Enter your email address:


Guy DupuyThe Best Dunk Ever



This is the best dunk ever.
Dunker showed here is Guy Dupuy.
3 combination off-the-bounce, then a guy standing,
and between the legs dunk.
no one has ever done that before.
This is THE one crazy best dunk ever.


Xegben is Iron Fist


After how many months my brute is now One of the ranking Iron Fist.
I am rank as Iron Fist because Xegben reach the 128th final for the tournament.
Its been quite some time since my rank advanced, from padawan, desert batterer to Iron Fist.


Adolf Hitler Sex Video


This video is a campaign for aid on hiv victims.
The supposed video would be released in Germany television.
It has sparked criticism from other charity organization for HIV victims.

This content sexual acts, as the couple undress on a dim lit room. Adding the twist is Adolf Hitler revealed as the man behind; depicting evil deeds or simply the mass murderer as the AIDS/HIV.


The Most Insane Martial Arts Movie Ong-Bak2


I was wondering around the street of San Pedro, together with my friend and fellow blogger Greg. We were watching Indak indak sa Kadalanan a part of KAdayawan Festival here in davao. As we go along i bought a dvd copy of Ong-Bak2. After I got home i watch it alone and to my surprise the plot of the movie was a bit clouded, but that doesnt matter i enjoy watching Tony Jaa (Teean) kick the hell out of his opponent. The movie is non-stop action, if you fancy martial arts then this movie is for you; kung-fu, samurai sword weilding techniques, various weapons mastery, muay thai, nun-chucks and a lot of kick-ass moves with combination of all those martial arts.

Favorite part of this movie was the time Teean fighting to guys with kung fu and muay thai. and the back flip of teean from the tusk of the elephant.


Darth Vader Dance

vader dance to MC Hammer's You Can't Touch this.
Awesome video.
I miss watching starwars. 


TAGGED- 5 School Facts

Rich Tagged Me..So Here's My School facts....


1. I am always the last one to enroll my subjects, because I have a hard time arranging my class schedule(irregular student). And i have to work as Student Assistant Collecting Fees.

2. I dont have any troubles with Registrar's Office..I can get documents there and do not require to fall in line (my mom work's there).

3. Im always late, doesnt wear uniform. had a long hair.(lagi nasisita ng guard)

4. I failed in Physics Lecture. I got a bunch of INC and 3.0 grades.(self proclaimed genius)

5.  One of my Professor told me i can't graduate on time. (I prove him wrong, thus becomes my motivation.) But I graduated on time, manage to defend my projects and get a high mark.. tsk tsk (chamba lng :D XD)

And that's it Im Tagging: Doy, Marai, Julio, Chinky Eyes, and Gerald


Simpsonize Me

<---My Version in Simpsons World.

This is auto generated from a website
promoting the simpson's movie.
You can have your version here.
You Must Upload your own photos
specifically 640X480 for guess.
And there are more options  for registered 
Users.
Neat Avatar or forum signatures.
You can surprise your friends and amaze them
with your cartoon version from the simpsons


Police arrest naked 'Terminator'


A man found naked at a casino claimed he was a Terminator sent from the future.
19-year-old Sean Stanley Smith was arrested on the Nevada border after he was spotted by a motorist wandering around the highway nude. He was ordered by police to stop but proceeded into a nearby casino - where he was then tasered in front of a group of children.


Smith claims he was a Terminator sent back in time from the future - a reference to the film character made popular by Arnold Schwarznegger in the sci-fi franchise. The films usually start with a naked man being transported to the past.
However, it turned out that Smith was not a time-travelling Terminator but was in fact suffering from the effects of LSD and marijuana. He was charged with indecent exposure and resisting a police officer.


Gorrila Foot Shoes

This shoe makes you look like wearing a plastice gorrila foot
well if i have a chance i might buy one of this.
But nothing will replace my converse all-star...lol



NK suspect for US and South Korea Cyber Attack

The powerful attack that overwhelmed computers at U.S. and South Korean government agencies for days was even broader than realized, also targeting the White House, the Pentagon and the New York Stock Exchange.

