Wednesday, February 26, 2014

原棕油價趨高 IOI集團獲上調目標價

IOI集團(IOICORP,1961,主要板種植)截至去年12月底次季營業額和淨利同步下滑,但券商看好本財年原棕油(CPO)價格走高能帶旺種植領域,一致上調該股目標價。

 肯納格證券研究看好,IOI集團旗下種植業務能受益于更高的原棕油價格(目前遊走在2700令吉每公噸)。

 “基于更好的全球經濟展望,該集團下游業務或改善。”

 該行預計IOI集團2014財年核心淨利將提升4%至13.5億令吉;2015財年核心淨利揚升5%至15.5億令吉。

閉市跌17仙

 大眾投資研究分析報告指出,油棕樹鮮果串(FFB)生產量改善可帶動成本效益優于預期,原棕油價格料在2015年走高,都是重新評級IOI集團股價的催化劑。

 MIDF證券研究估計,印尼種植地區將陸續成熟,將在2015財年貢獻更高收入。

 “相對去年同期產量,2014財年1月至6月的油棕樹鮮果串生產量將維持平穩,因此下調IOI集團營業額預期達18.3%。”

 IOI集團今早開市先微跌3仙,報4.70令吉,隨后窄幅走跌,但跌幅在臨休市前突然飆升,該股掛休4.57令吉,挫16仙,半日交易256萬2600股,為十大下跌股之一。

 IOI集團午盤間雖繼續走跌,但跌勢紓緩,閉市前成功脫離十大下跌股榜;閉市收在4.56令吉,下跌17仙,全日成交1557萬4500股。

域名注册



 
目前的域名注册只支持ASCII字符。
如果你想查询WHOIS信息的IDN,请点击这里提供您的IDN域名转换为微不足道的代码。
 
 请选择搜索类型:
一个。域名
湾注册人名称
角注册代码
ð。联系人守则
Ë。名称服务器主机名
f。名称服务器代码 克IP地址
 
注:代码是以前被称为MYNIC手柄。  该查询限制为每天500来自同一个IP。

通过域名搜索

域名jpn.my并不在数据库中存在

Friday, February 21, 2014

马来西亚基本贷款利率

基本贷款利率(Base Lending Rate)是由金融机构计算资金成本和其他行政费用后定出的最低贷款利率。 通常由银行在几乎同一时间调整,调整基本贷款利率不定期进行。基本贷款利率通常是在国家银行(国行)在货币政策会议后的隔夜政策利率进行相对的调整。 一些国家的银行使用名称“优惠利率”或“最优惠贷款利率”来称其基本贷款利率。11月1日1995年,马来西亚国家银行(“国行”)实行了由金融机构所引述的基本贷款利率上限。 这一框架进一步修订了1998年9月1日 , 以加强在国家银行的货币政策变化的传输速度的修订。
一般来说,基本贷款利率的上限计算公式如下:
基本贷款利率上限=调整后的国行干预利率+固定管理费
商业银行和金融公司的基本贷款利率上限是不同的 , 由于该国行的干预汇率调整是这样解释的:
对于商业银行来说,调整后的国行的干预汇率=国行的干预汇率× 80%/(1 -需求评审%)
对于金融公司,调整后的国家银行的干预汇率=国行的干预汇率/(1 -需求评审%)
商业银行以较低的国行的干预汇率调整(与金融公司)在基本贷款利率下限 , 导致商业银行的资金成本相对较低。 这是由于存在零利息经常账户余额。
在实践中,国家银行的干预汇率 , 被定为当时的国家银行3个月的干预汇率(前一个月的平均KLIBOR以前使用)。 国行定在2.50%的固定管理费用的初期,但在08年9月1日降低到2.25%,以促进金融机构提高营运效率。 每当国行的干预汇率的变化或需求评审 ,银行机构提供一周来调整其最优惠贷款利率 , 以符合新的上限。

 
马来西亚基本贷款利率 : 6.60%  (5月11日2011年生效)

(利率2014年1月29日刷新)

Jivdani Mata Temple Virar

People are attracted to this Temple for one main reason being its on Top of mountain, Its a fun to climb those 1300 footsteps early morning or after 5:00 PM in evening, with friends and relatives. Another specialty being the scenic aerial view (See Video Below) from the peak top of Mountain. Complete Virar can be seen till far stations like Vasai Road etc. The beautiful sunset view is not to be missed when in evening, it adds a charm to the wide arabian sea at far ends that can be seen from this Jivdani temple mountain.

