Funny Definitions of words you won't find in the dictionary



ADULT: A person who has stopped growing at both ends and is now growing in the middle.

BEAUTY PARLOR: A place where women curl up and dye.

CANNIBAL: Someone who is fed up with people.

CHICKENS: The only creatures you eat before they are born and after they are dead.

COMMITTEE: A body that keeps minutes and wastes hours.

DUST: Mud with the juice squeezed out.

EGOTIST: Someone who is usually me-deep in conversation.

GOSSIP: A person who will never tell a lie if the truth will do more damage.

HANDKERCHIEF: Cold Storage.

INFLATION: Cutting money in half without damaging the paper.

MOSQUITO: An insect that makes you like flies better.

RAISIN: Grape with a sunburn.

SECRET: Something you tell to one person at a time.

TOOTHACHE: The pain that drives you to extraction.

TOMORROW: One of the greatest labor saving devices of today.

YAWN: An honest opinion openly expressed.

WRINKLES: Something other people have. You have character lines.

Travel Insurance - Compare different offers for a large number

Buy travel insurance is something that most people struggle with. The key to choosing travel insurance is not trapped in the mass of available companies. There are literally hundreds of companies to choose from, but you only want one. Your travel insurance company should be all you need to be, here are some things you can do to make your choice.You can get many quotes directly from the Internet

Best Beaches of India: Neil island- Andaman and Nicobar, Anjuna beach - Goa , Lakshadweep the paradise , Kovalam Beach – Paradise of the South (Kerala), Radhanagar Beach - Andaman, Benaulim Beach-Goa, Minicoy - Lakshadweep

Neil island- Andaman and Nicobar



Neil island is situated in Andaman and Nicobar. The south western part of India. Neil is one of the several gorgeous islands of Andaman. An ideal holiday spot for those who loves nature. It is favorite among eco-friendly tourists. Beautiful beaches of Laxmanpur, Bharatpur and Sitapur are worth visiting. The bridge formation at the seas shore (the Howrah bridge) is a must see. The widest part of the island is 5 kms. You can walk on the whole island in about an hour.

 http://hallosushant.blogspot.com/

The population is about 4000. Neil is referred as vegetable bowl of Andaman. There is not a huge market. Locals would love to cook you fish and vegetables while hiking. Sitapur beach is the main attraction. You can see live corals in shallow water and beautiful species of fishes.







Neil is connected with Port Blair (the capital of Andaman) 4 days a week. One way ticket costs Rs.200 (approx $4.00) Book your tickets atleast 3 days prior you visit. The boats leaves early in the morning at 6.30 am.



How to reach - You can reach Port Blair which is the Capital of Andaman from Kolkata or Chennai (3rd and 4th biggest Indian cities. Kolkata and Chennai have International airports and well connected with all major Indian cities) http://hallosushant.blogspot.com/


Anjuna beach - Goa



Anjuna is a village in Goa. Place of one of the Brahman commodities. During the 60's and 70's it was the favorite destination of hippies.Besides the beach it is known to the travelers from all over the world for its flea market. This market has anything from Indian souvenirs to antiques. Once it was a hippie center of Goa is now one of the aging tourist destinations.





Anjuna is safe for watersports. White sands makes it awesome for sun bathing. It is favorite among sun starved European tourists.  http://hallosushant.blogspot.com/


How to reach - Anjuna is 18 kilometers (10 miles approx) from the Goa's capital city Panjim. Panjim is well connected to all the major cities of India by Railways, Airways and Buses.


Lakshadweep the paradise 







Lakshadweep is probably among top 5 most beautiful beaches of the world. Lakshadweep is a Sanskirt word which means "1000 islands". It is the smallest union territory of India. It is only 200 to 300 kms from the Kerela coast. Out of hundreds, only 10 of the Islands are inhabited. The total land area is 11 sq mi or 32 square kms. The main language of the island is Malayalam and a dialect of Malayalam
 http://hallosushant.blogspot.com/


Lakshadweep has a large scenic appeal. The water is crystal clear and beach is sunny. The ideal and best place for scuba diving. Lakshadweep cannot support big industries because of being a small region. Tourism is the only industry. World first low temperature thermal desalination plant was opened in Lakshadweep.




How to reach by Air - Lakshadweep only has 1 operating Aerodrome in Agatti. The Indian Airlines provides air service. From 2007, the Kingfisher airlines has started flights to Agatti from Bangalore (Karnataka) and Kochi Kerela.  http://hallosushant.blogspot.com/


By ship - The other islands has well connected ship services from Kochi or Calicut (Kerela) There are 5 ships from Kochi to reach the Lakshadweep islands. Advanced booking prior 4 days is recommended. There are larger ships which are operated between islands. Information about ship fares Click here - Website of Ship fares and timings
 http://hallosushant.blogspot.com/

Kovalam Beach Paradise of the South (Kerala)


Kerela is called God's own country by world tourism. Kerela is blessed with beauty of hills, rainforests, beaches and backwaters. The beaches of Kerela are among best in the world. Kovalam Beach is best of all beaches. It is totally opposite of Goa. Goa is for backpackers but Kerela is for those who want a peaceful vacation in nature's lap. The clam beauty attracts more upper-class tourists. The best time to visit is October to March.


Kovalam is on the west coast of Kerela. It is only 8 miles from Thiruvananthapuram (the capital city of Kerela state) The lush green surroundings around the beach, shade of tall coconut trees and coll breeze makes a memorable holiday. The international tourists prefer Kovalam to relax and get an Aayurvedic Herbal Massage. The delicious sea food attracts thousands and scuba diving with colorful corals is an experience of life time. http://hallosushant.blogspot.com/


How to reach ? - Kovalam is only 30 minutes from Thiruvananthapuram which is the capital city of Kerela. Thiruvananthapuram is well connected to all the Major cities of India by Air, Road and Trains. Below is the Website links for airtravel.


 Radhanagar Beach  - Andaman


Radhanagar is probably one of the top 3 beaches of Andaman. It is full of natural beauty, white sand and a small tropical rainforest. It has an extra ordinary marine life which can be seen through naked eyes as the water is crystal clear. http://hallosushant.blogspot.com/








How to reach - You can reach Andaman from Kolkata or Chennai (3rd and 4th biggest Indian cities. Metros with International airports) Radhanagar is well connected with Port Blair (the capital of Andaman) through regular ship service.


Benaulim Beach, Goa
This Portuguese named beach is not very well known. It is one of the reasons of it’s charm. It is a beach town a little south of Margao in Goa, India. It is in the center of Colva beach in South Goa. Being a fishing beach it gets fairly crowded in evening and weekends. The water is safe for swimming.




A legend says lord Parshurama shot an arrow from the Sahyadri Mountains and the town is now situated where the arrow landed. The place also sacred for Christians being the birthplace of Father Joseph Vaz.
 http://hallosushant.blogspot.com/
How to reach - The town is well connected to the Goan capital of Panjim. Panjim is well connected to all major cities of India.


Minicoy  - Lakshadweep


Minicoy is the second largest island of union territory of Lakshadweep. A prior permission is needed to enter Minicoy.It is cresent shaped and it is approximately 10 kilometers long. There is large lagoon deep enough for small ships.
A lighthouse built in 1885 is a good time to spent time. The cool breeze and the feeling of time being slow is awesome. The island has beautiful coral reef. Scuba diving facility is available.  The beaches has change rooms and  and facility to kayak and sail. 




How to reach by Air - Lakshadweep only has 1 operating Aerodrome in Agatti. The Indian Airlines provides air service. From 2007, the Kingfisher airlines has started flights to Agatti from Bangalore
(Karnataka) and Kochi Kerela.


By ship - The other islands has well connected ship services from Kochi or Calicut (Kerela) There are 5 ships from Kochi to reach the Lakshadweep islands. Advanced booking prior 4 days is recommended. There are larger ships which are operated between islands. Information about ship fares Click here - Website of Ship fares and timings
 http://hallosushant.blogspot.com/
Where to stay -  There are 3 tourist cottages and a tourist house with a capacity of 20 beds..








AirAsia Refund the Convenience fee charges : Experince Sharing

Background Information:
First payment attempt was via credit card. Therefore, the system has capture the charge amount of convenience fee.

Best Approach to refund:
1. Please directly go to http://www.airasia.com/my/en/faqdetailsform.html, and type a short sentence about the wrong charges.

According to http://www.airasia.com/my/en/confees.html, the convenience fee only be included when the payment is made via credit card. (In my case, I used online bank transaction)



2. Next, don't forget to provide your bank account, for refund propose details which should include the following items:
a) Full name
b) A/C number
c) Bank name, branch
d) Passport / IC number
e) Contact no.

