Warn Against Cigarette

| 0 comment(s)

I got pictures message from a friend. First impression about these pictures was funny, eye-cathcy and strongly warn the smokers. These pictures were taken from famous cigarettes commercial brand icon and slogan that has been published everywhere.

Just take a look at these pic one by one and catch the moral messages!

1. With only 4.000 poison chemical in a cigarette, have all your effort to build your personal chemical factory.

Tanya Kenapa2. Don't worry, it's only tar, carbon monoxide and nicotine! You don't have to know about the other 200 more deadly things, ENJOY AJA (just enjoy it!)

Enjoy Aja3. Every year around 57.000 body stop smoking HERE successfully! Would you like to join?
Gak ada Loe gak rame

How to install printer in your network without connection to PC or Server?


My office has a new branch which connected to the 5 to 10 people capacity unlimited internet who are using notebook for work. I set the LAN using wireless and wired (for back up) from Linksys WRT54G2 router with DHCP enable.

The trouble comes next after printing work, because there is no server or PC to share printer connection and it’s impossible to install the printer separately as a local printer. I’ve asked this problem to the HP technical support and they gave me a solution by recommend an installation of HP JetDirect print server in my network.

JetDirect en1700 PrintserverFor this type of printer which is being used, HP JetDirect en1700 is the most compatible print server. This hardware has a square shape, the same size as Nokia communicator 9100, so it wasn’t that hard to be installed in the network. Just have its connection USB cable from printer to the print server and plug in the power cable to each hardware then plug in the UTP cable from switch to the print server. The power and activity indicator lamp in print server will blink on. After this lamp indicate an active signal, just have a print test by push the Test button that is located behind the print server. Printer will print out the HP JetDirect configuration page that has been installed.

If you have already had a correct configuration network, right after the driver of HP Print Server on each notebook is installed, printer can be used by the entire user at the time.

How to Display CAPTCHA Code to Your SMS

| 1 comment(s)

Captcha is verification code that must be inserted before sending data form a web form application. The main reason of it's usage is to avoid the spambots.

In one case, we can perform its verification code separately from the form on the web. For example CAPTCHA code is delivered through SMS just like generaly using in a cellular community, forum, gadget lounge, etc.

Drupal is enable to perform the CAPTCHA code through SMS with these SMS_captcha module for Drupal 5.X. So, after login and enter the password, user must enter additional code that is sent through SMS on your cellular/ handphone.

1. Download the SMS_captcha module here.
2. Enable the module from administration page.
3. Go to admin/user/sms_captcha for various actions.

Backgrounds and Finishing Touches

| 0 comment(s)

Once you have your character all colored in, you may wish to add a background. Even a sloppy background can really bring your picture to life. I sketched up a quick background, which consisted of a city and some mountains, and put the sketch in a layer beneath the main picture. I then made the sketch transparent using the same method described in part 1. However, it's probably smarter to include the background in your first sketch; I just didn't think about
it until after scanning in the inked version of this picture. Anyway, make sure the outline for the background layer is transparent.

Next, fill in the base colors of the background using the polygonal lasso tool. Okay, I know the background I drew isn't the most exciting in the world, but it's my first try at adding a hand drawn background, so bear with me.

Once the main colors are set down, add shading to the background so it doesn't look so flat. This part takes a little while... It is usually a big help to have some reference pictures, because I don't know about you, but I personally find coloring landscapes challenging. Of course, that's probably because I don't practice nearly enough...

Once I colored in the background, I added a few lighting effects to make it look a little nicer. I added a lens flare right above the mountains (this is one time when a lens flare would be appropriate; they are generally only seen when a light is shining directly into the camera), and added some streaks of light. To get the light streaks, I created another layer between the background and the character, used the polygonal lasso tool to make large, flat triangle shapes, filled them in with pure white, blurred them out with a Gaussian blur, set the layer to "Soft Light" instead of normal, and adjusted the opacity of the layer to about 70%.

You're almost done now. If you like, create a layer on top of all the others. On this layer, you will put extra highlights and touch ups. Take a light airbrush set to a low pressure (20-40%), and carefully add light to areas with highlights, such as the lighter areas of the metallic areas on the headdress in the picture to the right. This gives them an added shininess.

