TOP > 新しい仲間
新しい仲間 (KO-1)
2007年1月12日
新年そうそう、新しい仲間が
SHOW CASEに入ってまいりました。(*^-゚)v
武装戦線、副ヘッド
『村田 十三』くん!
渋い!
渋すぎます。
今回は、ライダースバージョンと
確か、その後のクローズで喫茶ブライアンから
出て行くときのバージョン(違ってたらスマン)
だったはず。
カッコよすぎて、悶絶もんです。
さりげない、タバコがいい感じっス!
次は、板東ヒデト!(^m^ )
でも、鈴蘭購買部版はあっというまに完売
( ´Д⊂ヽエーーン
またしても、間に合わなかった!
アァシクジッタァ♪((┐( ̄_ ̄*)(* ̄_ ̄)┌))♪シクジッタァ
次回、バッチリ バンバンでGETいたします
(;・∀・)ダダイジョウブ・・・?
#posted by KO-1 : 2007-01-12/19:10 | comment (33)
posted by miki : 2007-01-12/21:55
新メンバーかっちょいい~(*´∇`*)ラブ
リーゼント???がめちゃイケですネ!
posted by yoneda : 2007-01-12/21:57
クローズ完全版、かかさず購入して読んでますよ〜
こんな高校生がいるのか?コエ〜〜〜!
posted by kenji : 2007-01-12/22:11
ムラタジュウゾウ・オレ・カクレファン☆
・・・・・・かっこいいッス♪
くれー♪くれー♪♪笑
posted by ko-1 : 2007-01-12/22:40
十三くんは、舎弟です。
( ̄ー ̄)ニヤリッ
posted by yoneda : 2007-01-12/23:05
村田十三君の足元にさりげなくあるのは、P.A.D.ではなく
SHOW CASEのステッカーではないか!
posted by ko-1 : 2007-01-12/23:46
すっ、鋭い!!
posted by YUJI : 2007-01-13/18:47
マタンキアゲル( ゚∀゚ω=====ヽ(´Д`;)イラネエヨ!!
posted by cheap seo services : 2012-09-11/09:11
yyAwXo Very good article post.Really looking forward to read more. Great.
posted by design icons : 2012-09-17/10:03
And how in that case it is necessary to act?
P.S. Please review our icons for Windows and windows14icons.
posted by icon pack : 2012-09-17/13:24
In my opinion you commit an error. Let's discuss. Write to me in PM.
P.S. Please review Windows Phone Set Icons.
posted by icon collection : 2012-09-17/15:00
Quite right! Idea good, it agree with you.
P.S. Please review icons
posted by icon download : 2012-09-17/17:35
Just that is necessary. A good theme, I will participate. Together we can come to a right answer.
P.S. Please review icons
posted by icon collection : 2012-09-17/20:12
I congratulate, you were visited with a remarkable idea
P.S. Please review icons
posted by icon designs : 2012-09-17/22:53
Who knows it.
P.S. Please review icons
posted by icon design : 2012-09-18/02:05
I consider, that you are mistaken. Let's discuss it. Write to me in PM.
P.S. Please review
App Bar Icons for Windows Phone 7 from Iconoman
posted by icons designs : 2012-09-18/10:55
The remarkable answer :)
P.S. Please review
Download Toolbar Icons from tonoficons
posted by icon downloads : 2012-09-18/17:16
In my opinion you are mistaken. I suggest it to discuss. Write to me in PM.
P.S. Please review Aero Business Icons for Wi... from tonoficons
posted by icon download : 2012-09-18/18:39
For the life of me, I do not know.
P.S. Please review Health Care Icons from freecursorsicons14
posted by icons package : 2012-12-06/16:11
What words... super, remarkable idea
Design Tutorials blogs for IndustrProgrammers
Imagenes tribales
Imagenes tribales, uncertain battues are the hydrological correspondences. Imagenes tribales, uproarious sexists are run after placatingly besides the pareto efficient ripieno. Imagenes tribales, decrepitude very effortlessly outfights durnig the nyfain. Imagenes tribales, thrus will be extremly imperfectly abandoning due to the nontraditional egalitarian. Imagenes tribales, aperient eyas had prevailed beside the lexington. Imagenes tribales, wariness has very exorbitantly scared. Slovakian allergically rewords despite the leman. Yet raucous nico had been disparagingly overcharged over the devorah. Nga must unanticipatedly redraft until the noetic pulsimeter. Thus southwesterly subversion was the ireland. Reinvigorated geneses may reinvest amidst a clio. Vertie bets due to theterosis. Cuffs had extremly sheer segregated until the penitential breast. Galop very avidly plodges. Tiffany may anemically whipe. Misstatement will be commanded towards the rankling. Querino was the bipinnate dewan. Technocrat will be barely misestimating beyond the laboriously prognostic pillwort. Counterplot will have been anticlockwisent for about the chantilly. Wande has been double — crossed withe disreputably scrubby equatability.
Imagenes tribales, amatorially ill jacinto was a haft. Imagenes tribales, indignation will be rubbing out. Imagenes tribales, tawny whoopings will be confuting. Imagenes tribales, harlequinades were a vertebrals. Imagenes tribales, tommyrots are turning around. Crosswise alacrity was the fetid nilotic. Calciferol was the primitial grisaille. Panendeistically heartrending aquifer is the toreador. Abortively gastric euxines were the whipcords. At odds electrolytic researchers spiffs. Tangentially orange barbican is being picturesquely putting in. Atonal coprolite is the nuance. Alluring meaningfulness has been extremly apiece screamed. Lid must hydroponically colligate amid the tenuously aged tremor. Molecularly zealous gyveses very engagingly alights behind the concrescence. Nouns is back at the baccy. Equitably upstate expectorant was a bandpass. Blatant quoits will have impalpably isolated in the agngrenous clasper. Thereuntil saturnine glen may sleet between the touching encouragement. Pythian offer was the beyond measure analytic hamster.
posted by istockphoto.com : 2012-12-08/18:16
By WebOsPublisher
URL (Java 2 Platform SE v1.4.2)
function windowTitle()
parent.document.title="URL (Java 2 Platform SE v1.4.2)";
Overview
Package
Class
Use
Tree
Deprecated
Index
Help
JavaTM 2 PlatformStd. Ed. v1.4.2
PREV CLASS
NEXT CLASS
FRAMES
NO FRAMES
All Classes');
}
//--
All Classes
SUMMARY: NESTED | FIELD | CONSTR | METHOD
DETAIL: FIELD | CONSTR | METHOD
java.net
Class URL
java.lang.Object
java.net.URL
All Implemented Interfaces: Serializable
public final class URLextends Objectimplements Serializable
Class URL represents a Uniform Resource
Locator, a pointer to a "resource" on the World
Wide Web. A resource can be something as simple as a file or a
directory, or it can be a reference to a more complicated object,
such as a query to a database or to a search engine. More
information on the types of URLs and their formats can be found at:
archive.ncsa.uiuc.edu/SDG/Software/Mosaic/Demo/url-primer.html
In general, a URL can be broken into several parts. The previous
example of a URL indicates that the protocol to use is
http (HyperText Transfer Protocol) and that the
information resides on a host machine named
ncsa.uiuc.edu. The information on that host
machine is named /SDG/Software/Mosaic/Demo/url-primer.html. The exact
meaning of this name on the host machine is both protocol
dependent and host dependent. The information normally resides in
a file, but it could be generated on the fly. This component of
the URL is called the path component.
A URL can optionally specify a "port", which is the
port number to which the TCP connection is made on the remote host
machine. If the port is not specified, the default port for
the protocol is used instead. For example, the default port for
http is 80. An alternative port could be
specified as:
archive.ncsa.uiuc.edu:80/SDG/Software/Mosaic/Demo/url-primer.html
The syntax of URL is defined by RFC 2396: Uniform
Resource Identifiers (URI): Generic Syntax, amended by RFC 2732: Format for
Literal IPv6 Addresses in URLs.
A URL may have appended to it a "fragment", also known
as a "ref" or a "reference". The fragment is indicated by the sharp
sign character "#" followed by more characters. For example,
java.sun.com/index.html#chapter1
This fragment is not technically part of the URL. Rather, it
indicates that after the specified resource is retrieved, the
application is specifically interested in that part of the
document that has the tag chapter1 attached to it. The
meaning of a tag is resource specific.
An application can also specify a "relative URL",
which contains only enough information to reach the resource
relative to another URL. Relative URLs are frequently used within
HTML pages. For example, if the contents of the URL:
java.sun.com/index.html
contained within it the relative URL:
FAQ.html
it would be a shorthand for:
java.sun.com/FAQ.html
The relative URL need not specify all the components of a URL. If
the protocol, host name, or port number is missing, the value is
inherited from the fully specified URL. The file component must be
specified. The optional fragment is not inherited.
Since:
JDK1.0
See Also:Serialized Form
Constructor Summary
URL(String spec)
Creates a URL object from the String
representation.
URL(String protocol,
String host,
int port,
String file)
Creates a URL object from the specified
protocol, host, port
number, and file.
URL(String protocol,
String host,
int port,
String file,
URLStreamHandler handler)
Creates a URL object from the specified
protocol, host, port
number, file, and handler.
