วันอาทิตย์ที่ 30 กันยายน พ.ศ. 2555

Discovered the computer of the ancient Greeks 2,000 BC.


 


Discovered the computer of the ancient Greeks 2,000 BC.



the First Computer Built By the Greeks.A strange box found over a century ago in the sea off the shore of Greece has been the subject of postulation and debate for decades. Now researchers say they think they know what it is.
By Carol Johnson In 1901, divers off the coast of Greece recovered a gear-filled box from a 2,000 year old shipwreck on the floor of the Mediterranean sea. The mysterious device, about the size of a shoebox, came to be known as the Antikythera Mechanism.
Theories about the origins and purpose of the mechanism have ranged from the scientific to the surreal. "Some people thought it came from outer space," said Yanis Bitsakis, a physicist at Athens University. "And since the mechanism has Greek writing on it, the other ridiculous story is that Greeks themselves came from outer space and brought the mechanism with them."
More logical suppositions included the theory that the box was a clock or a device used for navigation. But most interpretations of the purpose of the box have relied on either very flimsy evidence or pure imagination.


Greek solar computer.Now an international team of researchers claim that they finally have discovered what the box was built for. Last year, scientists built an eight-ton "microfocus" X-ray machine around the box and used it to take three-dimensional scans of the mechanism. The scans revealed ancient inscriptions and complicated gear trains inside the box, which no researcher had ever seen before in the century since the Antikythera Mechanism was found. 
Bitsakis has been spending up to 15 hours a day deciphering the inscribed text inside the mystery object. "It's an all-in-one astronomical device," says Bitsakis. "In a single machine, the designer tried to put all the knowledge he had about astronomical phenomena." 
Researchers say the 30 or so bronze gears and 2,000 inscribed Greek characters in the mechanism helped ancient Greek scientists track the cycles of the solar system and calculate the motions of the sun, the moon, and the planets. According to Cardiff University astrophysicist Michael Edmunds, the box technically qualifies as a computer. "To build one of these is not trivial," he says. "It shows how technically advanced the Greeks were."
The ancient Greeks were the first recorded group in human history to understand that the world was round and orbited the sun, a view the Christian church only acknowledged a thousand years later. Two hundred years before the birth of Christ, the Greek astronomer Eratosthenes accurately predicted the circumference of the earth to within 80 kilometers of its presently accepted value.
Article From : Edutopai , disqus.com



Evolution of Computers


 

Evolution of computers.


Evolution Of Computers(Iron Man)Do you know how computers evolved from being small calculators to becoming the intelligent machines that they are? Read on for information on the evolution of computers.
Information on evolution of computers and the timeline of computer development. In 1937 Alan Turing's Turing machine pioneered the idea of machines that could complete well-defined tasks by being supplied with programs. In 1938, Konrad Zuse built the first binary digital relay computer. In 1943 the first general-purpose digital computer, ENIAC was made. In 1948 the Manchester Baby became the first stored program computer. In 1955 MIT built the first real-time processing machine. In 1956, IBM created the disk memory system. The next year brought the integrated circuit chip. In 1959 IBM introduced the first desktop machines, which led in 1965 to Digital Equipment Corporation's introduction of the first real microcomputer. The links included herein relate to computer history, timeline of computer technology and the human experience.

Abacus was invented in 2400 BC.
The term Computer, originally meant a person capable of performing numerical calculations with the help of a mechanical computing device. The foundation stone of the development of computers was laid way back in the era before Christ. Binary arithmetic is at the core of computer systems. History of computers dates back to the invention of a mechanical adding machine in 1642. ABACUS, an early computing tool, the invention of logarithm by John Napier and the invention of slide rules by William Oughtred were significant events in the evolution of computers from these early computing devices. Here's introducing you to the ancestors of modern computers.

