January 28, 2008
Baru bagi aku..
Sudoku!
Pada aku benda ni baru.. sebab aku baru je main benda ni. Masa mula2 aku nampak benda ni kat surat khabar, aku rasa malas juga nak menceburi bidang sudoku ni.. malas nak fikir... Kalau dulu aku rajin mengisi ruangan dalam silangkata.
Entah macam mana, satu hari aku tak ada benda nak buat, belek-belek surat khabar ada pulak sudoku. Aku pun cuba la selesaikan. Apa la agaknya orang lain yang minat dengan benda ni punya la ralit sampai tak perasan apa benda jadi kat sekeliling.
Rupa-rupanya memang best kalau dapat setelkan. Kena ada strategi jugak nak siapkan. Macam main chess... kalau silangkata tak mencabar sangat... sebab kalau tak tau jawapan, memang sampai bila-bila pun tak dapat daaa....
RM oh RM...
Mulanya niat aku nak cerita pasal claim aku yang termiss... bulehke diorg buleh tercicir.. dahla bulan ni banyak sangkut... tapi aku tak jadi la citer.. cuma ada sikit terkilan je.. tapi buleh survive lagi.. insyaAllah..
Aku citer lain la pasal RM jugak la...
Aku heran kadang-kadang kalau dengar radio atau tengok tv.. ada pengacara atau pengiklan yang menyebut RM sebagai 'ar em'. Contohnya hadiah sebanyak RM3000.00 disebut sebagai 'ar em tiga ribu ringgit Malaysia'. Apobondo tu.. tak reti ke.. RM ni adalah simbol matawang bagi negara Malaysia... sebutan tetap sama, 'tiga ribu ringgit'. Bukannya 'ar em tiga ribu'. Yang berubah dari simbol $ dulu jadi RM adalah simbol, bukan sebutan. Pekara remeh macam ni tak sepatutnya berlaku, apatah lagi disiarkan ke seluruh negara, malah sedunia (melalui internet).
Kebetulan simbol matawang yang ada pada kekunci komputer cuma "$", yang lain tak ada.. salah satu sebab utama ialah simbol $ juga digunakan dalam pengaturcaraan komputer. Kalau simbol $ tak ada, pening programmer nak cari simbol lain.
Takkan la kalau pegi pasar tanya kat penjual ikan tu macam ni, "Pakcik! Berapa ar em harga ikan ni sekilo?" . Maka dijawap oleh penjual tu, "ar em lapan ringgit sekilo dik!". ada ke.. ada ke..??
Aku citer lain la pasal RM jugak la...
Aku heran kadang-kadang kalau dengar radio atau tengok tv.. ada pengacara atau pengiklan yang menyebut RM sebagai 'ar em'. Contohnya hadiah sebanyak RM3000.00 disebut sebagai 'ar em tiga ribu ringgit Malaysia'. Apobondo tu.. tak reti ke.. RM ni adalah simbol matawang bagi negara Malaysia... sebutan tetap sama, 'tiga ribu ringgit'. Bukannya 'ar em tiga ribu'. Yang berubah dari simbol $ dulu jadi RM adalah simbol, bukan sebutan. Pekara remeh macam ni tak sepatutnya berlaku, apatah lagi disiarkan ke seluruh negara, malah sedunia (melalui internet).
Kebetulan simbol matawang yang ada pada kekunci komputer cuma "$", yang lain tak ada.. salah satu sebab utama ialah simbol $ juga digunakan dalam pengaturcaraan komputer. Kalau simbol $ tak ada, pening programmer nak cari simbol lain.
Takkan la kalau pegi pasar tanya kat penjual ikan tu macam ni, "Pakcik! Berapa ar em harga ikan ni sekilo?" . Maka dijawap oleh penjual tu, "ar em lapan ringgit sekilo dik!". ada ke.. ada ke..??
Cerita pasal:
Merapu kepunden paran sekeper
January 25, 2008
Jalan-jalan cari pasal...