Previously it was believed that Godess Jivdani will be happy if you sacrifice a hen at the sacrifice section which is behind side of temple and their use to be lots of blood spots and smell around which was seen uncomfortable to tourist and others. Since last decade the ritual of sacrificing life of goat or hen to Life saver Mata Jivdani has been stopped and the place now is neat and clean to visit at any time.

Thursday, February 20, 2014

PC Auto Power Off Each Time After Few Seconds On

 I have a year and a half old Acer computer. Today, my computer was working fine at the local library and I did what I usually do with my computer. I went for a 20 minute walk and took out my computer again but the 'volume mixer' wasn't working so I manually turned off the computer by touching the power button. I tried to turn on the computer again by pressing the button but it will only stay on for a couple of seconds. When those seconds are up, the computer shuts off. Help me!

Here's a few things that might help:

-My computer always had a memory problem. I would have to shut down my computer because my computer would get so slow and have messages pop up saying my computer was low on memory.

-I downloaded a virus by accident and ever since the virus was activated on my computer, my emails won't work.

- I use a different AC adapter than the one I used to. My old one stopped working so I had to buy another one from a different company.

Could anyone tell me what's wrong and tell me how to fix it if I can avoid a trip to the computer repair man or buy another computer. 


Answer:


PC or laptop auto turn off may have several reasons, one of them is motherboard faulty, power switch itselt faulty, another is cooling fan faulty where result overheat the the pc/laptop will auto cut off power to prevent burn.

You need someone technical sound to open the check the internal, not easy to identify if motherboard faulty.         

Keyboard Hot Key

Keyboard shortcuts are typically an alternate means for invoking one or more commands that would otherwise be accessible only through a menu, a pointing device, different levels of a user interface, or via a command console. Keyboard shortcuts generally expedite common operations by reducing input sequences to a few keystrokes, hence the term "shortcut".
Some keyboard shortcuts require the user to press a single key or a sequence of keys one after the other. Other keyboard shortcuts require pressing and holding several keys simultaneously. For simultaneous keyboard shortcuts, one usually first holds down the modifier key(s), then quickly presses and releases the regular (non-modifier) key, and finally releases the modifier key(s). This distinction is important, as trying to press all the keys simultaneously will frequently either miss some of the modifier keys, or cause unwanted auto-repeat. One exception is shortcuts involving the Esc key, which almost always requires pressing and releasing the Esc key before pressing the next key.
Mnemonics are distinguishable from keyboard shortcuts. One difference between them is that the keyboard shortcuts are not localized on multi-language software but the mnemonics are generally localized to reflect the symbols and letters used in the specific locale.

When shortcuts are referred to as key bindings it carries the connotation that the shortcuts are customizable to a user's preference and that program functions may be 'bound' to a different set of keystrokes instead of or in addition to the default. This highlights a difference in philosophy regarding shortcuts. Some systems, typically end-user-oriented systems such as Windows or Macintosh consider standardized shortcuts essential to the environment's ease of use. These systems usually limit a user's ability to change shortcuts, typically requiring a separate, possibly third-party, utility to perform the task.

Other systems, typically Unix and related, consider shortcuts to be a user's prerogative, and that they should be changeable to suit individual preference. In most real-world environments, both philosophies co-exist; a core set of 'sacred' shortcuts remain fixed while others, typically involving an otherwise unused modifier key or keys, are under the user's control.

Wednesday, February 19, 2014

Offer to Buy Domain

For last few days, busy with an offer to acquisition of my website & domain name. Now is in final stage where the proposed buyer are in the midst of evaluating the reports and traffics of the website.

The buyer is from a financial portal dealing with online financial packages.

