Thursday, 27 October 2011

Pro Evolution Soccer 2012 Full Version + Crack Download



1. Mount or Burn
2. Install
3. Use one of the following serials when asked:
see .nfo (otworzyć można np.: za pomocą notatnika)
4. Copy and paste all files from dir CRAck into the installation dir of the game
5. To get all the languages, copy everything inside pes12.Multi.languages to the following location:
C:\Program Files (x86)\KONAMI\Pro Evolution Soccer 2012\img
6. Play the game
Serial Number
7X9K-YYES-64AV-4HAN-3JRN
HJJN-XJ64-363X-99V5-KSJ4
7XFH-RLM2-ET5U-MWH5-RHFE
4VRE-P766-LL3F-MYLP-YUTT
S2D9-M3XC-HE3C-5R9P-TASM
9R9U-MUXR-JHTJ-2MFN-F329
XT44-6AV3-HLEC-23TC-67PR
SEHM-S2NT-24M7-9LJ4-VP6K
7TW2-TLXR-W7LS-KTPY-TWNE
33CF-3PS5-CH3F-CYWA-JERW

PES 2012 Download Links

wUpload
linksafe.me/d/419017e8f9
Rapidshare (1.5gb Links)
rapidshare.com/files/4184958740/1-3-3-8.com_ind-pes2012.part1.rar
rapidshare.com/files/99608080/1-3-3-8.com_ind-pes2012.part2.rar
rapidshare.com/files/3022973179/1-3-3-8.com_ind-pes2012.part3.rar
rapidshare.com/files/1734759288/1-3-3-8.com_ind-pes2012.part4.rar
rapidshare.com/files/932452913/1-3-3-8.com_ind-pes2012.part5.rar
FileSonic (Interchangeable)
www.filesonic.com/file/2188670211/1-3-3-8.com_ind-pes2012.part1.rar
www.filesonic.com/file/2188670251/1-3-3-8.com_ind-pes2012.part2.rar
www.filesonic.com/file/2188670261/1-3-3-8.com_ind-pes2012.part3.rar
www.filesonic.com/file/2188670041/1-3-3-8.com_ind-pes2012.part4.rar
www.filesonic.com/file/2188635901/1-3-3-8.com_ind-pes2012.part5.rar
FileServe
www.fileserve.com/file/CfD9WgW/1-3-3-8.com_ind-pes2012.part1.rar
www.fileserve.com/file/4EQeqnz/1-3-3-8.com_ind-pes2012.part2.rar
www.fileserve.com/file/nsJMqRU/1-3-3-8.com_ind-pes2012.part4.rar
www.fileserve.com/file/jH3pnMP/1-3-3-8.com_ind-pes2012.part3.rar
www.fileserve.com/file/UUdXQgz/1-3-3-8.com_ind-pes2012.part5.rar
MultiUpload (Interchangeable)
www.multiupload.com/43EGJN3P22
www.multiupload.com/D656OK40Z1
www.multiupload.com/QMEFFMRZQ9
www.multiupload.com/UBO1ZTGDWA
www.multiupload.com/VX8LXH1JW9
List Of Available Full Version PC Games
Free PC Games Download Home Page


Remember: you have already complete our survey and have a lifetime access to this site
- so you can access to all the full version pc games in our site. Thanks and wait for this games download link.
Source : http://links.downloading.im/download-pro-evolution-soccer-2012-free/

Connect your google+ profile with blogger



Many of my friends asked me how to connect our google+ plus profile to our blog so a new question arises . hotw toAdd Google Profile Button Into Blog  after the advent of Google+ Plus. Previously we used to follow people on twitter or Facebook but now its also possible to Follow People In Google+ Plus by using Google Profile Button In Blog which will help you to get more traffic to blog with Google+ Plus. Lets see more about How To Add Google+ Profile Button In Blog


Are you faceing any problem? dont worry i have the solution :

Unlike Facebook or Twitter, Google officially provides a Google Profile Button script to add it into Blog or website which is great part of honour for Google Plus.