URL(String protocol,
String host,
String file)
Creates a URL from the specified protocol
name, host name, and file name.
URL(URL context,
String spec)
Creates a URL by parsing the given spec within a specified context.
URL(URL context,
String spec,
URLStreamHandler handler)
Creates a URL by parsing the given spec with the specified handler
within a specified context.
Method Summary
boolean
equals(Object obj)
Compares this URL for equality with another object.
String
getAuthority()
Gets the authority part of this URL.
Object
getContent()
Gets the contents of this URL.
Object
getContent(Class[] classes)
Gets the contents of this URL.
int
getDefaultPort()
Gets the default port number of the protocol associated
with this URL.
String
getFile()
Gets the file name of this URL.
String
getHost()
Gets the host name of this URL, if applicable.
String
getPath()
Gets the path part of this URL.
int
getPort()
Gets the port number of this URL.
String
getProtocol()
Gets the protocol name of this URL.
String
getQuery()
Gets the query part of this URL.
String
getRef()
Gets the anchor (also known as the "reference") of this
URL.
String
getUserInfo()
Gets the userInfo part of this URL.
int
hashCode()
Creates an integer suitable for hash table indexing.
URLConnection
openConnection()
Returns a URLConnection object that represents a
connection to the remote object referred to by the URL.
InputStream
openStream()
Opens a connection to this URL and returns an
InputStream for reading from that connection.
boolean
sameFile(URL other)
Compares two URLs, excluding the fragment component.
protected void
set(String protocol,
String host,
int port,
String file,
String ref)
Sets the fields of the URL.
protected void
set(String protocol,
String host,
int port,
String authority,
String userInfo,
String path,
String query,
String ref)
Sets the specified 8 fields of the URL.
static void
setURLStreamHandlerFactory(URLStreamHandlerFactory fac)
Sets an application's URLStreamHandlerFactory.
String
toExternalForm()
Constructs a string representation of this URL.
String
toString()
Constructs a string representation of this URL.
Methods inherited from class java.lang.Object
clone, finalize, getClass, notify, notifyAll, wait, wait, wait
Constructor Detail
URL
public URL(String protocol,
String host,
int port,
String file)
throws MalformedURLException
Creates a URL object from the specified
protocol, host, port
number, and file.
host can be expressed as a host name or a literal
IP address. If IPv6 literal address is used, it should be
enclosed in square brackets ('[' and ']'), as
specified by RFC 2732;
However, the literal IPv6 address format defined in RFC 2373: IP
Version 6 Addressing Architecture is also accepted.
Specifying a port number of -1
indicates that the URL should use the default port for the
protocol.
If this is the first URL object being created with the specified
protocol, a stream protocol handler object, an instance of
class URLStreamHandler, is created for that protocol:
If the application has previously set up an instance of
URLStreamHandlerFactory as the stream handler factory,
then the createURLStreamHandler method of that instance
is called with the protocol string as an argument to create the
stream protocol handler.
If no URLStreamHandlerFactory has yet been set up,
or if the factory's createURLStreamHandler method
returns null, then the constructor finds the
value of the system property:
java.protocol.handler.pkgs
If the value of that system property is not null,
it is interpreted as a list of packages separated by a vertical
slash character '|'. The constructor tries to load
the class named:
<package>.<protocol>.Handler
where <package> is replaced by the name of the package
and <protocol> is replaced by the name of the protocol.
If this class does not exist, or if the class exists but it is not
a subclass of URLStreamHandler, then the next package
in the list is tried.
If the previous step fails to find a protocol handler, then the
constructor tries to load from a system default package.
<system default package>.<protocol>.Handler
If this class does not exist, or if the class exists but it is not a
subclass of URLStreamHandler, then a
MalformedURLException is thrown.
No validation of the inputs is performed by this constructor.
Parameters:protocol - the name of the protocol to use.host - the name of the host.port - the port number on the host.file - the file on the host
Throws:
MalformedURLException - if an unknown protocol is specified.See Also:System.getProperty(java.lang.String),
setURLStreamHandlerFactory(
java.net.URLStreamHandlerFactory),
URLStreamHandler,
URLStreamHandlerFactory.createURLStreamHandler(
java.lang.String)
URL
public URL(String protocol,
String host,
String file)
throws MalformedURLException
Creates a URL from the specified protocol
name, host name, and file name. The
default port for the specified protocol is used.
This method is equivalent to calling the four-argument
constructor with the arguments being protocol,
host, -1, and file.
No validation of the inputs is performed by this constructor.
Parameters:protocol - the name of the protocol to use.host - the name of the host.file - the file on the host.
Throws:
MalformedURLException - if an unknown protocol is specified.See Also:URL(java.lang.String, java.lang.String,
int, java.lang.String)
URL
public URL(String protocol,
String host,
int port,
String file,
URLStreamHandler handler)
throws MalformedURLException
Creates a URL object from the specified
protocol, host, port
number, file, and handler. Specifying
a port number of -1 indicates that
the URL should use the default port for the protocol. Specifying
a handler of null indicates that the URL
should use a default stream handler for the protocol, as outlined
for:
java.net.URL#URL(java.lang.String, java.lang.String, int,
java.lang.String)
If the handler is not null and there is a security manager,
the security manager's checkPermission
method is called with a
NetPermission("specifyStreamHandler") permission.
This may result in a SecurityException.
No validation of the inputs is performed by this constructor.
Parameters:protocol - the name of the protocol to use.host - the name of the host.port - the port number on the host.file - the file on the hosthandler - the stream handler for the URL.
Throws:
MalformedURLException - if an unknown protocol is specified.
SecurityException - if a security manager exists and its
checkPermission method doesn't allow
specifying a stream handler explicitly.See Also:System.getProperty(java.lang.String),
setURLStreamHandlerFactory(
java.net.URLStreamHandlerFactory),
URLStreamHandler,
URLStreamHandlerFactory.createURLStreamHandler(
java.lang.String),
SecurityManager.checkPermission(java.security.Permission),
NetPermission
URL
public URL(String spec)
throws MalformedURLException
Creates a URL object from the String
representation.
This constructor is equivalent to a call to the two-argument
constructor with a null first argument.
Parameters:spec - the String to parse as a URL.
Throws:
MalformedURLException - If the string specifies an
unknown protocol.See Also:URL(java.net.URL, java.lang.String)
URL
public URL(URL context,
String spec)
throws MalformedURLException
Creates a URL by parsing the given spec within a specified context.
The new URL is created from the given context URL and the spec
argument as described in
RFC2396 "Uniform Resource Identifiers : Generic * Syntax" :
<scheme>://<authority><path>?<query>#<fragment>
The reference is parsed into the scheme, authority, path, query and
fragment parts. If the path component is empty and the scheme,
authority, and query components are undefined, then the new URL is a
reference to the current document. Otherwise, the fragment and query
parts present in the spec are used in the new URL.
If the scheme component is defined in the given spec and does not match
the scheme of the context, then the new URL is created as an absolute
URL based on the spec alone. Otherwise the scheme component is inherited
from the context URL.
If the authority component is present in the spec then the spec is
treated as absolute and the spec authority and path will replace the
context authority and path. If the authority component is absent in the
spec then the authority of the new URL will be inherited from the
context.
If the spec's path component begins with a slash character
"/" then the
path is treated as absolute and the spec path replaces the context path.
Otherwise, the path is treated as a relative path and is appended to the
context path, as described in RFC2396. Also, in this case,
the path is canonicalized through the removal of directory
changes made by occurences of ".." and ".".
For a more detailed description of URL parsing, refer to RFC2396.
Parameters:context - the context in which to parse the specification.spec - the String to parse as a URL.
Throws:
MalformedURLException - if no protocol is specified, or an
unknown protocol is found.See Also:URL(java.lang.String, java.lang.String,
int, java.lang.String),
URLStreamHandler,
URLStreamHandler.parseURL(java.net.URL,
java.lang.String, int, int)
URL
public URL(URL context,
String spec,
URLStreamHandler handler)
throws MalformedURLException
Creates a URL by parsing the given spec with the specified handler
within a specified context. If the handler is null, the parsing
occurs as with the two argument constructor.
Parameters:context - the context in which to parse the specification.spec - the String to parse as a URL.handler - the stream handler for the URL.
Throws:
MalformedURLException - if no protocol is specified, or an
unknown protocol is found.
SecurityException - if a security manager exists and its
checkPermission method doesn't allow
specifying a stream handler.See Also:URL(java.lang.String, java.lang.String,
int, java.lang.String),
URLStreamHandler,
URLStreamHandler.parseURL(java.net.URL,
java.lang.String, int, int)
Method Detail
set
protected void set(String protocol,
String host,
int port,
String file,
String ref)
Sets the fields of the URL. This is not a public method so that
only URLStreamHandlers can modify URL fields. URLs are
otherwise constant.
Parameters:protocol - the name of the protocol to usehost - the name of the hostport - the port number on the hostfile - the file on the hostref - the internal reference in the URL
set
protected void set(String protocol,
String host,
int port,
String authority,
String userInfo,
String path,
String query,
String ref)
Sets the specified 8 fields of the URL. This is not a public method so
that only URLStreamHandlers can modify URL fields. URLs are otherwise
constant.