Samuel Morsetriangle Abacus was invented in 2400 Before Christ
triangle[1] Pingala introduced the binary number system, which would later form the core of computing systems.
triangle[2] Later in 60 AD, Heron of Alexandria invented machines that could follow instructions. Who knew back then that this idea would evolve into intelligent machines!
triangle[3] The 1600s witnessed the invention of slide rules, the system of movable rods based on logarithms used to perform basic mathematical calculations, and a mechanical adding machine, which in some way, laid the foundation of modern-day calculating machines or computers.
1800s saw some remarkable feats in the history of computers. They included:
triangle[4] A punching card system was devised by Joseph Marie Jacquard in 1801.
triangle[5] Charles Babbage designed the first mechanical computer in 1822 and the Analytical Engine in 1834.
triangle[6] Morse code was invented in 1835 by Samuel Morse.(Pic 2.)
triangle[7] George Boole invented the Boolean algebra in 1848, which would later be at the heart of programming.

 

first generation computers

If you look at how computers evolved, you will notice that first generation computers made use of vacuum tubes. These computers were expensive and bulky. They used machine language for computing and could solve just one problem at a time. They did not support multitasking.
P.3-4 Mark1 & Eniactriangle[8] IBM, today a big name in the list of computer technology industries, was founded in 1911.
triangle[9] It was in 1937 that Alan Turing came up with the concept of a theoretical Turing machine. In the same year, John V. Atanasoff devised the first digital electronic computer. Atanasoff and Clifford Berry came up with the ABC prototype in the November of 1939. Its computations were based on a vacuum tube and it used regenerative capacitor memory.
triangle[10] Konrad Zuse's electromechanical 'Z Machines', especially the Z3 of 1941 was a notable achievement in the evolution of computers. It was the first machine to include binary and floating-point arithmetic and a considerable amount of programmability. Since it was proved to be Turing complete in 1998, it is regarded as world's first operational computer.
triangle[11] In 1943, the Colossus was secretly designed at Bletchley Park, Britain to decode German messages. The Harvard Mark I of 1944 was a large-scale electromechanical computer with less programmability. It was another step forward in the evolution of computers. (Pic 3.)
triangle[12] The U.S. Army's Ballistics Research Laboratory came up with the Electronic Numerical Integrator And Computer (ENIAC) in 1946. It came to be known as the first general purpose electronic computer. However, it was required to be rewired to change its programming thus making its architecture inflexible. Developers of ENIAC realized the flaws in the architecture and developed a better one. It was known as the stored program architecture or von Neumann Architecture. It got this name after John von Neumann, who for the first time described the architecture in 1945. All the projects of developing computers taken up thereafter have been using the von Neumann Architecture. All the computers use a 'stored program architecture', which is now a part of the definition of computers. (Pic 4.)

Mark IItriangle[13] Mark II was an electromechanical computer built at Harvard University under the direction of Howard Aiken and was finished in 1947. It was financed by the United States Navy . (Pic 5.)
The Mark II was built with high-speed electromagnetic relays instead of electromechanical meters used in the Mark I, which makes it much faster than its predecessor. Its addition time is 0.125 seconds (8 Hz) and the multiplication time was 0.750 seconds. This was a factor of 2.6 faster for addition and a factor of 8 for the rapid multiplication compared to I. Mark It was the second machine (after the relay calculator Bell Labs) have floating point hardware. A unique feature of the Mark II is that it has built-in hardware for several functions such as the inverse square root, logarithm, exponential, and trigonometric functions. They have between five and twelve seconds to run.
The Mark II was not a stored-program computer – it read an instruction of the program one at a time from a tape and executed it (like the Mark I). This separation of data and instructions is known as the Harvard architecture . The Mark II had a peculiar programming method that was devised to ensure that the contents of a register were available when needed. The tape containing the program could encode only eight instructions, so what a particular instruction code meant depended on when it was executed. Each second was divided up into several periods, and a coded instruction could mean different things in different periods. An addition could be started in any of eight periods in the second, a multiplication could be started in any of four periods of the second, and a transfer of data could be started in any of twelve periods of the second. Although this system worked, it made the programming complicated, and it reduced the efficiency of the machine somewhat.
The Mark II ran some realistic test programs in July 1947. It was delivered to the US Navy Proving Ground at Dahlgren, Virginia in 1947 or 1948.
triangle[14] The U.S. National Bureau of Standards came up with Standards Electronic/Eastern Automatic Computer (SEAC) in 1950. Diodes handled all the logic making it the first computer to base its logic on solid devices.
triangle[15] American mathematician and engineer, known as the 'Father of Information Theory', Claude Shannon published a paper Programming a Computer for Playing Chess, wherein he wrote about a machine that could be made to play chess!
triangle[16] IBM announced the IBM 702 Electronic Data Processing Machine in 1953. It was developed for business use and could address scientific and engineering applications.

