Friday, 21 November 2014

Two Missing President in History.

Sjafruddin Prawiranegara and Mr. Assaat.


Sjafruddin Prawiranegara and Mr. Assaat.

Most of us say that the number of Indonesian president who has served until now (2013) there were six people, namely Soeharto, BJ Habibie, K.H. Abdurrahman Wahid (Gus Dur), President Megawati Sukarnoputri and Susilo Bambang Yudhoyono (SBY). However, it turns out it was wrong. There are actually eight presidents who served in Indonesia. However, there are two people who are not well known, because of a very short tenure.

Two figures were missed it is Sjafruddin Prawiranegara (to the left in the picture above) and Mr. Assaat. Both were not called, can as negligent, but may also be deliberate. Sjafruddin Prawiranegara is the Leader Emergency Government of the Republic of Indonesia (PDRI) when President Soekarno and Moh. Hatta was arrested Netherlands at the beginning of the second military aggression, while Mr. Assaat is the current President of the republic became part of the Republic of Indonesia (1949).

On December 19, 1948, when the Dutch military aggression II to attack and dominate the current capital of the Republic of Indonesia in Yogyakarta, they caught and arrested President Soekarno, Moh. Hatta, Indonesia as well as other leaders and then exiled to the island of Bangka. The news of the capture of Sukarno and the Indonesian leaders was heard by Sjafrudin Prawiranegara then served as Minister of Welfare and was in Bukittinggi, West Sumatra.

Mr Sjafruddin Prawiranegara.

To fill the void, Sjafrudin proposed the formation of an emergency government to carry on the government of Indonesia. In fact, when it's Soekarno - Hatta sent telegram reads, "We, the President of the Republic of Indonesia reported that on Sunday, December 19, 1948 6 o'clock in the morning the Netherlands has begun on Capital serangannja Jogjakarta. Djika in a state government can not carry out kewajibannja again, we authorize to Mr. Sjafruddin Prawiranegara, Minister of Welfare of Indonesia to form a Provisional Government in Sumatra ".

But when the telegram is not up to Bukittinggi. However, it turns out at the same time Sjafruddin Prawiranegara have taken similar initiatives. In a meeting at a house near the canyon Sianok Bukittinggi, December 19, 1948, he proposed the formation of an emergency government (emergency government). Sumatra Governor Mr. T.M. Hasan approved the proposal "to save the Republic of Indonesia which was in danger, that emptiness head of government, which is the requirement to be recognized internationally as a country".

On December 22, 1948, in Halaban, about 15 km from Payakumbuh, PDRI "proclaimed". Sjafruddin sits as chairman / president and Minister of Defence, Information, and Foreign Affairs, ad. the interim. Kabinatenya assisted Mr. T.M. Hasan, Mr. B.C. Rasjid, Mr. Lukman Hakim, Ir. Mananti Sitompul, Ir. Indracahya, and Marjono Danubroto. The Sudirman remained as Commander in Chief of the Armed Forces.

Sjafruddin hand back the mandate to President Soekarno on July 13, 1949 in Yogyakarta. Thus ended the history of the PDRI for approximately eight months to continue the existence of the Republic of Indonesia.

Mr Assaat.

In the Round Table Conference (RTC), which was signed in the Netherlands, December 27, 1949 it was decided that the Netherlands transferred sovereignty to the Republic of Indonesia (RIS). RIS consists of 16 states, one of which is the Republic of Indonesia. Other states such as the State Chancellor, State of East Indonesia, and others. Because Sukarno and Moh. Hatta has been determined to be the President and Prime Minister of the RIS, it means there is a vacancy in the leadership of the Republic of Indonesia.

Assaat is Stakeholder Position While President. Assaat very important role. If there is no RI then, there is a void in the history of Indonesia, that Indonesia never disappear and then reappear. However, by recognizing the presence of RI in the RIS that only a few months, it appears that the history of the Republic of Indonesia since 1945 uninterruptible until now. We know that the RIS then merged into the Republic of Indonesia on August 15, 1950. That means, Assaat has held the post of the President about nine months.