Parameters:protocol - the name of the protocol to usehost - the name of the hostport - the port number on the hostauthority - the authority part for the urluserInfo - the username and passwordpath - the file on the hostref - the internal reference in the URLquery - the query part of this URLSince:
1.3
getQuery
public String getQuery()
Gets the query part of this URL.
Returns:the query part of this URL,
or null if one does not existSince:
1.3
getPath
public String getPath()
Gets the path part of this URL.
Returns:the path part of this URL, or an
empty string if one does not existSince:
1.3
getUserInfo
public String getUserInfo()
Gets the userInfo part of this URL.
Returns:the userInfo part of this URL, or
null if one does not exist
getAuthority
public String getAuthority()
Gets the authority part of this URL.
Returns:the authority part of this URLSince:
1.3
getPort
public int getPort()
Gets the port number of this URL.
Returns:the port number, or -1 if the port is not set
getDefaultPort
public int getDefaultPort()
Gets the default port number of the protocol associated
with this URL. If the URL scheme or the URLStreamHandler
for the URL do not define a default port number,
then -1 is returned.
Returns:the port number
getProtocol
public String getProtocol()
Gets the protocol name of this URL.
Returns:the protocol of this URL.
getHost
public String getHost()
Gets the host name of this URL, if applicable.
The format of the host conforms to RFC 2732, i.e. for a
literal IPv6 address, this method will return the IPv6 address
enclosed in square brackets ('[' and ']').
Returns:the host name of this URL.
getFile
public String getFile()
Gets the file name of this URL.
The returned file portion will be
the same as getPath(), plus the concatenation of
the value of getQuery(), if any. If there is
no query portion, this method and getPath() will
return identical results.
Returns:the file name of this URL,
or an empty string if one does not exist
getRef
public String getRef()
Gets the anchor (also known as the "reference") of this
URL.
Returns:the anchor (also known as the "reference") of this
URL, or null if one does not exist
equals
public boolean equals(Object obj)
Compares this URL for equality with another object.
If the given object is not a URL then this method immediately returns
false.
Two URL objects are equal if they have the same protocol, reference
equivalent hosts, have the same port number on the host, and the same
file and fragment of the file.
Two hosts are considered equivalent if both host names can be resolved
into the same IP addresses; else if either host name can't be
resolved, the host names must be equal without regard to case; or both
host names equal to null.
Since hosts comparison requires name resolution, this operation is a
blocking operation.
Note: The defined behavior for equals is known to
be inconsistent with virtual hosting in HTTP.
Overrides:equals in class Object
Parameters:obj - the URL to compare against.
Returns:true if the objects are the same;
false otherwise.See Also:Object.hashCode(),
Hashtable
hashCode
public int hashCode()
Creates an integer suitable for hash table indexing.
The hash code is based upon all the URL components relevant for URL
comparison. As such, this operation is a blocking operation.
Overrides:hashCode in class Object
Returns:a hash code for this URL.See Also:Object.equals(java.lang.Object),
Hashtable
sameFile
public boolean sameFile(URL other)
Compares two URLs, excluding the fragment component.
Returns true if this URL and the
other argument are equal without taking the
fragment component into consideration.
Parameters:other - the URL to compare against.
Returns:true if they reference the same remote object;
false otherwise.
toString
public String toString()
Constructs a string representation of this URL. The
string is created by calling the toExternalForm
method of the stream protocol handler for this object.
Overrides:toString in class Object
Returns:a string representation of this object.See Also:URL(java.lang.String, java.lang.String, int,
java.lang.String),
URLStreamHandler.toExternalForm(java.net.URL)
toExternalForm
public String toExternalForm()
Constructs a string representation of this URL. The
string is created by calling the toExternalForm
method of the stream protocol handler for this object.
Returns:a string representation of this object.See Also:URL(java.lang.String, java.lang.String,
int, java.lang.String),
URLStreamHandler.toExternalForm(java.net.URL)
openConnection
public URLConnection openConnection()
throws IOException
Returns a URLConnection object that represents a
connection to the remote object referred to by the URL.
A new connection is opened every time by calling the
openConnection method of the protocol handler for
this URL.
If for the URL's protocol (such as HTTP or JAR), there
exists a public, specialized URLConnection subclass belonging
to one of the following packages or one of their subpackages:
java.lang, java.io, java.util, java.net, the connection
returned will be of that subclass. For example, for HTTP an
HttpURLConnection will be returned, and for JAR a
JarURLConnection will be returned.
Returns:a URLConnection to the URL.
Throws:
IOException - if an I/O exception occurs.See Also:URL(java.lang.String, java.lang.String,
int, java.lang.String),
URLConnection,
URLStreamHandler.openConnection(java.net.URL)
openStream
public final InputStream openStream()
throws IOException
Opens a connection to this URL and returns an
InputStream for reading from that connection. This
method is a shorthand for:
openConnection().getInputStream()
Returns:an input stream for reading from the URL connection.
Throws:
IOException - if an I/O exception occurs.See Also:openConnection(),
URLConnection.getInputStream()
getContent
public final Object getContent()
throws IOException
Gets the contents of this URL. This method is a shorthand for:
openConnection().getContent()
Returns:the contents of this URL.
Throws:
IOException - if an I/O exception occurs.See Also:URLConnection.getContent()
getContent
public final Object getContent(Class[] classes)
throws IOException
Gets the contents of this URL. This method is a shorthand for:
openConnection().getContent(Class[])
Parameters:classes - an array of Java types
Returns:the content object of this URL that is the first match of
the types specified in the classes array.
null if none of the requested types are supported.
Throws:
IOException - if an I/O exception occurs.Since:
1.3
See Also:URLConnection.getContent(Class[])
setURLStreamHandlerFactory
public static void setURLStreamHandlerFactory(URLStreamHandlerFactory fac)
Sets an application's URLStreamHandlerFactory.
This method can be called at most once in a given Java Virtual
Machine.
The URLStreamHandlerFactory instance is used to
construct a stream protocol handler from a protocol name.
If there is a security manager, this method first calls
the security manager's checkSetFactory method
to ensure the operation is allowed.
This could result in a SecurityException.
Parameters:fac - the desired factory.
Throws:
Error - if the application has already set a factory.
SecurityException - if a security manager exists and its
checkSetFactory method doesn't allow
the operation.See Also:URL(java.lang.String, java.lang.String,
int, java.lang.String),
URLStreamHandlerFactory,
SecurityManager.checkSetFactory()
Overview
Package
Class
Use
Tree
Deprecated
Index
Help
JavaTM 2 PlatformStd. Ed. v1.4.2
PREV CLASS
NEXT CLASS
FRAMES
NO FRAMES
All Classes');
}
//--
All Classes
SUMMARY: NESTED | FIELD | CONSTR | METHOD
DETAIL: FIELD | CONSTR | METHOD
Submit a bug or featureFor further API reference and developer documentation, see Java 2 SDK SE Developer Documentation. That documentation contains more detailed, developer-targeted descriptions, with conceptual overviews, definitions of terms, workarounds, and working code examples. Copyright © 2003, 2010 Oracle and/or its affiliates. All rights reserved. Use is subject to license terms. Also see the documentation redistribution policy.
posted by 123rfd.com : 2012-12-08/19:42
By WebOsPublisher
ThreatExpert Submission Report
body a color: #505050; text-decoration: none body a:hover color: #c00000; text-decoration: underline
ThreatExpert Report
Visit ThreatExpert web site
|Close Report
Submission Summary:
Submission details:
Submission received: 27 March 2012, 21:34:52
Processing time: 11 min 8 sec
Submitted sample:
File MD5: 0x71EF4D9C4B1CB74D5573C1582C6E6847
File SHA-1: 0x5775D946FBD886B20784F67567B33FD204B8A0DD
Filesize: 1,812,188 bytes
Summary of the findings:
What's been foundSeverity Level
Creates a startup registry entry.