Initially i was thinking to keep the website and take stable revenue from adsense in peaceful mind, that's all, any offers to placed ads in the website is bonus and it is one time work without other responsibility.
After received the offer to take full control of the website content and removed the adsense, i managed to seeks advise and opinions from several parties including legal consultation (nephew is a lawyer). As registered owner to the website, i couldn't just give the 100% control right of the website to someone without monitoring its content especially when the website is dealing with financial products where it is tied to BNM rules and regulations. In fact, i'm not in the position to counter check the content as well as editing. Furthermore, time is not permitted for me to do so.
There are also few other factors that stopped me to give 100% control right and removed the adsense.
While doing evaluation, please take the point that the traffics of the website is generated without any promo, ads campaign or backlink works. Most importantly, it attracted the right audience with specify keyword.

Monday, February 17, 2014

PC How To - Install / Upgrade RAM

Adding more memory to your PC is one of the easiest and cheapest ways to boost your computer's performance. If you have kids that like to play high end games or maybe you like to edit vacation movies or pictures the more memory you have the faster, your computer will process the information. The only difficult part of upgrading the memory is making sure you have the wrights type.

There are three main types of memory you have SDRAM, DDR and RD-RAM. The older computers from around 1998 to 2001 used 168 pin SDRAM, then they came out with DDR memory which most newer computer are using this type but the newest memory is the RD-RAM. Memory also comes in different speeds the older models had pc50 and pc66 then came pc100 and pc133. Newer computers are using pc2700, pc3200 and so on on DDR type memory.

Ok that gives you an ideal of the different types of memory now we should point out that if your computer is still under warranty you will have to take it to a authorized service center because you break the warranty sticker on the back it will void you warranty and if you ever have a problem it will not be covered. Ok we need to find out what type of memory you have in you computer. The best way is to go online to the manufacture of your computers web site once there you can enter the model number of your computer and they will have all the specs on your computer. Including type of memory and how much memory you can add. All computers have a limit on how much you can add. Memory is measured in megabytes ranging from 64 megabytes to 1024 megabytes also know as 1 gigabyte and higher. Memory comes in modules or the tech slang is sticks for example if your computer will only handle one gigabytes of memory and you have to slots in your computer you could add two sticks of 512 megabytes each, totaling 1024 megabytes or 1 gigabyte of memory. Most computer stores will carry memory but I would suggest checking online first you can find some pretty go deals.

Now comes the easy part adding the memory to your computer. First make sure you unplug your computer from the wall socket and touch a metal part of the computer case to discharge any static electricity from your body. Next remove the cover there should be screws on the back that will remove the cover. Once you have the cover off look inside and find the memory sticks they look like long thin circuit boards and there will be two tabs at each end. When you find the tabs push the tabs outward and the memory will pop out. If you look at the memory you will see two small notches and there will be two small tabs in the slots that the memory came out of that means that the memory will install only one way. Just take the new memory and line up the notches with the tabs in the slots and push the memory in place until the tabs at each end lock in place. Be careful not to move the memory back and forth too much it should push straight in and lock into place. Once you make sure the two tabs are locked in replace the cover and plug the power back in then start your computer. The computer will recognize the new memory and you are done.

Sunday, February 16, 2014

Avoid getting spyware


Now with today's Internet there's no way to avoid totally getting spyware, but here's a few tips to reduce the amount that affect your computer.
1. Don't install any software from the Internet unless you are absolutely sure it won't infect your computer. This includes freeware, free greeting cards, free screensavers, free music, on-line games, extra toolbars, little add-ons, etc. Even if the file comes from a friend, you still must be sure what the file is before opening it.
2. Don't click on any links in an E-mail unless you are absolutely sure that the web site won't infect your computer. This is especially true with viruses because they are sent mostly though E-mail.
3. Surf with Firefox instead of Internet Explorer. Firefox has extra security and pop-up fighting features that will prove invaluable over and over again.

Friday, February 14, 2014

Few tips on PC made you easy life

You don't need to remember folder names to be organized anymore. Save time by instantly tracking down any document, photo, e-mail message, song, video, file, or program on your PC using Instant Search.

Just open the Start menu and begin typing in the Instant Search box—Windows Vista searches file names, application names, the full text of all files, and metadata, and then displays the results right away.

Making a great home movie just got easier. Use Windows Movie Maker to blend videos and photos into a rich movie, complete with your own soundtrack, titles, and credits.

When your masterpiece is ready to share with family and friends, you can easily create a professional-looking DVD in Windows DVD Maker.