3. You should receive a response within 3 working days.

After that, you should wait about a minimum thirty working days (30) to receive this refund. Although it is required to wait about 30 working days, the attitude of the staff is still good and at least, the money will be refunded in the end.

To follow up on the refund status, one could either refer to your issue bank or please logon to the web under 'Manage my booking' and select 'Check status' under the Refund status column.

Feel free to give me a comment about this topic. It will be a great support to Xaivier Blog. Written by: Xaivier Chia Homepage. Advertise here. Subscribe.

Bursa Malaysia: OSK Holding (5053) - Important date should be noticed

These are some important date for those interested in OSK Holding should be noticed about:

25/11/2009 Quarterly rpt on consolidated results for the financial period ended 30/9/2009

05/10/2009 EX-date
06/10/2008 EX-date

18/09/2009 Interim Dividend
17/09/2008 Interim Dividend

27/08/2009 Quarterly rpt on consolidated results for the financial period ended 30/6/2009
29/08/2008 Quarterly rpt on consolidated results for the financial period ended 30/6/2008

28/05/2009 Quarterly rpt on consolidated results for the financial period ended 31/3/2009

28/04/2010 EX-date
29/04/2009 EX-date

22/03/2010 Final Dividend
23/03/2009 Final Dividend

25/02/2010 Quarterly rpt on consolidated results for the financial period ended 31/12/2009

26/02/2009 Quarterly rpt on consolidated results for the financial period ended 31/12/2008

Note: All contents shall not be treated as a recommendation but are solely the opinions of the author. Any action that one taken as a result of information from this site is ultimately ones responsibility. Consult your investment adviser before making any investment decisions, if necessary.

Feel free to give me a comment about this topic. It will be a great support to Xaivier Blog.

Written by: Xaivier Chia

Homepage. Advertise here. Subscribe.

Natural Organic Green Tea Benefits : Helps fight against Cancer, Heart Disease, Anti-Aging, Weight Loss, Obesity, Arithritis, Alzheimer, Parkinson's, BP, Cold, Flu, Asthma, Herpes, Allergy, and HIV





Green tea has increasingly become a very popular drink worldwide because of its immensely powerful health benefits.


It is extraordinarily amazing what green tea can do for your health. And if you're not drinking 3 to 4 cups of green tea today, you're definitely NOT doing your health a big favor.


Here Are The 25 Reasons Why You Should Start Drinking Green Tea Right Now:


1. Green Tea and Cancer
Green tea helps reduce the risk of cancer. The antioxidant in green tea is 100 times more effective than vitamin C and 25 times better than vitamin E. This helps your body at protecting cells from damage believed to be linked to cancer. http://hallosushant.blogspot.com/


2. Green Tea and Heart Disease
Green tea helps prevent heart disease and stroke by lowering the level of cholesterol. Even after the heart attack, it prevents cell deaths and speeds up the recovery of heart cells.


3. Green Tea and Anti-Aging
Green tea contains antioxidant known as polyphenols which fight against free radicals. What this means it helps you fight against aging and promotes longevity.


4. Green Tea and Weight Loss
Green tea helps with your body weight loss. Green tea burns fat and boosts your metabolism rate naturally. It can help you burn up to 70 calories in just one day. That translates to 7 pounds in one year.


5. Green Tea and Skin
Antioxidant in green tea protects the skin from the harmful effects of free radicals, which cause wrinkling and skin aging. Green tea also helps fight against skin cancer. http://hallosushant.blogspot.com/


6. Green Tea and Arthritis
Green tea can help prevent and reduce the risk of rheumatoid arthritis. Green tea has benefit for your health as it protects the cartilage by blocking the enzyme that destroys cartilage.


7. Green Tea and Bones
The very key to this is high fluoride content found in green tea. It helps keep your bones strong. If you drink green tea every day, this will help you preserve your bone density.


8. Green Tea and Cholesterol
Green tea can help lower cholesterol level. It also improves the ratio of good cholesterol to bad cholesterol, by reducing bad cholesterol level.


9. Green Tea and Obesity
Green tea prevents obesity by stopping the movement of glucose in fat cells. If you are on a healthy diet, exercise regularly and drink green tea, it is unlikely you'll be obese. http://hallosushant.blogspot.com/


10. Green Tea and Diabetes
Green tea improves lipid and glucose metabolisms, prevents sharp increases in blood sugar level, and balances your metabolism rate.


11. Green Tea and Alzheimer's
Green tea helps boost your memory. And although there's no cure for Alzheimer's, it helps slow the process of reduced acetylcholine in the brain, which leads to Alzheimer's.


12. Green Tea and Parkinson's
Antioxidants in green tea helps prevent against cell damage in the brain, which could cause Parkinson's. People drinking green tea also are less likely to progress with Parkinson's.
 http://hallosushant.blogspot.com/
13. Green Tea and Liver Disease
Green tea helps prevent transplant failure in people with liver failure. Researches showed that green tea destroys harmful free radicals in fatty livers.


14. Green Tea and High Blood Pressure
Green tea helps prevent high blood pressure. Drinking green tea helps keep your blood pressure down by repressing angiotensin, which leads to high blood pressure.


15. Green Tea and Food Poisoning
Catechin found in green tea can kill bacteria which causes food poisoning and kills the toxins produced by those bacteria.


16. Green Tea and Blood Sugar
Blood sugar tends to increase with age, but polyphenols and polysaccharides in green tea help lower your blood sugar level.


17. Green Tea and Immunity
Polyphenols and flavenoids found in green tea help boost your immune system, making your health stronger in fighting against infections. http://hallosushant.blogspot.com/


18. Green Tea and Cold and Flu
Green tea prevents you from getting a cold or flu. Vitamin C in green tea helps you treat the flu and the common cold.


19. Green Tea and Asthma
Theophylline in green tea relaxes the muscles which support the bronchial tubes, reducing the severity of asthma.


20. Green Tea and Ear Infection
Green tea helps with ear infection problem. For natural ear cleaning, soak a cotton ball in green tea and clean the infected ear.


21. Green Tea and Herpes
Green tea increases the effectiveness of topical interferon treatment of herpes. First green tea compress is applied, and then let the skin dry before the interferon treatment.


22. Green Tea and Tooth Decay
Green tea destroys bacteria and viruses that cause many dental diseases. It also slows the growth of bacteria which leads to bad breath.


23. Green Tea and Stress
L-theanine, which is a kind of amino acids in green tea, can help relieve stress and anxiety.
 http://hallosushant.blogspot.com/
24. Green Tea and Allergies
EGCG found in green tea relieves allergies. So, if you have allergies, you should really consider drinking green tea.


25. Green Tea and HIV
Scientists in Japan have found that EGCG (Epigallocatechin Gallate) in green tea can stop HIV from binding to healthy immune cells. What this means is that green tea can help stop the HIV virus from spreading.


How to hack a facebook account - hack a facebook account

How a facebook account can be hacked

Facebook is one of the most widely used Social Networking website by many across the world . Most of them are now a days making the fake accounts both for abuse or maintaining secret relations. So, it’s no wonder that many people have started to devise methods to hack a Facebook account.
Now i will show you some of the working and best ways to hack a Facebook account
Now a days the security standards are greatly increased even the brute force attacks don’t work don’t get fooled there are so many people who try to fool the people by telling them to hack Facebook and any other service like orkut ,gmail,yahoo, orkut, there are only a few ways to get that account and the easiest relies on the ignorance of the user. The hardest relies on the skill of the hacker…
Starting with the easiest…and going to the rare and intermediate hacks

#Using a Keylogger
The hacker sends a client keylogger software that captures everything the user types in, including passwords. The captured keysrokes are sent by email, FTP or sare stored on the victim’s computer for later removal.
Counter : Use a firewall and don’t accept suspicious programs(specially when they are light) Using a virtual keybord also helps.

#Using a Trojan
This is same as the keyloggers if u want more control over the victom then u can use Trojans (Rats) these are remote administrator tools which give the complete control over the victim system. Relies fully on whether the user accepts the infected file or not. Trojans are quickly detected by antivirus software but packing the Trojan can get around that. Trojans or Rats can also be binded with legitimate software using exe binders.
Counter : Antivirus and Suspicion. Trojan also generate a lot of network activity when operating, so it is easy to spot them. Firewalls also work gr8.

#Phishing
PHISHING is the most commonly used method to hack into any web based systems like orkut ,gmail ,yahoo.
Phishing is proved the best and easy way to hack into any web based system u can even hack into Facebook it has high success rate . And also there is no need of any scripting knowledge like html just upload the page to any free hosting accounts and send the link to the victim. It works by creating a copy of a Login page (facebook login) ,changing some stuffs in it so as it emails the input username and password to the hacker and redirect to the REAL Facebook login page after so as the user does not get a hint of what is happening. Once the user has input his credentials, they are sent as plain text to the hacker.
Counter: The fake login page usually have to be hosted somewhere and must have a domain name. Naturally it cannot be the same as login.facebook.com so check for the URL when you are login in.