Whew, almost done! Now, all you have to do is compress your file. If you have the memory to spare, you may wish to keep an uncompressed version of your picture for future use (you may want to make prints or wallpapers out of it). Still, if you plan on posting your picture on the internet, you need to compress it and save it in either JPEG or GIF format. There is nothing more annoying than having to wait half an hour waiting to receive a 2 meg file that someone sent, because he or she didn't know how to properly compress the file. To shrink the file size down, go to the Layers Menu at the top menu bar, then go to "Flatten Image". This will flatten all the layers together.

You cannot save in JPEG format unless you flatten the image. At this point, you may need to adjust the size of the image, too. Try not to make the picture any more than 800 pixels in either direction; it's best to have the picture fit on one screen. Next, just go to "save as", and select JPEG format from the pull down menu. When prompted, pick a compression rate to save it as. I recommend a compression rate of either 6 or 7, because it trims the file size down nicely without sacrificing too much quality. Trust me, it's pretty hard to tell the difference between a level
10 compressed file and a level 6 compressed file. By the way, click on the picture to the left to see the finished, full size version!

Adding Color and Shading 2

| 0 comment(s)

After shading the hair and face, I moved on to the headdress. I wanted to go over how to color orbs and give them that nice glowy appearance. Glowing orbs can look complicated, but it is really quite simple to shade them. Start off by creating a dark area in the center of the orb. I had inked mine in when drawing, which probably wasn't the best of ideas, so I use the smudge tool to smooth it out a little before continuing.

Use a darker shade of the base color to extend the shadows in the center of the orb, as well as along the bottom rim of the orb. Use as much or as little detail as you wish.

Next, just add a few round highlights in the area where the light is coming from. To give the orb an added shinyness, I put a few more shadows around the largest highlight, and painted on top of the highlights with a very soft white airbrush. See? Its not that hard. To get the shiny effect, just add several layers of shadows and overlapping highlights.

Start adding shading to the other, more detailed areas of your picture, and make sure you keep the light source consistent. Remember to use several layers of highlights and shadows to make the picture look more three dimensional and rounded. I recommend using at least two or three different colors per layer.

Color in the rest of the details. Remember that the more layers of shading you use, the more three dimensional it will look. However, you have to make sure that you put them in the right place, or it won't make much difference how many shadows you have.

Remember at the beginning of this tutorial I said that adding color to the outline can give your picture a nice touch? Well, now you can try it out and see for yourself. Go back to the outline layer, make sure the preserve transparency is checked, pick a darker version of the color you are going to paint around, and color the outlines. For the hair, I used a darker blue; for the skin, I used a dark brown. What this does is make the outlines less prominent, but still give the edges the proper definition. Compare this picture with the one directly above. Do you see the difference? Its very subtle, but trust me, it can make your picture look much better, especially if you are working with thicker outlines.

Adding Color and Shading 1

| 0 comment(s)

Create a new layer between the Background layer and the Outline layer. This layer will be for the skin (well, you can color whatever you like first, but I usually start off with the skin or hair). Most people use the magic wand tool to select an area to paint, but I have found the magic wand tool to be insufficient, and not very precise. Plus, you end up having several white areas around the lines that need to be filled in.

Instead, use the polygonal lasso tool to select the areas that you want to color in. It takes a little longer, but works out best in the long run. You don't have to worry about holes in the outline or those annoying white areas around the lines. What you want to do is trace along the outlines of the region you are wanting to color. This can be difficult on larger complex regions, though, since once you start the selection you can't stop until you finish it. If this becomes a problem, the pen tool will work just as well for this task. Sometimes complicated regions like detailed hair can be a pain to select, but trust me, just be patient and you will be glad you took the extra time instead of using the magic wand tool.

Once you have all of the skin (or whatever other part you are working on) selected, choose a color and use the paint bucket to fill it in. If you have problems choosing colors, look around on the internet for pictures of characters with nice skin tones, and copy them over. If the color is too faded because you took it from a bad scan, just adjust it until it looks the way you want it. Also, before you add the color, consider what kind of lighting will be in the picture. Will it be in normal daylight, or will it be dark? What kind of mood do you want your picture to have? The colors you choose will affect the overall feel of the picture, so take this into account before you begin to add color.

