Thursday, March 27, 2008

Lover Conversation

He: Yes. At last. It was so hard to wait.
She: Do you want me to leave?
He: No! Don't even think about it.
She: Do you love me?
He: Of course! Over and over!
She: Have you ever cheated on me?
He: No! Why are you even asking?
She: Will you kiss me?
He: Every chance I get.
She: Will you hit me?
He: Are you crazy! I'm not that kind of person!
She: Can I trust you?
He: Yes.
She: Darling!

After marriage....

Simply read from bottom to top.

Wednesday, March 26, 2008

The Smell of Rain

Dana Lu Blessing was born premature (24 weeks pregnant) because her mother Diana Blessing had a complications. She was 12 inches long and weighing only one pound nine ounces.

There's only a 10-percent chance she will live through the night, and even then, if by some slim chance she does make it, her future could be a very cruel one.

She would never walk, she would never talk, she would probably be blind, and she would certainly be prone to other catastrophic conditions from cerebral palsy to complete mental retardation, and on and on.

Diana and David (her husband), with their 5-year-old son Dustin, had long dreamed of the day they would have a daughter to become a family of four.
Now, within a matter of hours, that dream was slipping away.

But as those first days passed, a new agony set in for David and Diana. Because Dana's underdeveloped nervous system was essentially 'raw', the lightest kiss or caress only intensified her discomfort, so they couldn't even cradle their tiny baby girl against their chests to offer the strength of their love.

All they could do, as Dana struggled alone beneath the ultraviolet light in the tangle of tubes and wires, was to pray that God would stay close to their precious little girl.

There was never a moment when Dana suddenly grew stronger.

But as the weeks went by, she did slowly gain an ounce of weight here and an ounce of strength there.

At last, when Dana turned two months old. her parents were able to hold her in their arms for the very first time.

Five years later, when Dana was a petite but feisty young girl with glittering gray eyes and an unquenchable zest for life. She showed no signs whatsoever of any mental or physical impairment. Simply, she was everything a little girl can be and more. But that happy ending is far from the end of her story.

One blistering afternoon in the summer of 1996 near her home in Irving, Texas, Dana was sitting in her mother's lap in the bleachers of a local ball park where her brother Dustin's baseball team was practicing. As always, Dana was chattering nonstop with her mother and several other adults sitting nearby when she suddenly fell silent. Hugging her arms across her chest, little Dana asked, "Do you smell that?"

Smelling the air and detecting the approach of a thunderstorm, Diana replied, "Yes, it smells like rain."

Dana closed her eyes and again asked, "Do you smell that?"

Once again, her mother replied, "Yes, I think we're about to get wet. It smells like rain."

Still caught in the moment, Dana shook her head, patted her thin shoulders with her small hands and loudly announced, "No, it smells like Him. It smells like God when you lay your head on His chest."

Tears blurred Diana's eyes as Dana happily hopped down to play with the other children.

Before the rains came, her daughter's words confirmed what Diana and all the members of the extended Blessing family had known, at least in their hearts, all along.

During those long days and nights of her first two months of her life, when her nerves were too sensitive for them to touch her, God was holding Dana on His chest and it is His loving scent that she remembers so well.

Sunday, March 23, 2008

Is It a Coincidence ???

Abraham Lincoln entered the congress in 1846.
John F. Kennedy entered the congress in 1946.

Abraham Lincoln was elected in 1860.
John F. Kennedy was elected in 1960.

Both of them really cared about the civil rights.
Their wives lost the child during in the White House.

Both president were shot on Friday.
Both president was shot on the head.

Isn't it weird.
Lincoln secretary was named Kennedy .
Kennedy secretary was named Lincoln .

Both of them were killed by someone from the south area.
Both of them were replaced by someone from the south area named Johnson.

Andrew Johnson, that replaced Lincoln, was born in 1808.
Lyndon Johnson, that replaced Kennedy, was born in 1908.

John Wilkes Booth, that killed Lincoln, was born in 1839.
Lee Harvey Oswald, that killed Kennedy, was born in 1939.

Both killer was famous with his three names.
The name both of them consisted of 15 letters.

More weird.
Lincoln was shot in the Ford theater.
Kennedy was shot in Lincoln car that made by Ford.

Lincoln was shot in the theater and the killer hid in the warehouse.
Kennedy was shot from a warehouse and the killer hid in the theater.
Booth and Oswald was killed before being trial.

