Monday, 15 June 2009

Wireless keyboard with TrackPad

While many laptop users choose to use a USB mouse instead of the trackpad. Now PC users are even a trackpad with terbuilt-up on the key board. It is USB 2.4 GHz RF Wireless Entertainment Slim Keyboard with Touchpad Smart who has 18 hot keys and features high Precision Multi-Touch touchpad.

Keyboard with a price range of $ 69 has a dimension that is less than the conventional keyboard. Approximately ¾ unturan times normal. The most interesting of this keyboard is the multitouch trackpad is also a ten-key number pad ..


With multitouch, you can use a combination of fingers to control the computer during the time that you can find on the latest macbook. With two and three fingers at the same time we can do activities, scrolling, zooming, window switching, Tapping and many more.

Additional 18 hotkeys for instant melaunch the program through the keyboard to create the position of the keyboard as this complement HTPC (Home Theater PC) increasingly feel.


A choice to either Media Center PC HTPC (Home Theater PC) or PC to conventional employment. Although interesting, this is not a keyboard option for user who want to have a replacement mouse for gaming activities tentunya.
techpowerup.com

Wednesday, 10 June 2009

Kevin Mitnick, Hacker Legend

A knock sounded from the door of apartments, Kevin Mitnick opened the door and found dozens of FBI agents and other law enforcement is prepared to catch it. This is the end of the journey of a hacker who had buron in order to avoid imprisonment. Hackers during buronannya it has obtained legendary status, has even grown into a myth that is greater than himself

The arrest happened in 1995 that marked the beginning of the case of the most controversial arrest of the perpetrator of a cyber crime. Mitnick is a computer system on it reincarnate as America's Most Wanted Hacker.

Addictions Computers

Mitnick easy to learn with computer nongkrong at radioshack store or diperpustakaan general, family berduit not enough to have your own computer. Favorite on the computer until he developed adult.

In the period of 1990s, Mitnick easy entry exit system. But in the late 1980s, he actually wanted to leave hobynya and starts looking for a legitimate job. Unfortunately, before he can do that, in 1987 he caught the pass in a company's Santa Cruz Organization, a software company that mainly engaged in the operating system Unix. When the lawyer mitnik successfully reduce the alleged crime to be a lack of good action, Mitnick was the only ganjar 3 years probation.

Not until the return trip a year Mitnick case law. Gara-garanya a friend that he use the computer to other computers break Mitnick reported that it is the obligation of times dibobol Mitnick is owned by Digital Equipment Corporation. Each time you break the computer is taking mitnik code composer of the software. Code and then he learned that very seriously, sometimes found several weaknesses in it. Mitnick opportunity in a just claim to take the code from the compiler software that he or the like for him.

In the case of DEC Mitnick prisoners who get the more weight. When the call Mitnick has pengacaranya, 'addicted to the computer that can not be stopped'. He diganjar 1 year in prison.

Mitnick in prison get a bad experience. At that time the legend of Kevin Mitnick, or better known by the name of the fictitious' The Condor ', is the draw. Reputation as a
computer criminals are also increasingly membumbung beyond reality. Warden at Lompoc, where the prison is located Mitnick, Mitnick think infiltrate into the computer can only start with the voice and the phone. Hence
Mitnick is not only can not use the phone, he also spent many hours in the isolation room. No wonder then if he dikabarkan experienced little interference when a life sentence at Lompoc.

In 1989 Mitnick released from prison. He tried to find a formal job, but their status as former prisoners make Mitnick difficult to maintain employment. Finally, he worked as a
pendulang information office for private investigators office. Of course this Mitnick dragged back to the world in the gray and black. In the early 1990s, Mitnickpun searched by FBI again. This time the fear of the entry room isolation for years, decided to Mitnick blurred.

Hacking The Human Side

Expertise as a hacker Mitnick is not limited to purely technical kemapuan. It is purely on technical ability. He was a correct understanding of the security computer system that consists of aspects of the organization's policies, human resources, process involved and the technology used. Had he seoarang hero super kemapuannya main seoarang that Mitnick is a social science practice engginering aka social engineering. This is a technique to get important information, such as passwords, by using human weakness.