Next, select the other regions of the picture and fill in the colors. Make sure to put each color on a separate layer, or at least make sure you do not have any two colors touching one another. This will make it much easier to shade later on. Speaking of which, do not begin to shade until you have filled in the colors for all the major areas. This is done so you can make sure the colors match up well. I wanted this picture to have soft light, so I chose light, slightly faded colors. Remember that your color selection can greatly affect the look and feel of your picture, so take some time when filling in all the colors. I usually spend some time adjusting and readjusting the colors of the skin, hair and clothing until I'm pleased with the combination.

Now that all the main colors are filled in, we can go back and start shading. I usually start with the skin and hair, just because I think they're more fun. Make sure that you check the preserve transparency box at the top of the Layers floating menu! This is very important; it allows you to paint over the area that you already painted on without going over the lines. It will make shading much easier. Select a darker version of the base color of the layer you are working with. If you have trouble selecting a nice color, then look at other pictures for reference. I almost always use another anime picture to help me with the shading, especially with more complicated light patterns. I use a graphics tablet when shading, but a lot of people have to use a mouse instead. To get that smooth cel look with a mouse, you can use the freehand pen tool to define the shadows, color them freehand (which I often prefer, even though its messy and takes longer..), or use the polygonal lasso tool to select the areas you want to shade. There are a variety of ways you can go about adding the shading; what method you choose is up to you. Just remember to experiment, and to be patient, because it can take a while to get the shadows smooth and shaped the way you want them.

It's usually a good idea to add several layers of shading per base color, especially on areas like the skin and hair. In addition to adding another layer of shadows, I adjusted the colors of the skin a little to make them less dull. To do this, use the eyedropper tool to select the color you want to change, then go to Replace Color on the top Image Menu. You can then change that color to anything you like without messing up the shading you have already filled in.

Once you have finished shading the face, move onto another area. I chose to do the hair next, because as I mentioned before, I like coloring hair. :) The hair was colored pretty much the same way as the face; I picked a darker shade of the base color, and filled in the shadows. Make sure that you keep a consistent light pattern. For example, if the light is coming from the left on the face, make sure it looks like its coming from the left on the rest of the picture. Pay close attention to areas where the shadows fall, and make sure to shade them accordingly. Again, it never hurts to use another picture as reference.

If you like, add a second layer of shadows to the hair to give it added depth. Feel free to add highlights, too. I didn't add them in this particular picture, because I didn't feel that his hair needed it, but if you were to add highlights, I recommend putting it on a separate layer above the hair. Making the light areas of the highlights overlap the darker shadows is a great way to make the hair (or anything) look really shiny, and its easier to make them overlap if they are on separate layers.

Outline for Photoshop Coloring

| 2 comment(s)

Once you have decided what picture you want to color, retrace the image onto a clean piece of paper and carefully ink it. It usually helps to use big paper and thin pens, so you can get a really crisp, thin outline. If you mess up the inking, you can clean it up with whiteout or by fixing it in Photoshop. Erase any extra pencil lines and get the inked outline as clean as possible. Scan the outline and load it into Photoshop. Make sure your outline is in RGB mode before you continue. To put your outline in RGB mode, go to the Image menu on the top bar, then Mode, and RGB Color.

A lot of people like to keep the outline on the bottom of the picture, and then color on top using layers set to "Multiply". The major flaw in coloring this way is that you have no way to color the outline. Adding color to the outline can give your picture a nice touch. In order to do this, though, you have to make the outline transparent, which will allow you to color beneath it (just as if you put the outline on a sheet of transparency paper).

Before you do anything, though, adjust the brightness and contrast of your image until the white areas are pure white and the black lines are dark black, but not pixelly. If you aren't careful and adjust the contrast too much, you'll end up with a jagged outline, as in the picture to leftmost picture. You do not want an outline this jagged and ugly; you want it to be as smooth and crisp as possible, so be careful.

You will also want to go over sketchy areas, such as the eye in this picture, and clean up the lines a little bit. I'm usually not patient enough to do this too often, though. Once you shrink down the image, flaws in your outline won't be as noticeable, anyway.

Now, in order to make your freshly cleaned outline transparent, first select the entire canvas. Copy the entire outline, and paste it into a layer by itself as shown to the left. You will then have two copies of your outline: the background layer, and Layer 1. Delete the background layer, and create a new blank, pure white background by going to the Layers menu, then to New Background.