Its very easy to add Google Plus Profile Button Into Blog or Blogger as its officially provided by Google+ Plus and we have to just copy/paste the given script into our/your blog.

Just follow these simple steps , and your are done:

1. Just go to Google Profile Button
2. Now enter your full Google plus profile URL or ID and select the button size :







Just copy/paste the code updated in your blog[monetize] and you are done :

 







Source : http://devzcyberarena.blogspot.com/2011/07/how-to-connect-your-google-profile-with.html

All Nokia mobile symbian/java Secret Codes

 

 

Some useful secrete codes for NOKIA Phones
On the main screen type

*#06# for checking the IMEI
(International Mobile Equipment Identity).

*#7780# reset to factory settings.

*#67705646# This will clear the LCD display (operator logo).

*#0000# To view software version.

*#2820# Bluetooth device address.

*#746025625# Sim clock allowed status.

*#62209526# – Display the MAC address of the WLAN adapter.
This is available only in the newer devices that support WLAN

#pw+1234567890+1# Shows if sim have restrictions.

*#92702689# – takes you to a secret menu where you
may find some of the information below:

1. Displays Serial Number.
2. Displays the Month and Year of Manufacture
3. Displays (if there) the date where the phone was purchased (MMYY)
4. Displays the date of the last repair – if found (0000)
5. Shows life timer of phone (time passes since last start)

*#3370# – Enhanced Full Rate Codec (EFR) activation.
Increase signal strength, better signal reception.
It also help if u want to use GPRS and the service is
not responding or too slow.
Phone battery will drain faster though.

*#3370* – (EFR) deactivation. Phone will automatically restart.
Increase battery life by 30% because phone receives
less signal from network.

*#4720# – Half Rate Codec activation.

*#4720* – Half Rate Codec deactivation. The phone will automatically restart

If you forgot wallet code for Nokia S60 phone,

use this code reset: *#7370925538#

Note, your data in the wallet will be erased.
Phone will ask you the lock code.
Default lock code is:
12345Press *#3925538# to delete the contents and code of wallet.

Unlock service provider: Insert sim, turn phone on and press
vol up(arrow keys) for 3 seconds, should say pin code.
Press C,then press * message should flash, press * again and 04*pin*pin*pin#*#7328748263373738# resets security code.

Default security code is 12345

Make your Window 7 Genuine With RemoveWAT2.2.6


 RemoveWAT can crack windows 7 sp1, windows 7 ultimate, enterprise, professional, home, Basic, etc. It’s 100% work and tested. RemoveWAT (Windows Activation Technologies) completely from the OS, whilst still retaining OS genuine status and receiving all updates. RemoveWAT works like windows 7 loader. So that users can validate the illegal pirated copies of Windows 7 as genuine status forever and permanently. Also allows you to download windows update.

How it works:


  1. Close all antivirus and firewalls, and then run the program with administrator privileges (from the internet need not be switched off)
  2. Click “Remove WAT” and wait until you see the message on successful completion of the procedure
  3. Computer will restart automatically
  4. All the system is activated.
  Download Free :
http://www.ziddu.com/download/17012281/RemoveWAT2.2.6.rar.html

Pdf Locker 1.0




PDFLocker is easy to use with its simple GUI interface even for beginners.