Thus, the president is the president of RI-8. The order of the President are as follows: Sukarno (punctuated by Sjafruddin Prawiranegara and Assaat), Suharto, BJ Habibie, Abdurrahman Wahid, Megawati Sukarnoputri and Susilo Bambang Yudhoyono. Thank you for reading this article.
Written and posted by Bambang Sunarno. sunarnobambang86@gmail.com
author:
http://schema.org/Personal.
https://plus.google.com/105319704331231770941.
Name: Bambang Sunarno.
http://www.primadonablog.blogspot.com/2014/11/two-missing-president-in-history.html
DatePublished: 21 November 2014 at 12:40
Tag : Two Missing President in History.
Code : 7MHPNPADAEFW

Posted by: Bambang Sunarno
www.Primo.com Updated at: 12:40

Thursday, 20 November 2014

The way hackers penetrated website.

How can a hacker to penetrate or infiltrate and destroy a website is as follows. Techniques include:

1. IP Spoofing
2. FTP Attack
3. Finger Unix Exploits
4. Flooding & Broadcasting
5. Fragmented Packet Attacks
6. E-mail Exploits
7. DNS and BIND Vulnerabilities
8. Password Attacks
9. Proxy Server Attacks
10. Remote Command Processing Attacks
11. Remote File System Attack
12. Selective insertions Program
13. Port Scanning
14. TCP / IP Sequence Stealing, Passive Listening Port and Packet
15. HTTPD Attacks

IP Spoofing.

IP Spoofing is also known as the Source Address Spoofing, namely forgery attacker's IP address so that the target considers the attacker's IP address is the IP address of the host in the network instead of from the outside network. Suppose the attacker has an IP address of type A 66.25.xx.xx when the attacker to attack this type of network is under attack, the IP will assume the attacker is part of their network, eg IP 192.xx.xx.xx ie type C.

IP Spoofing occurs when an attacker? Outsmart? packet routing to change the direction of the data or transmissions to different destinations. Packet routing is usually transmitted in a transparent and clear so as to make the attacker to easily modify the data source or destination of the data. This technique is not only used by the attacker, but also used by security professionals to download tracing the identity of the attacker.

FTP Attack.

One of the attacks carried out against the File Transfer Protocol is a buffer overflow attack caused by malformed command. destination FTP server to attack the average is to get a command shell or to perform a Denial of Service. Denial Of Service attack can eventually lead to a user or attacker to retrieve the resource in the network without authorization, while the command shell can make an attacker to gain access to the server system and data files that an attacker can eventually make anonymous root-acces a right full to the system even attacked network.

Finger Unix Exploits.

In the early days of the Internet, Unix OS finger-efficient utility used to download information sharing among users. Because the demand for information on this finger information do not blame the rules, many system administrators leave this utility (finger) with minimal security, even without any security at all. For an attacker this utility is very valuable to have information on footprinting, including login names and contact information.

This utility also provide excellent information about user activity in the system, how long the user is in the system and how far the user take care of the system. The information generated from this finger to minimize Kracker effort in penetrating a system. Personal information about the user that is raised by the finger daemon is already enough for a atacker to perform social engineering using the social skill to utilize the user to? Tell? passwords and access codes to the system.

Flooding & Broadcasting.

An attacker can reduce the speed of the network and the hosts that are in it significantly by continuing to perform request / demand for the information of servers that can handle classic attacks Denial of Service (Dos), send a request to the named port of excessive flooding, sometimes it is also called spraying. The purpose of the attack is the same that makes network resources that provide information to be weak and eventually gave up.

Flooding Attacks by the way, depending on two factors: the size and / or volume (size and / or volume). An attacker could cause a Denial of Service by throwing large capacity files or a large volume of small packet to a system. In such circumstances the network server will deal with congestion: too much of the requested information and not enough power to push the data to run. Basically a big package that requires greater processing capacity, but abnormally small package and at a high volume resource will be spent in vain, and the resulting congestion.