You don't need to remember folder names to be organized anymore. Save time by instantly tracking down any document, photo, e-mail message, song, video, file, or program on your PC using Instant Search.

Just open the Start menu and begin typing in the Instant Search box—Windows Vista searches file names, application names, the full text of all files, and metadata, and then displays the results right away.

Thursday, February 13, 2014

Chap Goh Meh

Today mark the last day of CNY 2014, Chap Goh Meh (元宵节).

This Chap Goh Meh a bit special, it fall on Feb 14, a Valentine's Day in western. Chap Goh Meh also consider one of lovely day for someone in China.
This coincidence is very meaningful and auspicious, especially in this Wood Horse Year which has double spring days (Feb 4, 2014, and Feb 4, 2015). It is very auspicious to marry or give birth this year.

As accordingly to horoscope study, Once every 19 years, Valentine’s Day and Chinese Valentine’s Day fall on the same day.

Some Chinese families celebrate Chap Goh Meh with a feast at home or in restaurants.

Google also have their doodles changed today to represented the lovely day!




Valentine's Day + Chap Goh Meh = Lots of LOVE !!


Wednesday, February 12, 2014

Most Smooth Day

City traffic no jammed at all....3.10 pm arrived home.
Daughters said want to eat tong yam, qi want prawn and ying want egg.
I will cook the vege fish asam tong yam, add prawn and boiled egg.

Tuesday, February 11, 2014

Adware in the PC

My daugters like to download games from internet, last few days is Chinese New Year school off days. Couple of them do nothing at home except playing online game.

After few days off, we (my wife and me) discovered that the PC used by them to play online games has infected by adware, it is pop up and embedded in the browser every time you open it.

Adware is a very wasting resources gimic that affected millions of PC users.

Adware or advertising-supported software is any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software.

Advertising functions are integrated into or bundled with the software, which is often designed to note what Internet sites the user visits and to present advertising pertinent to the types of goods or services featured there. Adware is usually seen by the developer as a way to recover development costs, and in some cases it may allow the software to be provided to the user free of charge or at a reduced price. The income derived from presenting advertisements to the user may allow or motivate the developer to continue to develop, maintain and upgrade the software product. Conversely, the advertisements may be seen by the user as interruptions or annoyances, or as distractions from the task at hand.

Some adware is also shareware, and so the word may be used as term of distinction to differentiate between types of shareware software. What differentiates adware from other shareware is that it is primarily advertising-supported. Users may also be given the option to pay for a "registered" or "licensed" copy to do away with the advertisements.

Monday, February 10, 2014

Is it possible that she can be pregnant?

This is a situation, a girl shave her pubic hair, a shave which she is using is also use of the male to shave also his pubic hair. do you think there is a possibility for that girl be pregnant?

Please answer this seriously. What is the percent change that im pregnant?

PLEASE be serious she is very scared!!!! 

Sunday, February 9, 2014

Malware Attack

This morning, when my wife switched on her PC at her office, the antivirus alerter pop up to tell that her PC infected by malware and provided some guidelines for her to clean and delete the malware.

Malware has evolved tremendously over the last couple of years. The abuse malware had inflicted on financially and throughout the networks were realized almost immediately. Malware, when released, have extremely short lifecycles. But the outcomes are not to be taken lightly. Many variations of just one malware are highly common in the malware world. The ones with longer lifespan than other malware tend to be the majority of the percentage of computers infected.

The word malware comes from the words malicious and software.
Types of malware include:

- Computer viruses
- Computer worms
- Trojan horses
- Logic bombs
- Spyware
- Adware
- Spam
- Popups

Unlike any other infectious causing virtual pathogens, malware reaches levels of sophistication. This further makes an impact on the computer literate community. Every single malware is designed and released for a purpose, with the short lifespan signaling the programmer's intentions of the program. Malware also switches tactics whenever it sees fit.

With the high threat of malware, countries worldwide address this issue with solutions to protect its users. This factor was one of the many highlights of early malware experienced during the last two years. Users are anxious over the threats pertaining to malware, and companies attempting to eliminate these pest are causing the malware world to become stronger. Consider Microsoft's integration of RSS into future Internet Explorer versions and a malware being injected into the RSS feed due to a web application vulnerability on the service. Every time something is created to prevent any malware from infecting the users in any way, the malware steps into the game ahead of everyone else.