Ability Mitnick is best illustrated in the following story, the story itself dikisahkan Mitnick on a forum online Slasdot.org

"On one occasion, my friend by the one to get the number (phone) Sprint Foncard it. He said that will buy dinner if I can get that number. I will not refuse to eat well, so I berusahan by contacting the Customer Service and perpura ostensibly as a part of information technology. I ask the officer replied that if he had difficulty in sitem used. He is not, I ask that the system used to access customer data, I want to pretend to verify. He mentioned the name of the system. "

"After that I call back Costumer Service and connected with a different officer. I said that my computer is broken and I want to see a customer data. He said that the data is already berjibun question. What's your name? You work for who? Address where you are? Yah, like that. Because my little research, I draw up a name and place only. Failed. He says the phone will report on the security of the phone. "

"As I noted his name, my friend and sorang bring about a situation that will happen. I ask that friend to masquerade as' keamaman investigators' notes for a report from the Customer Service and speak with the officers before. As the 'investigators' he said to receive reports of people try to get the customer's personal information. After a phone interview earlier question, 'what investigators menyakan the requested information before the caller. Officials say the number Foncard.' investigators' to ask, how is the number? And the officer is to give the number. Oops. The case is finished "



I as a fugitive Mitnick berusahan as much as possible not to be caught. He often moved residence and always throw a variety of habits. Many ways he did so by not being pengejarnya. But he can not leave hobinya mengoprek computer network and internet. Perhaps even some expertise is used to obtain a new identity.

Legend Mitnick during in approximately two years, more and aggravate it menjelama as' Cyber Ninja 'which seems to break the computer with the Pentagon only television remote, a rumor that exceeds any fictional story.

Why Mitnick, in the case of a buron piercing machine, could become the most sought criminals? This is not separated from the role of mass media. In particular is a series of sensational articles from John Markoff published in the New York Times.

Markoff condemn Mitnick is like a terrorist. In a statement released after a long, Mitnick himself mentions that the image displayed Markoff like seoarang terrorist who tried to control the nuclear world. "I will be a fake Osama bin Mitnic," he said archly.

Markoff describes Mitnick as a death, can not be terminated and is eligible to become FBI fugitive ten large and other law enforcement. Article Mafkoff, which sometimes appears on the front page, the candidate most Mitnick pilot project on cyber crime. Mitnick then the future may be spelled out in the prison have also written saati.

During a buron Mitnick also continue to run aksinya. He break many big computer companies. Including Sun Microsystems. It uses, and maksutnya here is the account of a break in the online storage service to store the backup of the results aksinya. Mitnick does not actually work alone, but when caught he never said anyone colleagues.

One of the victims of Mitnick is T. Shimomura, a computer expert in any posts on the Internet some doubt kebersihannya. There are allegations that Shimomura was also a hacker who frequently perform illegal acts. One thing that many have approved Shimomura is the attitude seems arogan and want to appear as a hero in the story Mintick hunting.

Shimomura, Markoff and FBI shoulder shoulder to catch the fugitive. Guide's news sensasionalnya Mafkoff, Shimomura hacking ability and power of law to the FBI finally track Mitnick residence.

As the story usually tertangkapnya seoarang buron, Mitnick do ketledoran. Storage service that he has apparently use automated programs to fill mencek file saved. The owner of the account that is used to get Mitnick's warning system on the excess capacity. This is the beginning of the tertangkapnya Mitnick.

Mitnick admitted that his careless because they do not suspect that the FBI, Shimomura, Markoff, and wireless phone service provider to work together so closely and integrated.

"Plans mobile searches in the database against the billing them to dial-up Internet service Netcom POP. This, as can be suspected, they can identify the area and call the number MIN (mobile identification number) that I use at that time. Because I often switch number , they observe any call data that occur in these locations. Then, with the tool Cellscope 2000 Shimomura, track the signal to my phone to the right location, "Mitnick menuturkan.

Two weeks before tertangkapnya Mitnick new move to Raleigh. New location less vigilant and make sure he track line to dial-up digunakannnya. Several hours before tertangkapnya Mitnick something new happens, tracking and control is being carried out on paths that use it. When he is trying to track the extent to which control has been done to whom dilbalik tracking, and he heard the door knocking. Mitnick opened the door and faced with dozens of FBI and U.S. Marshall.

Four Half Year swing

Mitnick arrested after caught with no possibility of collateral. He also never asked for the court. Approximately four years to spend it without any certainty. This is really frustrating to make Mitnick.