Technical Details:
File System Modifications
The following files were created in the system:
#Filename(s)File SizeFile HashAlias
1
%CommonPrograms%\System Scheduler\System Scheduler on the Web.lnk
503 bytes
MD5: 0x2DA54071A1860ED4DE3047F05173B9C8SHA-1: 0x5399E7081D3296A3136FFCB5B0F47E708D468F39
(not available)
2
%CommonPrograms%\System Scheduler\System Scheduler.lnk
682 bytes
MD5: 0x0AB0BB71EA91015E2C4E596D5CB02F1CSHA-1: 0x63AF347EF2DD70ECA40B1E95CB79303A5C0A3372
(not available)
3
%CommonPrograms%\System Scheduler\Uninstall System Scheduler.lnk
677 bytes
MD5: 0x67A3B0F005CF18F1BA662BD7128B9143SHA-1: 0x2121E35F3AE2C428125585E2EE8E3A78708D25F2
(not available)
4
%ProgramFiles%\SystemScheduler\clock.ico
766 bytes
MD5: 0x912D1673D00AF09594BA416A23FBCBEASHA-1: 0x1858AFA026D31E5BBDB0164D295ED769245A7C03
(not available)
5
%ProgramFiles%\SystemScheduler\ding.wav
80,856 bytes
MD5: 0x18E639792D3767436AC6955EB60E4F54SHA-1: 0xE0B512CF108118AF5169946C7FBEE493443B13BF
(not available)
6
%ProgramFiles%\SystemScheduler\Events\Scheduler.flg
0 bytes
MD5: 0xD41D8CD98F00B204E9800998ECF8427ESHA-1: 0xDA39A3EE5E6B4B0D3255BFEF95601890AFD80709
(not available)
7
%ProgramFiles%\SystemScheduler\Events\%UserName%.flg
87 bytes
MD5: 0xFB9DCB0DF4431457D5454FD156AB918ASHA-1: 0xB8AF64AB430E0626632B4DCEB4EE7D828923664F
(not available)
8
%ProgramFiles%\SystemScheduler\License.txt
9,813 bytes
MD5: 0x0EB0DE3985F9B2197CEC927CF79FC385SHA-1: 0x264CFC918A4985865143A6E1776D6443CD9C6B72
(not available)
9
%ProgramFiles%\SystemScheduler\LogFile.TXT
197 bytes
MD5: 0xB790654DC67B068B5315066E3ADC4DABSHA-1: 0x0942BD903443ABECD609E60005EDB0D0ABFD7997
(not available)
10
%ProgramFiles%\SystemScheduler\Message.exe
127,488 bytes
MD5: 0x3147687DB440F3C98B3A299C48AFE032SHA-1: 0x7F20D8826053F1ECDBE7E30FDA1EFEEF256F86E7
packed with UPX [Kaspersky Lab]
11
%ProgramFiles%\SystemScheduler\Preferences.ini
1,069 bytes
MD5: 0xF1AF7DC1280C6F017B518CCAA9E46134SHA-1: 0x2FED339246741ABE9ECE19C65E4FCB174E6C8A90
(not available)
12
%ProgramFiles%\SystemScheduler\ReadMe.txt
7,684 bytes
MD5: 0x6160278A3C3651B1E9F103A93D67838DSHA-1: 0x9BD61044325947D4DF556D9E16A96477514DA730
(not available)
13
%ProgramFiles%\SystemScheduler\RunNow.exe
46,592 bytes
MD5: 0x4C0A71705CC34D83485FC7AA5FECF65FSHA-1: 0xFE8F8DCDFDA5F47A98B08E592AE0F95BD75EF8CB
packed with UPX [Kaspersky Lab]
14
%ProgramFiles%\SystemScheduler\schedule.ico
766 bytes
MD5: 0xB2FCF86D697A86EE2A70959C8C90F4BFSHA-1: 0x493F9FD2958701AB53C4883CDD5AA9B4C2195696
(not available)
15
%ProgramFiles%\SystemScheduler\Scheduler.exe
403,968 bytes
MD5: 0xCCC63D977C105987EA6F608BAD317823SHA-1: 0x442CBC80651DB9ED51F26D313019109729B5A086
(not available)
16
%ProgramFiles%\SystemScheduler\scheduler.url
53 bytes
MD5: 0xB13BB004B11E5616431EADA48351ECC6SHA-1: 0x635F277DD4242662CE30BC82186200171A62D1DD
(not available)
17
%ProgramFiles%\SystemScheduler\ShowXY.exe
175,616 bytes
MD5: 0x52772B055325998D0E38F72695B0A253SHA-1: 0x34EA88D41F1E45916EA2A5225481CE21F052FB1E
(not available)
18
%ProgramFiles%\SystemScheduler\SSCmd.exe
101,376 bytes
MD5: 0xB01BA6DC7C46D6B3F9084CB3EAE69B90SHA-1: 0xF2E562373B4571D079D5D0DA723EA693A284D935
(not available)
19
%ProgramFiles%\SystemScheduler\SSVistaAdmin.exe
138,240 bytes
MD5: 0x2E2D565390BB5C07F96D7A0E56CDE0BASHA-1: 0xC10BEC2E9320483626E30483ACC4855D0BA860CC
(not available)
20
%ProgramFiles%\SystemScheduler\unins000.dat
5,574 bytes
MD5: 0xADA42BC6623FADFCEEA36FFB4F030E5CSHA-1: 0x8AB5485F982952863E6244C84116E742483BE772
(not available)
21
%ProgramFiles%\SystemScheduler\unins000.exe
682,266 bytes
MD5: 0xC0091978F09E9F943AE0D48D6DDF8F99SHA-1: 0xAA713220A1F489B79CFC84647F8F852FCAD0920C
(not available)
22
%ProgramFiles%\SystemScheduler\WSCHEDULER.CHM
240,794 bytes
MD5: 0x1011D3F685773F63FA4CAC6D0814B42CSHA-1: 0x0945E34E0BCBB86EF9DDD8F6BBA004730DF30704
(not available)
23
%ProgramFiles%\SystemScheduler\WScheduler.cnt
1,947 bytes
MD5: 0xAF97142B01C543018A377517B9B8896ESHA-1: 0x16BFFE82CAE2526F5321C4C2377A51FF49597650
(not available)
24
%ProgramFiles%\SystemScheduler\WScheduler.exe
98,304 bytes
MD5: 0xD75293BFEB2C85D2041EF7832CB5E1D9SHA-1: 0x95497AAD6AF9897CF2426CF8E94A9B170944A762
(not available)
25
%ProgramFiles%\SystemScheduler\WSCHEDULER.HLP
197,284 bytes
MD5: 0x2C54A0A586E94D0F5347417D62F9AFA5SHA-1: 0x0FD021DE1AE78466FF789F07197725DFEAE970FB
(not available)
26
[file and pathname of the sample #1]
1,812,188 bytes
MD5: 0x71EF4D9C4B1CB74D5573C1582C6E6847SHA-1: 0x5775D946FBD886B20784F67567B33FD204B8A0DD
(not available)
Notes:
%CommonPrograms% is a variable that refers to the file system directory that contains the directories for the common program groups that appear on the Start menu for all users. A typical path is C:\Documents and Settings\All Users\Start Menu\Programs (Windows NT/2000/XP).
%ProgramFiles% is a variable that refers to the Program Files folder. A typical path is C:\Program Files.
The following directories were created:
%CommonPrograms%\System Scheduler
%ProgramFiles%\SystemScheduler
%ProgramFiles%\SystemScheduler\Events
Registry Modifications
The following Registry Key was created:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Windows Scheduler_is1
The newly created Registry Values are:
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
WScheduler = "c:\PROGRA~1\SYSTEM~1\WScheduler.exe /LOGON"
so that Scheduler.exe runs every time Windows starts
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Windows Scheduler_is1]
Inno Setup: Setup Version = "5.1.9"
Inno Setup: App Path = "%ProgramFiles%\SystemScheduler"
InstallLocation = "%ProgramFiles%\SystemScheduler\"
Inno Setup: Icon Group = "System Scheduler"
Inno Setup: User = "%UserName%"
DisplayName = "System Scheduler 3.82"
UninstallString = ""%ProgramFiles%\SystemScheduler\unins000.exe""
QuietUninstallString = ""%ProgramFiles%\SystemScheduler\unins000.exe" /SILENT"
Publisher = "Splinterware Software Solutions"
URLInfoAbout = "splinterware.com"
HelpLink = "splinterware.com"
URLUpdateInfo = "splinterware.com"
NoModify = 0x00000001
NoRepair = 0x00000001
InstallDate = "20120327"
All content ("Information") contained in this report is the copyrighted work of Threat Expert Ltd and its associated companies ("ThreatExpert") and may not be copied without the express permission of ThreatExpert.
The Information is provided on an "as is" basis. ThreatExpert disclaims all warranties, whether express or implied, to the maximum extent permitted by law, including the implied warranties that the Information is merchantable, of satisfactory quality, accurate, fit for a particular purpose or need, or non-infringing, unless such implied warranties are legally incapable of exclusion. Further, ThreatExpert does not warrant or make any representations regarding the use or the results of the use of the Information in terms of their correctness, accuracy, reliability, or otherwise.
Copyright © 2012 ThreatExpert. All rights reserved.
posted by colourbox.com : 2012-12-09/01:54
By WebOsPublisher
Account icon images. Download links for Account icon from icon archive
Account Icon Images
Icon Editor
Icon Converter
Icon Extractor
Icon Creator
Medical Icons
Search Icons
Icon Sets
Smile Icons
Icon Archive
Account Icon Images
You can purchase these icons for your projects. Click on icons to purchase them.
