ZonaNet Blog: July 2007
ZonaNet Blog Home Page



Are You ZonaNet Blog Visitor?


eXTReMe Tracker

out of Libya
Monday, July 23, 2007

I so sorry, My blog now is closed because I have travel to another country
so waiting me....I will back soon.....ZonaNet


posted by ZonaNet @ 4:43 AM   0 comments:
before and after
Saturday, July 21, 2007
the last my job in photo shop workshop ^_^


after the colors of my job



posted by ZonaNet @ 1:45 PM   3 comments:
alhandasa net logo
Friday, July 20, 2007
hi all
all know alhandasa net forums

this is small job of my design

is Like the original^_^



posted by ZonaNet @ 2:39 PM   0 comments:
star academy 5 - Je ne suis pas un héros

I love you Jérémy....ZonaNet

posted by ZonaNet @ 12:41 PM   0 comments:
wallpaper for firefox user
Thursday, July 19, 2007
this is background put it in your computer if you are use firefox sure!



posted by ZonaNet @ 8:06 AM   0 comments:
our shop
Tuesday, July 17, 2007
this is image of our shop ^_^

Alsiyahia Km 7 after Zarga Alyama center on the road main



posted by ZonaNet @ 2:08 PM   0 comments:
Vote for Joomla
Packt CMS award 2007




posted by ZonaNet @ 9:53 AM   0 comments:
userbar for joomla of my design
Monday, July 16, 2007

hi all

this is small job from me to joomla users

two userbar for put in our Signatures

the first

the second



posted by ZonaNet @ 12:56 PM   2 comments:
Monday, July 09, 2007

Introduction - What is AJAX?

AJAX, or Asynchronous JavaScript and XML,is a fancy way to use JavaScript and XML to communicate with a web server without refreshing the web page.
You can visit this web page for more information about AJAX; it has a good list of links.

Why use AJAX?

There are a couple of reasons to use AJAX in lieu of the traditional form submission. The first is that it is very light weight: instead of sending all of the form information to the server and getting all of the rendered HTML back, simply send the data the server needs to process and get back only what the client needs to process. Light weight means fast. The second reason to use AJAX is because (as the logo in the link above makes clear) AJAX is cool.

Using AJAX with ASP.NET

Even though AJAX is a client side technology that uses JavaScript, the client-server interaction is very important.

Adam Vandenberg has put together a nice JavaScript wrapper for AJAX. His wrapper even does caching, although that will not be discussed here. His wrapper is used in the code examples and project files.

Using the code

There are four parts of the code that are important to look at:

  1. The HTML

    There are two form elements that will interact with AJAX. The input button "btn1" will invoke the AJAX code, which will make a server call and fill the select element "select1".

  2. The JavaScript that calls the AJAX.

    The function getOptions() will do the main work.

    // Create the Request object (the AJAX wrapper)
    var request = new Request();
    // Change this to fit your environment
    var url = "http://localhost/ajax/";
    function getOptions()
    // Call the AJAX
    // Notice the second parameter is actually a function to handle the
    // response

    request.GetNoCache(url + "requests/getOptions.aspx",
    if (result.readyState!=ReadyState.Complete)
    if (result.status==HttpStatus.OK && result.responseText != "")
    // If the request was successfull and returned data
    var vals = result.responseText.split("~");
    for (i=0; ivar pair = vals[i].split("|");
    var op = new Option(pair[1], pair[0], false, false);
    var sel = document.getElementById("select1");
    sel.options[sel.length] = op;
    alert("Remember that the new values in form" +
    " element 'select1' are not in viewstate." +
    " Code appropriately.");
    // Handle the failure condition
    alert('Get options failed.');
  3. The ASPX file.

    The important thing here is that the aspx file only returns the string (XML) data from the code behind.

    <%@ Page language="c#"            Codebehind="getOptions.aspx.cs" 
  4.  AutoEventWireup="false"
  5.  Inherits="ajax.requests.getOptions" %>
  6. The code behind.
    protected string result = string.Empty;
    private void Page_Load(object sender, System.EventArgs e)
    for (int i=0; i<10; i++)
    result += i.ToString() + "|option " + i.ToString() + "~";
    // to drop the last '~'
    result = result.Substring(0, result.Length - 1);
to Download source files click on link down :


password extract file : ZonaNet

Enjoy It....ZonaNet


posted by ZonaNet @ 6:41 AM   0 comments:
Download PHP 5.2.3 Complete Source Code
Sunday, July 08, 2007
PHP 5.2.3

PHP 5.2.3 (tar.bz2) [7,244Kb] - 01 June 2007
md5: eb50b751c8e1ced05bd012d5a0e4dec3


Enjoy It...ZonaNet


posted by ZonaNet @ 1:04 PM   1 comments:
Batch Converting Linux ASCII Files to Windows
Friday, July 06, 2007

This article is a simple exercise in Drag & Drop, TextFile IO, and Batching.

