


Digital Blaster v1.2 – Internet & amp; Network Flooder + Source code program (update versi baru)


EtherDetect (Utk sniffing)


ELSAVE (penghapus log)


Golden eye 2005 (keylogger)


Hack Billing Explorer.


Hack Forum phpBB.


Igmpnuke (untuk nuke win 95)


JPS VirusMaker 3.0.


John the Ripper.


Trojan R3C for WinXP + Source.


Trojan R3C for Win9x + Source.


Mac Addreas Changer v4.5.


Mac Addreas Changer 4.5.


memhack (utk hack games)


Hack Pass WinBoost.


NMAP 4.53 (terbaru)


OGC Speedhack v1.0 for Windows 2000 or xp.


PayPal Database Hacker.


PHP Injection – Mass Scanner.


Remote IceLan 1.9.9.


Rampok 2.0 (Tool sedot isi USB)


SMBDIE (utk denial of service win xp rc 1)


SQL Injection Scan v1.2.


Script utk jebakan denial of service di web.


Super Bluetooth Hack v1.07USB Dumper (utk sedot isi flashdisk)


Void Eye (IIS scanner)


Vadim (tool yg byk ditakuti ISP & warnet..)


Visual Basic VIrus Maker32 RC 03 (Utk membuat virus scr instant) + tutor.


TeraBIT Virus Maker v2.8.


W32Romdil (Rahasia W32/Romdil)


Windows NT2k/XP/Vista Change Password / Registry Editor / Boot CD (ISO Linux)


hack billing explorer (008)


TLOGSPY By Tomero (18/04/2007)


Apache Hacker Tool v 2.0.


Apache Chunked Scanner.


iis5dav-scan-exploit-2006-2 Shared By Hacking-Truths.


PHPAttacker Shared By Hacking-Truths.


casi4.0_Shared_By__Hacking-Truths Security Forum.


XML-RPC Scanner & Exploiter Shared By Hacking-Truths.


Windows 2000 SP 4 Hack Tool + tutor.


Yersinia (DHCP Flooder)


Etherflood (Flood for switch)


SniffPass v1.06- Kumpulan Hardware Tools.


PC Wizard 2006.1.661.


Tools for OverClock VGA Card.


Ati Tool untuk OverClock.


& # 8211; Kumpulan Internet Tools.


FireFox 2.0.0.8 + fasterfox-2.0.0-fx. xpi.


Google Toolbar for Firefox 1.0.20051122.


Internet Download Manager 5.11 (Updated)


Invisible Browsing v4.0.


Xitami Web Server 2.4d6.


& # 8211; Kumpulan Kompresi Tools.


KGB Archiver 1.0.3.15.


Kompresi lama (DOS)


Tar for Windows.


& # 8211; Kumpulan Multimedia Tools.


dBpowerAMP Music Converter.


Nullsoft mIRC Control Plug-in.


The Core Media Player 4.11.


Vocal Remover – Winamp.


& # 8211; Kumpulan Source Code.


Source code ANSAV.


visual basic worm generator.


Dav Delphi Worm_Generator.


Delphi Bouncer v0.1.


Kumpulan JavaScripts games.


& # 8211; Towers of Hanoi.


Kumpulan Script Pascal (Source code dibagi 13 bab)


Kumpulan souce code virus.


Source untuk ip jebak penyusup.


Source code AntiVirus MultiKiller3.


Kumpulan Source Code PHP.


Source code SMS gratis dengan IM3.


Source code keylogger.


Source Code dari VBBEGO.


& # 8211; daftaruser. ZIP (Source code tool utk tampilin user computer)


& # 8211; sambadie. ZIP (Source code ddos tool for win xp)


& # 8211; sms. zip (Source code SMS Polling)


& # 8211; telnetserver. ZIP (Source code telnet server)


& # 8211; sharefolder. ZIP (Source code tool utk membuat share folder)


& # 8211; sqlserver2000.ZIP (Source Code SQL Server Exploit)


& # 8211; ymbomber. ZIP (Source utk bikin tool ym bomber)


Source code cacing & anti cacing.


Source Code Game Rosetta.


Source Code Program SPRITE EDITOR Version 2.00.


Source Code aplikasi angsuran barang.