A week before Lincoln was shot, he was in Monroe, Maryland.
A week before Kennedy was shot, he with Marilyn Monroe.

Oooooooooo creepy

Monday, March 17, 2008

Wheat Killer Fungus

This fungus is capable of wreaking havoc to wheat production by destroying entire fields.

This wheat fungus first emerged in Uganda in 1999 and is therefore called Ug99. The wind-borne transboundary pest subsequently spread to Kenya and Ethiopia. In 2007, an FAO mission confirmed for the first time that Ug99 has affected wheat fields in Yemen. The Ug99 strain found in Yemen was already more virulent than the one found in East Africa.

Ethiopia and Kenya had serious wheat rust epidemics in 2007 with considerable yield losses.

Disease surveillance and wheat breeding is already underway to monitor the fungus and to develop Ug99 resistant varieties. However, more efforts are required to develop long term durable resistant varieties that can be made available to farmers in affected countries and countries at risk.

Friday, March 14, 2008

Protecting Yourself From Identity Theft

"Spoofing," "phishing" and "dumpster diving" are some of the electronic and physical techniques used to gather personal information that can be used to steal a person's identity for the purpose of accessing bank accounts or making purchases in the individual's name.

The federal Public Safety and Emergency Preparedness Department issued an information note on the best ways to prevent online identity theft:

  • Install and frequently update proven anti-virus software.
  • Ensure web browsers and operating systems are up to date and security patches are applied.
  • Be suspicious of any e-mails with requests for personal, financial or sensitive information.
  • Don't fill out forms in e-mail messages that ask for personal, financial or other sensitive information.
  • Use caution with links supplied in e-mails.
  • Always verify you have the correct website address for sites that require users to authenticate by providing information such as a password.
  • Change passwords regularly. Use those that are hard to guess. Never share passwords with anyone.
  • Use caution when locating a website through an Internet search engine. It isn't always possible to distinguish a fake site from a legitimate one.
  • Look at the company's privacy policy when visiting its website.
  • Ensure that a secure website is used when submitting credit card or other sensitive information by way of your web browser. Look for secure symbol in the status bar.
  • Contact the organization by telephone, not the number listed on the website, if there is any doubt about the validity an e-mail or website.
  • Report suspect e-mails to the organization or to local law enforcement agencies.
  • Identity theft would not be as successful a criminal pursuit if e-mail and Internet users learned to be more vigilant and constantly protect themselves.

Thursday, March 13, 2008

Your Next High-Tech Gadget May Come Bundled With An Extra - A Virus

From iPods to navigation systems, some of today's hottest gadgets are landing on store shelves with some unwanted extras from the factory - pre-installed viruses that steal passwords, open doors for hackers and make computers spew spam.

Computer users have been warned for years about virus threats from downloading Internet porn and opening suspicious e-mail attachments. Now they run the risk of picking up a digital infection just by plugging a new gizmo into their PCs.

Recent cases reviewed by The Associated Press include some of the most widely used tech devices: Apple iPods, digital picture frames sold by Target and Best Buy stores and TomTom navigation gear.

In most cases, Chinese factories - where many companies have turned to keep prices low - are the source.

So far, the virus problem appears to come from lax quality control - perhaps a careless worker plugging an infected music player into a factory computer used for testing - rather than organized sabotage by hackers or the Chinese factories.

It's the digital equivalent of the recent series of tainted products traced to China, including toxic toothpaste, poisonous pet food and toy trains coated in lead paint.

But sloppiness is the simplest explanation, not the only one.

If a virus is introduced at an earlier stage of production, by a corrupt employee or a hacker when software is uploaded to the gadget, then the problems could be far more serious and widespread.

Knowing how many devices have been sold, or tracking the viruses with any precision, is impossible because of the secrecy kept by electronics makers and the companies they hire to build their products.

But given the nature of mass manufacturing, the numbers could be huge.

"It's like the old cockroach thing - you flip the lights on in the kitchen and they run away," said Marcus Sachs, a former White House cybersecurity official who now runs the security research group SANS Internet Storm Center. "You think you've got just one cockroach? There's probably thousands more of those little boogers that you can't see."

Jerry Askew, a Los Angeles computer consultant, bought a new Uniek digital picture frame to surprise his 81-year-old mother for her birthday. But when he added family photos, it tried to unload a few surprises of its own.