Fragmented Packet Attacks.

Internet data is transmitted via TCP / IP can be further divided into packages that only contain the contents of the first package of information the main part (head) of TCP. Some firewalls will allow to process part of packages that do not contain information on the source address on the packet first, this will lead to some type of system to crash. For example, the NT server will be crash if the packages were broken up (fragmented packet) enough information to rewrite the first packet of a protocol.

E-mail Exploits.

Exploitation of e-mail occur in five types: mail floods, manipulation command (command manipulation), the attack rate of transport (transport-level attack), include a variety of code (inserting malicious code) and social engineering (utilizing physical socialization). Email assault could cause the system to crash, open and execute even rewrite the application files or also make access to command functions (command function)

DNS and BIND Vulnerabilities.

Recent news about the vulnerability (vulnerabilities) on apps Berkeley Internet Name Domain (BIND) in various versions illustrate the fragility of the Domain Name System (DNS), which is a crisis that is directed at the basic operation of the Internet (internet basic operation).

Password Attacks.

Password is common when we talk about security. Sometimes a user does not care about the number of pins they have, such as online transaction in the cafe, even transact online at home is very dangerous if it is not equipped with security software such as SSL and PGP. Password is one procedure that is very difficult to attack, an attacker might have many tools (technically and socially) just to open something that is protected by a password.

When an attacker managed to get a password that is owned by a user, then it will have the same power to the user. Train employees / users to remain vigilant in keeping the password of social engineering can at least minimize the risk, in addition to guard against social engineering practices organizations must be aware of this by way of technical. Most attacks are carried out against password guessing (guessing), brute-force, cracking and sniffing.

Proxy Server Attacks.

One of the functions of proxy servers is to speed up response time by bringing together the process of multiple hosts on a trusted network.

Remote Command Processing Attacks.

Trusted Relationship between two or more hosts Provides information exchange and resource sharing. Similar to a proxy server, trusted relationships give all members equal access to power networks in one and the other system (the network).
Attacker will attack the servers that are members of a trusted system. Just as the latency to the proxy server, when access is received, an attacker would have the ability to execute commands and access the data available to other users.

Remote File System Attack.

Protocols for transport of data? Backbone of the internet? is the TCP level (TCPLevel) with a mechanism that has the ability to read / write (read / write) between network and host. The attacker can easily obtain the information traces of this mechanism to gain access to the file directory.

Selective insertions Program.

Selective Program insertions are performed when the attacker attacks put destroyer programs, such as viruses, worms and trojans (maybe you already know this term well?) On the target system. Programs crusher is also called malware. These programs have the ability to damage the system, destruction of files, theft of the password to unlock the backdoor.

Port Scanning.

Through port scanning an attacker can see the functions and how to survive a system from a variety of ports. A atacker can gain access to the system through an unprotected port. Sebaia example, scanning can be used to determine where the default SNMP strings in open to the public, which means that the information can be extracted for use in remote command attack.

TCP / IP Sequence Stealing, Passive Listening Port and Packet.

Interception TCP / IP Sequence Stealing, Passive Listening Port and Packet Interception runs to gather sensitive information to access the network. Unlike active attacks and brute-force attacks that use this method have more stealth-like quality.

HTTPD Attacks.

The vulnerability is present in HTTPD webserver or five kinds: buffer overflows, bypasses httpd, cross scripting, web code vulnerabilities, and URL floods
Thank you for reading this article. Written and posted by Bambang Sunarno. sunarnobambang86@gmail.com
author:
http://schema.org/Personal.
https://plus.google.com/105319704331231770941.
Name: Bambang Sunarno.
http://www.primadonablog.blogspot.com/2014/11/the-way-hackers-penetrated-website.html
DatePublished: 20 November 2014 at 13:38
Tag : The way hackers penetrated website.
Code : 7MHPNPADAEFW

Posted by: Bambang Sunarno
www.Primo.com Updated at: 13:38

Thieves money.