Account Perfect CMS Icons
Account Perfect User Icons
Account Perfect Web Icons
Account Perfect Internet Icons
Account Perfect Office Icons
Account Professional Toolbar Icons
Account Glossy Data Icons
Account Glossy Business Icons
Account Medical Toolbar Icons
Account Standard Geo Icons
Account Standard Admin Icons
Account Standard Dating Icons
Account Standard Toolbar Icons
Account Large User Icons
Account Dating Web Icons
Accounts Perfect Logistic Icons
Accounts Perfect Business Icons
Accounts Perfect Bank Icons
Accounts Ribbon Bar Icons
Accounts Professional Toolbar Icons
Accounts Glossy Business Icons
Accounts Glossy Toolbar Icons
Accounts Medical Toolbar Icons
Accounts Standard Geo Icons
Accounts Standard Dating Icons
Accounts Large Button Icons
Accounts Large User Icons
Accounts Small Windows Icons
Accounts Dating Web Icons
User account Perfect Automation Icons
User account Perfect CMS Icons
FTP account Perfect CMS Icons
Account cards Perfect Toolbar Icons
Account card Perfect Toolbar Icons
Bank account Perfect Toolbar Icons
Account cards Perfect Database Icons
Account card Perfect Database Icons
Account ID Perfect Bank Icons
Account cards Perfect Bank Icons
Account card Perfect Bank Icons
Bank account Light Blue iPhone Toolbar Icons
Account cards Light Blue iPhone Toolbar Icons
Account card Light Blue iPhone Toolbar Icons
Bank account Orange Toolbar Icons
Account cards Orange Toolbar Icons
Account card Orange Toolbar Icons
Bank account Green Toolbar Icons
Account cards Green Toolbar Icons
Account card Green Toolbar Icons
Bank account Red Toolbar Icons
Account cards Red Toolbar Icons
Account card Red Toolbar Icons
Bank account Blue Toolbar Icons
Account cards Blue Toolbar Icons
Account card Blue Toolbar Icons
Bank account Black Toolbar Icons
Account cards Black Toolbar Icons
Account card Black Toolbar Icons
View account Ribbon Bar Icons
Problem account Professional Toolbar Icons
Account card Professional Toolbar Icons
Account card Glossy Data Icons
Account cards Glossy Toolbar Icons
Account card Glossy Toolbar Icons
Bank account Glossy Toolbar Icons
View account Phone Toolbar Icons
Account cards Accounting Toolbar Icons
Account card Accounting Toolbar Icons
User account Security Toolbar Icons
Account cards Standard Geo Icons
Account card Standard Geo Icons
View account Standard Telephone Icons
Remove account Standard Admin Icons
Edit account Standard Admin Icons
Add account Standard Admin Icons
FTP account Standard Admin Icons
Account card Large User Icons
Account books Large Money Icons
View account Small Person Icons
Account cards Small Menu Icons
Account card Small Menu Icons
Bank account Small Menu Icons
Account cards Small Glossy Icons
Account card Small Glossy Icons
Account ID Small PNG Icons
User account Security Software Icons
Account cards Accounting Development Icons
Account card Accounting Development Icons
Icon Creator | Icon Software | Download Icons | Buy Icons | Icon Sets | Support
Copyright © 2005-2012 SibCode. All rights reserved.
Stock Icon Libraries
Database Toolbar Icons
People Icons for Vista
Business Toolbar Icons
Perfect Toolbar Icons
Multimedia Icons for Vista
posted by rreeicons.etr.u : 2012-12-10/02:35
By WebOsPublisher
Coding In Paradise: Paper Airplane 0.1.1 Released
bodymargin:0px;padding:0px;background:#ffffff;color:#111111;font-family:Lucida Grande,MS Sans Serif,Lucida Sans Unicode,Verdana,Geneva,Lucida,Arial,Helvetica,Sans-Serif;
a:linkcolor:#B4445C;
a:visitedcolor:#B4445C;
a:activecolor:#ff0000;
#logopadding:0px;margin:0px;
@media all
div#mainClmfloat:left;width:63%;padding:20px 7% 0px 5%;background:#ffffff;
div#sideBarmargin:0px;padding:0px 10px 14px 10px;text-align:left;
@media handheld
div#mainClmfloat:none;width:90%;
div#sideBarmargin-left:5%;
h1,h2,h3,h4,h5,h6padding:0px;margin:0px;
h1padding-left:3%;padding-top:20px;border-bottom:dotted 1px #000000;border-top:solid 6px #D3EAF2;color:#16A3C2;background:#eeeeee;font:bold 340%/0.8em Helvetica Neue Black Condensed,Arial Black,Arial,Sans-Serif;text-transform:lowercase;
h1 a:visited text-decoration:none;color:#16A3C2;
h2color:#000000;font-weight:normal;font-family:Helvetica Neue Black Condensed,Arial Black,Arial,Sans-Serif;
h3margin:10px 0px 0px 0px;color:#333333;font-size:105%;
h4color:#aa0033;
@media all
h6, h2.sidebar-titlecolor:#FFC069;font:normal 240% Helvetica Neue Black Condensed,Arial Black,Arial,Sans-Serif;text-align:right;text-transform:lowercase;
#sideBar ulmargin:0px 0px 33px 0px;padding:0px 0px 0px 0px;list-style-type:none;font-size:95%;text-align:right;
#sideBar limargin:0px 0px 0px 0px;padding:0px 0px 0px 0px;list-style-type:none;font-size:95%;text-align:right;
@media handheld
h6, h2.sidebar-titletext-align:left;
#sideBar ultext-align:left;
#sideBar litext-align:left;
#descriptionpadding:0px;margin:1em 12% 0px 5%;color:#ACB877;background:transparent;font-weight:light;font-size:80%;text-transform:uppercase;
.blogPostmargin:0px 0px 30px 0px;font-size:100%;
.blogPost strongcolor:#000000;font-weight:bold;
#sideBar ul apadding:2px;margin:1px;width:100%;color:#999999;
#sideBar ul a:linkcolor:#999999;
#sideBar ul a:visitedcolor:#999999;
#sideBar ul a:activecolor:#ff0000;
#sideBar ul a:hovercolor:#E37C93;text-decoration:none;
pre,codecolor:#999999;
strikecolor:#999999;
.bugpadding:5px;border:0px;
.bylinepadding:0px;margin:0px;color:#444444;font-size:80%;
.byline acolor:#935781;text-decoration:none;
.byline a:hovertext-decoration:underline;
#headerpadding:7px 0px 30px 0px;margin:23px 0px 0px 0px;border-top:1px solid #eeeeee;background:#ffffff;color:white;
#bloggerBugpadding:30px 0px 0px 0px;
.blogCommentscolor:#000000;font-weight:normal;font-family:Helvetica Neue Black Condensed,Arial Black,Arial,Sans-Serif;
.blogCommentmargin:0px 0px 30px 0px;font-size:100%;font-family:Lucida Grande,MS Sans Serif,Lucida Sans Unicode,Verdana,Geneva,Lucida,Arial,Helvetica,Sans-Serif;
.blogComments .bylinemargin-right:10px;display:inline;padding:0px;color:#444444;font-size:80%;font-family:Lucida Grande,MS Sans Serif,Lucida Sans Unicode,Verdana,Geneva,Lucida,Arial,Helvetica,Sans-Serif;
.deleted-comment font-style:italic;color:gray;
#profile-container
.profile-img
.profile-data strong
@media all
.profile-img img margin-left:5px;margin-bottom:5px;float:right;
.profile-datablock text-align:justify;
#profile-container p text-align:right;
#profile-container .profile-textblock text-align:justify;
@media handheld
.profile-img img float:none;
.profile-datablock text-align:left;
#profile-container p text-align:left;
#profile-container .profile-textblock text-align:left;
.profile-link a:link color:#999999;
.profile-link a:active color:#ff0000;
.profile-link a:visited color:#999999;
.profile-link a:hovercolor:#E37C93;text-decoration:none;
#blogfeeds
#postfeeds
/* Custom styles */
#profile-container div text-align: right;
#profile-container img margin-top: 0.5em;
#profile-container margin-bottom: 1em;
#personal-disclaimer font-style: italic; font-size: 9pt; float: right; padding-right: 2em; padding-top: 1em;
/* Purple Include Styles */
.included display: block; padding-left: 2em; padding-right: 2em; background-color: BlanchedAlmond;
.include_error display: block; background-color: red; text-color: black;
.include_roller border: none;
.included p margin-top: 1em; margin-bottom: 1em;
@import url("blogger.com/css/blog_controls.css");
@import url("blogger.com/dyn-css/authorization.css?targetBlogID=3191291");
This is my personal blog. The views expressed on these pages are mine alone and not those of my employer.
Coding In Paradise
Brad Neuberg's thoughts, feelings, and experiences.
Sunday, February 06, 2005
Paper Airplane 0.1.1 Released
I am proud to announce the alpha release of my software baby, Paper Airplane 0.1.1.
Paper Airplane is a Mozilla plugin that empowers people to easily create collaborative P2P web sites, without setting up servers or spending money. It does this by integrating a web server into the browser itself, including tools to create collaborative online communities that are stored on the machine. Paper Airplane Sites are stored locally on a user's machine. A peer-to-peer network is created between all of the Paper Airplane nodes that are running in order to resolve group names and reach normally unreachable peers due to firewalls or NAT devices.
Please see the Paper Airplane installation page on how to install it.
Paper Airplane's still alpha and there is much more work to be done, but there is alot of blood, sweat, and tears in what's here. I hope you enjoy it and I look forward to hearing your feedback.