Next, go to the Channels menu on the floating layers window. Click the "Load Channel as Selection" button, which is the leftmost button that looks like a little dotted circle on the bottom of the menu. What this does is select all of the white areas on a picture, so you don't have to use the magic wand. Avoid using the magic wand at all costs! It can make some really sloppy selections. Anyway, after hitting the "Load Channel as Selection" button, all the white areas should be surrounded by dashed lines.

Make sure that Layer 1 is selected, and not the background layer, then hit delete. This will delete all white areas from the picture, leaving only the black outline. Deselect the image so that the dashed lines go away, leaving only the outline. You'll notice that the outline is a little faded, though. Don't worry, this is very easy to correct.

Set Layer 1 to "Preserve Transparency" by checking the box on the Layers menu, as shown at the left. This allows you to paint on top of the existing lines without coloring over them and messing them up. Its a very handy feature. Select a big paintbrush and paint over the entire picture with pure black. The outline should be back to its former darkened self.:)

There, now you have a clean, transparent outline ready to be colored underneath.

Information Security Certification Guide

The biggest challenge for technology based industry is to preserve data security. When information security is threatened who’s the person will be looked for? The answer is an IT Security Expert. In order to have that challenge an IT security worker must qualified, experienced, know ledged and have general standard. One of the parameter to measure their qualification is PROFESSIONAL CERTICATES. There are many certifications that issued by industry based certification center for the Information Security field, let’s find out some:

Certification Focus: System Auditor.
Test Material: IS Audit Process, IT Governance, System & Infrastructure, Lifecycle .Management, IT Service Delivery and Support, Protection of Information Assets, Business Continuity & Disaster Recovery.
Other Qualification: Filled CPE Quota, 5 years experiences of related field.

Certification Focus: Information Security.
Test Material: IS Governance, Information Risk Management, IS Program Development, IS Program Management, and Incident Management & Response.
Other Qualification: Having CISA, CISSA Certificate, or post graduated, 5 years experiences of Information Security.

Certification Focus: Information Security.
Test Material: 10 area Common Body of Knowledge (CBK): Access Control, Application Security, Business Continuity and Disaster Recovery Planning, Telecommunication & Network Security, Operations Security, Cryptography, Security Architecture & Designs, Physical (Environmental) Security, Information Security & Risk Management and Legal Regulation, Compliance & Investigations.
Other Qualification: 3 years experiences.

4. CompTIA Security+
Certification Focus: Information Security.
Test Material: Communication Security Concept, General Infrastructure, Cryptography, Operational & Information Security.
Other Qualification: 2 years experiences of computer networking and having CompTIA+ Network.

5. LPT
Certification Focus: Penetration Tester.
Test Material: None Test Certification.
Other Qualification: No criminal record.

6. CIW Security Analyst
Certification Focus: Internet Web Security Analysis.
Test Material: None Test Certification.
Other Qualification: Having one of Network Certificate such: CEH, CCNA, CCNP, CCIE, GSEC, CISSP, JNICA-FWV, LPI, MCSA, MCSE, MCSE Security, Novell Certified Linux Engineer, RedHat Certified Security Specialist, or Symantec Certified Technical Specialist.

7. CEH
Certification Focus: Ethical Hacker.
Test Material: Prometric Test (CEH Exam 312-50) after 5 days course.
Other Qualification: -

Certification Focus: Firewall Analysis.
Test Material: -
Other Qualification: Having GIAC Security Essentials Certification (GSEC).

Certification Focus: Security Analysis.
Test Material: None Test Certification.
Other Qualification: -

10. CHFI
Certification Focus: Computer Hacking Forensic Investigation.
Test Material: None Test Certification.
Other Qualification: -

11. SCNS
Certification Focus: Network Security.
Test Material: Network Defense Fundamentals, Hardening, Routers and ACI, Implementing IPSec and VPN, Advanced TCP/IP, Securing Wireless Network, Designing and Configuring Intrusion Detection, Systems, Designing & Configuring Firewall Systems.
Other Qualification: Having Security+ certificate.