Various types of malicious programs often terrorize Internet users. The virus is classified as very dangerous because it can drain the contents of the victim's account.

Virus 'thief money' life has been discovered a few years ago, but gradually becoming more sophisticated malicious programs until it is feared could lead to huge losses.

Drug to counteract some of the virus had been found. But cyber criminals are not losing my mind, they are often modified with the latest techniques in order to successfully pass the various protection systems.

According to JD Sherry, Global Director of Technology and Solutions Trend Micro, there are at least six internet banking virus that is dangerous to the present, and it still could cost quite a bit.

Virus 'thief money' which, according to Trend Micro warrant concern are as follows:

Citadel.

In the ancient Citadel are used as a last defense of a kingdom. Hence, typically form large, sturdy, and comes with a variety of weapons systems.

In modern times it is in the name Citadel pincers cyber criminals to name a virulent virus. The virus specifically designed to drain the victim's account.

Citadel is a virus that is created from the source code of Zeus, one of the viruses that are also quite sophisticated. The difference Citadel is made specifically to attack internet banking.

The virus is found in the Citadel began in January 2012 and, since then a malicious program is constantly being developed to reach their latest version in October 2013. Until now, the virus is thought to still circulate freely.

Tinba.

One observer virus named Amit Klein wrote many stories about Tinba on his personal blog. This is one of the viruses attacker who should be wary of internet banking.

Tinba emerged from the underground hacker community about 9 months ago. This malware is designed to steal money.

Originally methods used Tinba still relatively unusual, even to say a little bit old school compared with viruses like. But in January 2013 found a new version Tinba more sophisticated, able to outsmart even the two-way authentication system of the bank.

"When the victim accessing their bank pages, Tinba will display a page that is very similar to the bank," writes Klein.

However, when trying to log into the page, the user is actually displayed error pages. This is where the process starts data theft.

Eurograbber.

In accordance with its name. The virus is designed to drain money internet banking users in Europe, even until the end of 2012 and at least 36 million euros ($ 455 billion) were successful in the brush of the virus.

Eurograbber first discovered by a security agency named Check Point Software Technologies, then assisted also by other institutions of Israel named Versafe. They say that these malicious programs designed to attack the banking sector.

In operation the virus was not only attacked by a computer, but also infiltrated into the smart phone of the victim. Having successfully entered, it will download some application components to be able to act.

Eurograbber first discovered in Italy, then spread to several areas of Europe such as Germany, the Netherlands and Spain. At least there are thousands of victims from 30 different banks that successfully infected by the virus.

SpyEye

Analysis and Guardian and McAfee announced the discovery of a new virus called SpyEye. It is said that these malicious programs created by programmers who know well about the working system of internet banking.

Just like the Citadel, SpyEye is based on the source code of Zeus. It's just the program to attack a specific target, such as corporate transactions, or users who have savings are numerous.

SpyEye said to be great because it managed to avoid the various protection systems. In fact, the virus is said to be relatively ingenious, it was difficult to detect when a transaction takes place.

"They know how to make the transaction as if it occurred. Obviously, these people (the author-ed) to know more than just the understanding of Internet banking," said David Marcus, director of Advanced Research and Threat Intelligence McAfee, as quoted of CRN.

Gozi-Prinimalka.

If Eurograbber attacking the banking system, then Gozi-Prinimalka made to beat the internet banking system in the United States.

Trend Micro managed to capture and analyze Gozi-Prinimalka, after the surgery turns out this malicious program has several unique among similar applications.

To steal information from its victims, the virus will first create a backdoor using exploits Java Script. There are two backdoor to be made, and BKDR_URSNIF.DN BKDR_URSNIF.B both are connected in real time to the control system of the virus.

The data stolen this virus was not only stored on the hard drive, but also temporary memory that is stored in the browser.