second generation of computers.

Till the 1950s all computers that were used were vacuum tube based. In the 1960s, transistor based computers replaced vacuum tubes. Transistors made computers smaller and cheaper. They made computers energy-efficient. But transistors led to emission of large amounts of heat from the computer, which could damage them. The use of transistors marked the second generation of computers. Computers of this generation used punched cards for input. They used assembly language.
triangle[17] Stanford Research Institute brought out ERMA, Electronic Recording Machine Accounting Project, which dealt with automation of the process of bookkeeping in banking.
triangle[18] In 1959, General Electric Corporation delivered its ERMA computing system to the Bank of America in California.

Douglas Engelbartthird generation of computers

The use of Integrated circuits ushered in the third generation of computers. Their use increased the speed and efficiency of computers. Operating systems were the human interface to computing operations and keyboards and monitors became the input-output devices. COBOL, one of the earliest computer languages, was developed in 1959-60. BASIC came out in 1964. It was designed by John George Kemeny and Thomas Eugene Kurtz. Douglas Engelbart(Pic 6.) invented the first mouse prototype in 1963. Computers used a video display terminal (VDT) in the early days. The invention of Color Graphics Adapter in 1981 and that of Enhanced Graphics Adapter in 1984, both by IBM added 'color' to computer displays. All through the 1990s, computer monitors used the CRT technology. LCD replaced it in the 2000s. Computer keyboards evolved from the early typewriters. The development of computer storage devices started with the invention of Floppy disks, by IBM again.
triangle[19] In 1968, DEC launched the first mini computer called the PDP-8.
triangle[20] In 1969, the development of ARPANET began with the financial backing of the Department Of Defense.


Xerox Star(Xerox 8010 Information System)Thousands of integrated circuits placed onto a silicon chip made up a microprocessor. Introduction of microprocessors was the hallmark of fourth generation computers.
triangle[21] Intel produced large-scale integration circuits in 1971. Microprocessors came up during the 1970s. Ted Hoff, working for Intel introduced 4-bit 4004.
triangle[22] In 1972, Intel introduced the 8080 microprocessors.
triangle[23] In 1974, Xerox came up with Alto workstation at PARC. It consisted of a monitor, a graphical interface, a mouse, and an Ethernet card for networking.(Pic 6.)
triangle[24] Apple Computers brought out the Macintosh personal computer on January 24 1984.

Ice Age 1:Funny animation.gifThe fifth generation computers are in their development phase. They would be capable of massive parallel processing, support voice recognition and understand natural language. The current advancements in computer technology are likely to transform computing machines into intelligent ones that possess self organizing skills. The evolution of computers will continue, perhaps till the day their processing powers equal human intelligence.
Article by : 



วันพุธที่ 26 กันยายน พ.ศ. 2555

Malware: Malicious Software.





Malware: Malicious software.