Baru-baru ini aku menemani isteri aku yang ada kerja di luar kawasan, bertempat di Colmar Tropicale, Bukit Tinggi. Memandangkan time tu hari kerja, aku pi kerja dari sana... buleh tahan jauh la jugak.. ada la dalam 45 minit nak sampai opis kat Cyberjaya. Oleh sebab isteri aku kat sana bekerja, bukan makan angin.. aku je la yang makan angin sorang-sorang kat kawasan tu... tapi tak ada apa sangat nak tengok pon sebab ini dah kali ke-4 kot aku stay kat situ..
Yang aku tak paham, kenapa ada show yang nampak ala-ala 'tiger show' kat sini.. malu la kat budak2.. bukan orang tua je yang ada.. .kan ramai yang bawak famili gi sana.. tak senonoh betul.. alang2 nak bukak2 tu.. kasi bukak semua laa... tadak la aku nak bubuh gambar... hehehe..
Yang aku tak paham, kenapa ada show yang nampak ala-ala 'tiger show' kat sini.. malu la kat budak2.. bukan orang tua je yang ada.. .kan ramai yang bawak famili gi sana.. tak senonoh betul.. alang2 nak bukak2 tu.. kasi bukak semua laa... tadak la aku nak bubuh gambar... hehehe..
Tak mintak tolong sapa-sapa ambik gambar. Set self-timer. Nampak background macam kat Perancis kan...
Gambar ni pon aku ambik waktu malam. Tak sangka juga hasilnya macam ni... tak ada la bagus sangat, tapi ok le untuk beginner macam aku.
Gambar yang belah bawah ni time aku bermain-main dengan makro. Boleh la tahan untuk kamera yang bajet mikro. Dah lama tak buat kerja ni.. tak usah la bandingkan dengan hasil dari tangan-tangan pro tu..
Belalang kunyit. Ada orang makan benatang ni. Bakar ke, goreng ke.. aku tak lalu daa...
January 22, 2008
Lebuhraya Baru KL-Putrajaya
Hari ini, buat pertama kalinya aku lalu lebuhraya kl-putrajaya dengan membayar tol. Biasanya aku tak bayar tol sebab miseh percuma. Ataupun aku lalu laluan tak bertol iaitu antara kucai lama dan bukit jalil. Dari bukit jalil ke putrajaya, tol RM2.50. Ok la tu.. kalau ikut KLS highway, masuk kat Sg Besi dan exit kat SDG pun dah RM1.60.. tambah 90 sen jadi RM2.50.. berbaloi ke kalau nak dibandingkan dengan jarak dan masa yang dijimatkan... ntahhh.. tak kuasa aku nak buat kalkulasi...
Kalau masuk dari bulatan pandan.. ntah berapa sen agaknya... tak mampu la aku lalu situ.. keluar je kat jalan kucai lama tu.. ok pe..
sebenarnya setiap hari pun aku guna lebuhraya tu nak elakkan sesak antara sri petaling ke npe... jimat masa dan minyak kat situ.. mujurle situ tak kena toll... huhuhu
Kalau masuk dari bulatan pandan.. ntah berapa sen agaknya... tak mampu la aku lalu situ.. keluar je kat jalan kucai lama tu.. ok pe..
sebenarnya setiap hari pun aku guna lebuhraya tu nak elakkan sesak antara sri petaling ke npe... jimat masa dan minyak kat situ.. mujurle situ tak kena toll... huhuhu
January 17, 2008
Saya ayah baru belajar...
sekarang aku kena belajar balik unix dng oracle... hua hua hua.. last sekali aku pegang mesin unix untuk dikerjakan tahun 1999 dulu... dah dekat 10 tahun... Oracle?? aku belajar teori je masa kat sekolah dulu...
teori tanpa praktikal memang la tak bagus... maknanya sekarang aku tengah praktikal la ni... dah tua-tua gini.. rasa macam tepu kepala hotak aku ni.. tapi.. semakin aku tau sikit-sikit.. makin menarik pulak rasanya... mujur ada abang muin menunjuk arah... tabik brader...