12. SCNP
Certification Focus: Network Security.
Test Material: Analyzing Packet Signatures, Creating Security Policies, Performing Risk Analysis, Ethical Hacking Techniques, Internet & WWW Security, Cryptography, Hardening Linux Computer, and Hardening Windows Server 2003.
Other Qualification: -

13. SCNA
Certification Focus: Architect Network Security.
Test Material: Enterprise Security Implementation and The Solution.
Other Qualification: -

14. GCIA
Certification Focus: -
Test Material: Basic TCP/IP, TCPdump, WINdump, and other network analyzer.
Other Qualification: -

15. GCIH
Certification Focus: Incident Handling.
Test Material: None Test Certification.
Other Qualification: -

Google Chrome: Search and the User Experience

Google Chrome opensource browserBen Goodger, Google's software engineer said that in Google Chrome, the primary piece of the user interface (UI) is the tabs. As soon as they started thinking about it that way, the design naturally followed. They began rebuilding the UI, so the tabs were on the tab. We could detach the tabs easily because of the separation of the browser and tab processes move it from window to window and the tabs state goes with it. And because the tabs are the most important part of the UI, each tab has its own controls and URL box which around here we've been calling the OmniBox.

The omnibox handles far more than just URLs. It also offers suggestions for searches, top pages we've visited before, pages we haven't visited but are popular and more we have full text search over our history. If we found a good site for digital cameras yesterday, we don't have to bookmark that page. Just type "digital camera" and quickly get back to it. An auto completion inline will help us because it will never flicker, never flash, it's perfectly aesthetically non-distracting. Plus it'll only autocomplete to something we've explicitly typed before. Just type C + Return you might go straight to (for example) cnn.com, but never to cnn.com.politics/2008/07/27/campaign.wrap/index.html?ref=mp. And we search on sites like amazon, wikipedia or even google the search boxes on those pages are captured on our local system so we can search those same sites with different term later on, stright from address bar, by starting the site's name and pressing "tab".

Open a new tab in most browsers today, and we'll get our homepage. Some users have a blank page because it opens quickly but the action of opening tab is a statement of intent: we want to go some place! Maybe we don't know where, maybe we don't know and need to search. The team shows a page that is designed to be fast but also help us complete that action Google's team default experience, then, is the new tab page with our nine most visited pages are on the left side and the site we search on most of left side of interface. We type into the URL box. Google Chrome uses our behavior in the omnibox to feed into that page. We might open it and be, but after a while we see this page and it's just our browser. Google Chrome has a privacy mode. We can create an "incognito" window and nothing that occurs in that window is ever logged on our computer. It's a read only mode: we can still access our bookmarks, but none of your history is saved in the browser. And when we close the windows, the cookies from that session are wiped out. There's no concept of a drive-by pop up in Chrome. Javascript has no way to force a popup into our world. Pop ups are scoped to the tab they came from and confined there. If you want an audio palyer (for example), just drag it out and it'll be promoted to its own window.

Source: http://www.google.com/googlebooks/chrome/

Google Chrome: Web Kit & V8

Google Chrome web kit V8Web kit is the open source rendering engine that used for Google Chrome. The Google's team impressed by how fast it is. There was a team at Google working on android who said that it uses memory efficiently, was easily adapted to embedded devices and it was easy for new browser developers to learn to make the code base work. Browser are complex one of the things done well with web kit is that it’s kept simple.

Because Javascript is so important to work on building a Javascript virtual machine which is exactly what the V8 team in Denmark did. The V8 team are expert as virtual machines. Whatever language you want to put into into a VM, they can tell us how to write it. Virtual machine provide safety and platform independence. But previous virtual machine for Javascript were designed for small programs, where the performance and interactivity of the system weren’t that important. They just wanted to run some very basic stuff on the webpage. But now, we have web application like Gmail that are using the web browser to its fullest when it comes to DOM manipulations and Javascript and that simplistic approach to Javascript engines isn’t enough anymore. So they started with no code, just some wild ideas about how to make it go really fast such as introducing hidden class transition.

Javascript itself is classless. We can create a new object. Dynamically add properties to it and go on. But in V8, as execution goes on, objects that end up with the same properties will share the same hidden class and we can start applying dynamic optimization based on that. Another factor in V8 speed is dynamic code generation. When other javascript engines run, they look at the Javascript source code and generate an internal representation of it they can interpret. But when we have to do interpretation, we have to look at the structure of your internal representation over and over again. So instead, V8 looks at the Javascript source code and generates machine code that can run directly on the CPU that’s running the browser.