In America this virus at least have made a restless three banking institutions, they are TDBank, Firstrade, Options Xpress. The trio then make improvements to the system to fend off the attack.

High Roller.

The virus is spread pretty much the last terror is the High Roller. It is said that this is one of the biggest attacks in the banking industry world.

Unlike other malicious programs that only attack by stealth, launch a High Roller can blindly from various directions.

The virus is more difficult to track because they do not have the Command Center in a physical form. Performers are smart enough to make this control system in the 'cloud', making it difficult to track.

Basically the High Roller is made of a combination of Zeus and SpyEye virus, and in it there are also some conventional information theft techniques that are common in cyberspace.

Advanced technology owned by High Roller makes it quite difficult suppressed, even to this day. Therefore, the entire banking sector are advised to remain vigilant.

"By using a cloud system, the High Roller has a new attack techniques. They are difficult to analyze and difficult to detect its presence," said Chris Silveira, Manager of Fraud Intelligence of Guardian Analytics.
Thank you for reading this article. Written and posted by Bambang Sunarno. sunarnobambang86@gmail.com
author:
http://schema.org/Personal.
https://plus.google.com/105319704331231770941.
Name: Bambang Sunarno.
http://www.primadonablog.blogspot.com/2014/11/thieves-money.html
DatePublished: November 20, 2014 at 13:16
Tag : Thieves money.
Code : 7MHPNPADAEFW

Posted by: Bambang Sunarno
www.Primo.com Updated at: 13:16

Fasting longest and fastest.

Because every country in the world that are dispersed from north to south, west to east there arose a difference long fasting period. We start from the oldest are:

1. Russia.

Russia seems to be the country's most severe when you are fasting Ramadan. Just imagine, Muslims in Provideniya've had to finish the meal at 1:46 pm and a new dawn may be breaking when the evening call to prayer rang out at 21:43 at night.
Fasting Duration: 19 Hours 57 Minutes.

2. England.

Want to be in the land of Ramadan fasting Harry Potter? Then at least you have to be strong to withstand hunger and thirst for more than 15 hours. Just imagine, Muslims in London mark Ruling heard at 2:45 AM and shall break their new night at 20:50 o'clock.
Fasting Duration: 18 Hours 5 Minutes.

3. United States.

When you have a super mega fast in the city of New York, then you have to be more robust to withstand the passions including hunger and thirst. Being immigrants in the United States during the month of Ramadan when the fast begins at 4:25 and the Ruling will be breaking at 20:12 at night.
Fasting Duration: 15 Hours 47 Minutes

4. Japan.

Living in Tokyo as full of fun gadgets and super sophisticated means of transportation? Indeed, but what if you were there when fasting Ramadan? Muslims in Japan mentioned start fasting when the Ruling 03:11 o'clock and 18:47 o'clock will be breaking later.
Fasting Duration: 15 hours 36 minutes

5. Saudi Arabia.

If you choose to do the pilgrimage when the holy month of Ramadan. then you must be prepared to do a fasting longer than you usually do in Indonesia. Because Mecca Ruling start at 04:31 and at 19:01 the night of new breaking.
Fasting Duration: 14 Hours 30 Minutes

6. Indonesia.

This is the most reasonable fasting Indonesian people lived. If averaged most Ruling People Indonesia will meet at 4:52 and at 17:55 pm iftar (take the example of Jakarta). So that means you are half-day abstinence, including hunger and thirst.
Fasting Duration: 3 Hours 13 Minutes

7. Western Australia.

If you feel want to try fasting in neighboring countries, but not far from Indonesia, Austraia is quite appropriate choice. Ramadan fasting in Perth and regional Western Australia, then you will see Ruling at 05:42 and is ready to break at 17:41 pm.
Fasting Duration: 11 Hours 59 Minutes

Judging from the list above, Indonesia is still considered average. So be grateful and try not perforated fasting. Thank you for reading this article.
Written and posted by Bambang Sunarno. sunarnobambang86@gmail.com
author:
http://schema.org/Personal.
https://plus.google.com/105319704331231770941.
Name: Bambang Sunarno.
http://www.primadonablog.blogspot.com/2014/11/fasting-longest-and-fastest.html
DatePublished: November 20, 2014 at 10:30
Tag : Fasting longest and fastest.
Code : 7MHPNPADAEFW


Posted by: Bambang Sunarno
www.Primo.com Updated at: 10:30

The cleanest city.

