Minggu, 23 Maret 2014

0 Lorem Ipsum Dolor Sit Amet

 
/*Sidebar*/
.sidebar{padding:0; margin:0}
.sidebar h2{text-align:center; background:#000; border:1px dashed #0F0; border-radius-topleft:2px; border-radius-bottomright:2px; margin-bottom:5px; padding:8px 10px 10px 10px; color:#FFF; font-family:Electrolize;font-size:15px; font-weight:bold}
.sidebar h2:hover{style:none}
.sidebar ul{margin:0; padding:0}
.sidebar li{list-style:none; padding:4px 0; line-height:1.2em; margin:0; border-bottom:0px dotted #0F0}
.sidebar .widget{opacity:0.9; margin-bottom:0px; padding:0}
.sidebar .widget-content{background:#000; border:1px dashed #0F0; border-radius:2px; margin:0; padding:10px}
.main .Blog{border-bottom-width:0}
/*Bottom Wrap*/
#bottom1, #bottom2{width:256px; float:left; margin-right:10px}
#bottom3{width:256px; float:left}
/*Sidebar*/
.sidebar{padding:0; margin:0}
.sidebar h2{text-align:center; background:transparent; border:1px dashed #0F0; border-radius-topleft:2px; border-radius-bottomright:2px; margin-bottom:5px; padding:8px 10px 10px 10px; color:#FFF; font-family:Electrolize; font-size:15px; font-weight:bold}
.sidebar h2:hover{style:none}
.sidebar ul{margin:0; padding:0}
.sidebar li{list-style:none; padding:4px 4px; margin:0; padding-left:20px; margin-bottom:2px; border-bottom:0px dotted #0F0; line-height:1.1em}
.sidebar .widget{margin-bottom:10px; padding:0}
.sidebar .widget-content{background:transparent; border:1px dashed #0F0; border-radius:2px; margin:0; padding:10px}
.main .Blog{border-bottom-width:0}
/*Bottom Wrap*/
#bottom1, #bottom2{width:245px; float:left; margin-right:10px}
#bottom3{width:280px; float:left}

0 Default Posting Wothout Image (Tumbhnail)

Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh euismod tincidunt ut laoreet dolore magna aliquam erat volutpat.

 Ut wisi enim ad minim veniam, quis nostrud exerci tation ullamcorper suscipit lobortis nisl ut aliquip ex ea commodo consequat. Duis autem vel eum iriure dolor in hendrerit in vulputate velit esse molestie consequat, vel illum dolore eu feugiat nulla facilisis at vero eros et accumsan et iusto odio dignissim qui blandit praesent luptatum zzril delenit augue duis dolore te feugait nulla facilisi.

Nam liber tempor cum soluta nobis eleifend option congue nihil imperdiet doming id quod mazim placerat facer possim assum. Typi non habent claritatem insitam; est usus legentis in iis qui facit eorum claritatem. Investigationes demonstraverunt lectores legere me lius quod ii legunt saepius. Claritas est etiam processus dynamicus, qui sequitur mutationem consuetudium lectorum.

0 White House confirms cyber-attack on 'unclassified' system

white house
The White House has confirmed it was the target of a cyber-attack but says the breach hit an unclassified network.

An unnamed administration official told US media that there was no indication any data had been removed.

The conservative Washington Free Beacon reported on Sunday that hackers linked to the Chinese government had breached the White House Military Office.

The White House would not say if the attack originated in China, describing it as a "spear-phishing" attempt.

"Spear-phishing" typically works by sending fake e-mails that look like legitimate correspondence and links to a malicious website or file attachment.

"These types of attacks are not infrequent and we have mitigation measures in place," the official, who was not authorised to speak on the record, told the Associated Press and other US media.

Cyber-attacks from Chinese-linked hackers have been an increasing concern among US government offices, including the Pentagon, the top US cyber defence official told Reuters last week.

"Their level of effort against the Department of Defense is constant," Rear Admiral Samuel Cox said.

In 2011, Google blamed computer hackers in China for a phishing effort against Gmail accounts of several hundred people, including senior US government officials and military personnel.

That November, senior US intelligence officials for the first time publicly accused China of systematically stealing American high-tech data for its own gain.