#Metasploit
I personally hate this tool. Won’t talk much about it.. damn automatic hacker
The attacker just needs the victims IP and some skill to pull the attack. So don’t just give out your Ip and don’t download stuffs from Instant Messengers as it is in this way that the attackers obtain the ip address. Beware also of emails containing strange link as clicking on a link can send your IP adrress to the hacker.

#Cookie Stealing
Involves using an exploit to steal session cookies which when injected into the hackers session (cookie injection), gives him access to your facebook account without needing to input your password. But that limits the damage he can do.
A > Downloads the HomePage.
B > Allows you to the Target’s Wall and
C > Retrieve your Target’s Friend’s List

The hacker needs your IP, skills and skills.
A software I heard that can give you control of a facebook account is FBcontroller. You have to feed it the live cookies of a victim and it does the rest.
You can get the target’s cookie by sniffing, XSS, amusing engineering, ARP Poison-Sniffing, Scroogle chase or about you like.

Facebook rh hack tool - facebook hacking tool

Facebook rh hack tool is presumed to be a hacking tool allowing hackers to hack a facebook account. Basically facebook hacking tools are in great demand and easily get a big buzz on the net. A quick search on google and you
will find thousands of download links Facebook rh hack tool v1.6 or later but these links seem to go nowhere. From the hacker underground, it is very clear that rh hack tool is a ghost software, it does not exist. It is technically very difficult to develop such a tool, hackers uses a mix of techniques mos commonly SQL injection or phishing to get a hand on facebook accounts. Having a tools that automatically does these things in one go is hoax. So next time you here about a facebook hacking tool, don't even go looking for it. The key to hacking facebook is knowledge and skill. 
To end, Facebook rh hacking tool = HOAX .

Cara mengganti background foto

Berikut ini cara untuk mengganti foto background dengan Photoshop. Sebenarnya cara ini mudah sekali, sebenarnya sudah sering saya tuliskan caranya di blog ini. Namun karena masih ada beberapa pertanyaan yang sempat saya tampung, yang intinya masih bingung tentang cara mengganti background, dan memang saya juga belum pernah menulis secara langsung judulnya Mengganti background. Maka pada tutorial Photoshop ini saya tuliskan petunjuknya.

Yang menjadi inti saat kita mau mengganti background adalah kita harus memisahkan lebih dulu antara model foto dengan latar belakang foto sebelumnya. Sedangkan cara untuk memisahkannya adalah dengan membuat seleksi. Tentang pembuatan seleksi, bisa dipelajari dari Kategori seleksi. Yang paling mudah namun tidak saya rekomendasikan adalah menggunakan Lasso.
Langkah mengganti background foto dengan Photoshop

Langkah 1
Bukalah foto yang akan diedit dengan Photoshop

tutorial photoshop ganti background 1

Langkah 2
Buat seleksi pada model fotonya.

tutorial photoshop ganti background 2

Langkah 3
Pilih menu Edit > Copy. Kemudian pilih menu Edit > Paste. Hasilnya akan terjadi layer tambahan, bisa Anda lihat di palet layer (palet ini letaknya di kanan bawah)

tutorial photoshop ganti background 3

Langkah 4
Buka file lain yang akan digunakan sebagai background foto. Setelah file ini dibuka, kemudian pilih Move tool. Dengan tool ini, geserlah gambar dari file yang akan digunakan sebagai latar belakang ke arah file yang sudah dicopy dan paste tadi.

tutorial photoshop ganti background 4

Langkah 5
Ubahlah urutan layernya. Buatlah agar urutan layernya seperti gambar dibawah ini.
Untuk memindah urutannya, bisa dilakukan dengan menggeser nama layernya naik atau turun, diarahkan ke perbatasan tiap nama layer.

tutorial photoshop ganti background 5

Gambar sudah terganti backgroundnya.

tutorial photoshop ganti background 6

Caranya mudah, namun membuat seleksi yang detil memang agak rumit, dan diperlukan jam terbang menggunakan Photoshop. Jadi harus sabar dan rajin berlatih.

29, april 2010


USB DISK EECTOR

aplikasi ini merupakan freeware,namun kalo free blom tentu ga bagus
neh tools penting bangett....klo misal na kamu mau eject Perangkat USB kayak flashdisk dll namun ga bisa .....nah ini neh solusinya download tools na




copas aja ya html lagi rusak http://box.net/shared/6gqazv3k6e

Mengubah foto jadi kartun dengan photoshop

Pada efek kartun kali ini, kita akan membuat banyak bentuk-bentuk secara manual menggunakan Pen Tools. Tehnik seperti ini ada juga yang menyebut sebagai tracing, vektor. Sebenarnya, tehnik seperti ini akan lebih cocok bila dijalankan pada Adobe Illustrator. Namun karena pokok bahasan kita adalah Photoshop, maka sekarang kita coba menggunakan Photoshop saja, walaupun tentunya cara pembuatannya akan lebih rumit.

Jika ingin melihat contoh lain dari gambar trace/vektor ini, beberapa hari yang lalu pernah saya buatkan. Bisa dilihat di Galeri halaman 2.
Langkah pembuatan trace pada foto

Langkah 1
Bukalah sebuah foto dengan Photoshop. Pada contoh tutorial ini, saya menggunakan foto Mas Wasidi aka Si Kecil.

tutorial photoshop trace efek kartun 1

Langkah 2
Karena kondisi foto ini terlalu gelap, maka agar lebih nampak perbedaan antara daerah gelap dan terangnya, maka saya atur dulu pewarnaannya menggunakan Image > Adjustment > Shadow Highlights.

tutorial photoshop trace efek kartun 2

Langkah 3
Duplikat layer background ini, agar kita mempunyai cadangan foto yang aslinya. Untuk jaga-jaga, siapa tahu nanti membutuhkan gambar aslinya. Dan memang akhirnya kita juga butuh foto aslinya, untuk membuat bentuk-bentuk yang agak rumit, misalnya mata dan bibir.
Cara untuk menduplikat ini bisa dengan Ctrl + J, atau dengan menarik nama layer ke arah icon Create New Layer.

Langkah 4
Pilih menu Image > Adjustment > Posterize. Isikan nilai yang kecil. Misalnya 4.

tutorial photoshop trace efek kartun 3

Tujuan langkah ini adalah untuk mengurangi jumlah warna yang digunakan.

Langkah 5
Duplikat lagi layer foto yang sudah diposterize ini. Ubah blending option menjadi Darken.

tutorial photoshop trace efek kartun 4

Pilih menu Filter > Blur > Gaussian Blur. Atur nilai Radius secukupnya, sambil melihat gambar aslinya (jangan melihat gambar preview pada kotak dialog Gaussian Blur). Tujuan langkah ini adalah untuk membuat agar muncul perbatasan yang lebih tegas pada tiap warna yang ada.

tutorial photoshop trace efek kartun 5

Langkah 6
Sekarang kita mulai langkah pembuatan layer untuk melakukan trace.
Buatlah sebuah layer baru, dengan cara melakukan klik pada icon Create a new layer (di gambar dibawah ini saya tandai dengan lingkaran merah) . Kemudian ubahlah nilai opacity pada layer ini hingga 0% (saya tandai dengan lingkaran biru).

tutorial photoshop trace efek kartun 6

Langkah 7
Pilih Pen tools pada tool box photoshop (lingkaran merah pada gambar tutorial photoshop di bawah ini).

tutorial photoshop trace efek kartun 7

Kemudian lakukan pengaturan pada option bar. Pilihlah icon Shape layers (gambar lingkaran biru). Klik icon segitiga geometri option (gambar lingkaran hijau), kemudian beri tanda cek pada pilihan Rubber Band.

Di sebelah kanan dari pengaturan tersebut, terdapat beberapa icon lagi (gambar lingkaran ungu). Tentunya sudah Anda pelajari pada tutorial photoshop sebelum ini. Jika belum, silahkan dibaca dulu pada Cara Pembuatan Shape.

Sedangkan tentang penggunaan pen tool bisa dibaca pada Tutorial Photoshop yang judulnya Membuat Seleksi Dengan Path.