Many cities around the world is a great place to live because of the availability of recreational and high life expectancy. Countries that have a high ratio of physical disease patients who tend to be healthier and less number of doctors. The infant mortality rate and a low level of disease is important for the health of the city, but there are many factors that make these cities included in the list of the healthiest cities in the world. Exercising, eating well and healthy lifestyle are factors that contribute to the health of the citizens of any country in the world.

There are many ways to measure the health of a city. Several factors affect the health of society as a whole, including a long life expectancy, doctor-patient ratio and the overall number of toxins that can be found in the environment. Health is also measured by the availability of sports and other activities and the level of disease.

Some countries allocate a substantial amount on health, but it does not really mean they are healthy. Healthiest cities in the world are:

Reykjavik is the largest city and capital of Iceland Looks clean and very beautiful.

1. Reykjavik, Iceland.

Iceland has a low level of disease overall TB prevalence countries it was 2.2 per 100,000 residents, and no cases of H1N1 bird flu there. Iceland also has a high number of doctors, with a ratio of 3.62 per 1,000 residents.

Swimming is a popular sport in Iceland. Pool has been included in the school curriculum Iceland for over 60 years and each resident of Iceland is obliged to learn to swim.
Icelandic geothermal wealth makes a great place to swim.
An outdoor heated swimming pool located across the country and is open throughout the year, other outdoor sports such as hiking and sailing are also popular in Reykjavik.

Reykjavik and other towns in Iceland have high levels of vehicle ownership per capita is very high around 522 vehicles per 1,000 inhabitants, but they were not affected by congestion and air pollution levels are very low.

Walking - the road at night in the city of Vienna is an unforgettable experience.

2. Vienna, Austria.

Austria has an infant mortality rate was only 4 deaths per 1,000 live births.
They also have high physician density 3.38 doctors per 1,000 residents. People living in Austria covered by government insurance as soon as they get a job or to go to university.
Pensioners are also guaranteed automatically by law. Vienna offers skiing in the winter and lots of recreational activities in the summer months.
City of Vienna hosts various sporting events including the marathon,
This marathon attracts over 10,000 participants per year. In 2005 the Ice Hockey World Championships hosted by Austria and the final was played in Vienna.

It's amazing to see Sydney with a red sky as a backdrop.

3. Sydney, Australia.

Australian health care system is one of the best in the world. Australian insurance companies are required by law to pay the policy premiums and past the same no matter their health. Australian Air also among the cleanest air in the world. According to the CIA World Factbook, Australia also boasts one of the highest life expectancy at 81.81 years of age in 2011.

City of Sydney has a climate, sunny moderate contributes to a love of the outdoors that much in population. There are five major national parks located around Sydney which contains approximately 8,000 square miles of open space.

Zurich is the largest city in Switzerland and capital of the canton of Zurich. The beautiful city.

4. Zurich, Switzerland.

Swiss State spends more than 11 percent of gross domestic product budget on universal health coverage for its citizens. This is a very high expenditure per capita, but the people giving high life expectancy at age 71 for men and age 75 for women. The density of doctors in Switzerland is approximately 3.61 per 1,000 population. Switzerland also has a high level of air pollution.
There are many gardens and parks are located in Zurich for citizens to simply walking, cycling. Most of the people of Zurich enjoy an active lifestyle and sport is an integral part of Swiss culture. The number of sporting facilities make Zurich a gathering place for sports lovers in Switzerland. Some international sports federations make their home in Zurich.