Here are the brief usage details,
  • Run "PDF Locker" after installation by clicking shortcut on your desktop.
  • Enter or select the path of the file which is to be password protected.
  • Enter the owner and user password
  • Click on Start button and your PDF file will be protected instantly.
During recovery operation, you will see how many Brute Force attempts that had been done so far on the counter at bottom right. More complicated the password, more the time will be taken.
Version 1.0 :  27th May 2011 First public release of PDFLocker Tool

Download : http://www.appnimi.com/component/content/article/id/1

Wednesday, 26 October 2011

Torjan Remover 6.8.2 Cracked Download Free



In this Season Many peoples are hijacking and hacking computer and accounts becus now this is very easy to make Torjan so you should must protect your account and computer from hackers and scams etc must install Torjan Remover
it will Remove all kind of Torjan and will help you to protect your pc
Download Link below:

http://www.mediafire.com/?nv1v7u0qp8ob14x

Possible Features in Iphone 5 (Iphone 5 Specification)

According to sources the iPhone 5 would feature a Brushed metal chassis instead of the glass backing that the iPhone 4 has. Some other features are a 4-inch large display, an A5 processor, higher-resolution camera, 3D support, and an NFC chip.
Friends i think you saw alot of videos and Pics about iphone 5 like Iphone laser, Hologram, air touch Keyboards..
but all are fake still this kind of technology did not lunched…All Studio Companies just advertising their fun through Videos etc
But We can Guess what i phone has specs/Features

The Design is fully Unpredictable and it could be the same design with a metal chassis instead of the glass backing or it could have completely New look and could also be Inspired by the iPad 2 with Reduced Thickness and a Metallic Back side as you can see below:


Source : http://learnethicalhacking.net/news/possible-features-in-iphone-5-we-can-guess-iphone-5-specification/

Sunday, 16 October 2011

Instal Xampp xampp-win32-1.7.3 dan Joomla



1.       Klik 2 kali pada software sampai muncul Run,lalu klik Run
2.       Pilih C:/  untuk menginstal nya,klik INstal






3.       Tunggu Beberapa saat


4.       Lalu klik y pada cmd.exe
5.       Pilih 1 untuk contol panel nya Frend
6.       Pilih Apache dan Mysql untuk mengaktifkan nya Frend

7.       Kedua klik 2 kali pada Joomla yg akan di install lalu extrak file tersebut,biar gampang kasih nama “komunitas” file Joomla yang pengen di ekstrak..

8.       Jika sudah di ekstrak..taruh folder komunitas tsb di htdocs dan paste folder tsb..


9.       Buka mozila ketik http://localhost/komunitas akan muncul seperti gambar di bawah ini..lalu klik bahasa yg di pilih,trus klik NExt

10.   Next saja
11.   Next again
Isikan Data Formulir seperti di bawah ini
·  Database Type : mysql
·  Host Name : localhost
·  Username : root
·  Password : (kosongkan)
·  Database Name : komunitas_db (sesuai dengan penamaan folder td Frend) Next
12.   Next again

13.   Isikan nama situs,email,dan pass email,untuk username : admin

14.   REMOVE THE INSTALLATION DIRECTORY



15.   Buka http://localhost/komunitas/administrator/  untuk membuka situs yg telah di buat..masukan admin dan pass nya Frend
16.   Maka tampilan akan seperti ini jika berhasil

17.   Selamat!!! Web Frend Udah jadi ni…Horeee!!!

Kaspersky Antivirus/ Internet Security activation Keys [2012] free download



Hey guyzz today i am bringinng you KIS 2012 Activation keys, first you have to download KIS/KAV 2012  from its official website, hten just folow these simple instructions:



1. Turn of your Internet Connection.
2. On Kaspersky  2012 , click on“Insert your activation code here” one the right corner. Then click on Activate the application button.
3. Check on Activate commercial version box, then fill up with any number on the Enter activation code field (such as 1231234567, for example:-P). Click on Next.
4. Waiting for few seconds. You will get a notification that informs you don’t have an Internet connection “Internet connection is missing”. Then, you just need to click on Browse in the Key file field and browse the key which u downloaded on your hard disk to activate Kaspersky 2012.
5. Done. Enjoy!!
Download Serial,Registry keys

Download : http://www.box.net/shared/13xt50fp39h4de2lzflb

Friday, 14 October 2011

Virus Types/Tipe-Tipe Virus

Virus



What is a Computer Virus ? A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user.
Virus - A program that when run, has the ability to self-replicate by infecting other programs and files on your computer. These programs can have many effects ranging from wiping your hard drive, displaying a joke in a small box, or doing nothing at all except to replicate itself. These types of infections tend to be localized to your computer and not have the ability to spread to another computer on their own. The word virus has incorrectly become a general term that encompasses trojans, worms, and viruses.
Types of viruses :-
The different types of viruses are as follows-
1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.