Langkah 8
Buatlah bentuk shape menggunakan Pen tool. Buatlah mengikuti bentuk wajah pada foto.

tutorial photoshop trace efek kartun 8

Buatlah garis path ini melingkar hingga menyambung dari titik awal sampai akhir, sehingga terjadi sebuah bentuk bangun.

tutorial photoshop trace efek kartun 9

Langkah 9
Ulangi langkah ke-6 dan ke-7, namun kali ini buatlah bentuk shape pada area warna yang lain. Setiap bentuk shape dibuat pada sebuah layer baru.

tutorial photoshop trace efek kartun 10

tutorial photoshop trace efek kartun 11

Jumlah bentuk shape yang dibuat kita batasi antara 2 sampai 4 warna saja.

Langkah 10

Ubahlah nilai opacity pada layer-layer shape yang sudah kita buat tadi. Opacity kita buat hingga 100%. Sehingga nampak foto tertutupi oleh warna-warna.

Untuk mengubah warna pada setiap layer shape, lakukan dengan cara melakukan klik 2 kali pada thumbnail layer-nya. Kemudian pilih salah satu warna.

tutorial photoshop trace efek kartun 12

Sebagai panduan dalam memilih warna-warna kulit, berikut ini saya sertakan beberapa warna yang bisa Anda gunakan.

tutorial photoshop trace efek kartun 13

Ubahlah setiap warna pada semua bagian wajah tersebut.

tutorial photoshop trace efek kartun 14

Saat membuat bentuk shape pada area warna yang lain, jika ada layer yang menutupi sehingga kita kesulitan untuk menentukan bentuk shape, maka untuk sementara icon mata pada layer yang menutupi bisa dimatikan dulu atau di kurangi dulu opacity-nya.

tutorial photoshop trace efek kartun 14a

Kemudian ulangilah lagi membuat bentuk shape pada semua bagian tubuh, hingga keseluruhan foto tertutup oleh bentuk-bentuk shape.

tutorial photoshop trace efek kartun 15

Pada bagian mata dan bibir, karena bagian ini termasuk bagian pokok dalam mengenali wajah seseorang, kita perlu mematikan dulu beberapa icon mata pada palet layer. Sehingga kita bisa membuat trace dengan melihat bentuk aslinya yang belum ter-posterize.

Untuk bagian jenggot, saya menggunakan Brush tool berukuran kecil yang disapukan pada gambar dengan pengaturan Brush preset Scattering.

Langkah 11
Untuk membuat latar belakang pada foto, buatlah sebuah layer baru yang diletakkan pada urutan sebelah bawah dari bentuk-bentuk shape tersebut. Layer baru ini bisa diisi warna sesuka Anda, dengan memilih menu Edit > Fill.

tutorial photoshop trace efek kartun 16

Warna tidak harus putih, Anda bisa juga menggunakan warna-warna lain, misalnya dengan Gradient Tools seperti berikut ini.

tutorial photoshop trace efek kartun 17

Jika semua gambar akan dijadikan satu, bisa dilakukan dengan memilih menu Layer > Flatten Image.

Selamat mencoba tutorial membuat kartun dengan Photoshop ini.

masuk ke PC orang lain

mungkin ini untuk terakhir kali nya saya posting..,...
ato..........udah lah..forget it...
saya hanya ingin berbagi....dan melengkapi...

Cara masuk di komputer lain lewat DOS (Windows XP / 2000) Anda ingin masuk dikomputer teman anda dalam sebuah LAN?
bisa melihat seluruh isi harddisk teman anda, membuat directory, membuat file, mendelete file atau apa saja?
itu mudah, semua caranya ada disini.

================================================== ====================

1.Pertama-tama anda harus tahu 2 program penting yaitu internet Maniac (Internet Maniac.exe) Berfungsi untuk mengetahui
ip addreas client melalui computer name / hostname KaHT (KaHt.exe)program hacker KaHT Berfungsi sebagai program untuk menerobos
ke computer server atau client Ingat hanya dengan 2 program diatas maka anda bersiap-siaplah menguasai warnet / kampus / kantor dsb.

================================================== ====================

2.anda periksadahulu jaringan anda dengan melihat para hostname dengan 2 cara.
ekstractlah dahulu program tersebut,setelah di extract lalu pertama kali anda periksa dahulu jaringan anda dengan melihat para hostname
dengan 2 cara.Untuk Windows XP Cara Pertama Masuk ke Start Lalu Search, lalu pilih computers or people lalu
pilih A computer on the Network lalu langsung klik search maka akan segera muncul computer-komputer yang terkoneksi dalam jaringan.
Untuk Windows 2000/XP/vista (kalau anda menemukan open port 135 di OS ini)
Cara Pertama Masuk ke Start Lalu Search Lalu For Files or Folders lalu pada menu Search for other item pilihlah computers.

================================================== ====================

3.lalu akan muncul Search for computer, maka langsung klik Search Now maka nama-nama computer akan muncul (Alternatif cara yang cepat
dapat mengklik My Network Place / Network Neighboure saja)Setelah anda mendapatkan sasaran computer yang akan di masukin / diremote maka
anda langsung saja jalankan program Internet Maniac.

================================================== ====================

4.Masuklah ke Host Lookup lalu ketikkan nama computer / hostname lalu klik resolve, disini anda akan mendapat alamat ip computer tersebut.
Dengan nomor ip ini maka anda sudah mengetahui sasaran computer yang akan di masuki. Setelah itu selesai maka kita tinggalkan program
Internet Maniac,

================================================== ====================

5.kita akan beralih dengan program KaHT, program ini akan didetect sebagai Trojan
oleh antivirus, tapi abaikan saja, jangan di hapus / di karantina kalau terdetect, kalau perlu disable untuk sementara antivirusnya,
satu lagi, program KaHT bekerja dalam MS-DOS Mode jadi disini kemampuan anda menggunakan DOS sangat penting,
tanpa kemampuan DOS maka anda tidak akan bisa banyak berbuat.

================================================== ====================

6.Cara masuk DOS Mode Untuk Windows XP : Masuklah ke Start,
All programs, Accessories lalu Command Prompt Untuk Windows masuk DOS maka masuklah di directory program KaHT,misal tadi di di extract di
C:\""KaHt maka ketikkan "CD\""KaHT"....(dst :P)Jika sudah, ini saatnya? Ketikkan "KaHT sebelum_no_ip_komputer_sasaran no_ip_komputer_sasaran.
kalau bingung bisa begini : "KaHT Ip1 ip2" ip1 : ip awal yang discan ip2 : ip terahkir yang discan Misalnya tadi ip-nya 192.168.0.1 setelah
di detect pakek Internet Maniac tadi. Maka ketikkan saja "KaHT 192.168.0.0 192.168.0.1" lalu enter Nah disini nanti program akan bekerja
otomatis. Setelah selesai scanning jika nanti port 135 ternyata dalam keadaan open maka anda akan otomatis di computer tujuan / sasaran,
untuk lebih persisnya anda akan berada di "c:\""windows\""system" milik komputer tujuan / sasaran setelah pen-scan-an selesai.
Anda bisa bebas di computer sasaran mau edit atau di delete pun bisa, hehe Nah kalo udah begini kita bisa berkreasi : Pingin biaya warnet
kita lebih murah ? gampang masuk aja di billing server, ketik Time,ganti aja waktunya, tapi jangan banyak-banyak apalagi minus nanti ketahuan
ama operator warnetnya kasian khan (secara ane' juga OP warnet dull...:P)
Apalagi nih, Bikin computer itu rusak, lebih baik jangan, tapi sebenernya bisa lho,
delete aja file-file systemnya,hehehhehe. Diatas cuman kreasi dikit aja,kalian bisa saja memanfaatkannya jauh
lebih bermanfaat dari pada diatas Tujuan dari tutorial ini untuk anda yang sering menggunakan komputer dengan Windows 2000 dan XP,vista
dijaringan agar lebih waspada terhadap berbagai tindakan usil dari pihak-pihak yang tidak bertanggung jawab..

================================================== ====================

7.Membuat akses administrator Windows untuk kita lewat komputer lain Kita ingin membuat administrator Windows XP/2000
di komputer lain melalui LAN ?sangat mudah,caranya masuklah ke komputer tujuan dengan program kaht yang sudah diajarkan diatas,
lalu kita akan mencoba beberapa trik.Melihat akses guest dan administrator di Windows Ketik : net user Melihat aktif tidaknya guest
di Windows Ketik : net user guest Membuat akses guest menjadi Administrator dengan perintah : Ketik : net localgroup
Administrators Guest /add Membuat akses adminstrator sendiri :

1. Ketik : net user /add

2. Ketik : net localgroup Administrators /add Menghapus akses administrator Ketik : net localgroup Users /delete 1.
Cara mengetahui password administrator Windows - Download Proactive Windows Security Explorer

================================================== ====================

untuk lebih jelas dan detilnya
bisa di download di sini....dan ada software nya di situ...