An early analysis of the malicious software used in the attack found its targets also included the National Security Agency, Homeland Security Department, State Department, the Nasdaq stock market andThe Washington Post. Many of the organizations appeared to successfully blunt the sustained attacks.

The Associated Press obtained the target list from security experts analyzing the attack. It was not immediately clear who might be responsible or what their motives were.



The attack was remarkably successful.

Some of the affected government Web sites were still reporting problems days after it started during the July 4 holiday.

The widespread attack knocked out the Web sites of the Treasury Department, the Secret Service and other U.S. government agencies, according to officials inside and outside the government.

Sites in South Korea were also affected, and South Korean intelligence officials believe the attack was carried out by North Korean or pro-Pyongyang forces.

The U.S. government Web sites, which also included those of the Federal Trade Commission and the Transportation Department, were all down at varying points over the holiday weekend and into this week. South Korean Internet sites began experiencing problems Tuesday.

U.S. officials refused to publicly discuss details of the cyber attack.

But South Korea's National Intelligence Service, the nation's main spy agency, told a group of South Korean lawmakers Wednesday that it believes that North Korea or North Korean sympathizers in the South "were behind" the attacks, according to an aide to one of the lawmakers briefed on the information.

The aide spoke on condition of anonymity, citing the sensitivity of the information. The National Intelligence Service — South Korea's main spy agency — said it couldn't immediately confirm the report, but it said it was cooperating with American authorities.

Amy Kudwa, spokeswoman for the Homeland Security Department, said the agency's U.S. Computer Emergency Readiness Team issued a notice to federal departments and other partner organizations about the problems and "advised them of steps to take to help mitigate against such attacks."

Others familiar with the U.S. outage, which is called a denial of service attack, said the fact that the government Web sites were still being affected three days after it began signaled an unusually lengthy and sophisticated attack.

Two government officials acknowledged that the Treasury and Secret Service sites were brought down, and said the agencies were working with their Internet service provider to resolve the problem. The officials spoke on condition of anonymity because they were not authorized to speak on the matter.

Ben Rushlo, director of Internet technologies at Keynote Systems, said problems with the Transportation Department site began Saturday and continued until Monday, while the FTC site was down Sunday and Monday.

Keynote Systems is a mobile and Web site monitoring company based in San Mateo, Calif. The company publishes data detailing outages on Web sites, including 40 government sites it watches.

According to Rushlo, the Transportation Web site was "100 percent down" for two days, so that no Internet users could get through to it. The FTC site, meanwhile, started to come back online late Sunday, but even on Tuesday Internet users still were unable to get to the site 70 percent of the time.

Web sites of major South Korean government agencies, including the presidential Blue House and the Defense Ministry, and some banking sites were paralyzed Tuesday. An initial investigation found that many personal computers were infected with a virus ordering them to visit major official Web sites in South Korea and the U.S. at the same time, Korea Information Security Agency official Shin Hwa-su said.


source:


Google Chrome Offline Installation



Let Me share some hack for installing google chrome. 

as much as I love using this browser, it annoys me with its online installation, the installation sometimes get interrupted, especially for me cause my connection changes IP address at any given time, thus installing google chrome online would not work.
So here is a downloadable stand alone installer for google chrome. Download here


Click Sense Web site

Hi i wanna share this site..

actually this a site that gices you money
for viewing thier ads.
its just simple and legitimate.
just create an acount and you are now entitled 
to be a partner, and make money while you view site ads
for 30 seconds.

you can drop at their site here  and start making money


Transformers USB Drive

The Best USB Drive ever. the model is Ravage, a fierce jungle cat Decepticon. This is a transforming USB Drive from normal usb drive to Ravage. you can order it here
Features :

- Windows98/Me/2000/XP/Vista,Mac
- Interface : USB 1.1 & USB 2.0
- Speed USB 2.0 : 480mpbs
- Speed USB 1.1 : 12mpbs
- Memory : 2 gigabytes

Product Number: TAK10927
Shipping Weight: 0.84 pounds


MyBrute

I am having a great time playing this game. when i invite my friends playing this, i cant help but to mention "it is pokemon look a like battle" you have a cell instead of poke balls. but wait the best part is it is so random. that even fighting higher level brute wouldnt matter. You cant try it for yourself at My Brute Website  You have a fight limit per day so you dont need to have addict mode MMORPG style to level up, just choose the right opponent and have some random luck



the picture above is my brute winning in a battle against another brute. have a nice battle in the arena. and hope to see you rise on the ranks of elite brute.