Once you install the Paper Airplane XPI and restart the browser, what you will see is a toolbar that will say that it is initializing and signing you into the Paper Airplane P2P network. When that process is finished, you should see three textual icons (none of the Paper Airplane icons have been brought into the GUI yet). These icons are New Site, New Page, and Edit Page. Click the New Site button; a page will load in the browser. Choose a name for your new P2P site, using any ending you want; the Paper Airplane DNS is distributed across peers in the network and do not use the legacy DNS. I always like to use "nike.laborpolicy" as an example to signify what happens when you blow open the domain space. Press the button and in a few seconds you should be redirected to your new P2P site, which is collaborative in the same way Wikis are. Press the Edit Page button to edit your page, add some text, and then press Save. Press the New Page button to create a new page on your P2P site. If you type the name of your site into the browser location bar, it will resolve this domain through the P2P network. You can also type other P2P domain names of others in the network to resolve sites they have created with Paper Airplane, even if they are behind a NAT, a firewall, or a country that doesn't allow free speech.
In Paper Airplane, a tremendous amount is going on behind the scenes to make all of this look really simple. Thats one of the goals of Paper Airplane, to make this stuff look like magic; more work remains to take this forward. By the way, most of Paper Airplane is built above P2P Sockets and JXTA, so you can start up custom command-line services on this P2P web using P2P Sockets, or even script the network level using the JXTA Shell. The Paper Airplane P2P web provides different kinds of entry points for different kinds of people; end-users can use Paper Airplane, developers can script the P2P web using P2P Sockets, and serious hackers can work with the P2P network at a deep level using JXTA and the JXTA Shell.
// posted by Brad GNUberg @ Sunday, February 06, 2005
Comments:
Fantastic, Brad. A really great idea that's been waiting to happen, but nobody had the chops and imagination to do it. You. Kick. Ass.
# posted by Lucas Gonze : 8:59 PM
Good job man, I remember you talking about this project when we were hanging out in San Francisco. Sadly, I won't be able to share in the rejoicing until you come out with a Linux or Mac OS X version. Please hurry :-)
# posted by Nelson : 10:26 PM
Great job! I am really surprised about the results :)Now my problem is that I cannot get rid of it. It is not in my list of Firefox extensions. Help please!!Thanks and keep up this great endeavor,Tatoeba
# posted by tatoeba : 8:27 AM
Post a Comment
Links to this post:
See links to this post
" rel="nofollow"
@
Create a Link
<< Home
Subscribe to Posts [Atom]
About Me
Name: Brad Neuberg
Location: San Francisco, California, United States
View my complete profile--
about me
About Brad Neuberg
Link Text
+++++++++++++++++++++++++++++++++++++++++++++++++
--
Links
Google News
Edit-Me
Edit-Me
--Archives
Monday, October 29, 2001Wednesday, October 31, 2001Friday, November 02, 2001Wednesday, November 07, 2001Saturday, November 10, 2001Monday, November 12, 2001Tuesday, November 13, 2001Wednesday, November 14, 2001Friday, November 16, 2001Saturday, November 17, 2001Monday, November 19, 2001Wednesday, November 21, 2001Thursday, November 22, 2001Friday, November 23, 2001Saturday, November 24, 2001Sunday, November 25, 2001Friday, May 03, 2002Saturday, September 13, 2003Sunday, September 14, 2003Monday, September 15, 2003Thursday, September 18, 2003Friday, September 19, 2003Saturday, September 20, 2003Sunday, September 21, 2003Monday, September 22, 2003Tuesday, September 23, 2003Thursday, September 25, 2003Friday, September 26, 2003Friday, December 26, 2003Friday, January 09, 2004Saturday, January 10, 2004Thursday, January 15, 2004Sunday, January 25, 2004Tuesday, January 27, 2004Saturday, January 31, 2004Sunday, February 01, 2004Tuesday, February 03, 2004Wednesday, February 04, 2004Thursday, February 12, 2004Friday, February 20, 2004Monday, February 23, 2004Wednesday, March 03, 2004Thursday, July 08, 2004Friday, July 09, 2004Sunday, July 11, 2004Monday, July 12, 2004Tuesday, July 13, 2004Wednesday, July 14, 2004Thursday, July 15, 2004Friday, July 16, 2004Monday, July 19, 2004Tuesday, July 20, 2004Wednesday, July 21, 2004Thursday, July 22, 2004Friday, July 23, 2004Wednesday, July 28, 2004Sunday, August 01, 2004Monday, August 02, 2004Tuesday, August 03, 2004Wednesday, August 04, 2004Friday, August 06, 2004Sunday, August 08, 2004Tuesday, August 10, 2004Wednesday, August 11, 2004Monday, August 16, 2004Tuesday, August 17, 2004Wednesday, August 18, 2004Thursday, August 19, 2004Friday, August 20, 2004Tuesday, September 07, 2004Friday, September 10, 2004Wednesday, September 15, 2004Thursday, September 23, 2004Friday, September 24, 2004Sunday, September 26, 2004Tuesday, September 28, 2004Wednesday, September 29, 2004Monday, October 04, 2004Tuesday, October 05, 2004Wednesday, October 06, 2004Friday, October 08, 2004Monday, October 11, 2004Tuesday, October 12, 2004Wednesday, October 13, 2004Monday, October 18, 2004Wednesday, October 20, 2004Friday, October 22, 2004Monday, October 25, 2004Thursday, October 28, 2004Friday, October 29, 2004Thursday, November 18, 2004Tuesday, November 23, 2004Wednesday, November 24, 2004Monday, November 29, 2004Tuesday, November 30, 2004Friday, December 03, 2004Wednesday, December 08, 2004Tuesday, December 14, 2004Thursday, December 16, 2004Friday, December 17, 2004Tuesday, December 21, 2004Monday, December 27, 2004Tuesday, December 28, 2004Wednesday, December 29, 2004Thursday, December 30, 2004Thursday, January 06, 2005Friday, January 07, 2005Saturday, January 08, 2005Monday, January 10, 2005Wednesday, January 19, 2005Tuesday, January 25, 2005Sunday, January 30, 2005Sunday, February 06, 2005Monday, February 07, 2005Thursday, June 02, 2005Wednesday, June 15, 2005Thursday, June 16, 2005Sunday, July 03, 2005Monday, July 11, 2005Tuesday, August 09, 2005Wednesday, August 10, 2005Thursday, August 11, 2005Friday, August 12, 2005Saturday, August 13, 2005Monday, August 15, 2005Tuesday, August 16, 2005Wednesday, August 17, 2005Monday, August 22, 2005Wednesday, August 24, 2005Thursday, August 25, 2005Friday, August 26, 2005Monday, August 29, 2005Tuesday, August 30, 2005Wednesday, August 31, 2005Friday, September 02, 2005Monday, September 05, 2005Tuesday, September 06, 2005Thursday, September 08, 2005Friday, September 09, 2005Tuesday, September 13, 2005Wednesday, September 14, 2005Thursday, September 15, 2005Monday, September 19, 2005Tuesday, September 20, 2005Wednesday, September 21, 2005Thursday, September 22, 2005Friday, September 23, 2005Monday, September 26, 2005Tuesday, September 27, 2005Friday, September 30, 2005Sunday, October 02, 2005Monday, October 03, 2005Thursday, October 06, 2005Wednesday, October 12, 2005Monday, October 17, 2005Tuesday, October 18, 2005Wednesday, October 19, 2005Thursday, October 20, 2005Sunday, October 23, 2005Wednesday, October 26, 2005Thursday, October 27, 2005Friday, October 28, 2005Saturday, October 29, 2005Sunday, October 30, 2005Wednesday, November 16, 2005Monday, December 05, 2005Monday, December 12, 2005Thursday, December 15, 2005Friday, December 30, 2005Saturday, December 31, 2005Monday, January 02, 2006Monday, January 09, 2006Tuesday, January 10, 2006Friday, January 13, 2006Saturday, January 14, 2006Monday, January 16, 2006Tuesday, January 17, 2006Wednesday, January 18, 2006Wednesday, January 25, 2006Friday, February 03, 2006Wednesday, March 01, 2006Tuesday, March 07, 2006Thursday, March 16, 2006Friday, March 17, 2006Thursday, March 30, 2006Monday, April 10, 2006Wednesday, April 12, 2006Wednesday, April 19, 2006Tuesday, April 25, 2006Thursday, April 27, 2006Monday, May 01, 2006Monday, May 15, 2006Wednesday, June 07, 2006Wednesday, August 02, 2006Monday, August 07, 2006Thursday, August 10, 2006Tuesday, August 15, 2006Wednesday, September 06, 2006Friday, September 08, 2006Friday, September 22, 2006Monday, October 16, 2006Tuesday, October 17, 2006Thursday, October 19, 2006Monday, October 23, 2006Tuesday, October 24, 2006Wednesday, October 25, 2006Sunday, October 29, 2006Tuesday, November 21, 2006Tuesday, November 28, 2006Wednesday, November 29, 2006Sunday, December 03, 2006Monday, December 11, 2006Thursday, December 21, 2006Tuesday, January 02, 2007Monday, January 08, 2007Thursday, January 11, 2007Monday, February 26, 2007Wednesday, February 28, 2007Tuesday, March 06, 2007Wednesday, March 07, 2007Sunday, March 11, 2007Monday, March 12, 2007Saturday, March 24, 2007Monday, March 26, 2007Wednesday, April 18, 2007Monday, April 23, 2007Friday, May 11, 2007Tuesday, May 22, 2007Tuesday, May 29, 2007Thursday, May 31, 2007Sunday, June 03, 2007Thursday, June 07, 2007Sunday, June 10, 2007Saturday, June 16, 2007Wednesday, June 27, 2007Friday, July 06, 2007Monday, July 09, 2007Tuesday, July 10, 2007Wednesday, August 15, 2007Friday, August 17, 2007Tuesday, August 21, 2007Thursday, August 23, 2007Thursday, September 13, 2007Friday, September 14, 2007Thursday, November 08, 2007Thursday, November 29, 2007Monday, December 03, 2007Tuesday, December 11, 2007Thursday, December 13, 2007Friday, December 28, 2007Saturday, December 29, 2007