THANK's to : cakill, and all friends...

Swaminarayan Akshardham Temple Photographs of water show and laser show in Gandhinagar at night





http://hallosushant.blogspot.com/

http://hallosushant.blogspot.com/

http://hallosushant.blogspot.com/



http://hallosushant.blogspot.com/

http://hallosushant.blogspot.com/

http://hallosushant.blogspot.com/





Control Facebook accounts without the Password - FBController

FBController - The Ultimate Utility to Control Facebook accounts without the Password.

Let me clear this again like last time that this utility WON'T hack/crack Facebook accounts.

You need to feed it biscuits (cookies) before you can do anything.

You can get the target’s cookie by sniffing, XSS, social engineering, ARP Poison-Sniffing, Scroogle search or however you like.

Once you have the cookies you can use FBController to have Full control over the target’s Facebook account.

Login to your Facebook account and sniff your own cookie OR collect a few live Facebook Biscuit/s of your Target/s.
FBConTroller.RAR

============================================================== 
Changes in version FBController 2.0 
============================================================== 

- You don't have to provide each and every cookie variable in the command parameter.

Just save your cookie into a file and point FBC towards it.

- Many changes have taken place over the time in the FB UI and the Cookie structure as explained on the blog.

- FBConTroller v2.0 now has a menu based Operation making it easier to control.

- FBConTroller as of now can Write onto one's own wall, other's walls, Retrieve Profile Page, Retrieve Friends List and even attempts to Retrieve Inbox and Send Messages.

Russian Hacker sells hacked facebook accounts

A spammer/scammer named Kirloss is selling 1.5 million Facebook accounts for a few pennies apiece. Yours might be one of them.

Want to hear some good news? We now know exactly how much your Facebook profile is worth on the open market: Between 25 and 45 cents, depending on whether you have more than 10 friends.
The bad news? How we found out.

According to Verisign's iDefense, a Russian hacker known as Kirllos is selling 1000 Facebook IDs at a pop for $25 (if you have 10 friends or less) or $45 (if you're in the 11+ friends crowd). Thus explaining that rash of bogus Facebook password reset spam I got last month. He's apparently successfully phished log ons for some 1.5 million Facebookers, which he's now hawking on the antichat.ru forums.
Is your account one of them? There's really no way to know for sure, unless you're seeing stuff posted under your name you didn't put there. But if you've recently responded to an email purporting to be from Facebook asking you to log into your account, there's a very strong chance the answer is yes. (I'd recommend logging in and changing your password to something tricky. Do it right now. Go on, I'll wait.)
What can some miscreant do with your Facebook identity?
* He can use it to infect other Facebook users by posting links on your friends' walls to Web sites containing malware, a la the Koobface worm, which has been tormenting users of Facebook, MySpace, and Twitter for two+ years. Koobface can suck your PC into a botnet, at which point it doesn't really belong to you any more.
* He can use it to run big-money con games on your friends, a la the infamous "London Scam" in which a cybercrook pretends to be an old friend of yours who's stranded overseas and needs you to wire him cash -- fast. The London Scam took at least one U.S. victim for $4,000. Unlike Nigerian 414 scams, which requires mind-numbing stupidity on the part of its victims, the London Scam directly attacks affluent, college-educated, computer literate people. (I had a friend who got approached by the same scammer, who was seriously considering wiring the money until I explained what was going on.)
* He can use it to embarrass, harass, or blackmail you. Want to ruin someone's reputation in a hurry? Log on as them and post humiliating or hateful content on their page.
But here's the bigger threat. Facebook really wants to be the single sign-on engine for the Web (see "What's to like about Facebook's 'Like' button?"). So a Facebook log on isn't just a Facebook log on anymore; it's also a log on to sites like Unvarnished, the Huffington Post, and any others that use Facebook Connect. If that's not an argument against using Facebook for single sign on, I don't know what is. Even if you don't use FB Connect, most people tend to use the same log ons for multiple sites; once a crook has your email address and favorite password, he can go to town on you. Nervous yet?
Bottom line: Your Facebook credentials are important, and only getting more so. If you want to protect yourself online, you'll need to protect them as well. Start by mixing up your passwords for your favorite sites, changing them semi regularly, and not getting duped by every stupid email marked "urgent."
Also: I gotta say I find this whole thing kind of insulting. I've got 700+ friends. I think my account is worth at least $1.50. Don't you?

Facebook Security Issues

Facebook has been the victim of five different security problems in the month of March, says Trend Micro.
According to the security firm, four hoax applications have become available on the social network along with a new variation of the Koobface virus, which was first detected at the end of last year, and directs users to a fake YouTube page where they are encouraged to install malware.

Two of the hoax applications that have been downloaded by Facebook users include 'F a c e b o o k - closing down!!!' and 'Error Check System'. By downloading the app, users are giving hackers access to their profile and personal information, and also unwittingly forwarding fake messages to their friends, also encouraging them to download the programs.
Rik Ferguson, senior security advisor at Trend Micro told the BBC:"It's been a pretty bad week for social networking in general".
"It's almost as if the applications we have seen this week are a proof of concept," he said. "It would be much better for them to generate rogue applications that did not look like rogue applications."
Ferguson also revealed that he believes hackers are currently working on creating apps that don't initially appear to be malicious. He predicts these apps will appear on social networking sites very soon.
"One of the problems is that Facebook allows anybody to write an application and third party applications are not vetted before they are released to the public. Even as Facebook stamps out one malignant application, it can pop up in another place," said Graham Cluley, senior technology consultant at Sophos
However, it appears Facebook is still refusing to vet apps before they are made available on the social network.
Founder Mark Zuckerberg told Radio One last month: "Our philosophy is that having an open system anyone can participate in is generally better".

Payment by Mcdonalds Promo House Malaysia: Scam & Spam email

This is to officially inform you that you have been selected for payment by mcdonalds promo house malaysia.

Please find enclosed your payment details. Kindly complete and submit immediately to collect your cash prize!


Congratulations!


Managment.
Mcdonalds Malaysia.
00-601-2656-1229"

Again, this is another spam plus scam email in my mailbox today. However, I hope this post can help other people to avoid falling a trap.

So, why this email is a scam??
1. It is totally non-official email but the email said "This is to officially inform you that ...."
2. What is the manager name??
3. What is 00-601-2656-1229 means??

Next, let's see the attached as shown below:
"
WINNERS ONLY
C\ Don Jaime I nº11 2º
50.003 Zaragoza
WORLD WIDE
Ref: EAASL/941OYI/02/SHYN
Batch: 92/234/03889

April 25th 2010


Dear Lucky Winner,
 
THE MC DONALD'S SEASONAL PROMOTION PRIZE AWARDS WINNING NOTIFICATION.

We are pleased to inform you of the result of the just concluded annual final draws of McDonalds Annual Promo.

The online McDonalds KL, Malaysian Annual Promo draws was conducted by a random selection of email addresses from an exclusive list of 29,031 E-mail addresses of individuals and corporate bodies picked by an advanced automated random computer search from the internet. However, no tickets were sold but all email addresses were assigned to different ticket numbers for representation and privacy.

After this automated computer ballot, your e-mail address emerged as one of twelve winners in the fourth category for the second prize with the following data:

Ref Number: EAASL/941OYI/02/SHYN
Batch Number: 92/234/03889
Ticket Number: 025-11464992-750

You as well as the other winners are therefore to receive a cash prize of £1,350,000 (ONE MILLION THREE HUNDRED AND FIFTY THOUSAND BRITISH POUNDS ONLY) each from the total payout.

Your prize award has been insured with your e-mail address and will be transferred to you upon meeting the requirements, statutory obligations, verifications, validations and satisfactory report.
 To begin the claims processing of your prize winnings you are advised to contact our licensed and accredited claims agent/security company
for SECOND category winners with the information below: You are also advised to give the following information’s to the claim's agent via email

1. Full name and address:
2. Country:
3. Tel and fax number:
4. Occupation:
5. Your Reference and Batch number at the top of this mail:
6. Age:

Dr Harry Hector,
MCDONALDS PROMO CLAIMS AGENT
Email: mcdonalds.malaysia@live.com.my
Phone: 00-601-2656-1229

NOTE: All winnings must be claimed within 20 days from today. After this date all unclaimed funds would be included in the next stake.
Remember to quote your reference information in all correspondence with your claims agent.
You are to keep all lotto information away from the general public especially your reference and ticket numbers. (This is important as a case of double claims will not be entertained).

Members of the affiliate agencies are automatically not allowed to participate in this program.

Thank you and congratulations!!!
Yours faithfully,
Azmir Jaafar,
Managing Director McDonalds Malaysia."