So my business partner and I were migrating our DNS information from BIND on one of our Linux boxes to a new Windows 2003 machine. In the documentation for Windows DNS, we found that you could simply move the Zone files created by BIND for our DNS Zones to the Windows DNS directory, rename them, and voila, you have a copy of DNS records.
As with all things that sound simple, they usually aren't. Windows didn't like the formatting of the Linux BIND files because they had only the \n for line feed / carriage return, and Windows wanted more. Windows uses \n\r for new lines. Well, I knew there were probably utilities out there for converting Linux (and other) ASCII files to Windows style ASCII files.
download batch file :-
password extract file : ZonaNet
Enjoy It...


posted by ZonaNet @ 2:19 PM   0 comments:
Gwen Stefani - Cool: Album Version, Closed Captioned

posted by ZonaNet @ 11:53 AM   0 comments:
simple search page using Google AJAX Search API, and some DHTML

this is A cool'n'simple search page using Google AJAX Search API, and some DHTML from ZonaNet ^_^

download source file :-


password extract file : ZonaNet

Enjoy It...


posted by ZonaNet @ 10:08 AM   0 comments:
Joomla 1.x and IPB 2.x
Wednesday, July 04, 2007

1. Intro

Joomla are full-featured content management systems that can be used for everything from simple websites to complex corporate applications. Please click on their links if you want to continue reading for detailed feature lists.

Invision Power Board (IPB) are a powerful, scalable and fully customizable forums package for your web site. They have been written using the Web's quickest-growing scripting language; PHP, and are complimented with a highly efficient and ultra fast back-end database engine built using MySQL. They are the ideal community solution for all medium-to-large sites.

Joomla is your choice, IPB - so cool! So, we - BBPIXEL TEAM, bring to you the plug-in code to make those systems run with together. Here is the list of our products:
  • jipb Plugin : Integration for IPB and Joomla

2. Features
  • Powerful with all features of both Forum and Portal, bbpixel Plugin does not remove any function of them.
  • Users just need to register thru Forum and still use the other part without having to register again or login twice. Their private information are saved on both Portal and Forum databases. They can change their information via Forum User Control Panel
  • Easy to manage all users through Forum Admin Control Panel.
  • Can uninstall one of them (Portal, Forum) and/or run them as independent systems.
  • And more…

3. Requirements

Portal and Forum have been installed on your server, using a Single MySQL 4.x Database, PHP 4.x

4. Prices

a. Starter Package
USD 20.00 This price included But with ZonaNet is free ^_^ :
  • Plugin script for one installation, you can choose one of them: jipbPlugin, jvbPlugin, X-IPB
  • Document
  • One year update without fee
To Download script click on lik down :


password extract file : ZonaNet

Enjoy It...


posted by ZonaNet @ 7:11 AM   0 comments:
Vista Thumbnail-Enhanced Virtual Desktop Manager
Tuesday, July 03, 2007


Most developers often have many windows open at once, and so often will use a virtual desktop program to help organize their windows. However, most virtual desktop software is ugly and lacks many useful features. While I don't put every feature you may want in this program, I do give a powerful base implementation of a Vista thumbnail-enhanced virtual desktop program.

How to Use the Program

Obviously, you need Windows Vista to use this program. It was tested on RC1, and some older versions have differing thumbnail API functions that may fail. When you first start the program, a window flashes open and then closes. A new icon is now in the system tray. It installs hotkeys as follows:

  • Windows Key + Z - Open switcher
  • Windows Key + Numpad 1...4 (with numlock on) - Switch to desktop x

When you hit Windows Key + Z, everything starts to fade to black and any windows you have open will appear as thumbnails in the first desktop in the upper lefthand corner. You can drag windows around and they will move in real time. If you drag them to a different desktop, they will disappear. To move between desktops, either double-click a window on a desktop, or use the arrow keys to select a desktop and then press enter to switch to it. You can also press escape to hide the switcher.

Every time you switch desktops, the switcher window gives a visual representation of the switch.

If you right-click on the tray icon, you are presented with standard options and a menu for switching between desktops.