asalnya aku malas juga nak terjebak dalam bidang ni... tapi nampaknya terpaksa jugak... dan kena minat le.. kalau tak minat tak jadi hapa la.... so.. .kena configure dalam kepala hotak set mode=ok; set environment=best; set terminal=terminalbas.... hua hua hua...
sekarang ni archive log tengah mencanak-canak jadinya... boleh ke satu hari sampai lebih 10GB... mana nak bubuh.. allocation 100GB je.. seminggu je dah penuh... kadang-kadang buleh la pulak tak la banyak mana pun... takat 2GB je... musykil sungguh.... ni la sebabnya aku jadi kena belajar bendalah ni... kalau harapkan dba sorang je... payah la.. banyak site nak kena jaga
nanti ada masa, ada peluang.. kena belajar sungguh-sungguh benda ni.... boss... takdak training kaa...??
teori tanpa praktikal memang la tak bagus... maknanya sekarang aku tengah praktikal la ni... dah tua-tua gini.. rasa macam tepu kepala hotak aku ni.. tapi.. semakin aku tau sikit-sikit.. makin menarik pulak rasanya... mujur ada abang muin menunjuk arah... tabik brader...
asalnya aku malas juga nak terjebak dalam bidang ni... tapi nampaknya terpaksa jugak... dan kena minat le.. kalau tak minat tak jadi hapa la.... so.. .kena configure dalam kepala hotak set mode=ok; set environment=best; set terminal=terminalbas.... hua hua hua...
sekarang ni archive log tengah mencanak-canak jadinya... boleh ke satu hari sampai lebih 10GB... mana nak bubuh.. allocation 100GB je.. seminggu je dah penuh... kadang-kadang buleh la pulak tak la banyak mana pun... takat 2GB je... musykil sungguh.... ni la sebabnya aku jadi kena belajar bendalah ni... kalau harapkan dba sorang je... payah la.. banyak site nak kena jaga
nanti ada masa, ada peluang.. kena belajar sungguh-sungguh benda ni.... boss... takdak training kaa...??
January 14, 2008
Change service configuration using CLI
How to modify service configuration using Command Line Interface?
Microsoft provide sc.exe to help us.
As example, I want to change messenger service status from disable to automatic started. Currently, messenger service is disabled by microsoft because of security reason.
1. The following command to enable Messenger
> sc config Messenger type= interact type= own start= auto binPath= "C:\WINDOWS\system32\svchost.exe -k netsvcs"
2. This is to start the service.
> sc start Messenger
To see other options, just enter command sc /?
Microsoft provide sc.exe to help us.
As example, I want to change messenger service status from disable to automatic started. Currently, messenger service is disabled by microsoft because of security reason.
1. The following command to enable Messenger
> sc config Messenger type= interact type= own start= auto binPath= "C:\WINDOWS\system32\svchost.exe -k netsvcs"
2. This is to start the service.
> sc start Messenger
To see other options, just enter command sc /?
January 11, 2008
Playing with Domain Name Service (DNS)
1. Use DNS forwarders
A DNS forwarder is a DNS server that performs DNS queries on behalf of another DNS server. The primary reasons to use a DNS forwarder are to offload processing duties from the DNS server forwarding the query to the forwarder and to benefit from the potentially larger DNS cache on the DNS forwarder.
Another benefit of using a DNS forwarder is that it prevents the DNS server forwarding the requests from interacting with Internet DNS servers. This is especially important when your DNS server is hosting your internal domain DNS resource records. Instead of allowing your internal DNS servers to perform recursion and contacting DNS servers itself, configure the internal DNS server to use a forwarder for all domains for which it is not authoritative.
2. Use caching-only DNS servers
A caching-only DNS server is one that is not authoritative for any DNS domains. It's configured to perform recursion or use a forwarder. When the caching-only DNS server receives a response, it caches the result and returns the answer to the system issuing the DNS query to the caching-only DNS server. Over time, the caching-only DNS server can amass a large cache of DNS responses, which can significantly improve DNS response times for DNS clients of that caching-only DNS server.