Kumpulan source code baru :


& # 8211; automatic shutdown (source code)


& # 8211; billing local (source code)


& # 8211; brontok[1].c remover ii (source code)


& # 8211; class finder & generator (source code)


& # 8211; crack me -1 (source code)


& # 8211; koneksi database (script advance) (source code)


& # 8211; lockunlock window (source code)


& # 8211; membuat tts digital (source code)


& # 8211; messenger exploit-overflow tanpa winsock (source code)


& # 8211; morse translator (source code)


& # 8211; ramalan jawa (berdasarkan primbon) (source code)


& # 8211; remote procedure call exploit (source code)


& # 8211; remover for virus kspoold (source code)


& # 8211; run with new desktop (source code)


& # 8211; virus 4k51k4 (source code)


& # 8211; virus start kiddies (source code)


& # 8211; window locker (source code)


& # 8211; wktvbdebugger (source code)


& # 8211; zip repair (utk perbaiki file zip) Source Code BASIC.


Source Code VB for games.


Source Code VB pilihan.


Source Code VB virus pilihan.


Source Code VB for Security.


Source Code virus VB (update)


& # 8211; Melisa Source Code.


Source VB for MP3 Player.


VB Source pilihan.


& # 8211; 3XTR3M3 4NT! V!RU$ Source Code.


& # 8211; CODE WARRIOR (sebuah DLL dengan fungsi tentu saja untuk menjaga serial number)


& # 8211; PQWAK3 (Pass : vbbego)


& # 8211; INF20060723130605.RAR (Patch Task Manager)


& # 8211; INF20060821133508.RAR (SMS Encoder & Decoder)


& # 8211; software20060618132535.RAR (Sorted file or directory)


& # 8211; software20060618133854.RAR (Zip Repair)


& # 8211; VB6Decompiler. ZIP (VB 6 Decompiler Source Code)


& # 8211; Anti W32.Rontok. ZIP (SOurce Code Anti W32.Rontok)


& # 8211; database nfsu. rar (Source Code Login Need For Speed UnderGround II)


& # 8211; hajarbro. rar (Source Code Remover Brontok by Anti Hacker)


& # 8211; INF20060730010913.RAR (Membuat Form Transparant dst)


& # 8211; p3kdiary. ZIP (Source Code P3K Document Word Virus Diary. exe)


& # 8211; software20060618132914.RAR (Vbbego ClassFinder)


& # 8211; ware20060714042045.RAR (SQL Crack)


& # 8211; vbrdemo. zip (VB RezQ – Source Recovery for Visual Basic)


Source dari Ninja-Ceria.


& # 8211; grosir. zip (Source code MADINA GROSIR SYSTEM)


& # 8211; penterjemah. zip (Source code program penterjemah)


& # 8211; kamus_t. zip (Source code program kamus)


Source code VB Lainnya.


Source Code Virus Cintaku. A.


Source Code OS Sederhana.


Source Code Wedash AntiVirus 2005.


Source Code IndoProgSMS.


Source Code Tool Denial of Service.


Source code web SMS Mentari.


Source Code Shadow Thief.


& # 8211; Kumpulan tools untuk optimalisasi.


Tracks Eraser 4.10.


SuperFormat Version 2.7.


& # 8211; Kumpulan tools untuk security.


DecaffeinatID – A Very Simple IDS – Log Watching App – ARPWatch For Windows.


HTTP Spy 4.0.


Nikto 2.02 (versi terbaru – Untuk memeriksa keamanan website)


Security Task Manager 1.6.


TLOGSPY By Tomero.


radmin_2.2 (Untuk remote PC)


Windows Vulnerability Scanner.


& # 8211; Kumpulan Video komputer dan hacking.


Video Hack Windows XP SP2 by Adi [New Version]


Video Root Kits.


Video Hacking Friendster 1.


Video Hacking Friendster 2.


Video dari PusHm0v.


Video Hack Billing Explorer.


Video Hacking Pilihan.


& # 8211; JOHN THE RIPPER 1.7 PASSWORD CRACKER INSTALLATION INSTRUCTION VIDEO. ZIP 2,597,592.


& # 8211; Video Cara jadi admin di PHP Nuke.


& # 8211; Video ngeroot – Allnone.


& # 8211; Video SQL Injection – Paman.


& # 8211; Kumpulan Virus lokal dan perusak Windows.


& # 8211; Kumpulan Web Protection Tools.


Source Code JavaScript for Security.


& # 8211; Windows XP Indonesia & patch me.


Real DOS-Mode Patch For ME 1.3.


Windows XP Indonesia.


& # 8211; Programming language plus tools.


BAT_2_COM (file. bat menjadi )


Cavaj Java Decompiler.


Delphi to C++ Builder 1.5.


JCavaj Java Decompiler.


Power Basic 6.0 Beta.