During the FBI in prison, he did not get the opportunity in the case. Mitnick even pengacaranya and I can not see the case as there is in the laptop and access for laptop Mitnick is considered dangerous. Mitnick dituding cruise missile can only make a start laptop or phone. Larangn is still valid even if pengacaranya use a modem and a laptop without any network capability.

Mitnick eventually dituding cause damage to hundreds of million dollar losses that Mitnick is not correct, because it seems that companies do not even report the disadvantaged loss in their annual reports.

Mitnick final agreement for recognition is guilty. Guilty in the case of piercing the computer and tapping phone lines. Mitnick surrender and follow it, the rewards years 4 years more time in prison is as mas custody. Total Mitnick punished dipenjara is 5 years, 4 years in the custody of float and the rest 1 year.

He was released in 2000 with the condition should not touch the computer or phone. In 2002 he could use a new computer but not connected to the Internet. New in 2003 he was using the Internet for the first time.

Since exempt Mitnic trying to improve his life. He write two books about hacking, other than that he also founded its own security consulting company. "Hacker is the only crime that expertise can be used again for something that unethical. I never see it in others, eg ethical robbery," said Mitnick.

Author: Antonius Fran Setiawan

Friday, 1 May 2009

Phishing attacks on Facebook

Phishing attacks on Facebook The Generalized Print E-mail


Image Name of Facebook as the largest social networking website in the world also did not escape the target of cyber criminals. Having previously managed to overcome the problem of the debate about their Terms of Service, this time Facebook Phishing problem. For two days today, some dangerous attacks provoked by the victim to a fake web site Facebook is reported to have occurred.
The signs of phishing on Facebook fairly easily recognizable. Users receive a message from the contact list that usually contains the words "Check this out". Then the perpetrator invited the victim to click on a link that will take them out of Facebook. On Thursday, Facebook users receive messages from FBStarter.com. Meanwhile on Wednesday the attack to come from BAction.net Facebook.

Facebook party claimed that the attacks stopped every few hours on each case. Facebook also stated that there is no certainty whether the attack of the two websites are related to each other or not.

Facebook have removed the URL from the member page and remove URLs in mail messages. For users who have been caught this phishing attack, the Facebook has reset their password. Facebook also encourage the user should not clicking on suspicious links and recommends that users who have become victims to immediately change the password.

Some time ago, phishing attacks also has begun intensively occurs in the virtual world. Some of these phishing attacks occur through popular IM such as Yahoo Messenger. Phishing is the process to obtain sensitive information such as usernames, passwords and even credit card details by pretending to be the owner of the website.

Usually the offender to lure victims into the website created similar to the original website. On the web page that, the perpetrator has put a username and password box and asked victims to fill the box. In fact the victim had given a username and password to the perpetrator.

Saturday, 7 March 2009

Turning on Registry Tricks

Turning on Registry Tricks

Turning on Registry Tricks

Registry is a role in the life of the windows .. ehm but how do if the registry Disable by Administrator ... especially exposed to the virus have been completed .. suffering ... I can do the windows ..
how to continue to turn back? I also do not know ... he neh .. xx just kidding.
simply copy the script below:

/ / Program regedit
/ / Name of Program: regedit.js
var vbCancel = 2;
vbYesNoCancel var = 3;
vbYes var = 6;
var vbNo = 7;
vbQuestion var = 32;
var vbInformation = 64;
Nathan var = WScript.CreateObject ( "WScript.Shell");
var pesan1 = "regedit Security Options: \ n \ n" +
"[Yes] to Disable regedit. \ N" +
"[No] to Enable regedit. \ N" +
"[Cancel] to Exit. \ N \ n" +
"[.:: Bolank::.] \ N \ n "+
"-> Disable regedit now?"
var a = natan.popup (pesan1, 0, "Security regedit", vbYesNoCancel +
vbQuestion);
if (a == vbYes)
(
natan.RegWrite ( "HKCU \ \ Software \ \ Microsoft \ \ Windows \ \ CurrentVersion" +
"\ \ Policies \ \ System \ \ DisableRegistryTools", 1, "REG_DWORD");
pesan2 = "regedit Disabled!"
natan.popup (pesan2, 0, "Security regedit", vbInformation);
)
else if (a == vbNo)
(
natan.RegWrite ( "HKCU \ \ Software \ \ Microsoft \ \ Windows \ \ CurrentVersion" +
"\ \ Policies \ \ System \ \ DisableRegistryTools", 0, "REG_DWORD");
pesan3 = "regedit Enabled!"
natan.popup (pesan3, 0, "Security regedit", vbInformation);)
else
(
natan.popup ( "Thank Kasih.Thank You.Danke.", 0, "Security regedit", vbInformation);
)


already in a copy .. then save with the name "regedit.js" without quotes two ...
how I continue?
ehm regedit.js search files on direktory where you save and then click 2x,

select "yes" to disable regedit.