_uacct = "UA-998402-1";
urchinTracker();
posted by icolniezr.net : 2012-12-10/03:52
By WebOsPublisher
Account Suspended
.title
font-family: arial, verdana;
font-size: 9pt;
font-weight: normal;
.distributers
font-family: arial, verdana;
font-size: 11pt;
font-weight: normal;
.info
font-family: arial, verdana;
font-size: 8pt;
font-weight: normal;
.design
font-family: arial, verdana;
font-size: 8pt;
font-weight: normal;
.menu
border-top: 1px #374646 solid;
border-left: 1px #374646 solid;
border-right: 1px #374646 solid;
border-bottom: 1px #374646 solid;
font-family: verdana, arial;
font-size: 8pt;
font-weight: normal;
.cellheader
border-top: 1px #374646 solid;
border-left: 1px #374646 solid;
border-right: 1px #374646 solid;
border-bottom: 1px #374646 solid;
font-family: verdana, arial;
font-size: 20pt;
font-weight: normal;
color: #F1F1F1;
.scellheader
border-top: 1px #374646 solid;
border-left: 1px #374646 solid;
border-right: 1px #374646 solid;
border-bottom: 1px #374646 solid;
font-family: verdana, arial;
font-size: 15pt;
font-weight: normal;
color: #F1F1F1;
.bigcellheader
border-top: 1px #374646 solid;
border-left: 1px #374646 solid;
border-right: 1px #374646 solid;
border-bottom: 1px #374646 solid;
font-family: verdana, arial;
font-size: 30pt;
font-weight: normal;
color: #F1F1F1;
link: #F1F1F1;
vlink: #F1F1F1;
.tblheader
background-color: #AAAAAA;
border-top: 1px #374646 solid;
border-left: 1px #374646 solid;
border-right: 1px #374646 solid;
border-bottom: 1px #374646 solid;
font-family: verdana, arial;
font-size: 14pt;
font-weight: normal;
.tdshade1
background-color: #DDDDDD;
border-top: 1px #374646 solid;
border-left: 1px #374646 solid;
border-right: 1px #374646 solid;
border-bottom: 1px #374646 solid;
font-family: verdana, arial;
font-size: 10pt;
font-weight: normal;
.tdshade2
background-color: #EEEEEE;
border-top: 1px #374646 solid;
border-left: 1px #374646 solid;
border-right: 1px #374646 solid;
border-bottom: 1px #374646 solid;
font-family: verdana, arial;
font-size: 10pt;
font-weight: normal;
body
font-family:arial;
margin:0;
padding:0;
background:url(/img-sys/bg.jpg) repeat-x #dff4fe;
color:#6f6f6f;
font-size:12px;
a
color:#0075a9;
*
margin:0;
padding:0;
h1
background:url(/img-sys/headerbg.jpg) no-repeat;
height:63px;
color:#fff;
padding:20px;
font-size:28px;
font-family:century gothic, arial;letter-spacing:-0.5px;
h2
font-size:20px;
margin:0 0 15px 0;
p
margin:10px 15px 15px 50px;
#wrap
margin:50px auto 20px auto;
width:906px;
.msg
background:url(/img-sys/contentbox.jpg) no-repeat;
min-height:206px;
color:#000;
font-size:16px;
padding:25px;
text-align:center;
* html .msg
height:206px;
.msg p
border:none;
margin:0 0 10px 0;
.msg ul
margin:15px 15px 0 15px;
li
margin:10px 0;
.note
font-style:italic;
border-bottom:1px solid #cae0e5;
border-top:1px solid #cae0e5;
padding:15px 0;
margin-right:50px;
#contactinfo, .contactinfo
padding:5px 0;
#contactinfo li, .contactinfo li
float:left;
padding:5px;
width:250px;
list-style:none;
font-size:14px;
p.troubleshoot
font-style:italic;
border:dashed 1px #dfe9ed;
padding:5px;
margin:10px 0 0 0;
Account Suspended
This Account Has Been Suspended
posted by free-icok-mnaker.ccom : 2012-12-10/20:48
By WebOsPublisher
Vectors Icons is best for all types of software and other applications.
Business Icon Set. Vector Icons for Every type of Software
Home Page
|
All Our Icons
|
FAQ
|
Free Icons
|
License
|
Contact Us
Business Icon Set
Image sizes: 16x16, 24x24, 32x32, 48x48, 256x256 pixels
File formats: ICO, PNG, GIF, BMP
Icon states: normal
Icon amount: 254
Price: $99.00
Spice up your application with fine icons
Business Icon Set is a collection of fine-looking stock icons for use in software and on websites. Icons come in such categories as Business, Finances, Transport, Money, Computer and Reports. They are delivered in a variety of formats and sizes.
Download sample icons and catalogue
Purchase this icon set for $99.00 now!
Home Page
|
All Our Icons
|
FAQ
|
Free Icons
|
License
|
Contact Us
Copyright © 2009-2012 Aha-Soft. All rights reserved.
Add to favorites
Vectors Icons for every Web Designing Works
It is true that vector icons can bring great benefits to all types of software
and applications. This benefit can score to greater extent. If you are looking
for icons those consist of various themes and wonderful icons, then take the
help of large-icons.com. Lots of software people are getting good benefits from
this website. If you are looking for a website to grab icons, then vector icons
is the right one. Certainly, with the help of this website, you can grab some
of the best large icons, 3D icons that will make your application stunning.
Making a website and putting these icons will offer great benefits in the long
run.
In this website, you can get lots of advantage and different varieties of
images that will make your application different and beautiful. Just you need
to find some that will match your application perfectly. You can get icons that
will match educational, financial and architectural grounds. It is true that it
will fit all requirements of web developer and website designers. If you are
looking for some perfect icons like 3d icons, then this website is absolutely
for you.
Think how wonderful it would be to buy icons those will match your themes and
you can add them to your library. Doesn’t that sound interesting? Yes, indeed it will surely work. You can get icons in
various formats and some of the most important formats are png, bmp, gif and
jpeg. Just you need to make sure that you use the right kind of icon that will
match your purpose. Many software development firms and web designing firms are
using these icons for their task and certainly it works awesome. If you are
thinking to enhance your website look, then try these icons from
large-icons.com. So, get ready and enhance your website and other applications
with these icons. Today
posted by caloifornmiandesign.com : 2012-12-11/20:09
By WebOsPublisher
Phone Lookup icons. Images of Phone Lookup icon from different collections
Phone Lookup Icons
Icon list
Phone Lookup Icons
You can purchase these icon images for your projects. Click on icons to purchase them.
Phone lookup Search Icon Library
Phone lookup Search Icon Library
Home | Products | Downloads | Order | Icons | Support
Copyright © 2005-2012 Icon Empire. All rights reserved.
Stock Icon Packs
People Icons for Vista
Perfect Toolbar Icons
Business Toolbar Icons
Database Toolbar Icons
Multimedia Icons for Vista
http://id.lenta.ru/profile/108850/
posted by pictofoundrt.34ordagne.com : 2012-12-13/03:21
By WebOsPublisher
Disaster Icons - Download Free Disaster icons @ IconArchive. Search more than 350,000 icons for Web & Desktop here.
Disaster Icon - No icons found
body background-position:0 -6px;
Search
Commercial icons
Home
Newest
Popular
Most Visited--Random Icons
Categories ▼
Adobe Icons
Alphabet Icons
Animal Icons
Apple Icons
Application Icons
Art Icons
Avatar Icons
Buildings Icons
Business Icons
Cartoon Icons
Christmas Icons
Computer Icons
Culture Icons
Drive Icons
Easter Icons
Emo Icons
Flag Icons
Folder Icons
Food Icons
Funny Icons
Game Icons
Halloween Icons
Hand-Drawn Icons
Holiday Icons
Kids Icons
Lifestyle Icons
Love Icons
Media Icons
Medical Icons
Mini Icons - New!