Malware:Malicious software(Monster ink)
Malware (malicious software), is software used or created to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. 'Malware' is a general term used to refer to a variety of forms of hostile, intrusive, or annoying software.
Malware includes computer viruses, worms, trojan horses, spyware, adware, and other malicious programs. In law, malware is sometimes known as a computer contaminant, as in the legal codes of several U.S. states. Malware is not the same as defective software, which is software that has a legitimate purpose but contains harmful bugs that were not noticed before release. However, some malware is disguised as genuine software, and may come from an official company website. An example of this is software used for harmless purposes that is packed with additional tracking software that gathers marketing statistics.
Malware has caused the rise in use of protective software types such as anti virus, anti-malware, and firewalls. Each of these are commonly used by personal users and corporate networks in order to stop the unauthorized access by other computer users, as well as the automated spread of malicious scripts and software.
Your computer may comprise multiple kinds of threats affecting your data, so you must understand what types of malware exist and how these work.

Classic viruses:

Programs that infect other programs by adding code to take control after the execution of infected files. The main purpose of a virus is infecting. The speed of propagation of the virus is somewhat lower than that of the worms.

bomb:

Refers to a programming statement like " time bomb".   Malware of this type. Work under one condition. It is defined by the authors.  Example The Format Hard disk on the Run Program .... after 5 times and so on. Or the date it set.Program....ครบ5ครั้งเป็นต้น หรือกำหนดตามวันที่ก็มี


Jokes / Pranks(flushe away)Jokes / Pranks:

This group includes programs that do not cause direct damage to the computers they infect. However, show false warnings about alleged harm occurred or occur. May be messages warning users that the disks are formatted, which has found a virus or symptoms of infection have been detected. The possibilities are limited only by the sense of humor the author of the virus.

Rootkits:

A rootkit is a collection of programs used by a hacker to evade detection while seeking to gain unauthorized access to a computer. This is accomplished in two ways: replacing system files or libraries, or by installing a kernel module. The hacker installs the rootkit after, getting a similar access to the user, usually crack a password or exploiting a vulnerability, which allows you to use other credentials to gain access to root or administrator.

Network worms (flushe away)Network worms:

This type of malware uses to distribute network resources. His name means they can penetrate from one computer to another like a worm. They do so via email, instant messaging systems, file-sharing networks (P2P), IRC channels, local networks, global networks, etc. Its propagation speed is very high.
To penetrate a computer, the worm tries to obtain the addresses of other computers on the network to start sending copies. They also tend to use the data book contacts email client. Most worms spread as files but there is a small amount of worms that spread in the form of network packets and directly penetrate the victim computer's RAM, which then execute your code.

Riskware:

They are not malicious but contain a potential threat. In certain situations put your data at risk. Include remote administration programs, bookmarks, etc.

Trojans (the Rode to Eldorado)

 

 

Trojans:

This class of malware includes a variety of programs that perform actions without the user's knowledge and without their consent, collect data and send them to the criminals, destroy or alter data with criminal intent, causing damage to computer operation or use computer resources for criminal purposes, such as mass mailing of unsolicited email. They are classics because virus does not infect other programs or data. Trojans can not penetrate to the equipment itself, but spread by criminals under the wing of a software "desirable" and are capable of causing much more harm than classic viruses.


Spyware (flushe away)

Spyware:

Software that allows the collection of information about a user or organization in an unauthorized manner. Their presence can be completely invisible to the user and they can collect data on user actions, the contents of the hard drive, installed software, quality and connection speed, etc.

Adware:

Display advertising to the user. Most Adware programs are installed as free software. The advertisement appears in the interface. Sometimes they can collect and send user's personal data.

Phishing:

Is a variety of spyware that spreads via email to receive confidential user data, of a preferred bank. The phishing emails are designed to look like legal correspondence sent by banking organizations, or some well-known brands. These emails contain a link that redirects users to a fake page that will ask to some sensitive data such as the number of credit card.


 

Monsters inc:Funny animation.gifOther malicious programs:

There are a number of programs that do not directly affect computers, but are used to create viruses, Trojans or illegal activities such as operating system attacks and penetrate other computers, etc.