VbReFormer (Decompiler VB)


Resize picture tool.


WinContig 0.70 beta.


ShaPlus Google Translator 1.0.


DirectX 9 Uninstaller.


GPRS Counter 2.5.9.101 (Untuk menghitung biaya GPRS)


Hide IP Platinum 2.4.


SuperStorm (Memasukkan text ke dalam gambar secara hidden)


SuperFast (Biar shutdown jadi cepat)


Rosenthal Virus Simulator v3[1].0.


Icon Changer 3.5.


Info Seri Nokia.


Kode Area untuk HP.


KRAUX (Utk komunikasi SUARA antar pengguna PC)


PETA Yogya (Flash)


SSC Service Utility (untuk melakukan reset printer epson)


Tool anti nyamuk.


XSearch – Web Search Engine.


Yahoo Administrator booter v4.0.


Yahoo Scam page.


WebExe 1.55 (utk. html menjadi. exe)


PHP-EUY Warnet billing V 2.0.


dp4 Font Viewer 1.8.


NUSB 3.1 (USB utk win 98)


& # 8211; Tools untuk Perbaikan PC.


All Media Fixer (Utk memperbaiki files media yg rusak)


BadCopy Pro v3.72.1012 (utk memberbaiki data di floppy / CD dst)


Disc Text Savior (utk perbaiki file text yg rusak pd floppy)


Disk Repair (Bad Sector removal utk disket)


Disket Repair hdcopy (Low Level Format for disket)


DOS for Booting.


File Scavenger 3.0 (Utk recover data)


FreeUndelete 2.0 (Utk mengembalikan files yg terhapus)


Harddisk Partitioner PartitionStar 1.24.


HDD Regenerator 1.51 (Utk menghilangkan bad sector harddisk)


PC Bug Doctor 2.0.


Recovery for Word.


Registry Workshop 1.7.0.


Undelete (win32) (Utk mengembalikan files yg terhapus)


Wake On LAN (Menghidupkan PC via LAN)


TOKIWA DataRecovery 2.3.1.2.


The Harddisk Low Level Format.


X-Code Energy Saturn 10.0 Lite.


X-Code Logo (updated 08.2008)


X-Code Video Fun.


X-Code Wallpaper (Updated 01.2008)


Winamp XCode Skin (+Leopard)


Special Yogyafree Stuff.


BeeTrap. zip (Simple Honeypot)


UC. zip (Underground Chat Yogyafree)


xcode yf for mozilla firefox.


Flash CD YF Express v10.0.


Kumpulan ratusan foto-foto demo dan seminar Yogyafree, foto-foto gathering Yogyafree, dsb.


THE ONE PAGE LINUX MANUAL. PDF.


LINUX Admin Quick Reference.


windows 2000 sp4 remote (Exploit)


bermain dengan registry. doc.


Cara Sederhana membuat virus PHP. doc.


Cerita hack billing. pdf 263,911.


Demystifying Google Hacks. zip 62,715.


Evil Ping v0.3b. zip 104,532.


Update Jasakom tutor – Juli – September 2007.


Konsep Virus VB. RAR 9,569.


Perintah-perintah UNIXes Dasar. mht.


Mengenai Ngembom E-Mai Lewat E-Maill. zip 442,120.


Menjebol Password Network Neigborhoud. zip 267,250.


onno. rar (Konfigurasi N E61 dst)


seminar ubuntu yogyafree.


NEMESIS – TCP/IP Packet Injection.


rohitab_com – Forums my delphi virus. htm 24,536.


virus_hp. rar (Kumpulan beberapa virus HP)


Dasar-Dasar Security.


Pada postingan kali ini sya cuman pengen berbagi pegalaman seputar komputer dan internet. Tapi sebelumnya saya minta maaf geh bila da kata yang ngawur ato ga bner tlong di ikhlasin aja, maklum anak maren sore. Itung-itung belajar dan cari pengalaman baru. Banyak cincong jadinya nih…hehehehe.


Mungkin bagi anda yang sudah lama terjun ke dunia komputer khususnya internet tidak perlu lagi baca tulisan kayak gini. Yang nulis aja anak ingusan, tentunya yang baca anak ingusan juga dong. Dan sekarang saya mulai bingung, mau duluin yang mana…waduuuuuuhhhhh. gmana kalo soal keamanan (security gitu)……


Keamanan komputer maupun jaringan komputer, terutama yang terhubung ke internet harus direncanakan dan dikoordinasikan dengan baik agar dapat melindungi sumber daya (resource) dan investasi di dalamnya. Informasi (data) dan service (pelayanan) sudah menjadi sebuah komoditi yang sangat penting. Kemampuan untuk mengakses dan menyediakan informasi secara cepat dan akurat menjadi sangat esensial bagi suatu organisasi, baik yang berupa organisasi komersial (perusahaan), perguruan tinggi, lembaga pemerintahan, maupun individual (pribadi).