Note: This is just a spam email.( It does not consist of receiver's name, address etc ).

Next, although the name of Managing Director is correct, why such big company need to used live mail address??? mcdonalds.malaysia@live.com.my. 

Lastly, please let me know if you have similar Ref Number, Batch Number and Ticket Number as shown below. It is very useful for us to once again verify this email is a scam email.
"
Ref Number: EAASL/941OYI/02/SHYN
Batch Number: 92/234/03889
Ticket Number: 025-11464992-750
"
Based on my experience, most of the spam emails do not change this kind of number.

To sum up, although the sender's email is very convincing, "Mcdonalds Malaysia <info@mcdonalds.com.my>",  we have sufficient evidences to proof this is a scam email, that is, based on the email address of sender and receiver.

That's all for today. More fascinating articles and sharing will be updated from time to time in Xaivier Blog. Therefore, you are welcome to subscribe our feed, look at our sitemap or simply visit our Homepage.

Written by: Xaivier Chia

--------------------------------------------------------------------
Note:
- I have drop an official email to Mcdonalds to double verify this scam email. The reply will be posted ASAP.
- Good news for all my visitors here. Eventually, I have received an reply from McDonald regarding this scam email. Feel free to take a look at the post at McDonald's Seasonal Promotion - email scam  (10/08/2010))

First edited at 29th Jan 2011 - Reason: To make it more reader-friendly.

Windows Tips: Display special symbols|characters by using keyboard 2


Using the key-broad short-cut to create or type special characters and symbols will always impress your friends. Although the last article has shown how to enter ♡ , ® , ♣ etc by using your keyboard, it may not work if HTML function is disable. Therefore, an alternative way to avoid this problem is using Alt key with specific code number. All you need to do is press the Alt key and hold it down, then type in the specific code number accordingly.

Registered trademark ® is Alt + 0174;

Copyright © is Alt + 0169;

Trademark Sign ™ is Alt + 0153;

Generic Currency ¤ is Alt + 0164;

Some symbols may not work due to the brand of key-pad are shown below:

Alt + 1 is ☺| Alt + 2 is ☻| Alt + 3 is   ♥ | Alt + 4 is  ♦ | Alt + 5 is ♣ | Alt + 6 is ♠ |

Alt + 7 is • | Alt + 8 is ◘ | ○ is Alt + 9 | ◙ is Alt + 10 | ♂ is Alt + 11| ♀ is Alt + 12 |

♪ is Alt + 13 | ♫ is Alt + 14 | ☼ is Alt + 15 |

There are, of course, some requirements to use this method.
1. Must use key-pad. Therefore, for laptop user, an external key pad is needed.
2. The brand of key-pad will also determine whether the symbol can be created.
3. For laptop user, try FN+Alt instead of just Alt key if it doesn't work.

Since there may be a difficulty for us to memorize this stuff, some awesome symbols are shown below can be copied and pasted at anywhere you want. Enjoy it and remember give some comment to me as well^^

Σ⊗♒☠☮☯ ♠Ω♤♣♧ ♥♡♦♢♔♕♚♛⚜★ ☆✮✯☄ ☾☽☼ ☀☁☂☃ ☻☺☹۞۩ εїз Ƹ̵̡Ӝ ̵̨̄Ʒ ξЖЗ εжз☎☏ ¢☚☛ ☜☝ ☞☟✍ ✌☢☣ ♨๑ ❀✿ψ ♆☪☭ ♪♩♫ ♬✄✂ ✆✉✦✧ ♱♰∞ ♂♀ ☿❤❥ ❦❧™ ®©✖ ✗✘⊗♒ ■□▢ ▲△ ▼▽◆◇ ○◎● ◯Δ◕◔ ʊϟღツ回卐™©® ¿¡½⅓⅔¼¾ ⅛⅜⅝⅞ ℅№⇨❝❞ #&℃ ∃∧∠∨∩⊂ ⊃∪⊥∀ ΞΓɐəɘεβ ɟɥɯɔи ๏ɹʁ яʌʍλ ч∞ΣΠ ➀➁➂ ➃➄➅ ➆➇➈ ➉➊➋➌➍ ➎➏➐➑➒➓ ⒶⒷⒸⒹⒺⒻ ⒼⒽⒾⒿⓀ ⓁⓂⓃⓄⓅⓆ ⓇⓈⓉⓊⓋ ⓌⓍⓎⓏⓐⓑ ⓒⓓⓔⓕⓖⓗ ⓘⓙⓚⓛⓜⓝ ⓞⓟⓠⓡⓢⓣ ⓤⓥⓦⓧⓨⓩ ℘ℑℜℵ♏η αβεℓℓα· ¨…¦┅┆┈ ┊╱╲╳¯– —≡჻░▒▓ ▤▥▦▧▨▩█ ▌▐▀▄ ◠◡╭╮╯╰ │┤╡╢╖╕╣ ║╝╜╛┐ └┴┬├─┼ ╞╟╚╔╩╦ ╠═╬╧╨╤ ╥╙╘╒╓ ╫╪┘┌ {。^◕‿◕^。} (◕^^◕) ⓐⓑⓒⓓⓔⓕ ⓖⓗⓘⓙⓚⓛ ⓜⓝⓞⓟⓠⓡ ⓢⓣⓤⓥⓦⓧⓨⓩ ✖✗✘♒♬✄ ✂✆✉✦✧♱ ♰♂♀☿❤❥ ❦❧™®©♡♦ ♢♔♕♚♛★ ☆✮✯☄☾☽ ☼☀☁☂☃☻ ☺☹☮۞۩ εїз☎☏¢ ☚☛☜☝☞☟✍ ✌☢☣☠☮☯ ♠♤♣♧♥ ♨๑❀✿ ψ♆☪☭♪ ♩♫℘ℑ ℜℵ♏ηα ʊϟღツ回 ₪卐™ ©®¿¡½⅓ ⅔¼¾⅛⅜⅝⅞℅ №⇨❝❞ ℃◠◡╭╮╯╰ ★☆⊙¤㊣ ★☆♀◆◇◣◢ ◥▲▼△▽ ⊿◤◥■ ▓回□〓≡ ╝╚╔╗╬ ═╓╩ ┠┨┯┷┏ ┓┗┛┳⊥ ﹃﹄┌ ┐└┘∟「 」↑↓→ ←↘↙♀ ♂┇┅﹉﹊ ﹍﹎╭╮╰╯ *^_^* ^*^ ^-^ ^_^ ^︵^∵∴‖ ︱︳︴﹏ ﹋﹌♂♀ ♥♡☜☞☎ ☏⊙◎☺☻ ►◄▧▨ ♨◐◑↔↕ ▪▫☼♦▐ ░▒▬♦◊ ◦☼♠♣▣ ▤▥▦▩ ぃ◘◙◈♫ ♬♪♩♭♪ の☆→あ £❤。◕‿ ◕。✎✟ஐ ≈๑۩ ۩.. ..۩۩๑ ๑۩۞۩๑ ✲❈➹ ~.~◕ ‿-。☀☂☁ 【】┱┲❣ ✚✪✣ ✤✥✦❉ ❥❦❧❃ ❂❁❀✄☪ ☣☢☠☭♈ ➸✓✔✕ ✖㊚㊛ *.:。 ✿*゚‘゚・ ⊙¤㊣★☆ ♀◆◇ ◣◢◥▲ ▼△▽⊿◤ ■▓ 回□〓≡╝ ╚╔╗ ╬═╓╩ ┠┨┯┷┏ ┓┗┛ ┳⊥﹃﹄ ┌┐└┘∟ 「」↑↓ →←↘↙ ♀♂┇┅﹉ ﹊﹍﹎ ╭╮╰╯ *^_^* ^*^ ^-^ ^_^ ^︵^∵ ∴‖︱︳ ︴﹏﹋﹌ ♂♀♥♡☜ ☞☎☏⊙ ◎☺☻►◄ ▧▨♨◐◑ ↔↕▪▫ ☼♦▀▌▐░▒▬ ♦◊◦☼ ♠♣▣▤▥ ▦▩ぃ◘◙ ◈♫♬♪ ♩♭♪の☆ →あ£❤。 ◕‿◕。 ✎✟ஐ≈ ๑۩۩.. ..۩ ۩๑๑۩۞ ۩๑✲❈ ➹ ~.~◕‿-。 ☀☂☁【】 ┱┲❣✚ ✪✣✤✥ ✦❉❥❦ ❧❃❂❁❀ ✄☪☣☢☠ ☭♈➸✓ ✔✕✖㊚ ㊛ *.:。✿*゚ ‘゚・ ◊♥╠═╝▫■๑»«¶ஐ©† εïз♪ღ♣ ♠•± °•ิ.•ஐஇ *×○▫ ♂•♀◊©¤ ▲↔™®☎ε їз♨☏☆★ ▽△▲∵∴∷ #♂♀♥♠♣ ♧♤♧♡♬♪ ♭♫♪ﻬஐღ ↔↕↘••● ¤╬﹌▽☜♥☞ ♬✞♥♕☯☭☠☃ ─ ━ │ ┃ ┄ ┅ ┆ ┇ ┈ ┉ ┊ ┋ ┌ ┍ ┎ ┏ ┐ ┑ ┒ ┓ └ ┕ ┖ ┗ ┘ ┙ ┚ ┛ ├ ┝ ┞ ┟ ┠ ┡ ┢ ┣ ┤ ┥ ┦ ┧ ┨ ┩ ┪ ┫ ┬ ┭ ┮ ┯ ┰ ┱ ┲ ┳ ┴ ┵ ┶ ┷ ┸ ┹ ┺ ┻ ┼ ┽ ┾ ┿ ╀ ╁ ╂ ╃ ╄ ╅ ╆ ╇ ╈ ╉ ╊ ╋ ╌ ╍ ╎ ╏ ═ ║ ╒ ╓ ╔ ╕ ╖ ╗ ╘ ╙ ╚ ╛ ╜ ╝ ╞ ╟ ╠ ╡ ╢ ╣ ╤ ╥ ╦ ╧ ╨ ╩ ╪ ╫ ╬ ╭ ╮ ╯ ╰ ╱ ╲ ╳ ╴ ╵ ╶ ╷ ╸ ╹ ╺ ╻ ╼ ╽ ╾ ╿ ▀ ▁ ▂ ▃ ▄ ▅ ▆ ▇ █ ▉ ▊ ▋ ▌ ▍ ▎ ▏ ▐ ░ ▒ ▓ ▔ ▕ ▖ ▗ ▘ ▙ ▚ ▛ ▜ ▝ ▞ ▟ ■ □ ▢ ▣ ▤ ▥ ▦ ▧ ▨ ▩ ▪ ▫ ▬ ▭ ▮ ▯ ▰ ▱ ▲ △ ▴ ▵ ▶ ▷ ▸ ▹ ► ▻ ▼ ▽ ▾ ▿ ◀ ◁ ◂ ◃ ◄ ◅ ◆ ◇ ◈ ◉ ◊ ○ ◌ ◍ ◎ ● ◐ ◑ ◒ ◓ ◔ ◕ ◖ ◗ ◘ ◙ ◚ ◛ ◜ ◝ ◞ ◟ ◠ ◡ ◢ ◣ ◤ ◥ ◦ ◧ ◨ ◩ ◪ ◫ ◬ ◭ ◮ ◯ ◰ ◱ ◲ ◳ ◴ ◵ ◶ ◷ ◸ ◹ ◺ ◻ ◼ ◽ ◾ ◿ ☀ ☁ ☂ ☃ ☄ ★ ☆ ☇ ☈ ☉ ☊ ☋ ☌ ☍ ☎ ☏ ☐ ☑ ☒ ☓ ☔ ☕ ☖ ☗ ☘ ☙ ☚ ☛ ☜ ☝ ☞ ☟ ☠ ☡ ☢ ☣ ☤ ☥ ☦ ☧ ☨ ☩ ☪ ☫ ☬ ☭ ☮ ☯ ☰ ☱ ☲ ☳ ☴ ☵ ☶ ☷ ☸ ☹ ☺ ☻ ☼ ☽ ☾ ☿ ♀ ♁ ♂ ♃ ♄ ♅ ♆ ♇ ♈ ♉ ♊ ♋ ♌ ♍ ♎ ♏ ♐ ♑ ♒ ♓ ♔ ♕ ♖ ♗ ♘ ♙ ♚ ♛ ♜ ♝ ♞ ♟ ♠ ♡ ♢ ♣ ♤ ♥ ♦ ♧ ♨ ♩ ♪ ♫ ♬ ♭ ♮ ♯ ♰ ♱ ´ ῾  ‌ ‍ ‎ ‏ ‐   ‒ – — ― ‖ ‗ ‘ ’ ‚ ‛ “ ” „ ‟ † ‡ • ‣ ․ ‥ … ‧ 
 