Finland where Eastern and Western cultures meet, welcomes travelers to discover the Scandinavian metropolis of the whole atmosphere.

5. Helsinki, Finland.

Finland has one of the lowest pollution levels in the world. They also boast a low infant mortality three deaths per 1,000 live births. Finnish citizens have a life expectancy of about 79.27 years at birth. Helsinki, the capital.
There are about 390 cars per 1,000 inhabitants of Helsinki. Fewer than cities of similar density. Brussels, Belgium. Belgium has about 483 cars per 1000 people and Stockholm, Sweden has about 401.

Calgary is the largest city in the Province of Alberta, Canada. Located in the south of the province, in the foothills and prairie, approximately 80 km east of the Canadian Rockies.

6. Calgary, Alberta Canada.

Calgary is considered as the fastest growing city in Canada. Being in the top spot in Forbes magazine survey in the cleanest city in the world in 2007.
Canada is known for their universal health care system. The country only has about 2.1 doctors for every 1,000 residents, and they boast one of the average life expectancy of the longest in the world.
Canadian citizens can expect to live to about 81 years.

Portland is a city located in the Northwestern United States, near the confluence of Columbia and Willamette rivers in the state of Oregon

7. Portland, Oregon, USA.

Cooking Light magazine ranks the city of Portland in second place in the list of healthiest cities. The city offers 277 miles of bike paths, and urban planning that minimizes sprawl. Rainy weather is an issue that makes Portland a city that is difficult to do outdoor exercises there, Portlanders and other Oregonians have to find a fitness activity in the room to keep them healthy.
Thank you for reading this article. Written and posted by Bambang Sunarno. sunarnobambang86@gmail.com
author:
http://schema.org/Personal.
https://plus.google.com/105319704331231770941.
Name: Bambang Sunarno.
http://www.primadonablog.blogspot.com/2014/11/the-cleanest-city.html
DatePublished: 20 November 2014 at 10:11
Tag : The cleanest city.
Code : 7MHPNPADAEFW

Posted by: Bambang Sunarno
www.Primo.com Updated at: 10:11

Bridge formed naturally.

The bridge is currently mostly created by humans, but what if you ever think like this can really make a bridge of its own.
There are some magnificent bridges formed naturally without any human intervention, such as:

Xianren Bridge, China.


Xianren Bridge or commonly known as the Fairy Bridge is the world's largest natural arch with a span of 400 feet or 120 meters. The bridge is engraved on limestone is located about 40 km northwest of Fengshan in the northwest province of Guangxi, China.Peri Bridge was not known by the people of China. Until finally in 2009, a geologist found it through Google Earth. This was quickly confirmed by Panoramio images associated with Google Earth, taken by photographers from China. After conducting several experiments, the bridge finally succeeded measured in 2010.

Jiangzhou Immortal Bridge, China.

Jiangzhou Immortal Bridge

Natural Bridge Generated Jiangzhou Immortal Bridge is located approximately 2 km east of the village Jiangzhou in Guangxi Province, China. Or about 30 miles south Fengshan. The length of the bridge is still so controversial because of conflicting information obtained by the curve. The boundary between the range of about 340 meters which is placed into the second longest bridge in the world.

Landscape Arch, USA.

Landscape Arch

Generated Natural Bridge is located in Arches National Park in Utah, USA, Landscape Arch is much older and closer to the last cycle of life. At the thinnest curve has only 6 feet thick, but a variety of rock reaching 290 meters. This arch could collapse at any point of time for the unexpected. In 1991, 73 thin stone slab fell. A similar incident occurred in 1995. The 47-meter stone.

Kolob Arch, USA.

Kolob Arch

Natural Bridge Generated Kolob Arch, USA is located in Zion National Park, USA. bridge measuring 287 meters is located in the interior of Zion National Park. In the 20th century, many people assume that Kolob is actually the largest stone arch in the world.

Aloba Arch, Chad.