Examples of boot- sector viruses are Michelangelo and Stoned.

2) File or Program Viruses :-Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .

Some common file viruses are Sunday, Cascade.

3) Multipartite Viruses :-A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector.
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.
Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Other examples are Invader, Flip, etc.

4) Stealth Viruses :-These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.

5) Polymorphic Viruses :-
Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense.

6) Macro Viruses :- A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.

If you use a computer, read the newspaper, or watch the news, you will know about computer viruses or other malware. These are those malicious programs that once they infect your machine will start causing havoc on your computer. What many people do not know is that there are many different types of infections that are categorized in the general category of Malware.

Malware - Malware is programming or files that are developed for the purpose of doing harm. Thus, malware includes computer viruses, worms, Trojan horses, spyware, hijackers, and certain type of adware.
This article will focus on those malware that are considered viruses, trojans, worms, and viruses, though this information can be used to remove the other types of malware as well. We will not go into specific details about any one particular infection, but rather provide a broad overview of how these infections can be removed. For the most part these instructions should allow you to remove a good deal of infections, but there are some that need special steps to be removed and these won't be covered under this tutorial.
Before we continue it is important to understand the generic malware terms that you will be reading about.
Backdoor- A program that allows a remote user to execute commands and tasks on your computer without your permission. These types of programs are typically used to launch attacks on other computers, distribute copyrighted software or media, or hack other computers.
Hijackers- A program that attempts to hijack certain Internet functions like redirecting your start page to the hijacker's own start page, redirecting search queries to a undesired search engine, or replace search results from popular search engines with their own information.
Spyware- A program that monitors your activity or information on your computer and sends that information to a remote computer without your Knowledge.
Adware- A program that generates popups on your computer or displays advertisements. It is important to note that not all adware programs are necessarily considered malware.
There are many legitimate programs that are given for free that display ads in their programs in order to generate revenue. As long as this information is provided up front then they are generally not considered malware.
Dialler - A program that typically dials a premium rate number that has per minute charges over and above the typical call charge. These calls are with the intent of gaining access to pornographic material.
Trojan- A program that has been designed to appear innocent but has been intentionally designed to cause some malicious activity or to provide a backdoor to your system.
Worm- A program that when run, has the ability to spread to other computers on its own using either mass-mailing techniques to email addresses found on your computer or by using the Internet to infect a remote computer using known security holes.

Exploits

A tool developed by hackers that is used to perform malicious attacks on computer systems. They are usually scripts that are designed to exploit weaknessness in software over a network, most commonly the Internet. Zero-Day is a common type of exploit.



Zero-Day Exploits
Called either Day Zero or Zero-Day, it is an exploit that takes advantage of a security vulnerability on the same day that the vulnerability becomes publicly or generally known. Zero-Day exploits are usually posted by well-known hacker groups. Software companies may issue a security bulletin or advisory when the exploit becomes known, but companies may not be able to offer a patch to fix the vulnerability for some time after.

An exploit (from the same word in the French language, meaning "achievement", or "accomplishment") is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerised). This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.

There are several methods of classifying exploits. The most common is by how the exploit contacts the vulnerable software. A 'remote exploit' works over a network and exploits the security vulnerability without any prior access to the vulnerable system. A 'local exploit' requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application. Exploits against client applications may also require some interaction with the user and thus may be used in combination with social engineering method. This is the hacker way of getting into computers and websites for stealing data.