select "no" to enable regedit.

continue to do if I cancel? you thought it out? heexx hee ..
that to cancel ..

try .. congratulations!

in the quotation from: http://www.yogyafree.net/magazine

Sunday, 1 March 2009

Registry Komputer

Registry computer

1. Restore the Lost Document folder in My Computer
Sometimes the virus hides the folder. Often we think that we have already deleted the folder. In fact, if the folder is only hidden, we can show it again through the registry.
HKEY_LOCAL_MACHINE> Software> Microsoft> Windows> Current Version> Explorer> DocFolderPaths
• Select the Edit menu> New> String Value and name in accordance with the username that is used in Windows (for example: Chippers).
• Double-click on the value and enter the path where you are Documents (for example, D: \ Documents).
2. Name Change Default Shortcut on Desktop Important
Default shortcuts are not reimbursed can use the rename. If you want to change the name to be unique, eg "Recycle Bin" to the "Trash" can be done den ¬ gan way as below.
HKEY_CURRENT_USER> Software> Microsoft> Windows> Current Version> Explorer> CLSID
Double-click on the default value in each subkey below:
• My Network Places:
(208D2C60-3AEA-1069-A2D7-08002B30309D)
• My Computer:
(20D04FEO-3AEA-1069-A2D8-08002B30309D)
• My Documents:
(450D8FBA-AD25-11DO-98A8-0800361B1103)
• Recycle Bin:
(645FF040-5081-101B-9F08-OOAA002F954E)
• Default IE Icon:
(871C5380-42AO-1069-A2EA-08002B30309D)

3. Lock the Taskbar
Taskbar on Windows by default located at the bottom of the Desktop. We can only put this Taskbar at the top or at the side of the Desktop. When we have it with man-Taskbar position, we can lock the taskbar is that the position does not move (shift).
HKEY_CURRENT_USER> Software> Microsoft> Windows> Current Version> Explorer> Advanced
• Double-click on TaskBarSizeMove enter the number 0 and the Value Data.
4. Hide System Tray
Is a system tray icon that appears in the small right down ¬ Desk top. System tray can not be hidden with the normal way. We can hide it by making modifications to the registry, is as below.
HKEY_LOCAL_MACHINE> Software> Microsoft> Windows> Current Version> Policies> Explorer
• If there is no Explorer key create a new DWORD Value and name NoTrayltemsDisplay.
• Double-click NoTrayltemsDisplay and enter the number 1 in the Value Data.
• To restore the System Tray enter a number from 0 to the Value Data

5. Desktop Create More Stable
Steps to optimize the performance of desktop as follows:
HKEY_CURRENT_USER> Software> Microsoft> Windows> Current Version> Explorer
• Create a new DWORD Value and name DesktopProcess.
• Double-click DesktopProcess and enter the number 1 in the Value Data.
6. Hide the Desktop Icon
Desktop Shortcut Icon on the speed when we open a file or application. However, if you have too many icon and you make a headache, you can hide the Shortcut Icon. The screen on the desktop wallpaper will only be visible only to its (empty). All icon is hidden but not removed. HKEY_CURRENT_USER> Software> Microsoft> Windows> Current Version> Policies> Explorer
• Add DWORD NoDesktop, give value: 1.
• Log Off to get results.

7. Disabling Right Click on the Desktop
Right-click on the Desktop icon to be done and the men-gaturtampilan Desktop. We can disable right-click on the Desktop when we do not want to change the appearance of the Desktop.
HKEY_CURRENT_USER> Software> Microsoft> Windows> Current Version> Policies> Explorer
• Create a new DWORD Value and name NoViewContextMenu.
• Double-click on NoViewContextMenu and enter the number 1 in the Value Data.