When he plugged the frame into his Windows PC, his antivirus program alerted him to a threat. The $50 frame, built in China and bought at Target, was infested with four viruses, including one that steals passwords.

"You expect quality control coming out of the manufacturers," said Askew, 42. "You don't expect that sort of thing to be on there."

Security experts say the malicious software is apparently being loaded at the final stage of production, when gadgets are pulled from the assembly line and plugged in to a computer to make sure everything works.

If the testing computer is infected - say, by a worker who used it to charge his own infected iPod - the digital germ can spread to anything else that gets plugged in.

The recent infections may be accidental, but security experts say they point out an avenue of attack that could be exploited by hackers.

"We'll probably see a steady increase over time," said Zulfikar Ramzan, a computer security researcher at Symantec Corp. "The hackers are still in a bit of a testing period - they're trying to figure out if it's really worth it."

Thousands of people whose antivirus software isn't up to date may have been infected by new products without even knowing it, experts warn. And even protective software may not be enough.

In one case, digital frames sold at Sam's Club contained a previously unknown bug that not only steals online gaming passwords but disables antivirus software, according to security researchers at Computer Associates.

"It's like if you pick up a gun you've never seen before - before you pull the trigger you'd probably check the chamber," said Joe Telafici, vice-president of operations of McAfee Avert Labs, the security software maker's threat-research arm.

"It's an extreme analogy, but it's the right idea. It's best to spend the extra 30 seconds to be sure than be wrong," he added.

Consumers can protect themselves from most factory-loaded infections by running an antivirus program and keeping it up to date. The software checks for known viruses and suspicious behaviours that indicate an attack by malicious code - whether from a download or a gadget attached to the PC via USB cable.

One information-technology worker wrote to the SANS security group that his new digital picture frame delivered "the nastiest virus that I've ever encountered in my 20-plus-year IT career." Another complained his new external hard drive had malfunctioned because it came loaded with a password-stealing virus.

Monitoring suppliers in China and elsewhere is expensive, and cuts into the savings of outsourcing. But it's what U.S. companies must do to prevent poisoning on the assembly line, said Yossi Sheffi, a professor at the Massachusetts Institute of Technology specializing in supply chain management.

"It's exactly the same thing, whether it happened in cyberspace or software or lead paint or toothpaste or dog food - they're all quality-control issues," Sheffi said.

While manufacturing breakdowns don't happen often, they have become frequent enough - especially amid intense competition among Chinese suppliers - to warrant more scrutiny by companies that rely on them, Sheffi said.

"Most of the time it works," he said. "The Chinese suppliers have every reason to be good suppliers because they're in it for the long run. But it's a higher risk, and we've now seen the results of that higher risk."

The AP contacted some of the world's largest electronics manufacturers for details on how they guard against infections - among them Hon Hai Precision Industry Co., which is based in Taiwan and has an iPod factory in China; Singapore-based Flextronics International Ltd.; and Taiwan-based Quanta Computer Inc. and Asustek Computer Inc. All declined comment or did not respond.

The companies whose products were infected in cases reviewed by AP refused to reveal details about the incidents. Of those that confirmed factory infections, all said they had corrected the problems and taken steps to prevent recurrences.

Apple disclosed the most information, saying the virus that infected a small number of video iPods in 2006 came from a PC used to test compatibility with the gadget's software.

Best Buy, the biggest consumer electronics outlet in the U.S., said it pulled its affected China-made frames from the shelves and took "corrective action" against its vendor. But the company declined repeated requests to provide details.

Sam's Club and Target say they are investigating complaints but have not been able to verify their frames were contaminated.

Legal experts say manufacturing infections could become a big headache for retailers that sell infected devices and the companies that make them, if customers can demonstrate they were harmed by the viruses.

"The photo situation is really a cautionary tale - they were just lucky that the virus that got installed happened to be one that didn't do a lot of damage," said Cindy Cohn, legal director for the Electronic Frontier Foundation. "But there's nothing about that situation that means next time the virus won't be a more serious one."