Dalam mengamankan jaringan ada beberapa aspek yang harus kita perhatikan dan.


dijaga, antara lain:


Sistem yang kita buat harus stabil sejalan dengan waktu, dalam arti bila sewaktu-waktu terjadi perubahan pada perilaku hardware maupun software yang lain dari biasanya. Administrator harus mampu segera mengatasi masalah - masalah tersebut, seperti memperbaiki bug yang ada, melakukan upgrade, dan mengganti device rusak.


Ketersediaan data dan kerahasiaan.


Harus ada perlindungan terhadap informasi baik berupa data, program, dan segala hal yang dianggap penting agar tidak dihapus atau dirubah oleh orang lain yang tidak berhak. Selain itu harus ada jaminan terhadap informasi agar tidak bisa diakses/diketahui atau diubah oleh orang lain yang tidak berhak.


Servis-servis yang kita sediakan di dalam jaringan harus dijaga agar selalu.


tersedia tanpa adanya gangguan.


Harus ada sistem pengendalian tertentu, seperti mengatur hak akses di dalam sistem jaringan. Karena perilaku pemakai sulit ditebak maka pengguna harus dibatasi dalam melakukan akses pada daerah dimana ia berwenang, sedangkan bagi pengguna luar harus ditolak.


Administrator harus melakukan pemantauan terhadap sistem jaringan yang dibangunnya, siapa yang telah mengakses dan menggunakan servis, aktivitas apa yang telah dilakukan, mencari sela-sela sistem yang belum terlindungi, memantau catatan logging sistem, mendeteksi penyusup yang masuk dll.


Sangat penting di sini untuk mengembangkan budaya memperhatikan aspek keamanan dalam menggunakan setiap fasilitas jaringan kepada seluruh user/pengguna. Perlu diperhatikan bagi administrator jaringan agar para pengguna jaringan ikut menjaga keamanan jaringan, misalnya dengan menerapkan disiplin menggunakan login miliknya dan tidak memberikannya kepada siapa pun, mengganti password secara berkala, dan hal-hal lain yang berguna untuk membangun semangat untuk melindungi jaringan secara bersama.


Pengaturan Akses dalam Sistem Unix.


Salah satu cara yang umum digunakan untuk mengamankan informasi adalah dengan mengatur akses ke informasi melalui mekanisme “access control”. Implementasi dari mekanisme ini antara lain dengan menggunakan“p as s word”.


Di sistem Unix, untuk menggunakan sebuah sistem atau komputer, pemakai.


diharuskan melalui prosesa uth enti cation dengan menuliskan“us erid” dan.


“password”. Informasi yang diberikan ini dibandingkan dengan userid dan password.


yang berada di sistem. Apabila keduanya valid, pemakai yang bersangkutan.


diperbolehkan menggunakan sistem. Apabila ada yang salah, pemakai tidak dapa.


menggunakan sistem. Informasi tentang kesalahan ini biasanya dicatat dalam berkaslog. Besarnya informasi yang dicatat bergantung kepada konfigurasi dari sistem setempat. Misalnya, ada yang menuliskan informasi apabila pemakai memasukkanus eri d danpas s w or d yang salah sebanyak tiga kali. Ada juga yang langsung menuliskan informasi ke dalam berkasl og meskipun baru satu kali salah. Informasi tentang waktu kejadian juga dicatat. Selain itu asal hubungan (connection) juga dicatat sehingga administrator dapat memeriksa keabsahan hubungan.


 Password di Sistem Unix.


Akses ke sistem UNIX menggunakan password yang biasanya disimpan di dalam berkas /etc/passwd. Di dalam berkas ini disimpan nama, userid, password, dan informasi-informasi lain yang digunakan oleh bermacam-macam program. Contoh isi berkas password dapat dilihat di bawah ini (dapat dibuka juga dengan perintah ‘vipw’):


Nama atau userid pemakai.


password yang sudah terenkripsi (encrypted pass-word)


UID, user identification number.


GID, group identification number.


nama lengkap dari pemakai (sering juga disebut GECOS.


a atau GCOS field)


home directory dari pemakai.


shell dari pemakai.