Ironically, the malware world is highly competitive. All malware is in a competition to infect the higher percentage of the Internet population with malware authors waging a war amongst each other. However, at the same time, they are unintentionally collaborating information. With this, malware continues to be rather sneaky, requiring less user interaction in activating a malware code.
During 2005, other devices such as MP3 players, or external hard drives, were getting infected with malware.

National security was also at risk with Japanese nuclear data being leaked on the Internet through a virus on a personal computer. The virus exposed interiors, details of regular inspections of repair works, and names of workers. Damages also includes public hospitals in Hong Kong, one-third of Taiwan's post office branches, British Airways, Sydney train system, Scandinavian banks, and British Coast Guard.

Friday, February 7, 2014

My PC affected by computer virus....!!

This morning, my PC hits several Microsoft deadly "blue screen". After reboot it into safe mode and scanned with latest Microsoft Malware Scanner, discovered some trojan in my PC. I think this is the root caused the PC to be halt in dedly states.

A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The original may modify the copies or the copies may modify themselves, as occurs in a metamorphic virus.

A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or carrying it on a removable medium such as a floppy disk, CD, USB drive or by the Internet. Additionally, viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer. Viruses are sometimes confused with computer worms and Trojan horses. A worm, however, can spread itself to other computers without needing to be transferred as part of a host.
A Trojan horse is a file that appears harmless until executed. In contrast to viruses, Trojan horses do not insert their code into other computer files. Many personal computers are now connected to the Internet and to local-area networks, facilitating their spread. Today's viruses may also take advantage of network services such as the World Wide Web, e-mail, and file sharing systems to spread, blurring the line between viruses and worms. Furthermore, some sources use an alternative terminology in which a virus is any form of self-replicating malware.

The term comes from the term virus in biology. A computer virus reproduces by making (possibly modified) copies of itself in the computer's memory, storage, or over a network. This is similar to the way a biological virus works.

Some viruses are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Others are not designed to do any damage, but simply replicate themselves and perhaps make their presence known by presenting text, video, or audio messages. Even these benign viruses can create problems for the computer user. They typically take up computer memory used by legitimate programs. As a result, they often cause erratic behavior and can result in system crashes. In addition, many viruses are bug-ridden, and these bugs may lead to system crashes and data loss.

There are many viruses operating in the general Internet today, and new ones are created and discovered every day.

Wednesday, February 5, 2014

KLIA2 still a lot of issue

KLIA2 come to spot yesterday after news said that it failed both the safety and fire checks.

It is scheduled to open on coming 2 May after few delay. Now it failed the test again, so meaning that whether can it meet the openning schedule or not, nobody can tell.

Today news come out that KLIA2 Undergoing Readiness Test, Malaysia Airports Holdings Bhd (MAHB) has started conducting Operational Readiness and Airport Transfer (ORAT) process on Kuala Lumpur International Airport 2 (KLIA2) to ensure that the new terminal will be ready on May 2 as scheduled.

The main tenant of KLIA2, which is built to handle some 45 million passengers annually, will be AirAsia Bhd.
 ORAT is the rehearsal of airport operations. The baggage handling, check-in and information technology systems as well as the lighting in the terminal will be tested. Even the understanding of signage will also be tested.

Generally, ORAT is undertaken over one year but some airport operators do it in six months.
 In KLIA2's case, MAHB can complete the testing and commissioning within three months because KLIA has a similar system.

MAHB announced yesterday that it has yet to receive the certificate of completion and compliance (CCC) for the KLIA2 terminal building from the contractors, which was due at the end of last month. CCC indicates that the building is safe to be occupied.
 MAHB said it will continue to engage with the UEM Construction Sdn Bhd (UEMC)-Bina Puri Sdn Bhd joint venture on the next course of action in regard to the issuance of CCC and the commencement of ORAT.

 UEMC and Bina Puri jointly announced on Tuesday that they are working with MAHB, the authorities, consultants and architects to rectify issues found during the follow-up inspection, while rectification work will commence immediately.