Tuesday, March 11, 2008

To Disable the Use of USB Storage Devices

If a USB storage device is not already installed on the computer, assign the user or the group Deny permissions to the following files:
  • %SystemRoot%\Inf\Usbstor.pnf
  • %SystemRoot%\Inf\Usbstor.inf
When you do so, users cannot install a USB storage device on the computer. To assign a user or group Deny permissions to the Usbstor.pnf and Usbstor.inf files, follow these steps:
1.Start Windows Explorer, and then locate the %SystemRoot%\Inf folder.
2.Right-click the Usbstor.pnf file, and then click Properties.
3.Click the Security tab.
4.In the Group or user names list, click the user or group that you want to set Deny permissions for.
5.In the Permissions for UserName or GroupName list, click to select the Deny check box next to Full Control, and then click OK. Note In addition, add the System account to the Deny list.
6.Right-click the Usbstor.inf file, and then click Properties.
7.Click the Security tab.
8.In the Group or user names list, click the user or group that you want to set Deny permissions for.
9.In the Permissions for UserName or GroupName list, click to select the Deny check box next to Full Control, and then click OK.

If a USB Storage Device Is Already Installed on the Computer
If a USB storage device is already installed on the computer, set the Start value in the following registry key to 4: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor
When you do so, the USB storage device does not work when the user connects the device to the computer. To set the Start value, follow these steps:
  1. Click Start, and then click Run.
  2. In the Open box, type regedit, and then click OK.
  3. Locate, and then click the following registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor
  4. In the right pane, double-click Start.
  5. In the Value data box, type 4, click Hexadecimal (if it is not already selected), and then click OK.
  6. Quit Registry Editor.

Use XP Registry Edits To Disable Network Access To Floppy/CD-ROM Drives

Floppy and CD-ROM drives are automatically shared as administrative shares on a network. That means admins and other users can access the drives, increasing security vulnerability. Learn how to disable network access by using XP registry edits.

  1. Goto HKEY_LOCAL_MACHINE-SOFTWARE-Microsoft-Windows NT-CurrentVersion-Winlogon.
  2. To disable network access to the floppy disk drive, find AllocateFloppies and set the Value Data to 1.
  3. To disable network access to the CD-ROM drive, find AllocateCDRoms and set the Value Data to 1.
Note: If you can't find AllocateFloppies and AllocateCDRoms values add a new string value to the Winlogon key, pull down the Edit menu and select the New | String Value command. When you see the New Value appear in the Winlogon key, you can name it using the names described in the previous section. Once you name a value, press [Enter] twice—once to activate the new name and once to open the Edit String dialog box. You can then add the appropriate warning messages in Value Data text box.

Sunday, March 9, 2008

Phenomenal Power of The Human Mind

Try to read this and you would understand.

I cdnuolt blveiee taht I cluod aulaclty uesdnatnrd waht I was rdanieg. The phaonmneal pweor of the hmuan mnid! Aoccdrnig to a rscheearch at Cmabrigde Uinervtisy, it deosn't mttaer inwaht oredr the ltteers in a wrod are, the olny iprmoatnt tihng is taht the frist and lsat ltteer be in the rghit pclae. The rset can be a taotl mses and you can sitll raed it wouthit a porbelm. Tihs is bcuseae the huamn mnid deos not raed ervey lteter by istlef, but the wrod as a wlohe. Amzanig huh? Yaeh, and I awlyas thought slpeling was ipmorantt.

How Corrupted Is Your Mind

Take a look at the picture? What do you see?

Research has shown that young children cannot identify the intimate couple because they do not have prior memory associated with such a scenario.

Children see nine dolphins.

This is a test to determine if you already have a corrupted mind. If it is hard for you to find the dolphins within six seconds, your mind is indeed corrupted.

Sand Art

This video was performed by Ilana Yahav. Ilana is a multifaceted artist whose talents include: sketching, sculpture and three dimensional art.

Ilana is now showing her Sand Fantasy video art around the world. Ilana draws on sand, using only her fingers.As she weaves together sand, lighting and music, Ilana creates incredible three dimensional vistas they play out in perfect time with the musical accompaniment, Indeed, it is difficult to decide if the music accompanies the work of art, or vice versa Ilana's fingers dance in the sand on the glass to the music,the resulting aesthetic dynamic is powerful and moving.

Ilana uses this original technique in the creation of advertisements and image building clips.

Having Lunch In The Sky

Wednesday, March 5, 2008

Internet Explorer 8 Beta 1

This Beta version of Internet Explorer is for web developers and designers. We invite you to use the resources listed below to learn about the improvements, changes and new features available in this release.