Spam:

Unsolicited messages from unknown senders are sent en masse for advertising, political propaganda, seeking help, and more. Another kind of spam makes proposals relating to various illegal operations. Emails are also dedicated to steal passwords or credit card numbers, chain letters, etc. Spam creates an additional burden on email servers and can cause loss of desired information.
Artile by : Herry Willson (Understanding Malware: The Malicious Software>www.allthewebsites.)

 


วันจันทร์ที่ 3 กันยายน พ.ศ. 2555

Create batch file to hide & lock folders (Use a password) ซ่อน และล็อค Folder แบบใส่พาสเวิร์ด: Lock or Hide file, folders & Drive without any software. Page1.


 

Hide file, folder & drive Contents

1. Create batch file to hide & lock folder (Use a password) 2. Create batch file to lock Folder (use a password) 3. Use attrib command hide file & foder
4. Hide file & folder behind picture 5.Lock or divert folder with CLSID 6.Lock or divert folder with CLSID (Another way.)
7. Create invisible folder 8. Using gpedit.msc to hide specified drives in computer. 9. Lock & Hide Drives using Hexadecimal.
10. Hide Drive With Disk Management Tool 11. Hide Drive with QuickEdit Mode on Diskpart

Lock or Hid file , folder & Drive without any software Page1.

Create batch file to hide & lock folder (Use a password) 

ซ่อน และ ล็อคโฟลเดอร์แบบใส่พาสเวิร์ด



ผมมีเกมฆ่าเวลาสนุกๆให้คุณผู้อ่านได้เอาไปลองเล่นกัน เกมนี้มีชื่อว่า เกมซ่อนแอบในโลกของ Windows
Lock or Hidden file , folder & Drive without any software Page1.(Puss in boots& Desperado)การซ่อน File หรือ Folderใน Computer ถ้าเราจะใช้ฟังชั่น Hidden ที่ติดมากับ Windows ก็ดูเหมือนมันจะง่ายจนใครที่ไหนก็รู้กันหมด บางท่านที่ใช้ Vista, 7 อาจบอกว่า ใช้ Bit locker ก็จบเรื่องแล้ว...ก็ถูกนะ..แต่ไม่หมด มันมีเรื่องไม่เข้าท่าหลายอย่าง ไม่ว่าจะในเรื่องของการเข้ารหัสที่อืดอาดยืดยาดจนน่ารำคาญ แถมยังหมดมู๊ดกันแบบซื่อบื้อที่สุด อย่างเช่นในกรณีที่ คุณเข้าระหัสกับ USB Flash drive หรือ Harddisk external แล้ว....ไม่บอกถ้าใครยังไม่รู้ก็ไปหาคำตอบกันเอาเอง
เทคนิคการ ซ่อน, เบี่ยงเบน รวมถึงการ ล็อค File และ Folder โดยไม่ใช้โปรแกรมนั้น มีวิธีการที่หลายวิธีครับ และ แต่ละวิธีการก็มีข้อดี จุดอ่อน ที่แตกต่างกันไป ทั้งนี้ก็ขึ้นอยู่กับว่าคุณจะเอาไปป้องกันกลุ่มคนใช้ Computer ในระดับไหน แต่ไม่ต้องห่วงครับ เพราะกับคนใช้งาน Computer ส่วนใหญ่ ไม่ค่อยจะมีใครมาสนใจเรื่องประเภทนี้กันหรอก ใครชอบวิธีการไหน ก็เลือกใช้กันตามสะดวก

การซ่อนใน Page นี้ผมจะแยก Code ออกเป็น2 แบบคือ แบบใส่ password กับ แบบที่ไม่ใส่ Password

 

 

A. ซ่อนโฟล์เดอร์แบบใส่ Password

1. เปิดโปรแกรม Notepad ขึ้นมาจากนั้น Copy Code ข้างล่างนี้ลงไป โดยให้คุณเปลี่ยน Password ในแบบที่คุณต้องการที่อักษรสีส้ม ที่YourPassword (ในตัวอย่างผมจะใส่ Password เป็น 1234)จากนั้น Save as เป็น lock.bat (คุณจะตั้งชื่ออะไรก็ได้แต่ให้พิมพ์ต่อท้ายชื่อเป็น .bat)
cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo 
Do you want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%== 
YourPassword goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End


Double click to lock folder.