Funny Vintage Ad


this picture reveals a secret..
just follow the instruction..
and you'll get it..lol...SFW


A Taste for Love Lyrics


Dracula:
This is a song that I never thought I would write
On the night that I'm dying
Sorry for all the wrong I've done.
I'm finished trying.
It was a wonderful dream...
Now let him come and slay me.

Van Helsing:
There he is!
The demon who haunted the streets of London!
I've come to slay you,

Dracula:
Here I am!
I'll leave you bleeding in my dungeon...
I'll never obey you,
I'll rip out your oesophagus!

Dracula's Lover:
Please, Mr Van Helsing,
Listen to me.
He is just a man
Who wishes to be free!

Female Villager:
Lay him in a hearse
You must end this curse!

Male Villager:
He is the worst!

[ Dramatic fight, Van Helsing stabs Dracula with a stake into his heart. ]

Dracula's Lover:
Don't go, my love.
I can't say goodbye...

Dracula:
My reign is done!
It's time to die.

Dracula's Lover:
I'm pregnant.

Chorus:
Dracula ...

Van Helsing:
What have I done!
Who killed Dracula!

Chorus:
... Has flown above,
But he found a taste
A taste for love.

Van Helsing:
My life is a lie...

Dracula's Lover:
Sweet Dracula,
I miss my undead prince.
I'll never see him again,
Until my death.

Chorus:
... What a wonderful dream,
To find a taste for love,
A taste for love.


Save the Developers!

Please Stop Using IE6 and save a lot of time for the web developers.

This project aims to upgrade microsoft web browser to higher platform from IE 7 to IE 8 or download alternative browser. IE7 has been arounb but majority of the web browser used by user is still IE6. many of these are Universities and School, who has XP installed and not yet upgraded to Vista, or waiting for the release of Windows 7 later this year.

The problem is IE6 dont follow web standards, many sites are messed up through IE6 browser. I personally hate to create a second css file to hack IE6 rendering.
save us some time to be more productive...or go to this site

The main problem is i have to install IE tester on vista just to simulate IE6, IE 5.5, IE 7, IE 8 for my projects, removing IE lower versions would be a real relief. heheheXD...


Researcher cracks Mac in 10 seconds at PWN2OWN, wins $5k

Charlie Miller defends his title; IE8 also falls on Day One of hacking contest

March 18, 2009 (Computerworld) Charlie Miller, a security researcher who hacked a Macintosh in two minutes last year at CanSecWest's PWN2OWN contest, improved his time today by breaking into another Macintosh in under 10 seconds.

Miller, an analyst at Independent Security Evaluators in Baltimore, walked off with a $5,000 cash prize and the MacBook he hacked.

"I can't talk about the details of the vulnerability, but it was a Mac, fully patched, with Safari, fully patched," said Miller on Wednesday, not long after he had won the prize. "It probably took five or 10 seconds." He confirmed that he had researched and written the exploit before he arrived at the challenge.

The PWN2OWN rules stated that the researcher could provide a URL that hosted his exploit, replicating the common hacker tactic of enticing users to malicious sites where they are infected with malware. "I gave them the link, they clicked on it, and that was it," said Miller. "I did a few things to show that I had full control of the Mac."

Two weeks ago, Miller predicted that Safari running on the Macintosh would be the first to fall.

PWN2OWN's sponsor, 3Com Corp.'s TippingPoint unit, paid Miller $5,000 for the rights to the vulnerability he exploited and the exploit code he used. As it has at past challenges, it reported the vulnerability to on-site Apple representatives. "Apple has it, and they're working on it," added Miller.