Caching-only DNS servers can improve security for your organization when used as forwarders that are under your administrative control. Internal DNS servers can be configured to use the caching-only DNS server as their forwarders and the caching-only DNS server performs recursion on behalf of your internal DNS servers. Using your own caching-only DNS servers as forwarders improves security because you don't have to depend on your ISP's DNS servers as forwarders when you're unsure of the security configuration of your ISP's DNS servers.
3. Use DNS advertisers
A DNS advertiser is a DNS server that resolves queries for domains for which the DNS advertiser is authoritative. For example, if you host publicly available resources for domain.com and corp.com, your public DNS server would be configured with DNS zone files for the domain.com and corp.com domains.
What sets the DNS advertiser apart from any other DNS server hosting DNS zone files is that the DNS advertiser answers queries only for domains for which it is authoritative. The DNS server will not perform recursion for queries to other DNS servers. This prevents users from using your public DNS server to resolve names in other domains. This increases security by lessening the risks associated with running a public DNS resolver, which include cache poisoning.
4. Use DNS resolvers
A DNS resolver is a DNS server that can perform recursion to resolve names for domains for which that DNS server is not authoritative. For example, you might have a DNS server on your internal network that's authoritative for your internal network domain, internalcorp.com. When a client on your network uses that DNS server to resolve the name techrepublic.com, that DNS server performs recursion by querying other DNS servers to get the answer.
The difference between this DNS server and a DNS resolver is that a DNS resolver is a DNS server that is dedicated to resolving Internet host names. A resolver could be a caching-only DNS server that isn't authoritative for any DNS domains. You can make the DNS resolver available to only your internal users, you can make it available only to your external users to provide a secure alternative to using a DNS server outside of your administrative control, or you can allow both internal and external users access to the DNS resolver.
5. Protect DNS from cache pollution
DNS cache pollution is an increasingly common problem. Most DNS servers are able to cache the results of DNS queries before forwarding the response to the host issuing the query. The DNS cache can significantly improve DNS query performance throughout your organization. The problem is that if the DNS server cache is "polluted" with bogus DNS entries, users can subsequently be forwarded to malicious Web sites instead of the sites they intended to visit.
Most DNS servers can be configured to prevent cache pollution. The Windows Server 2003 DNS server is configured to prevent cache pollution by default. If you're using a Windows 2000 DNS server, you can configure it to prevent cache pollution by opening the Properties dialog box for the DNS server and clicking the Advanced tab. Select the Prevent Cache Pollution check box and restart the DNS server.
6. Enable DDNS for secure connections only
Many DNS servers accept dynamic updates. The dynamic update feature enables these DNS servers to register DNS host names and IP addresses for hosts that use DHCP for host IP addressing. DDNS can be a great boon in reducing the administrative overhead for DNS administrators who otherwise would need to manually configure DNS resource records for these hosts.
However, there can be a major security issue with DDNS updates if they are allowed unchecked. A malicious user can configure a host to dynamically update DNS host records of a file server, Web server, or database server and have connections that should be destined to those servers diverted to his machine instead of the intended target.
You can reduce the risk of malicious DNS updates by requiring secure connections to the DNS server in order to perform the dynamic update. This is easily achieved by configuring your DNS server to use Active Directory integrated zones and requiring secure dynamic updates. All domain members will be able to dynamically update their DNS information in a secure context after you make this change.
7. Disable zone transfers
Zone transfers take place between primary and secondary DNS servers. Primary DNS servers that are authoritative for specific domains contain writable DNS zone files that are updated as needed. Secondary DNS servers received a read-only copy of these zone files from primary DNS servers. Secondary DNS servers are used to improved DNS query performance throughout an organization or over the Internet.