Activities give users ready access to the online services they care about most from any page they visit, and developers gain an easy way to extend the reach of their online services. It’s as simple as selecting text to get started with an Activity Developers can mark parts of webpages as "WebSlices" and enable users to monitor information they rely on as they move about the web. With a click in the Favorites bar, users see rich "WebSlice" visuals and developers establish a valuable, persistent end-user connection.

Welcome to the website for Internet Explorer 8 Beta 1. Internet Explorer 8 Beta 1 is a developer preview for web designers and developers to help prepare their websites for the launch of Internet Explorer 8. Some of the new features designed for developers include a developer toolbar and improved interoperability and compatibility.

Internet Explorer 8 is designed to work in standard mode out of this box. However, Microsoft provides a way for users to browse the web in a way similar to Internet Explorer 7 by using the emulate Internet Explorer 7 button on the chrome.

Simple Look Rapidshare

First what you need is Mozilla Firefox, the fast and tweakable browser.

You need to install Grease Monkey AddOns or click here from See picture below :

And click Install Now. After installation complete restart the Firefox. You will see the greasemonkey is successfully installed as below picture. ( To access grease monkey go to Tools-Greasemonkey ) *reminder- you can see the icon of monkey below your Firefox windows, you can switch it on or off by click it once.

Now u need to install the rapid.user.js or click here by right click and open it with firefox or you can drag and drop it on your Firefox, you will notice that install button appearing. Sort of like this picture below :

Click Install, copy your rapidshare URL and see what's different.


Tuesday, March 4, 2008

Installation of Apache Tomcat on Windows

Many of the present web applications are created with a dynamic character by using a server side programming language. In principle, the dynamic web pages allow the separation of user interface by the content generation. There are many server side programming languages presently used
to develop complex applications.

Java Server Pages (JSP) allows the integration of Java code inside static HTML pages. JSP technology is developed by Sun Microsystems and permits the creation of applications running on server side. The Java code is contained inside special tags, but while the HTML, CSS or other static codes are processed by a web browser, the tags including Java code in a JSP file will be interpreted on the server.

If you want to start learning to make JSP applications, you will need to prepare the development environment. Free tools are available for any operating system, offering support to deploy and test JSP applications or scripts. For Windows operating system, the Apache Tomcat web server seems to be a reliable alternative.

First, you will have to install and download the latest version of Java SE Development Kit which provides the Java Runtime Environment (JRE) and other useful development tools. The JRE location is required by the Apache Tomcat installer for Windows and will be detected automatically. After you start the Apache Tomcat (installed by default as a Windows service), you should check if the installation was successful, by typing in your browser address bar:


You should see the default Tomcat homepage. From the left menu, you can select to browse the Tomcat server documentation, test and view the sources of JSP examples and more. The port 80 must not be used by any other server previously installed, and, as a consequence, it is recommended to disable the automatic startup of other servers if they exist, in the same time with Apache Tomcat, on your Windows operating system. The extensive documentation, tutorials and resources related to JSP applications development existing over the Internet should help you to rapidly create your own JSP scripts.

Monday, March 3, 2008

Internet Explorer 8 Beta 1

Expect little and you won't be disappointed. This has got to be the rule for Internet Explorer Beta 1. At this stage in the development of the browser, anything beyond reasonable expectations won't be met. At least not when it comes down to the graphical user interface. Traditionally, the UI details are among the last aspect of Microsoft software products that will be implemented before it is finalized. It is the case with Windows and Internet Explorer 8 makes no exception to this rule.

But you have to keep in mind that this is Beta 1, and that the UI will undoubtedly evolve. However, there are a few minute aspects of the user interface that are changed. First off, you will notice that the domain name is now highlighted in respect to the rest of the link in the address bar. This is of course a move to counter phishing attempts. Secondly, there is now a continuity between the Links item and the rest of the toolbar. And of course, the search box in the upper right hand side corner now features an icon of the default search provider. Nothing much else, except that the up has gained a few pixels, but nothing to grab too much screen real estate.

Painless Menopause

The hot flushes, night sweats, weight gain, libido loss, insomnia and psychological impact of the menopause can hit women hard. But there are many, many ways to make it a far more positive experience. Here are five ways to try:

1 Regular health checkups
You are at an increased risk of diabetes, heart disease and high blood pressure around menopause and after, so it is vital to look after yourself. Have a cervical smear test every three years and an annual pelvic exam with your GP (90% of ovarian cancers - the fourth most common cancer in women - occur over the age of 45). Get your GP to check your blood pressure and cholesterol levels, too.