In computing, an exploit is an attack on a computer system, especially one that takes advantage of a particular vulnerability that the system offers to intruders. Used as a verb, the term refers to the act of successfully making such an attack.

In Exploit another classification is by the action against vulnerable system: unauthorized data access, arbitrary code execution, denial of service.

Many crackers (or hackers, if you prefer that term) take pride in keeping tabs of such exploits and post their exploits (and discovered vulnerabilities) on a Web site to share with others.

Where an exploit takes advantage of a weakness in an operating system or vended application program, the owners of the system or application issue a "fix" or patch in response. Users of the system or application are responsible for obtaining the patch, which can usually be downloaded from the Web. Failure to install a patch for a given problem exposes the user to a security breach. (However, it can be difficult to keep up with all the required patches.)

Many exploits are designed to provide superuser-level access to a computer system. However, it is also possible to use several exploits, first to gain low-level access, then to escalate privileges repeatedly until one reaches root.

Normally a single exploit can only take advantage of a specific software vulnerability. Often, when an exploit is published, the vulnerability is fixed through a patch and the exploit becomes obsolete for newer versions of the software. This is the reason why some blackhat hackers do not publish their exploits but keep them private to themselves or other crackers. Such exploits are referred to as 'zero day exploits' and to obtain access to such exploits is the primary desire of unskilled attackers, often nicknamed script kiddies.

Script Kiddie

A person, normally someone who is not technologically sophisticated, who randomly seeks out a specific weakness over the Internet in order to gain root access to a system without really understanding what it is s/he is exploiting because the weakness was discovered by someone else. A script kiddie is not looking to target specific information or a specific company but rather uses knowledge of a vulnerability to scan the entire Internet for a victim that possesses that vulnerability.
The vast majority of the "hacker" underground is made up of people who have only been using computers for a few years and who really know comparatively little about them. These are people, usually kids, who are attracted by the seemingly magical powers that hacking gives them. Since they know so little about computers, they don't really known how to hack themselves but instead follow recipes or "scripts" developed by real hackers. Most of these scripts are easy-to-use programs whereby the "script-kiddy" simply enters the IP address of the victim.
One of the distinguishing features of script-kiddies is that they must have a lot of patience. Because security holes are quickly found and repaired, most systems will resist most attacks. Therefore, if the script-kiddy is targeting a single system, they have to find a lot of scripts to try against the system before they find one that works. More commonly, the script-kiddies downloads one of the most recently developed scripts and proceeds to run it against targets all throughout the Internet until they find someone who is vulnerable to that specific script.
You can get update exploits from www.1337day.com

Membuat Panggilan Bebas di Mana saja

Things that you will need


1. adobe flash player 9 or higher
2. Head phone with mic.


Note : you can make only one call using an ip in a Day. But it can be exceeded if you have dynamic IP like BSNL broadband then disconnect your internet connection and call again you will able to make another call.


now,
 open your browser and visit the following link :
www.evaphone.com
 then the screen is like as follow.



 


now enter the country code and phone number which you want to call.
then click on green button and then click on the under advertise then your call will be connected.

Re-Enable Task Manager, Registry, RUN, And More When Disabled By A Virus

Re-Enable is a free portable tool for Windows developed by Tangomouse that enables Task Manager, Registry(Regedit), Run Command, CMD Dialog, Folder Options, and System Restore Configuration when disabled by a virus.

By now most of you will already know that viruses that disable such critical Windows features are very common. Once the virus disables any of the feature, common users have no choice but to reinstall the Windows or perform complicated registry changes. Re-Enable plans to change all this with a dead-simple and lightweight(64KB) tool.
When you remove the virus, the changes remain intact which means that if it has disabled any option then you will have to manually enable it back by following complicated procedures. Most procedures require changes in the registry, but what if the registry has been disabled by the virus itself?
With Re-Enable, it is very easy to enable back the options, simply select the options that you want to re-enable and hit Enable button. That’s all.