However, zone transfers are not limited to only secondary DNS servers. Anyone can issue a DNS query that will cause a DNS server configured to allow zone transfers to dump the entirety of its zone database files. Malicious users can use this information to reconnoiter the naming schema in your organization and attack key infrastructure services. You can prevent this by configuring your DNS servers to deny zone transfer requests or by configuring the DNS servers to allow zone transfers only to specific servers in the organization.
8. Use firewalls to control DNS access
Firewalls can be used to gain access control over who can connect to your DNS servers. For DNS servers that are used only for internal client queries, configure firewalls to block connections from external hosts to those DNS servers. For DNS servers used as caching-only forwarders, configure firewalls to allow DNS queries only from those DNS servers that use the caching-only forwarders. An especially important firewall policy setting is to block internal users from using the DNS protocol to connect to external DNS servers.
9. Set access controls on DNS registry entries
On Windows-based DNS servers, you should configure access controls on the DNS server-related Registry settings so that only the accounts that require access to them are allowed to read or change those Registry settings.
The HKLM\CurrentControlSet\Services\DNS key should be configured to allow only the Administrator and System account access, and these accounts should have Full Control permissions.
10. Set access control on DNS file system entries
On Windows-based DNS servers, you should configure access controls on the DNS server-related file system entries so that only the accounts that require access to them are allowed to read or change those files.
The %system_directory%\DNS folder and subfolders should be configured to allow only the system account to access the files, and the system account should be given Full Control permissions.
A DNS forwarder is a DNS server that performs DNS queries on behalf of another DNS server. The primary reasons to use a DNS forwarder are to offload processing duties from the DNS server forwarding the query to the forwarder and to benefit from the potentially larger DNS cache on the DNS forwarder.
Another benefit of using a DNS forwarder is that it prevents the DNS server forwarding the requests from interacting with Internet DNS servers. This is especially important when your DNS server is hosting your internal domain DNS resource records. Instead of allowing your internal DNS servers to perform recursion and contacting DNS servers itself, configure the internal DNS server to use a forwarder for all domains for which it is not authoritative.
2. Use caching-only DNS servers
A caching-only DNS server is one that is not authoritative for any DNS domains. It's configured to perform recursion or use a forwarder. When the caching-only DNS server receives a response, it caches the result and returns the answer to the system issuing the DNS query to the caching-only DNS server. Over time, the caching-only DNS server can amass a large cache of DNS responses, which can significantly improve DNS response times for DNS clients of that caching-only DNS server.
Caching-only DNS servers can improve security for your organization when used as forwarders that are under your administrative control. Internal DNS servers can be configured to use the caching-only DNS server as their forwarders and the caching-only DNS server performs recursion on behalf of your internal DNS servers. Using your own caching-only DNS servers as forwarders improves security because you don't have to depend on your ISP's DNS servers as forwarders when you're unsure of the security configuration of your ISP's DNS servers.
3. Use DNS advertisers
A DNS advertiser is a DNS server that resolves queries for domains for which the DNS advertiser is authoritative. For example, if you host publicly available resources for domain.com and corp.com, your public DNS server would be configured with DNS zone files for the domain.com and corp.com domains.
What sets the DNS advertiser apart from any other DNS server hosting DNS zone files is that the DNS advertiser answers queries only for domains for which it is authoritative. The DNS server will not perform recursion for queries to other DNS servers. This prevents users from using your public DNS server to resolve names in other domains. This increases security by lessening the risks associated with running a public DNS resolver, which include cache poisoning.
4. Use DNS resolvers
A DNS resolver is a DNS server that can perform recursion to resolve names for domains for which that DNS server is not authoritative. For example, you might have a DNS server on your internal network that's authoritative for your internal network domain, internalcorp.com. When a client on your network uses that DNS server to resolve the name techrepublic.com, that DNS server performs recursion by querying other DNS servers to get the answer.
The difference between this DNS server and a DNS resolver is that a DNS resolver is a DNS server that is dedicated to resolving Internet host names. A resolver could be a caching-only DNS server that isn't authoritative for any DNS domains. You can make the DNS resolver available to only your internal users, you can make it available only to your external users to provide a secure alternative to using a DNS server outside of your administrative control, or you can allow both internal and external users access to the DNS resolver.