        ‰ ‱ ′ ″ ‴ ‵ ‶ ‷ ‸ ‹ › ※ ‼ ‽ ‾ ‿ ⁀ ⁁ ⁂ ⁃ ⁄ ⁅ ⁆ ⁇ ⁈ ⁉ ⁊ ⁋ ⁌ ⁍ ⁎ ⁏ ⁐ ⁑ ⁒ ⁓ ⁔ ⁕ ⁖ ⁗ ⁘ ⁙ ⁚ ⁛ ⁜ ⁝ ⁞ ⁰ ⁱ ⁴ ⁵ ⁶ ⁷ ⁸ ⁹ ⁺ ⁻ ⁼ ⁽ ⁾ ⁿ ₀ ₁ ₂ ₃ ₄ ₅ ₆ ₇ ₈ ₉ ₊ ₋ ₌ ₐ ₑ ₒ ₓ ₔ ₠ ₡ ₢ ₣ ₤ ₥ ₦ ₧ ₨ ₩ ₪ ₫ € ₭ ₮ ₯ ℀ ℁ ℂ ℃ ℄ ℅ ℆ ℇ ℈ ℉ ℊ ℋ ℌ ℍ ℎ ℏ ℐ ℑ ℒ ℓ ℔ ℕ № ℗ ℘ ℙ ℚ ℛ ℜ ℝ ℞ ℟ ℠ ℡ ™ ℣ ℤ ℥ Ω ℧ ℨ ℩ K Å ℬ ℭ ℮ ℯ ℰ ℱ Ⅎ ℳ ℴ ℵ ℶ ℷ ℸ ℹ ℺ ℻ ℼ ℽ ℾ ℿ ⅀ ⅁ ⅂ ⅃ ⅄ ⅅ ⅆ ⅇ ⅈ ⅉ ⅋ ⅍ ⅎ ⅓ ⅔ ⅕ ⅖ ⅗ ⅘ ⅙ ⅚ ⅛ ⅜ ⅝ ⅞ ⅟ Ⅰ Ⅱ Ⅲ Ⅳ Ⅴ Ⅵ Ⅶ Ⅷ Ⅸ Ⅹ Ⅺ Ⅻ Ⅼ Ⅽ Ⅾ Ⅿ ⅰ ⅱ ⅲ ⅳ ⅴ ⅵ ⅶ ⅷ ⅸ ⅹ ⅺ ⅻ ⅼ ⅽ ⅾ ⅿ ↀ ↁ ↂ Ↄ ↄ ← ↑ → ↓ ↔ ↕ ↖ ↗ ↘ ↙ ↚ ↛ ↜ ↝ ↞ ↟ ↠ ↡ ↢ ↣ ↤ ↥ ↦ ↧ ↨ ↩ ↪ ↫ ↬ ↭ ↮ ↯ ↰ ↱ ↲ ↳ ↴ ↵ ↶ ↷ ↸ ↹ ↺ ↻ ↼ ↽ ↾ ↿ ⇀ ⇁ ⇂ ⇃ ⇄ ⇅ ⇆ ⇇ ⇈ ⇉ ⇊ ⇋ ⇌ ⇍ ⇎ ⇏ ⇐ ⇑ ⇒ ⇓ ⇔ ⇕ ⇖ ⇗ ⇘ ⇙ ⇚ ⇛ ⇜ ⇝ ⇞ ⇟ ⇠ ⇡ ⇢ ⇣ ⇤ ⇥ ⇦ ⇧ ⇨ ⇩ ⇪ ⇫ ⇬ ⇭ ⇮ ⇯ ⇰ ⇱ ⇲ ⇳ ⇴ ⇵ ⇶ ⇷ ⇸ ⇹ ⇺ ⇻ ⇼ ⇽ ⇾ ⇿ ∀ ∁ ∂ ∃ ∄ ∅ ∆ ∇ ∈ ∉ ∊ ∋ ∌ ∍ ∎ ∏ ∐ ∑ − ∓ ∔ ∕ ∖ ∗ ∘ ∙ √ ∛ ∜ ∝ ∞ ∟ ∠ ∡ ∢ ∣ ∤ ∥ ∦ ∧ ∨ ∩ ∪ ∫ ∬ ∭ ∮ ∯ ∰ ∱ ∲ ∳ ∴ ∵ ∶ ∷ ∸ ∹ ∺ ∻ ∼ ∽ ∾ ∿ ≀ ≁ ≂ ≃ ≄ ≅ ≆ ≇ ≈ ≉ ≊ ≋ ≌ ≍ ≎ ≏ ≐ ≑ ≒ ≓ ≔ ≕ ≖ ≗ ≘ ≙ ≚ ≛ ≜ ≝ ≞ ≟ ≠ ≡ ≢ ≣ ≤ ≥ ≦ ≧ ≨ ≩ ≪ ≫ ≬ ≭ ≮ ≯ ≰ ≱ ≲ ≳ ≴ ≵ ≶ ≷ ≸ ≹ ≺ ≻ ≼ ≽ ≾ ≿ ⊀ ⊁ ⊂ ⊃ ⊄ ⊅ ⊆ ⊇ ⊈ ⊉ ⊊ ⊋ ⊌ ⊍ ⊎ ⊏ ⊐ ⊑ ⊒ ⊓ ⊔ ⊕ ⊖ ⊗ ⊘ ⊙ ⊚ ⊛ ⊜ ⊝ ⊞ ⊟ ⊠ ⊡ ⊢ ⊣ ⊤ ⊥ ⊦ ⊧ ⊨ ⊩ ⊪ ⊫ ⊬ ⊭ ⊮ ⊯ ⊰ ⊱ ⊲ ⊳ ⊴ ⊵ ⊶ ⊷ ⊸ ⊹ ⊺ ⊻ ⊼ ⊽ ⊾ ⊿ ⋀ ⋁ ⋂ ⋃ ⋄ ⋅ ⋆ ⋇ ⋈ ⋉ ⋊ ⋋ ⋌ ⋍ ⋎ ⋏ ⋐ ⋑ ⋒ ⋓ ⋔ ⋕ ⋖ ⋗ ⋘ ⋙ ⋚ ⋛ ⋜ ⋝ ⋞ ⋟ ⋠ ⋡ ⋢ ⋣ ⋤ ⋥ ⋦ ⋧ ⋨ ⋩ ⋪ ⋫ ⋬ ⋭ ⋮ ⋯ ⋰ ⋱ ⋲ ⋳ ⋴ ⋵ ⋶ ⋷ ⋸ ⋹ ⋺ ⋻ ⋼ ⋽ ⋾ ⋿ ⌀ ⌁ ⌂ ⌃ ⌄ ⌅ ⌆ ⌇ ⌈ ⌉ ⌊ ⌋ ⌌ ⌍ ⌎ ⌏ ⌐ ⌑ ⌒ ⌓ ⌔ ⌕ ⌖ ⌗ ⌘ ⌙ ⌚ ⌛ ⌜ ⌝ ⌞ ⌟ ⌠ ⌡ ⌢ ⌣ ⌤ ⌥ ⌦ ⌧ ⌨ 〈 〉 ⌫ ⌬ ⌭ ⌮ ⌯ ⌰ ⌱ ⌲ ⌳ ⌴ ⌵ ⌶ ⌷ ⌸ ⌹ ⌺ ⌻ ⌼ ⌽ ⌾ ⌿ ⍀ ⍁ ⍂ ⍃ ⍄ ⍅ ⍆ ⍇ ⍈ ⍉ ⍊ ⍋ ⍌ ⍍ ⍎ ⍏ ⍐ ⍑ ⍒ ⍓ ⍔ ⍕ ⍖ ⍗ ⍘ ⍙ ⍚␞ ␢ ␣ ␤ ─ ━ │ ┃ ┄ ┅ ┆ ┇ ┈ ┉ ┊ ┋ ┌ ┍ ┎ ┏ ┐ ┑ ┒ ┓ └