 Meanwhile, a source familiar with the project told Business Times a newspaper report yesterday suggesting that 65 per cent of the terminal building did not meet fire and safety requirements has been blown out of proportion.

"The Fire and Rescue Department was satisfied with the inspection. It only gave 10 items that need to be rectified which are in Sector 2 and considered minor.

 "In fact, the department has cleared all the other sectors. There is no 'final inspection'. When the 10 items have been fixed, the department will check to ensure that they are in accordance to its recommendations. After that, the department will issue a support letter," said the source.

More Info : http://www.klia2.org

Malware crashes into October 2013's top virus charts

Most of IT security and control firm has revealed that the most prevalent malware threats and countries causing problems for computer users around the world during October 2013.

The study, compiled by IT security and control firm global network of monitoring stations, has shown that a new Trojan horse, PDFex, that is typically spammed out in email messages with an infected Adobe Acrobat PDF attachment, has smashed its way into third position in the chart. The Trojan was widely spammed out in an attack during the last few days of October, taking advantage of an unpatched Windows vulnerability to infect innocent PCs.

As statistics showed, PDFex only started to circulate at the very end of the month, but still managed to account for over 13 percent of all emailed malware during October. It was heavily spammed out between 26-28th October, and during that period, it accounted for a staggering two thirds, or 66 percent, of all malware spread via email. PDFs have long been used in business as a means of sharing information, so the social engineering trickery of using a PDF puts insufficiently protected businesses at risk. Adobe have issued an update to their Acrobat software that fixes the problem, and eyes are now turned too.

Microsoft to patch the underlying flaw in Windows which could also affect other vulnerable applications such as Skype and Firefox.

Tuesday, February 4, 2014

Meet Alex

After almost a year never meet Alex, tonight he call me and we have meet up in Steven Corner.

Normal chit chat, in and around the same topic as usual. He mentioned that his PC running extremely slow for last few days, i have him to scanned by used Microsoft Malware scanner, we have discovered few 'trojan' in his PC.

The trojan namely:

Trojan Information
Name: Win32/PCClient.A.Trojan
Category: Backdoor
Dangerous: Yes
Win32/PCClient.A.Trojan is Backdoor which is malware.
Installing it is highly not recommended.
This Backdoor is also known as:
• Backdoor.PcClient.a - named by Kaspersky.
• Win32.Pcclient.A - named by Computer Associates.
• Win32/PcClient.A trojan - named by Eset.

Puncak Jalil House

After renting for 7 years, the tenant today return the house with good condition, the house defected as common wear the tear process.

Refund him the rental deposit and the new tenant expected to coming in this weekend.

The new rental is RM750 after rent for RM450 for last 10 years.

The house cracking in some places and need some minor repair as well as the ground floor toilet door frame is eaten by termite and need to change.

Some roof top leaking water marks, need to monitor weather is still leaking.

Chat with next door autie, she mentioned that the property there now worth for RM300K.

Monday, February 3, 2014

Market drop more than 30 points

Whole world dropping, US drop more than 300 points and HK open with 500 points below last week closing. Nikkei  also drop more than 400 points.

This is due to US will cut down the bond buy back from market.

Sunday, February 2, 2014

My Sister CNY Trip from Singapore

My sister, Lily. Currently she work in Singapore and travelling back to KL at eve of Chinese New Year (CNY). She departed from Singapore at 930 am by bus and arrived KL around 2.30 pm Terminal Bus Tasik Selatan (TBS). According to her, the traffic of North South Expressway are smooth all the time and reach TBS on time.

I'm fetch he from TBS, she has do some nice cloths for my daughter and bring some snack from S'pore for us. We have gather for CNY eve reunion dinner and so unlucky my wife stomachace due to food poisoning.

For this CNY, we're not travelling back to home town in Taiping (Kuala Sepetang). Actually is nothing so special to travel back, it is just wasting time and money (petrol & tol fee) as if going back, actually also do the same as in KL, watch TV, eat and chitchat, let all. So we have decided not to go back for this year.

After watch the Hong Kong (HK) firework at TV News, i'm planning to celebrate next year CNY in HK for 4 of us. Hope the trip can turn true. Next year CNY fall on 19 Feb 2015, Thursday, a nice day because is 4 continues holidays. A long weekend for everyone who plan to travel far.