8. Eliminate Tab Screen saver
Screen saver allows our favorites can be modified by other penggu-na. Screen saver so that we secure from other users, just missing a tab-screen saver it.
HKEY_LOCAL_MACHINE> Software> Microsoft> Windows> Current Version> Policies> System
• Create a new DWORD Value and name NoDispScr-SavPage.
• Double-click NoDispScrSavPage and enter the number 1 in the Value Data.

9. Disable the Windows XP & Animation
Animation is visible at the time we minimize a window. Although the moment but still using the CPU resources. If we do not need a computer and want to work more quickly, we can turn off this feature and also reduced the burden of the processor. Animation can be in-disable the following way:
HKEY_CURRENT_USER> ControlPanel> Desktop> WindowMetrics
• Double-click on MinAnimate, enter the numbers 1 to turn off, or 0 to enable it again.
10. Remove from the My Computer Desktop
My Computer icon on the Windows version can not be certain dihilan-gkan. We can only removed it with the registry change as follows:
HKEY_CURRENT_USER> Software> Microsoft> Windows> Current Version> Policies> NonEnum
HKEY_LOCAL_MACHINE> Software> Microsoft> Windows> Current Version> Policies> NonEnum
• Create a new DWORD Value (if not already there) and name (20D04FEO-3AEA-1069-A2D8-08002B30309D).
• Double-click (20D04FEO-3AEA-1069-A2D8-08002B30309D) and enter 1 in the Value Data.

11. Information on the Windows Desktop Version
Want to know the version of Windows that we use? This information can be known with the registry change as follows.
HKEY_CURRENT_USER> ControlPanel> Desktop
• Create a new DWORD Value (if not already there) and name PaintDesktopVersion.
• Double-click PaintDesktopVersion and enter 1 in the value of data

12. Pop-up shows in the Description Explorer and Desktop Items
Pop-up ads or similar, while the very pro-lnternet (browsing). To prevent pop-ups that often appear, such as how to use the following.
HKEY_CURRENT_USER> Software> Microsoft> Windows> Current Version> Explorer> Advanced
• Create a new DWORD Value (if not already there) and name ShowlnfoTip.
• Double-click ShowlnfoTip and enter 1 in the Value Data.
13. Turn off the Desktop CleanUp Wizard
Desktop Wizard CleanUp will eliminate the old desktop icon. Icon so that you can not be removed by any other people who run CleanUp Wizard, you may need to disable these CleanUp Wizard.
HKEY_CURRENT_USER> Software> Microsoft> Windows> CurrentVersion> Explorer> Desktop> CleanupWiz
• Create a new DWORD Value and name NoRun.
• Double-click NoRun and enter the number 1 in the Value Data.
14. Remove from My Desktop Document
My Documents icon on the Windows version can not be certain in-delete. If we want, we can delete the registry change as follows:
HKEY_CURRENT_USER> Software> Microsoft> Windows> CurrentVersion> Explorer> CLSID> (450D8FBA-AD25-llDO-98A8-0800361-B1103)> ShellFolder
• Change the value in a key Attributes Oxf0500174.
• Press F5 to see the results.
15. Restrict Access Control Desktop Theme
Theme reflect the characters in the Windows user-puter cereal bowl. The scope of the theme that includes wallpaper, screen saver, sound, and so forth. If you do not like your favorite Windows Theme often changed people, amankan only. Perubah-stop access to a theme in the following ways:
HKEY_CURRENT_USER> Software> Microsoft> Windows> Current Version> Policies> System
• Create a DWORD Value, or some new name with the following:
o NoVisualStyleChoice - Disable the "Windows and buttons" style control
o NoColorChoice - Disable the "Color scheme" control NoSizeChoice - Disable the "Font size" control
• To activate the limits, enter the number 1 on each Value Data.