Finally the core design flaw of current Javascript engines is bad garbage collection behavior. Javascript and other modern object-oriented programming languages have automatic memory management. If you don’t have reference to an object anymore, it’s memory can be reclaimed by the system. That’s garbage collection, and it’s a fairly trivial process. But in existing Javascript virtual machines, they use conservative garbage collection which means that because they don’t know exactly where all the pointers are we start searching through the execution stack to see which words look like pointers. But the ones that sort of look like pointers could also be integers that just happen to have the same address as an object in the object head.

Source: http://www.google.com/googlebooks/chrome/

Google Chrome: The Story of Open Source Browser

Google Chrome opensource browserWhen the first time created, web browser was definitely only a web page. There was no video upload, chat, games. They aren’t just like nowadays. Today they become an 'application'. But I think they need to be increased for the next day. What do we need from a browser? First browser need to be more stable, faster (even lot faster for web apps & Javascript) and also secure. Browser should have to find that sweet spot between too many features and too few with clear, simple, and efficient user interface. One of the problem with browser is they’re inherently single threaded. For example, once you have Javascript executing, it’s going to keep going, and the browser can’t do anything else until Javascript return control to the browser. So developer writes apis that asynchronous then the browser locks up because the Javascript is hung up on something.

Multiple threads must be much better than single, but what if we have multiple processes? Each having its own memory and its own copy of the global data structure. The process installation is the same as you find in modern operating systems. So, separate process rendering separate tabs, then Javascript threads will separate as well. One tab will be busy, while we’re still using all the others. And if there’s a browser bug in the rendered we still only lose the one tab. When one tab goes down we get a 'sad tab' but it doesn’t crash the whole browser. A multi process design means using a bit more memory up front. Each process has a fixed additional cost, but overtime it will also mean less memory bloat.

In a traditional browser we only have one process and one address space that we keep loading web pages into. When we have too many tabs open, we can close some to free up the memory. When we bring in another tab, we use the memory that was previously used. But as time goes on, fragmentation results little bit of memory still get used even when a tab gets closed. Either we have memory that nothing can refer to again, or there’s a piece of reallocated memory we still have a pointers to. So when the browser wants to open a new tab, it can’t fit in the existing space and so the O.S has to grow the browser address space. And this problem grows all day, as the lifetime of the browser extend. But when a tab is closed in Google Chrome, we’re ending the whole process and all the memory gets reclaimed. When we open the new tab after, you’ll start from scratch. So as we browse, Chrome creating and destroying processes all the time. If there’s a crazy memory leak it won’t affect us for that long because we’ll probably close the tab at some point and get memory back.

And Chrome is taking it one step further. Suppose we navigate from a domain A to domain B. There’s no need for any relationship between the two sites so now Chrome can throw away the old rendering engine, the old data structure, and the old process. So, even within a tab, we can be collecting and tossing out the garbage. Recycling the whole process. And just like with our OS, you can look under the hood with Google Chrome’s task manager to what sites are using the most memory, most bytes, and abusing our CPU. We can even see plug-ins within the tab, since they appear in Chrome’s task manager as separate processes. So when things start freaking out, we’ll finally have some insight into who’s misbehaving and eliminate them.

Google Chrome is a massive, complicated product that will need to load billions of different web pages, so testing is critical. Fortunately, here at Google, Chrome has an equally massive infrastructure for crawling web pages. Within 20-30 minutes of each new browser build, they can test it on tens of thousands of different web pages. Each week, 'chrome bot' test millions of pages, giving their developers early result they’d otherwise have to wait until external beta for. The key is catching problems as early as possible. It is less more expensive and easier to fix them right away. After a few days it is harder to track them down. And catching them early helps engineers write better code.

There are several ways they test each check in. From unit tests of individual pieces of code to automated UI testing of scripted user actions like ‘clicked back button…went to page…’ to fuzz testing: sending your application random input. In layout tasting, web kit found that producing a schematic of what the browser thinks it’s displaying is a more precise way to compare layouts than taking screen shots and creating a cryptographic hash. When started we were passing 23% of web kit’s layout tests. Moving from there to 99% has been a fun challenge and interesting example of test driven design. There are limits to what we can do with automated testing. We can’t test websites that require a password for example. And it’s not the same as a human being walking around and misusing things, they are using browser in the way they are designed it to be used.

Source: http://www.google.com/googlebooks/chrome/