Download : http://oron.com/k1o452eiilq0

Thursday, 13 October 2011

JavaScript has problems. Do we need Dart to solve them?



Google hopes to upset JavaScript's dominance by introducing a new language, Dart. Dart is designed to be simpler, more familiar, and faster than JavaScript, and Google one day wants to see it everywhere: in the browser, on the server, and maybe even on the smartphone. Those are big ambitions, but before we take a look at Dart and at Google's plans for it, it's worth taking a closer look at JavaScript itself. Why exactly doesn't Google like it?

The oddball

JavaScript is a funny little language. Languages which buck trends rarely flourish, and though JavaScript mostly has the syntax and structure of a conventional, C-family programming language, the way it actually works is quite unusual. It's an object-oriented language, but instead of using classes, it has only objects and prototypes. (Classes are cookie cutters that can be used to stamp out a whole set of objects that all have the same behavior. To create multiple objects with identical behavior in JavaScript and other prototype-based languages, you take an object with the behavior you want and clone it.)
Every other object-oriented language in widespread use sticks to classes. Widespread variations do exist—classes in, say, C++ or Java are static, defined at compilation time, and can never change during the execution of a program, whereas those in Python or Ruby can be modified by a running program—but the use of classes is a constant.
Still, JavaScript has been enormously successful. The ability to add dynamic scripting to webpages has proven useful, and because JavaScript was the first language to be used this way—it was invented in a hurry by Netscape for Navigator 2.0—it has become the dominant force for Web scripting. Microsoft does have a pluggable scripting system supporting JScript (Microsoft's JavaScript implementation) and VBScript, with Perl and Python (among others) available as downloadable options, but only JavaScript has had the cross-platform, cross-browser uptake that's necessary to flourish in the Web environment.

I feel the need

JavaScript's wide usage has produced great pressure to make the language faster. Google's Chrome was the first browser to really tout JavaScript performance as a feature, and its V8 engine was the first to use techniques such as just-in-time (JIT) compilation to make serious improvements in JavaScript execution. Microsoft (with its Chakra engine) and Apple (with its Nitro engine) and Mozilla (with its various Monkey engines), have all followed suit. The result is that modern JavaScript engines are an order of magnitude or more faster than engines of old.
Probably the biggest single advance is the use of JIT compilation instead of interpretation. JIT compilers generate small fragments of native code so that script programs are compiled in a piecemeal fashion. When it comes to performance, JavaScript engines are some of the most advanced scripting runtimes around—generally being much faster than perl, Python, or Ruby.
But there's a big difference between "the fastest scripting language" and just plain "fast." Compared to traditional compiled languages like C++ or Fortran, or even JIT-compiled safe languages like C# and Java, JavaScript's performance looks a lot less impressive. For all the time, money, and effort that has been poured into JavaScript engines, JavaScript programs still perform at a huge disadvantage relative to those built with typical desktop development tools.
Writing a high performance scripting engine is hard to do—and writing a high performance JavaScript engine is particularly challenging. One of the things that makes it difficult is the use of prototypes instead of classes. With a class-based language, every single instance of that class has the same behavior: the same set of fields to store data and the same set of methods to perform actions. The scripting engine need only generate optimized executable code for that class once and it can then be used for every single instance of that code. Even in languages like Python, where modifications to the class can be made at runtime, the amount of code generation is limited; a modification might force the engine to throw away all the executable code it has generated so far and create new code, but that code is still shared by every instance of the class.
This approach allows very fast code to be generated. As an example, consider the simple case of accessing a field in an object. With an old-fashioned interpreted scripting engine, this might be accomplished by looking inside a dictionary mapping from field names to field values—a slow, expensive operation. With a traditional compiled language, the compiler will lay out all the fields of a class in a particular order and it will know the exact position of each field; accessing the field then becomes as quick as reading a value from memory. The position of the field will be the same for every single instance of the class, so the native code can be very simple and very fast.
In JavaScript, that's much harder to do; there are no real classes, so there's much less scope for easily sharing generated code. The overhead of generating this code will often outweigh the performance improvement that code generation provides; if you can't share the native code between lots of objects, you're often better off using the slow dictionary lookup. V8 (and the Firefox engine and, I believe, other high-performance JavaScript engines) tries to remedy this problem by generating synthetic hidden classes, which can then be shared among multiple object instances.
This works well, to a point—the modern JavaScript engines are faster than their counterparts in other languages—but it's nonetheless complex. And it's a complexity that languages with explicitly defined classes don't have to handle.