Good luck and have a nice day^^
Feel free to give me a comment about this topic. It will be a great support to Xaivier Blog.

Written by: Xaivier Chia


source reference:
http://knopok.net/symbol-codes/all
http://www.theworldofstuff.com/characters/

IPL Final match Complete Scorecard: Chennai Super Kings Vs Mumbai Indians: Get all details of the ipl final match. Each batsman Score,strike rate,number of balls faced,4s "fours" and 6s "sixes" hit,Extras,did not bat,out states,bollower statics,no of wickets taken,maiden over given,Economy Rate,No of overs bowled,noballs and wideball thrown by all the ballers in Chennai super kings and Mumbai Indians, Fall of Wicket, Powerplay duration and total squad of chennai super kings and mumbai Indians.

Following Tables shows the detailed IPL Final match Scorecard (Chennai Super Kings Vs Mumbai Indians) at Dr DY Patil Sports Academy, Mumbai.





Chennai Super Kings vs Mumbai Indians, Final





MUM: 146/9 (20.0 Ovs)
CHN: 168/5 (20.0 Ovs)
Chennai Super Kings won by 22 runs
Indian Premier League, 2010
Dr DY Patil Sports Academy, Mumbai
April 25, 2010
Chennai Super Kings won the toss and elected to bat
MOM: Suresh Raina
MOS: Sachin Tendulkar
  • Scorecard MUMBAI INDIANS

Batsmen
R
B
4s
6s
SR
Shikhar Dhawan
c M Dhoni b D Bollinger
0
8
0
0
0.00
Sachin Tendulkar (c)
c M Vijay b S Jakati
48
45
7
0
106.67
Abhishek Nayar
run out (M Dhoni)
27
26
1
2
103.85
Harbhajan Singh
lbw b S Raina
1
2
0
0
50.00
Ambati Rayudu (wk)
run out (M Dhoni/A Morkel)
21
14
1
1
150.00
Saurabh Tiwary
c S Raina b S Jakati
0
2
0
0
0.00
Jean-Paul Duminy
c S Jakati b M Muralitharan
6
7
0
0
85.71
Kieron Pollard
c M Hayden b A Morkel
27
10
3
2
270.00
Zaheer Khan
run out (R Ashwin)
1
3
0
0
33.33
Lasith Malinga
not out
1
1
0
0
100.00
Dilhara Fernando
not out
2
2
0
0
100.00
Extras:
(b 1, lb 6, w 5)
12
Total:
(9 wkts, 20 ovs)
146
RR:
7.30
Bowling: CHN
O
M
R
W
Nb
Wd
ER
Ravichandran Ashwin
4
1
24
0
0
2
6.0
Doug Bollinger
4
0
31
1
0
0
7.8
Albie Morkel
3
0
20
1
0
1
6.7
Muttiah Muralitharan
4
0
17
1
0
0
4.2
Shadab Jakati
3
0
26
2
0
0
8.7
Suresh Raina
2
0
21
1
0
2
10.5
  Fall Of Wickets
Wkt
Batsmen
Score(Over)
Wkt
Batsmen
Score(Over)
1st
S Dhawan
1(1.4)
6th
J Duminy
114(16.6)
2nd
A Nayar
67(11.2)
7th
A Rayudu
142(18.5)
3rd
H Singh
73(11.6)
8th
K Pollard
142(18.6)
4th
S Tendulkar
99(14.2)
9th
Z Khan
143(19.3)
5th
S Tiwary
100(14.5)
  Powerplays
Mandatory
1st to 6th over - 33 runs






















Batsmen
R
B
4s
6s
SR
Murali Vijay
c S Tiwary b D Fernando
26
19
1
2
136.84
Matthew Hayden
c A Rayudu b K Pollard
17
31
1
1
54.84
Suresh Raina
not out
57
35
3
3
162.86
Subramaniam Badrinath
c L Malinga b D Fernando
14
11
2
0
127.27
MS Dhoni (c & wk)
c D Fernando b Z Khan
22
15
2
1
146.67
Albie Morkel
run out (A Rayudu)
15
6
1
1
250.00
Srikkanth Anirudha
not out
6
3
1
0
200.00
Extras:
(lb 3, w 8)
11
Total:
(5 wkts, 20 ovs)
168
RR:
8.40
Did not bat: Ravichandran Ashwin, Shadab Jakati, Doug Bollinger, Muttiah Muralitharan
Bowling: MUM
O
M
R
W
Nb
Wd
ER
Harbhajan Singh
4
0
30
0
0
0
7.5
Lasith Malinga
4
0
33
0
0
1
8.2
Zaheer Khan
4
0
34
1
0
1
8.5
Dilhara Fernando
4
0
23
2
0
2
5.8
Kieron Pollard
4
0
45
1
0
0
11.2
  Fall Of Wickets
Wkt
Batsmen
Score(Over)
1st
M Vijay
44(7.2)
2nd
M Hayden
47(8.4)
3rd
S Badrinath
67(11.2)
4th
M Dhoni
139(17.1)
5th
A Morkel
157(19.3)
  Powerplays
Mandatory:
1st to 6th over - 40 runs




































































































































Get paid To Promote at any Location