Pada sistem UNIX lama, biasanya berkas /etc/passwd ini “readable”, yaitu.


dapat dibaca oleh siapa saja. Meskipun kolom password di dalam berkas itu berisi.


“encrypted password” (password yang sudah terenkripsi), tetapi ini merupakan.


potensi sumber lubang keamanan. Ada program tertentu yang dapat digunakan.


untuk memecah password tersebut. Contoh program ini antara lain:crac k (UNIX),


viper (perl script), dan cracker jack (DOS). Program “password cracker” ini tidak.


dapat mencari tahu kata kunci dari kata yang sudah terenkripsi. Akan tetapi, yang.


dilakukan oleh program ini adalah melakukan coba-coba (brute force attack). Salah satu caranya adalah mengambil kata dari kamus(di ct ionary) kemudian mengenkripsinya. Apabila hasil enkripsi tersebut sama dengan password yang sudah terenkripsi (encrypted password), maka kunci atau passwordnya ketemu. Selain melakukan“look up” dengan menggunakan kamus, biasanya program.


“password cracker” tersebut memiliki beberapa algoritma heuristicseperti.


menambahkan angka di belakangnya, atau membaca dari belakang (terbalik), dan seterusnya. Semakin sederhana password yang digunakan maka kemungkinan terpecahnya password tersebut akan semakin tinggi dan semakin cepat selesainya.


Salah satu cara untuk mempersulit mendapatkan berkas yang berisi password (meskipun terenkripsi) adalah dengan menggunakan “shadow password”. Mekanisme ini menggunakan berkas /etc/shadow untuk menyimpan encrypted password, sementara kolom password di berkas /etc/passwd berisi karakter “x”. Berkas /etc/shadow tidak dapat dibaca secara langsung oleh pemakai biasa (bersifat hidden), tetapi bisa diakses oleh user root.


Beberapa perintah dan fungsi yang berhubungan dengan account dan password :


chage (mengeset password expiration)


chfn (untuk mengubah finger information)


chsh (mengubah default shell)


gpasswd (menambah user dalam group tertentu)


groupadd (menambah group)


groupdel (menghapus group)


groupmod (mengubah setting/informasi group)


id (menampilkan informasi ID beberapa informasi)


login (untuk login)


newgrp (mengganti group efektif)


passwd (membuat password atau mengubah password)


su (substitue user)


userdel (menghapus user)


usermod (mengubah setting dan informasi user)


Dengan adanya kemungkinan password ditebak, misalnya dengan menggunakan program password cracker, maka memilih password memegang peranan yang sangat penting dan memerlukan perhatian khusus. Berikut ini adalah daftar hal-hal yang sebaiknya tidak digunakan sebagai password :


Nama orang, dan hewan.


Nama komputer, nomor telepon atau plat nomor kendaran.


Tanggal lahir, alamat rumah, nama tempat yang terkenal.


Kata-kata yang terdapat dalam kamus (misal : bahasa Indonesia, bahasa.


Password dengan karakter yang sama diulang-ulang.


Password yang mengurutkan penekanan tombol pada keyboard.


Sebaiknya jangan menggunakan password yang terdapat dalam kamus, atau kata - kata yang umum digunakan. Gunakan kombinasi huruf besar dan kecil, dan gunakan angka atau karakter lainnya. Password yang kita gunakan semakin panjang tentu semakin baik. Panjang password minimal secara default biasanya adalah 7 karakter. Kita bisa mengeset sesuai dengan kebutuhan kita (misal = 8 karakter). Untuk itu editlah file /etc/login. defs dengan text editor favorit anda :


[root]# vi /etc/login. defs.


kemudian pada bagian PASS_MIN_LEN 7 (ganti 7 dengan 8).


Enkripsi adalah proses pengubahan/konversi/penyandian suatu informasi ke bentuk tertentu sehingga tidak dimengerti/tidak dapat dimanfaatkan oleh pihak yang tidak berhak. Enkripsi digunakan untuk melindungi data. Dekripsi adalah kebalikan dari proses enkripsi.


Data-data penting yang ada dan yang anda kirimkan bisa diubah sedemikian rupa sehingga tidak mudah disadap. Jenis-jenis metode enkripsi ini banyak sekali, misal : DES (Data Encryption System), PEM (Privacy Enhanced Mail), PGP (Pretty Good Privacy), SSL (Secure Socket Layer), MD5 dll.


Banyak servis di Internet yang masih menggunakan “plain text” untukauthe nt i c at i on,


seperti telnet. Informasi ini dapat dilihat dengan mudah oleh program penyadap.