• To activate the default style, create a String Value and name SetVisualStyle.
• Double-click SetVisualStyle and enter the file path location. Ms-styles as desired.
16. On an Desktop Security
Even the view Desktop also can not be safe from the threat of spy-ware and viruses. To secure the Desktop from spyware and viruses that make possible conversion, do the following.
HKEY_LOCAL_MACHINE> SOFTWARE> Microsoft> Windows NT> CurrentVersion> Windows
• Create a new DWORD Value and name-SecureDesk top.
• Double-click SecureDesktop and enter the number 1 in the Value Data.
17. Changing the Active Desktop Background In Safe Mode
To distinguish between normal mode and safe mode, would better if we set the wallpaper that appears on the safe mode. Wallpapernya can also create your own, eg its "warning, you have a computer failure."
HKEY_CURRENT_USER> Software> Microsoft> lnternet Explorer> Desktop> SafeMode> General
• Double-click Wallpaper and enter the path and the desired location of the wallpaper in the Value Data.
Configuration tab hide Theme
One solution that does not change Windows Theme is de-ngan hide Theme configuration tab. Next tricks to hide the theme configuration tab in the Properties Dekstop.
HKEY_CURRENT_USER> Software> Microsoft> Windows> Current Version> Policies> Explorer
HKEY_LOCAL_MACHINE> Software> Microsoft> Windows> Current Version> Policies> Explorer
• Create a new DWORD Value (if not already there), and name NoThemesTab.
• Double-click NoThemesTab and enter the number 1 in the Value Data.

rangertox

Thursday, 26 February 2009

Game Developers Conference Reveals Keynote Speakers
San Francisco, Calif. – The Game Developers Conference revealed that Hideo Kojima and Satoru Iwata will both be providing keynote addresses at the upcoming event, as well as announced the the finalists for the Game Developers Choice Awards. New sessions on the ups and downs of working with physics for Little Big Planet, as well as lessons learned from the decline of Flagship Studios.




(2/17/2009)












In newly announced sessions, developers of Mirror’s Edge will reveal the secrets of creating an authentic first-person perspective, Media Molecule will discuss the challenges of developing a game centered around creative gaming, and speakers from Disney Interactive, Activision, and others will talk about how to deal with the business of gaming in an increasingly volatile economic and technological environment.

Meggan Scavio, event director for the GDC, has confirmed sessions covering Dead Space, Little Big Planet, and the decline of the late Flagship Studios.

Metal Gear creator Hideo Kojima and president and CEO of Nintendo Satoru Iwata will extol their unconventional insights into game development in their keynote addresses, while the prestigious Game Developers Choice Awards honor the very best games released over the past year with the lists of nominees for this year’s ceremony.

The GDC Team and the advisory board is on a constant hunt for new and interesting content and sessions from the most experienced developers in the world. From managing a video game company in a volatile and changing economic and technological environment, to giving player a true first-person experience, to the ups and downs and developing one of the year’s biggest (little) games, each session will impart a unique lesson to participants.

For a full list of finalists for the Game Developers Choice Awards, check out http://www.gamechoiceawards.com/winners/index.htm#nom. Did your favorite game make the list?

For more information about the Iwata and Kojima Keynotes, check out
http://www.gdconf.com/conference/keynotes




Wednesday, 18 February 2009

Image Metrics Introduces Four Facial Animation Service Levels for Video Game, Film
Los Angeles - Image Metrics, a provider of facial animation services for the entertainment industry, has introduced four new facial animation service levels for film and game customers.

The four new service levels range from facial animation for background video game characters to photorealistic digital doubles for live-action movies. All offerings use Image Metrics’ proprietary facial animation technology to analyze an actor’s facial performance and transfer it with all of its subtleties and nuances to a 3D facial rig.

The service levels include:

Value: At roughly half the cost of standard facial animation, this service level uses Image Metrics’ proprietary technology to automatically generate high volumes of high-quality facial animation for secondary characters in games or for pre-visualization purposes.

Pro: Ideal for important in-game scenes and cutscenes, this service level offers more subtle facial movements on advanced games rigs as well as iterative cycles to help clients capture better performances.

Premium: This level provides greater creative control with pore-level analysis of facial movement and more fine-tuning of the performance. Including optional support for multi-camera performance capture, it is ideal for more budget-conscious film studios or VFX houses that need high quality CG faces for films, visual effects shots or television spots.

Elite: Image Metrics’ highest level of service takes advantage of the very best its technology-based service has to offer. From HD (and up) support to optional multi-camera performance capture, superior analysis detail to multiple creative iterations, this level gives quality-focused directors the freedom to create completely believable digital faces for their most important scenes.

For easy integration into customer pipelines, all service levels include a final output of animation curves that work with the leading 3D software applications. Ongoing customer service is also included in all service levels.
at www.cgw.com