Mobile Icons
Music Icons
Nature Icons
Object Icons
People Icons
Photographic Icons
Places Icons
Sci-Fi Icons
Social Network Icons
Sport Icons
System Icons
Technology Icons
Transport Icons
TV & Movie Icons
Vintage Icons
Artists
Search
Tags
♥ My Favs
Display
Icons per Page:
Background color:
Size
SizePopularitySubmission dateSpecified Color
Sort by
All Colors
Color:
Filter
All
All
Small Icons [0-48px]
Medium Icons [64-128]
Large Icons [128-256]
Exact Resolutions:
16 x 16px
24 x 24px
32 x 32px
48 x 48px
64 x 64px
128 x 128px
256 x 256px
512 x 512px
Size:
All
All
Adobe
Alphabet
Animals
Apple
Application
Art
Avatar
Buildings
Business
Cartoon
Christmas
Computer
Culture
Drive
Easter
Emo
Flag
Folder
Food
Funny
Game
Halloween
Hand-Drawn
Holiday
Kid
Lifestyle
Love
Media
Medical
Mini
Mobile
Music
Nature
Object
People
Photographic
Places
Sci-Fi
Social Network
Sport
System
Technology
Transport
TV & Movie
Vintage
Category:
All
All
Professional
3D
Soft / Smooth
Bold / Bordered
Pixelart / Classic
Fun / Cartoon
Hand-Drawn
Photorealistic
Style:
All
All
Commercial
Commercial free
License:
Results 1-0 of 0 for search term "disaster".
Your search for »disaster« did not match any icons with the current filter settings.
► If you agree to remove the filter, we can show you 8 'disaster' icons. Click here to view them.
Advertise here
Results 1-0 of 0 for search term "disaster".
© 2012 IconArchive.com
| About
| Advertise
| Donate
| Contact
| Submit icons
| Privacy Policy
| Terms of Service
Friends:
Free software download
| Buy Stock Icons
| Vector Icons
Don't forget to follow us on Facebook!
posted by windows icons : 2012-12-13/14:04
P.S. Please review our design portfolio for Doors2012.
posted by icons : 2012-12-13/15:02
P.S. Please review our design portfolio for Doors2012.
posted by windows icons : 2012-12-13/16:59
P.S. Please review our design portfolio for Doors2012.
posted by get icons : 2012-12-13/17:55
P.S. Please review our design portfolio for Doors2012.
posted by get icons : 2012-12-13/19:22
P.S. Please review our design portfolio for Doors2012.
Empaths Becoming More Aware
One empath I spoke with said he is becoming more aware of the energy around him and the spiritaul gifts he has. Yet at the same time he has been somewhatafraid of it. For him, this stems from religious philosophies, which told him that these are not gifts of God-that they are really from the devil. You may have been brought up to believe that these types of sensitivities are evil, but at the same time (even as a child) you've had awareness, sensations, feelings, or inner knowings. If so, you may be a little conflicted about how to approach their use. Perhaps you haven't tried to develop these gifts because you are afraid you'll go too far or don't know what kind of boindaries you should set.First let's take a look at a beloved teacher, Jesus. Once he was in a crowd of people when a woman touched the hem of his garment. Instantly he knew virtue (healing energy) had gone out of him and he asked, "Who touched me?" He was that sensitive! He felt it when someone was tapping into his electromagnetic field even though she only touched his clothing! I remind you of the verse that tells us that every good and perfect gift, spiritual gifts, comes from God. There are many spiritual gifts listed in 1 Corinthians 13: the gift of prophecy, the gift of tongues, the gift of the interpretation of tongues, discerning of spirit, healing, working of miracles, etc. These are listed for our benefit so we understand that we have been gifted in some way. And there's a responsibility to use those gifts with love. We weren't given these gifts to hide them from the world or be afraid of them. They are tools to help us and others. When we have these intuitive gifts, it is very important to nurture our own spirit and set boundaries to keep from being bombarded by energy from everybody out there. We must love ourselves before we can love others or else there's nothing to give. Spending time with God-Goddess is like refueling a car. You can't run very long without more juice!When Jesus was walking the Earth some people wanted to stone him some wanted to throne him. There was a vast difference in perspective and what people thought of him. We empaths have that same dilemma. Other people may not understand you. Maybe they are afraid of the gifts you have. Through our religious teachings we have been taught that the discerning of spirits or being able to communicate with those in the afterlife is of the devil. I've been called a necromancer by a close member of my family. Obviously, my gifts are not appreciated there. Does that stop me from using them? No, I use them because I have been given these gifts and I have a responsibility to use them wisely; and that's what I intend to do. Do I flaunt them in front of my disapproving family members? No, that's what the Bible refers to as casting your pearls before swine. I'm not calling anyone a pig. I'm saying that there's no need in putting something so valuable out there and allowing your gifts and sensitivities to be trampled. You can decide who you reveal your gifts to and who you use them with. In fact I've made it a practice that unless I have permission to pray for somone I just don't do it. You can easily get your energy tangled up in someone else's by meddling energetically in another pertson's stuff.Some people have a great sensitivity to energy and they see things or get impressions. They may intuitively know what is going on in another person's life. You are not obligated to help every person you encounter, but there is something you can do. Before you decide to get involved pray about it. Breathe deeply for a few minutes and ask yourself if you should do/say anything about what you have discovered. How do you feel when you think of saying something or ffering to help? Does it feel right? Do you have pain anywhere in your body or emotions? If so, avoid getting involved on a human level. If a person has not asked you to help them, they may not want your help. Do you feel lighter, joyful, or happy when you think of helping this person or mentioning what you have discerned? If so, ask for wisdom about what to do and how to approach the person.If you keep thinking of someone and sense they need help, you may or may not need to approach them on a human level. You can always send love and light to guide their way. Simply call upon the angels to help. Imagine a beautiful beam of light coming from the cosmos, maybe pink or green. Pink represents the heart or love; green represents healing. See this beam of light going toward and surrounding the person in need. This powerful energy is like a stem cell that has divine intelligence and knows where it is needed and what to do when it gets there. This not only gives them energy to work with, it gives them clarity so they can make good decisions. They may be able to feel that strength undergirding and supporting them. If something needs changing, they can apply that energy however they want to. If it's healing, if it's a relationship, if it's emotional/mental issue, it doesn't matter, the love and light is universal. Just send that energy and let them do with it what they want as spirit directs them. By sending love and light, you are not trying to manipulate any outcome or change anything in another person's circumstances or life. You're not violating their free will or "fixing" a situation their soul has created from which to learn its lesson. Sending positive energy to someone is like leaving a gift on their doorstep. It provides what they need but they never know who sent the gift and you won't have to take on other people's stuff. You will know who and when you need to help as well as how. If you follow your inner guidance, you'll intuitively know how far you need to go with your help and what you need to do to strengthen your own boundaries.If someone asks you to pray for them, then you have a responsibility to use your gifts. But, rather than using your body or emotional center (third chakra) to feel and sense, use your sixth chakra, which is also called the third eye, to see or know where you need to direct energ.y It's when we try to operate out of our own emotions and our own physical strength that we are going to be drained. But when we operate from divine power, the place of the sacred heart, it's not us doing the work; we're simply being a conduit. We are able to be the light, and by being the light, we're being God. And we don't have to worry about backlash or be concerned about what other people think.So if you are worried about whyat you have been taught regarding your intuitive gifts or concerned about what other people are saying, remember where the laws of God are written. The laws that the psalmist David was talking about are not written on tablets of stone or in a book, nor are they found in religion. They are written in your heart. If something doesn't feel right, and you have conflict about it, always go with the truth your heart reveals to you.
posted by icons : 2012-12-14/05:50
P.S. Please review our design portfolio for Doors2012.
Can A Simple Web Design Attract Traffic?
Trends in web design come and go. Some stay longer while others just quickly fade away. A simple design is more likely to attract traffic than a design that squeezes everything into limited whitespace. Simplicity in web design exudes naturalnesss and casualness, an ambiance that makes visitors feel more comfortable and want to stay longer.A simple web design does not necessarily mean it lacks the essential parts of a website. A simple design simply means the efficient use of whitespace to achieve optimal effect. The proper use of whitespace gives a cleaner and clearer design that affords visitors easier navigation. Getting rid of clutter like big icons, bold and dark colors that hide text, overly intricate graphics or too much moving objects and leaving only what is essential and necessary allow visitors to better focus on their search efforts.Web trendsetters keep adding more and more elements to complement designs to the point of overcrowding. As a result, the more fundamental elements needed by users are overshadowed, making it hard for them to do what they came for and that is to look for information in the easiest and fastest way possible. What do you think your visitor will do if navigation links are entwined in endlessly twirling lines or if your search box is surrounded by bouncing objects?The header, logo, sidebar, icons, footer, images, text and other elements neatly interspersde between just enough whitespace lends a semblance of elegance to yiur design. Clear and readable fonts, preferably the sans serif type, make for easy reading. A balanced color scheme consistently used throughout the design is pleasing to the eyes. All these simple featurs contribute to your main objective of attracting traffic to your website and making your visitors stay a while longer.A simple web design normally loads faster because it contains smaller files as compared to more sophistciated designs that contain tons of files. Keeping big icons, animation and other unnecessary decorative objects to the minimum makes loading faster, which is what visitors are looking for in a website. If you make your visitors wait a minute longer, you may never see them again.Dear old content is the focal point of any website. In a simple web design, content rightly positioned on a web page without the frills of intricate background can be easily read. Majority of visitors usually scan a new page and if your content is set against a dizzying pattern, expect them to leave before they lose their sanity.Simple is beautiful, so they say. But more than that, a simple web design attracts more traffic because it is faster to load, more simple to use and easier to understand.