Aplikasi-aplikasi yang sering digunakan untuk enkripsi antara lain :


SSH (Secure Shell), merupakan aplikasi enkripsi digunakan terutama untuk.


remote akses sebagai pengganti telnet/rlogin.


Gpg (Encryption and signing Tool), merupakan aplikasi enkripsi/dekripsi data.


Crypt, biasa terdapat pada sistem berbasis Unix.


SSL, aplikasi enkripsi data yang berbasis web.


PGP, aplikasi enkripsi data yang berbasis email.


Serangan Terhadap Sistem Keamanan.


Serangan pada keamanan jaringan sangat banyak jenisnya. Bahkan mungkin ditemukan cara-cara baru yang lebih mudah dan efektif serta tidak terlalu membutuhkan kemampuan yang tinggi. Serangan-serangan ini ada yang bersifat mengganggu, merusak, bahkan mengambil alih posisi superuser (root). Serangan yang sering terjadi di internet di antaranya :


Scan adalah probe dalam jumlah besar menggunakan tool secara otomatis dengan tujuan tertentu (misal : mendeteksi kelemahan-kelemahan pada host tujuan). Scanner biasanya bekerja dengan men-scan port TCP /IP dan servis - servisnya dan mencatat respon dari komputer target. Dari scanner ini dapat diperoleh informasi mengenai port-port mana saja yang terbuka. Kemudian yang dilakukan adalah mencari tahu kelemahan-kelemahan yang mungkin bisa dimanfaatkan berdasar port yang terbuka dan aplikasi serta versi aplikasi yang digunakan.


Sniffer adalah device (software maupun hardware) yang digunakan untuk mendengar informasi yang melewati jaringan dengan protokol apa saja. Host dengan mode promiscuous mampu mendengar semua trafik di dalam jaringan. Sniffer dapat menyadap password maupun informasi rahasia, dan keberadaannya biasanya cukup sulit untuk dideteksi karena bersifat pasif. Sniffer ini mendengarkan port Ethernet untuk hal-hal seperti “Password”, “Login” dan “su” dalam aliran paket dan kemudian mencatat lalu lintas setelahnya. Dengan cara ini, penyerang memperoleh password untuk sistem yang bahkan tidak mereka usahakan untuk dibongkar. Password teks biasa adalah sangat rentan terhadap serangan ini. Untuk mengatasinya, dapat digunakan enkripsi, merancang arsitektur jaringan yang lebih aman dan menggunakan One Time Password (OTP).


Eksploit berarti memanfaatkan kelemahan sistem untuk aktifitas-aktifitas di.


luar penggunaan normal yang sewajarnya.


Biasanya IP spoofing dilakukan dengan menyamarkan identitas alamat IP menjadi IP yang tepercaya (misal dengan script tertentu) dan kemudian melakukan koneksi ke dalam jaringan. Bila berhasil akan dilanjutkan dengan serangan berikutnya.


DoS (Denial of Service) attack.


Salah satu sumberdaya jaringan yang berharga adalah servis-servis yang disediakannya. DoS atau malah Distributed DoS (DDoS) attack dapat menyebabkan servis yang seharusnya ada menjadi tidak bisa digunakan. Hal ini tentu akan mendatangkan masalah dan merugikan. Penyebab penolakan servis ini sangat banyak sekali, dapat disebabkan antara lain :


1. Jaringan kebanjiran trafik (misal karena serangan syn flooding, ping.


2. Jaringan terpisah karena ada penghubung (router/gateway) yang tidak.


3. Ada worm/virus yang menyerang dan menyebar sehingga jaringan.


menjadi lumpuh bahkan tidak berfungsi, dll.


Malicious Code adalah program yang dapat menimbulkan efek yang tidak.


diinginkan jika dieksekusi. Jenisnya antara lain : trojan horse, virus, dan worm. Trojan Horse adalah program yang menyamar dan melakukan aktifitas tertentu secara tersembunyi (biasanya merugikan, misal : game yang mencuri password). Virus adalah program yang bersifat mengganggu bahkan merusak dan biasanya memerlukan intervensi manusia dalam penyebarannya. Worm adalah program yang dapat menduplikasikan diri dan menyebar dengan cepat tanpa intervensi manusia. Malicious kode dapat menimbulkan beragam tingkat permasalahan.


Serangan secara fisik.


Serangan secara fisik misalnya mengakses server/jaringan/piranti secara.


Buffer Ofer Flow.