2. ให้คุณ Double click ที่ Lock.bat มันจะสร้างโฟลเดอร์ที่ชื่อ Locker ขึ้นมา
3. ทดลองนำไฟล์หรือโฟลเดอร์ที่คุณต้องการซ่อน มาใส่ในโฟลเดอรที่ชื่อ Locker จากนั้น Double click ที่ File Lock.bat จะมีหน้าต่าง cmd โผล่ขึ้นมา และมีคำถามว่า Do you want to Lock the folder(Y/N) ข้อความconfirm ตรงนี้คุณจะเปลี่ยนเป็นอย่างอื่นก็ได้, ถ้าคุณต้องการ Lock ให้กดปุ่ม Y ถ้าไม่ต้องการ ก็กดปุ่ม N (สมมุติว่ากดผม Y ที่แป้น Keyboard จากนั้นกด Enter Pic1.) โฟลเดอร์ที่ชื่อว่า Lock ก็จะหายไป


type password to Unlock folder.4. ถ้าต้องการจะปลด Lock ก็ให้คุณ Double click ที่ File Lock.bat อีกครั้ง จะมีหน้าต่างขึ้นมาถาม Enter password to Unlock folder (อันที่จริงตรงนี้คุณก็เปลี่ยนข้อความได้เหมือนกันนั่นแหละ) ให้คุณใส่ Password ลงไป > กด Enter ...โฟลเดอรที่ถูกซ่อนอยู่ก็จะกลับคืนมาเหมือนเดิม






 


B. ซ่อน Folder แบบไม่ใส่ Password

ก็ไม่มีอะไรมาก แค่ตัดคำสั่งที่ไม่จำเป็นออกไปเท่านั้นเอง คือ Double click เพื่อซ่อน กับ Double click อีกครั้งก็เป็นการเปิด ไม่มีการถาม confirms ไม่ต้องใส่ Password เพราะยังไงโฟลเดอรมันก็ซ่อนเหมือนเดิม คนใช้ Computer ทั่วๆไปหาไม่เจออยู่ดีใช้งานง่ายด้วย
cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End


Puss in boots:Funny animation.gifNOTE
ในข้อ B. ผมไปตัดคำสั่งตรงบรรทัดไหน, ยังไง ก็นำเอาไปเปรียบเทียบกันเองนะครับ จริงๆเราสามารถนำ Cord พวกนี้ไปประยุคต์ได้อีกหลายรูปแบบ หรือถ้าขี้เกียจประยุคต์เอง คุณสามารถอ่านวิธีการนำ Cord มาต่อยอดแบบต่างๆได้ที่ Pantip.com หรือไม่ก็อ่านเทคนิคการซ่อนรูปแบบอื่นๆที่ไม่ใช่การเขียน Code แบบยาวๆได้จากตาราง Link ข้างบน Webpage. นี่ครับ
13แต่..!! ช้าก่อน
ในข้อ B. ผมไม่ได้ไปตัดคำสั่ง เพียงเพื่อให้มันใช้งานง่ายอย่างเดียวนะ...บอกให้ก็ได้ว่า Code B. มันจะมีประโยชน์ในกรณีที่คุณทำ Batch file ที่ใช้ในการซ่อนโฟลเดอรตามข้อ A.หาย และก็ไม่เกี่ยงด้วยว่า คุณจะใส่ Password ลงไปกี่ตัว อันนี้ให้เอาไปทดลองหาความสัมพันธ์กันเอง เพราะถ้าผมมานั่ง Review เอง จากนั้นก็เฉลยเองจนหมด มันก็ไม่มีความลับอะไรให้หลงเหลืออีกนะสิ