5. Protect DNS from cache pollution
DNS cache pollution is an increasingly common problem. Most DNS servers are able to cache the results of DNS queries before forwarding the response to the host issuing the query. The DNS cache can significantly improve DNS query performance throughout your organization. The problem is that if the DNS server cache is "polluted" with bogus DNS entries, users can subsequently be forwarded to malicious Web sites instead of the sites they intended to visit.
Most DNS servers can be configured to prevent cache pollution. The Windows Server 2003 DNS server is configured to prevent cache pollution by default. If you're using a Windows 2000 DNS server, you can configure it to prevent cache pollution by opening the Properties dialog box for the DNS server and clicking the Advanced tab. Select the Prevent Cache Pollution check box and restart the DNS server.
6. Enable DDNS for secure connections only
Many DNS servers accept dynamic updates. The dynamic update feature enables these DNS servers to register DNS host names and IP addresses for hosts that use DHCP for host IP addressing. DDNS can be a great boon in reducing the administrative overhead for DNS administrators who otherwise would need to manually configure DNS resource records for these hosts.
However, there can be a major security issue with DDNS updates if they are allowed unchecked. A malicious user can configure a host to dynamically update DNS host records of a file server, Web server, or database server and have connections that should be destined to those servers diverted to his machine instead of the intended target.
You can reduce the risk of malicious DNS updates by requiring secure connections to the DNS server in order to perform the dynamic update. This is easily achieved by configuring your DNS server to use Active Directory integrated zones and requiring secure dynamic updates. All domain members will be able to dynamically update their DNS information in a secure context after you make this change.
7. Disable zone transfers
Zone transfers take place between primary and secondary DNS servers. Primary DNS servers that are authoritative for specific domains contain writable DNS zone files that are updated as needed. Secondary DNS servers received a read-only copy of these zone files from primary DNS servers. Secondary DNS servers are used to improved DNS query performance throughout an organization or over the Internet.
However, zone transfers are not limited to only secondary DNS servers. Anyone can issue a DNS query that will cause a DNS server configured to allow zone transfers to dump the entirety of its zone database files. Malicious users can use this information to reconnoiter the naming schema in your organization and attack key infrastructure services. You can prevent this by configuring your DNS servers to deny zone transfer requests or by configuring the DNS servers to allow zone transfers only to specific servers in the organization.
8. Use firewalls to control DNS access
Firewalls can be used to gain access control over who can connect to your DNS servers. For DNS servers that are used only for internal client queries, configure firewalls to block connections from external hosts to those DNS servers. For DNS servers used as caching-only forwarders, configure firewalls to allow DNS queries only from those DNS servers that use the caching-only forwarders. An especially important firewall policy setting is to block internal users from using the DNS protocol to connect to external DNS servers.
9. Set access controls on DNS registry entries
On Windows-based DNS servers, you should configure access controls on the DNS server-related Registry settings so that only the accounts that require access to them are allowed to read or change those Registry settings.
The HKLM\CurrentControlSet\Services\DNS key should be configured to allow only the Administrator and System account access, and these accounts should have Full Control permissions.
10. Set access control on DNS file system entries
On Windows-based DNS servers, you should configure access controls on the DNS server-related file system entries so that only the accounts that require access to them are allowed to read or change those files.
The %system_directory%\DNS folder and subfolders should be configured to allow only the system account to access the files, and the system account should be given Full Control permissions.
January 07, 2008
Family trip to Sungai Klah
Setelah sekian lama merancang, akhirnya pada bebetul hujung tahun 2007, berkesempatan juga kami sekeluarga ke kawasan air panas Sungai Klah untuk bercuti... time tu memang hari cuti.. Ahad daaa...
Aku rasa berbaloi jugak kat tempat ni walaupun bayarannya agak mahal... RM1000++ untuk 13 dewasa dan 3 kanak2... bayaran termasuk sarapan dan pas masuk ke kawasan2 tertentu... lain kali klu gi sini.. tak payah ambik additional charge untuk additional person.. bayar sewa villa je...