Dapat terjadi jika ada fungsi yang dibebani dengan data yang lebih besar dari yang mampu ditangani fungsi tersebut. Buffer adalah penampungan sementara di memori komputer dan biasanya mempunyai ukuran tertentu. Jika hal itu terjadi maka kemungkinan yang dapat terjadi adalah :


Program menolak dan memberi peringatan.


Program akan menerima data, meletakkannya pada memori dan mengoverwrite isi memori jika ada data sebelumnya. Cracker dapat membuat data di mana bagian overflownya adalah set instruksi tertentu untuk mendapatkan akses. Jika set instruksi baru menempati tempat suatu instruksi sebelumnya, maka instruksi cracker akan dapat dijalankan.


Social engineering berarti usaha untuk mendapatkan password dengan jalan.


‘memintanya’ , misalkan dengan menggunakan fakemail.


OS Finger Printing.


Mengetahui operating system (OS) dari target yang akan diserang merupakan salah satu pekerjaan pertama yang dilakukan oleh seorang cracker. Setelah mengetahui OS yang dituju, dia dapat melihat database kelemahan sistem yang dituju. F i nge rpri nt i ng merupakan istilah yang umum digunakan untuk menganalisa OS sistem yang dituju. Beberapa cara.


konvensional antara lain : telnet, ftp, netcat, dll.


Jika server tersebut kebetulan menyediakan suatu servis, seringkali ada banner yang menunjukkan nama OS beserta versinya. Misalkan dilakukan dengan telnet dengan port tertentu, atau dapat juga menggunakan program tertentu.


Cara fingerprinting yang lebih canggih adalah dengan menganalisa respon sistem terhadap permintaan (request) tertentu. Misalnya dengan menganalisa nomor urut packet TCP/IP yang dikeluarkan oleh server tersebut dapat dipersempit ruang jenis dari OS yang digunakan.


Ada beberapa tools untuk melakukan deteksi OS ini antara lain:n map, dan.


Crack password adalah program untuk MENDUGA dan memecahkan.


password dengan menggunakan sebuah atau beberapa kamus(di ct i onary)


Dewasa ini tool-tool yang digunakan dalam penyerangan semakin mudah digunakan.


dan efektif, bahkan banyak yang disertai source kodenya..


Situs-situs Security di internet.


Sudah menjadi kewajiban administrator tentunya, untuk senantiasa mengikuti perkembangan keamanan jaringan sehingga tetap up to date. Kadang ditemukan bug-bug terbaru yang dapat dieksploit, dan patch lebih sering datang terlambat dan baru dikeluarkan setelah ditemukannya bug yang telah memakan korban.


Cukup banyak situs-situs di internet yang berisi informasi, script, maupun program dunia underground ini, dari situs Indonesia sampai situs internasional. Yang cukup terkenal antara lain :


Panduan Lengkap Membangun Server Menggunakan Linux SuSE 9.1.


Adapula situs yang menawarkan scan secara online otomatis , di antaranya :


Service inetd (internet daemon)


Secara default sistem kita akan menjalankan beberapa servis internet yang mungkin sebagian di antaranya tidak kita gunakan/perlukan. Untuk meningkatkan keamanan, lebih baik servis-servis (misalkan finger, telnet, dll) yang tidak terlalu kita butuhkan dimatikan/ditutup saja. Sudah banyak kasus yang menunjukkan kesalahan penggunaan (abuse) dari servis tersebut, atau ada kemungkinan lubang keamanan dalam servis tersebut akan tetapi sang administrator tidak menyadari bahwa servis tersebut dijalankan di komputernya. Kebanyakan servis yang berhubungan dengan internet (misalkan : ftp, telnet , ssh, dll) akan dijalankan melalui inetd (internet daemon).


Dengan melakukan pengeditan pada /etc/inetd. conf (konfigurasi utama internet.


daemon :su perserver) maka kita dapat melakukan modifikasi-modifikasi yang.


Mengenal Port.


Apa itu Port? , yang saya maksud bukan “pelabuhan” atau Air Port (Bandar Udara), tapi Port yang saya maksud di sini adalah port yang ada di komputer dan Dunia internet,


Port adalah suatu celah atau pintu atau lubang pada system komputer sebagai jalur transfer data.


Pada system komputer sebenarnya ada dua jenis Port yaitu :


& # 8211; Port fisik, adalah soket atau slot atau colokan yang ada di belakang CPU sebagai penghubung peralatan input-output komputer, misalnya Mouse, keyboard, printer…dll.


& # 8211; Port Logika (non fisik),adalah port yang di gunakan oleh Software sebagai jalur untuk melakukan koneksi dengan komputer lain, tentunya termasuk koneksi internet.