2 Weight-bearing exercise
Your metabolism slows down at menopause and regular exercise will help to speed it up. Weight-bearing exercise such as walking, jogging, cycling or bouncing on a trampoline helps maintain bone density, guarding against osteoporosis (thinning bones, a problem for one in three women). Aim for 30 minutes five days a week.

3 Breast awareness
Eighty per cent of breast cancer cases occur after the menopause, so always see your GP immediately if you notice any changes. After the age of 50, have a mammogram on the NHS every three years.

4 Diet
Studies show that foods such as soya, flaxseeds, lentils, kidney beans and pulses that contain phyto-oestrogens - compounds similar to the hormone oestrogen, levels of which drop in menopausal women - can lighten menopausal symptoms.

"The menopause can be emotionally draining, and you need to feel good about yourself," says West. "Spend a bit of time and money on some pampering and make sure you keep stress to a minimum." Though scientific evidence is sketchy, West's programme offers alternative therapies such as acupuncture or hypnotherapy, which, she says, can provide effective relief from menopausal symptoms such as insomnia or depression.

Beauty of Math!

1 x 8 + 1 = 9
12 x 8 + 2 = 98
123 x 8 + 3 = 987
1234 x 8 + 4 = 9876
12345 x 8 + 5 = 98765
123456 x 8 + 6 = 987654
1234567 x 8 + 7 = 9876543
12345678 x 8 + 8 = 98765432
123456789 x 8 + 9 = 987654321

1 x 9 + 2 = 11
12 x 9 + 3 = 111
123 x 9 + 4 = 1111
1234 x 9 + 5 = 11111
12345 x 9 + 6 = 111111
123456 x 9 + 7 = 1111111
1234567 x 9 + 8 = 11111111
12345678 x 9 + 9 = 111111111
123456789 x 9 +10= 1111111111

9 x 9 + 7 = 88
98 x 9 + 6 = 888
987 x 9 + 5 = 8888
9876 x 9 + 4 = 88888
98765 x 9 + 3 = 888888
987654 x 9 + 2 = 8888888
9876543 x 9 + 1 = 88888888
98765432 x 9 + 0 = 888888888

Brilliant, isn't it?

And look at this symmetry:

1 x 1 = 1
11 x 11 = 121
111 x 111 = 12321
1111 x 1111 = 1234321
1111 1 x 11111 = 123454321
111111 x 111111 = 12345654321
1111111 x 1111111 = 1234567654321
11111111 x 11111111 = 123456787654321
111111111 x 111111111=12345678987654321

Now, take a look at this...


From a strictly mathematical viewpoint:

What Equals 100%? What does it mean to give MORE than 100%?

Ever wonder about those people who say they are giving more than 100%?

We have all been in situations where someone wants you to

How about ACHIEVING 101%?

What equals 100% in life?

Here's a little mathematical formula that might help
Answer these questions:



Is represented as:

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26.


H-A-R-D-W-O-R- K

8+1+18+4+23+15+18+11 = 98%



11+14+15+23+12+5+4+7+5 = 96%



1+20+20+9+20+21+4+5 = 100%

THEN, look how far the love of God will take you:


12+15+22+5+15+6+7+15+4 = 101%

Therefore, one can conclude w ith mathematical certainty that:

While Hard Work and Knowledge will get you close, and Attitude will
Get you there, It's the Love of God that will put you over the top!

Have a nice day & God bless!!!

Tutorial For Real Media

You may find this helpful if you donwload hundreds of short episodes in rm format like me and tired of double-click to open next files.

Very easy. Use notepad to open a new file, type this inside:
file://link to file1
file://link to file2
(type as many as you want)
Close file. Rename it to FileName.rm

Then you`re done!!!!

I put my playlist file here: C:\Movies\7VNR
And the movie files are in C:\Movies\7VNR\DragonBall

Then inside my playlist file I`ll have something like this:


Paypal To Register

Sign up for PayPal and start accepting credit card payments instantly.

About Me

My photo
Please be often to visit and subscribe for my blog, because that would be really helpful for me. Thank you to read all of my post. If you don't mind come and have a chat with me. ^_^