Villa yang disediakan agak besar dengan satu bilik yang boleh memuatkan 4 bijik katil size queen dan satu bilik buleh la muat 2 katil kot. Dapur siap dengan gas juga disediakan. Setiap villa mempunyai kolam jakuzi air panas sendiri... maknanya kami sekeluarga boleh berendam dalam kolam air panas sampai masak telo... takdak sapa kacau... so.. kalau nak jimat, bawak makanan sendiri.. masak kat sana.. sarapan kat kafe dia rasa tak sesedap mana pun.. best lagi kat seri malaysia jb.. ahahahaha...
Nak masuk kat kawasan mandi air gunung, kena bayar... tampi nak masuk kat tempat air panas takdak bayaran lain dah....
Budak2 kalau dah nampak air..... macam biasa laa....
Aku rasa berbaloi jugak kat tempat ni walaupun bayarannya agak mahal... RM1000++ untuk 13 dewasa dan 3 kanak2... bayaran termasuk sarapan dan pas masuk ke kawasan2 tertentu... lain kali klu gi sini.. tak payah ambik additional charge untuk additional person.. bayar sewa villa je...
Villa yang disediakan agak besar dengan satu bilik yang boleh memuatkan 4 bijik katil size queen dan satu bilik buleh la muat 2 katil kot. Dapur siap dengan gas juga disediakan. Setiap villa mempunyai kolam jakuzi air panas sendiri... maknanya kami sekeluarga boleh berendam dalam kolam air panas sampai masak telo... takdak sapa kacau... so.. kalau nak jimat, bawak makanan sendiri.. masak kat sana.. sarapan kat kafe dia rasa tak sesedap mana pun.. best lagi kat seri malaysia jb.. ahahahaha...
Nak masuk kat kawasan mandi air gunung, kena bayar... tampi nak masuk kat tempat air panas takdak bayaran lain dah....
Budak2 kalau dah nampak air..... macam biasa laa....
Ini kaki aku dengan wife aku rendam dalam air panas 40C - 44C. Mula2 masukkan kaki, perit2 rasanya.. lama2 ok je..
Back to School
Tahun 2008 membuka tirai. Sekarang giliran anak no. 2 aku pulak masuk darjah satu... Seperti biasa, kami ibu-bapa ni yang sibuk menyiapkan segala keperluan. Dari buku2, alat tulis, pengangkutan, pakaian dan sebaainya...
Hari pertama, bayaran yuran dah dimansuhkan, buku2 teks diberi percuma... tapi perbelanjaan lebih tinggi... di mana silapnya...?? Kalau dikira perbelanjaan keseluruhan untuk dua orang anak aku dan seorang adik aku yang masuk ke tingkatan 6, hampir RM1000.00 diperuntukan untuk semua2 tu... aku dapat bayangkan bagaimana susah para ibu-bapa yang mempunyai anak hingga 5 orang atau lebih untuk disekolahkan.
Boleh ke kata Datuk Hisyam, "Berapa ringgit sangat la yang diorang nak ambik balik tu...". Kalau satu orang RM25.00, lima orang dah berapa...??
Pedulik la diorg... yang penting aku dah jalankan amanah yang sepatutnya... dah ajar anak2 aku nak naik bas kat mana, nak tunggu kat mana.. dan sebagainya... Tapi, hari kedua sekolah agama... Nina buleh tertinggal bas la pulak... pasal masa tu hujan lebat giler turun time abih sekolah... mujur le aku masih cuti time tu... aku ambik la Nina balik sekolah agama.... hehehe..
Subscribe to:
Posts (Atom)
Labels
- Catatan perjalanan (55)
- haji 1432 (1)
- Lakaran (34)
- Layan Jiwang (3)
- Merapu kepunden paran sekeper (46)
- Non-Technical (38)
- Panduan Hidup (1)
- Technical (28)
- Tips (4)