Aloba Arch

Natural Bridge Generated Aloba Arch is one of the most beautiful stone arch in the world. Located in the Ennedi Range in the Sahara Desert, Aloba Arch has a range of about 250 meters. The arch is referred to as a natural bridge in the world. Now that some bridges are formed naturally without any element of human intervention in the making.
Thank you for reading this article. Written and posted by Bambang Sunarno. sunarnobambang86@gmail.com
author:
http://schema.org/Personal.
https://plus.google.com/105319704331231770941.
name: Bambang Sunarno.
http://www.primadonablog.blogspot.com/2014/11/bridge-formed-naturally.html
DatePublished: November 20, 2014 at 09:40public of
Tag : Bridge formed naturally.
Code : 7MHPNPADAEFW


Posted by: Bambang Sunarno
www.Primo.com Updated at: 09:40

Wednesday, 19 November 2014

Animals mysterious secret.

The earth was still save a lot of wonders. One of them is the animal or animals, these days a lot of strange creatures emerging new find. There used to be back there, why? Because these animals are just like animals first ancient times, large and tend to be spooky or often called dinosaurs.

The mysterious animal found, but their presence there is still mysterious and difficult to accept the truth and there is also a deliberate in secret. Possible to avoid excessive exploitation that may affect extinction, and it is this mysterious animal, one of them in Indonesia.

Ahool, Giant Bat.

Giant Bat.

These animals manifold bat, but size is not fair, and face ape and has fangs. Terrible is not it? This animal was first discovered by Dr. Ernest Bartels in 1925. Bartels who was then down Mount Salak in West Java region to conduct research. Finding this giant bat swooped over his head.

And 2 years later when Bartels lay in bed at around midnight Tjijengkol hut he heard a voice saying "ahool. ahool .. ", Bartels who was then curious, immediately took the torch and check the direction of the voice, and that he found was exactly the same bat when he met at the Mount. Therefore, this animal is called 'ahool'.

Andean wolf.

Andean wolf.

This animal is not really a wolf, often encountered wandering around the Arctic sea in North America. Which makes it unique is, hairless body, only on the head and tail are feathered, fur is golden brown.

Tsuchinoko.

Tsuchinoko.

Animals with a snake-like body is found in some areas in Japan, except Hokkaido regions and islands Ryukku this animal was not found. The name 'Tsuchinok'o comes from Kansai population which covers an area of Kyoto, Mie, Nara and Shikoku, which means "animal". However, the presence of these animals can not be verified, and no one has ever managed to catch him, because this animal is very agile, but it is also most people who find it frightened, perhaps because of the sinister appearance.

Tasmanian Tiger.

Tasmanian Tiger.

Animals with the Latin name 'Thylacinus cynocephalus' if you see a glimpse of his face like a wolf, but the animal is classified as 'marsupial carnivore modern' largest ever in the know. Why say the tiger? because there are stripes on his body that resembles a tiger.

Animals are only found in Australia and Papua continent was declared extinct since the 20th century. Based microorganisms found, animals which lived in the time of Moizen. But anyone ever claimed to see these animals and try to catch it, it turns out there is a swarm of these animals. Is it true?

Yeti.

Yeti Bigfood.
Creatures legend Bigfood similar to this one, it's just a different life and color. Yeti white woolly, life in cold regions, Yeti story first appeared, saying if these animals live in the Himalayas of Nepal.

But many doubt the truth of this animal, whether true or just fairy tales? However, many also believe and say never see and deal directly with the Yeti.
Thank you for reading this article. Written and posted by Bambang Sunarno. sunarnobambang86@gmail.com
author:
http://schema.org/Personal.
https://plus.google.com/105319704331231770941.
name: Bambang Sunarno.
http://www.primadonablog.blogspot.com/2014/11/animals-mysterious-secret.html
DatePublished: November 19, 2014 at 15:30
Tag : Animals mysterious secret.
Code : 7MHPNPADAEFW

Posted by: Bambang Sunarno
www.Primo.com Updated at: 15:30