Port Logika inilah yang akan kita bahas di sini, yaitu port yang berhubungan secara langsung dengan kegiatan kita ber-internet.


Port Logika ini di golongkan 3 jenis berdasarkan range dan klasifikasinya-nya yaitu:


1. Port umum (well known port)


port Pada kelas ini memiliki range dari 0-1023, port pada range ini kebanyakan dipakai oleh root, atau oleh program yang dijalankan oleh user, seperti ftp(21),ssh(22),telnet(23),http(80),jadi mislanya bila kita sedang browsing maka kita mengakses port 80 pada situs yang kita akses(http).


2. Port Terdaftar (Registered Ports)


memiliki range dari 1024-49151, port pada range ini kebanyakan digunakan oleh Networking utlities seperti Browser, Email Client, Messenger Utilities untuk berkomunikasi dengan remote.


server. Biasanya Networking utlites akan membuka secara acak port pada range ini untuk terhubung dgn remote server. Port number pada range inilah yang membuat kita dapat melakukan surfing di internet, melakukan pengecekan e-mail, dll. Misalanya kita sedang Chat dengan Yahoo! Messenger maka kita sedang mengakses Port:1143,1155,5050,1177, 1186, 1187.


3. Port Pribadi atau Port Dinamis (Dynamic or Private Ports).


memiliki range dari 49152-65535, port ini terutama di gunakan program yang memerlukan range port number yang besar, seperti pada Sun yang menjalankan RPC pada port 32768.


Ok, jadi gambaran jelasnya misalkan komputer kita ibaratkan rumah maka TCP/IP adalah alamat rumah kita (masalah TCP/IP bisa di baca jelasnya pada posting saya dulu pada link ini) dan Port adalah pintu, jendela, lubang, celah dari Rumah itu yang memungkinkan sesuatu bisa keluar-masuk. contoh nya di bawah ini port-port yang sering di gunakan pengguna internet.


port 80 untuk HTTP.


443 untuk https.


53 untuk Domain name server (DNS)


port 443, 563 untuk SSH, HTTPS (SSL) dan SNEWS.


port 21 untuk FTP.


port 6901 untuk Voice Chat.


port 2082 untuk cPanel.


port 2095 untuk Webmail (cPanel)


port 2086 untuk WHM.


port 1863 untuk MSN Messenger.


port 113,194, 531, 6667,6668,6669, 31456, 31457, 31458, 7000, 6666, 6665, untuk IRC.


port 5050 untuk YM.


port 5000,5100 untuk Yahoo Webcam.


port 2083 untuk secure CPanel.


port 2096 untuk secure webmail.


port 2087 untuk secure WHM.


port 25 untuk SMTP.


port 110 untuk POP3.


Bila anda mau tau port-port yang sedang aktif di dunia maya suatu cara gampangnya bisa kita gunakan progarm-program scanner misalnya, bisa anda download di sini , atau bila anda ingin tau port-port yang sedang anda gunakan ketika online, anda bisa mejalankan program what’s running bisa di download di sini.


Bila kita tidak bisa mengakses suatu service internet di suatau tempat umum Warnet misalnya, dan di tempat lain bisa, maka kemungkinan port untuk service tersebut tertutup , dan memang ada beberapa ISP yang membatasi suatu akses port begitu juga di tempat-tempat fasilitas internet umum seperti Warnet ada yang melakukan pembatasan terhadap beberapa service.


Banyak aktivitas hacking yang mencari-cari celah dari port-port ini pada komputer target.

Comments

Popular posts from this blog

Opções de ações executivas período de carência

Período de carência para opções executivas Sua fonte para obter um pacote de separação melhor. A maioria dos executivos e funcionários não quer pensar nisso quando aceita uma nova posição, mas é quase certo que um dia eles deixarão seu novo empregador. A experiência nos diz que uma proporção significativa daqueles que um dia partirão partirá em circunstâncias menos que amistosas. Se você optou por não negociar seu pacote de desligamento antes de assumir seu último emprego, poderá se perguntar: "Meu empregador está me oferecendo um pacote de indenização justo?" O melhor momento para negociar um pacote de indenização ou "acordo de separação" é antes de você aceitar essa nova posição. Uma vez que você comece a trabalhar, é tarde demais para levantar o espectro de coisas que não funcionam. E uma vez que um lado decide se separar do outro, seja você ou seu empregador, é realmente tarde demais para uma discussão amigável. Qualquer discussão sobre o aumento da indenização...