Giving developers what they want

Prototypes have also proven to be a mixed blessing for developers. Prototype-based languages are academically interesting, but it's fair to say that they've lost the battle for mainstream acceptance (if they ever really fought it). Class-based languages are taught in schools and in universities now; they're what most of the object-oriented literature and research focuses on. They're the mainstream. Developers want to use their class-based knowledge and techniques, but JavaScript doesn't directly support that. In response, many of the widely used JavaScript libraries include their own emulation of class-based objects. With classes baked directly into the language, both JavaScript engines and libraries would be easier to develop, easier to use, and faster.
The use of prototypes isn't the only thing that makes JavaScript complex, but it's probably the biggest single issue. And significantly, it's arguably also the most discardable one. If neither users of the language nor developers of engines really want prototypes, perhaps the language shouldn't be built around them after all.
JavaScript also has features (or, more commonly, it lacks features) that make development of large applications somewhat more challenging than they might be in other languages. Some of these are minor grievances—the way variable scope works, for example. Others are a bit more significant; for example, JavaScript has no built-in module system. This is a particular annoyance for programs that depend on third-party libraries, since they have no good way of ensuring that library A won't conflict somehow with library B (for example, both libraries might try to create objects with the same name).
JavaScript also lacks any kind of static typing. This is not at all unusual; dynamic typing is a feature of most scripting languages, and in this sense JavaScript is thoroughly conventional. With static typing, every variable or field has a singular, well-defined type (say, "number" or "string" or "file"). It can only store objects of that type, and the compiler will complain before you even try to run the code if you try to do something that the type cannot do—for example, if you try to divide a string by a file, or add a network socket to an integer. With dynamic typing, that's no longer the case. Variables and fields can store values of any type, and the scripting engine will only complain if it simply can't figure out what to do at runtime.
Opinions vary wildly on which approach is better. Dynamic typing tends to be easier to use and less verbose, because programmers don't need to specify type information at all. Dynamically typed languages have much of the power of interfaces, templates, and generics without ever having to suffer the complexity of those mechanisms. But static typing has its advantages, too. Detecting errors at compile time, rather than having them blow up in the user's face at runtime, is greatly preferable. Fixed knowledge of the types used in a program makes it easier to generate fast code, too. Static typing also tends to make it easier to answer questions about the code, such as "show me every part of the program that uses this class." This can be a boon to maintenance; it makes refactoring much simpler and safer.
Not everyone will agree that every JavaScript issue is a real problem. The language has its fans, though it's certainly not the case that everyone who uses it actually likes it. But everyone who uses it must surely acknowledge that some of these things are problems, even if minor ones. Some problems, such as the small built-in library and the lack of module system, can be solved with a combination of policy and third-party code. People may prefer classes to prototypes, but prototypes can be used to implement class-like systems anyway. The dynamic typing versus static typing question will never be resolved, as there's no right answer, but there's a sizeable minority at least who would prefer some kind of static typing to be possible.
The importance of Web scripting is unlikely to diminish any time soon. Web programs are only going to grow in scope and complexity. The case in favor of making the Web's scripting language better—easier to run at high speed, easier to develop, easier to test—is therefore compelling.
Hence Google's new language, Dart.

Photograph by Aurich Lawson

Source : http://arstechnica.com/business/news/2011/10/javascript-has-problems-can-googles-dart-solve-them.ars