How it Works

I'll go over the internals of the program by class. A lot of tricks are needed in order to get everything working. I have not only classes that will be useful in other projects, but a library I'll do another article on named PPAB Forms.dll. This library contains many useful graphical functions and most importantly, it offers a class called Form that inherits from System.Windows.Forms.Form that displays a layered window. If you don't know what a layered window is, it's a special kind of window that is composited and can have per-pixel alpha information (PPAB stands for per-pixel alpha blending). That's right, before Vista and DWM, there were layered windows. You can use them for all kinds of graphical things. If you've ever used Object Desktop, Konfabulator, ObjectDock, etc, or seen the old Adobe Reader alpha-blended splash screen, you've seen layered windows in action.

Thumbnail Class

This class mainly wraps the Vista thumbnail API. You give it source and destination windows. Then, you set some properties and call UpdateRendering. This starts the rendering. It is disposable, so you can stop the rendering completely by calling dispose.

to download
Virtual Desktop click in link down :


password extract file : ZonaNet


posted by ZonaNet @ 7:16 AM   2 comments:
Next Generation of Cryptography for Microsoft Windows Vista


The Cryptography API: Next Generation(CNG) is a new and agile framework in Windows Vista™, which implements an extensible provider model that allows you to load a provider by specifying the required cryptographic algorithm rather than having to hardcode a specific provider.

The advantage is that an algorithm provider can be replaced or upgraded and you will not have to change your code in any way to use the new provider. Also, if some algorithm is determined to be unsafe in the future, a more secure version of that algorithm can be installed with no effect to your code. To facilitate this, you load a CNG provider by identifying the cryptographic algorithm that you require, not the specific provider. Most of the CNG APIs require a provider or an object created by a provider.

In this article, I try to describe the new security feature Cryptography API: Next Generation(CNG) and compare it with an RSA and AES samples, both managed and unmanaged, using "Crypto API" (CAPI before Vista) and how it can be implemented using CNG in Windows Vista. Managed version of CNG is yet to come, if you feel like you want more, wait for the next release of Visual Studio "Orcas".


About RSA

RSA is the established standard for public key encryption. The name RSA is derived from the names of the inventors of this algorithm, which are: Ron Rivest, Adi Shamir and Leonard Adleman. The principle and security of RSA is based on the fact that with today's knowledge, it is not possible to find the prime factors of a big number (n=pq, where p and q are prime numbers) in suitable time.

Short details

  • Public Key: n=pq (p and q are big prime numbers)
  • e relative prime to (p-1)(q-1)
  • Private Key: d e-1 mod ((p-1)(q-1))
  • Encryption: c = me mod n
  • Decryption: m = cd mod n

About AES

Advanced Encryption Standard (AES), also known as Rijndael, is a symmetric 128-bit block cipher adopted as an encryption standard by the US government.

Short details

  • AES operates on a 4×4 array of bytes.
  • For encryption, each round of AES (except the last round) consists of four stages: AddRoundKey, Subbytes, Shift rows and Mix columns.
  • At each stage, the bytes are manipulated and processed for the next level.

Crytography API: Next Generation(CNG)

CNG provides a set of APIs that are used for performing basic cryptographic operations, such as creating hashes, encrypting, and decrypting data.

Each algorithm class in CNG is represented by a primitive router. Applications making use of the primitive APIs will link to the router binary (Bcrypt.dll in user mode, or Ksecdd.sys in kernel mode), and make calls to the various CNG primitive functions. All of the algorithm primitives are managed by various router components. These routers keep track of each algorithm implementation that has been installed on the system. The router will route each function call to the appropriate primitive provider module.

The following illustration shows the design and function of the CNG cryptographic primitives.

CNG provides primitives for the following classes of algorithms:

  • Random Number Generator: This class is used to represent pluggable random number generation (RNG).
  • Hashing: This class represents algorithms used for hashing, such as SHA1 and SHA2.
  • Symmetric encryption: This class represents algorithms used for symmetric encryption. Some examples are AES, 3DES, and RC4.
  • Asymmetric encryption: This class represents asymmetric (public key) algorithms that support encryption, like RSA.
  • Signature: This class represents signature algorithms such as DSA and ECDSA. This class can also be used with RSA.
  • Secret Agreement: This class represents secret agreement algorithms such as Diffie-Hellman (DH) and elliptical curve Diffie-Hellman (ECDH).


posted by ZonaNet @ 6:56 AM   0 comments:
About Me

Name: Yazin Alhamdi
Country: LIBYA
About Me: Angel!
Email: yazin.alhamdi@gmail.com
My Guest Book
Previous Post
Powered by


© ZonaNet Blog Template by ZonaNet