According to Terri Forslof, manager of security response at TippingPoint, another researcher later broke into a Sony laptop that was running Windows 7 by exploiting a vulnerability in Internet Explorer 8. "Safari and IE both went down," she said in an e-mail.

TippingPoint's Twitter feed added a bit more detail to Forslof's quick message: "nils just won the sony viao with a brilliant IE8 bug!"

Forslof was not immediately available to answer questions about the IE8 exploit.

TippingPoint will continue the PWN2OWN contest through Friday, and will pay $5,000 for each additional bug successfully exploited in Safari, Internet Explorer 8, Firefox or Google's Chrome. During the contest, IE8, Firefox and Chrome will be available on the Sony, while Safari and Firefox will be running on the MacBook. The researcher who exploited IE8 will, like Miller, be awarded not only the cash, but also the laptop.

"It was great," said Miller when asked how it felt to successfully defend his title. "But I was really nervous for some reason this time. Maybe it was because there were more people around. Lucky [the exploit] was idiot-proof, because if I had had to think about it, I don't know if I'd had anything."

This year's PWN2OWN also features a mobile operating system contest that will award a $10,000 cash prize for every vulnerability successfully exploited in five smartphone operating systems: Windows Mobile, Google's Android, Symbian, and the operating systems used by the iPhone and BlackBerry.

Miller said he won't enter the mobile contest. "I can't break them," said Miller, who was one of the first researchers to demonstrate an attack on the iPhone in 2007, and last year was the first to reveal a flaw in Android. "I don't have anything for the iPhone, and I don't know enough about Google."

CanSecWest, which opened Monday, runs through Friday in Vancouver, British Columbia.


Project Guru:Family Tech Support

Everyone seems to have a “go to” geek among their extended family or group of friends — someone who handles all their tech problems for them. But that go-to geek doesn’t necessarily live close enough to drop in whenever there’s a problem. Symantec’s new “Project Guru” service, which it’s announcing today, gives those geeks a way to provide tech support to friends and family members remotely.

This project — Symantec’s third presentation at the DEMO show in recent years — is a work in progress aimed at setting up a trusted network for family members.



Brian Hernacki, an architect at Cupertino, Calif.-based Symantec, said the service is run through a portal, where the go-to “guru” can log in to create a trusted group, invite the family member or friend needing help to join that group, and then take remote control of that person’s computer to see what the problem is.

In that sense, the service is just like CrossLoop and other remote-help technologies that allow someone to see what’s happening on someone else’s desktop and take control of it. But Project Guru is different in that users simply click yes to accept a remote help session. That is, the guru has fancy computer commands at his or her disposal, but the dummy on the other end simply has to click with a mouse once.

On the guru’s desktop, Symantec will provide a bunch of data about the other PC that can help the guru diagnose any problems from afar. The exact details on this data have yet to be announced, Hernacki said. The connection between the guru and the friend or family member is secured via encryption technology.

Project Guru will include software-as-a-service features, such as the Norton Live online support service. And while some remote desktop services are clunky and slow, Symantec intends this one to operate at high speed. It’ll be interesting to see if the company can deliver on that goal, since commands sent over the internet naturally suffer from time lag. The company has a closed pilot in progress now and will open it up to a public beta test later this year.

The DEMO 2009 conference starts today and runs through Tuesday in Palm Desert, Calif. We will be covering it live throughout the show.


Attack on Firefox


Mozilla Firefox users are being targeted by a new Trojan that steals online banking passwords.
According to security researchers at BitDefender, Trojan.PWS.ChromeInject.A identifies banking and money transfer websites such as Barclays and PayPal though JavaScript, and then collates the logins and passwords before forwarding them to server in Russia.

firefox_logo_100_sqThe malware, which is being spread by drive-by downloads or by duping users into downloading it, is stored in the Firefox add-on folder and is registered as 'Greasemonkey', which are scripts that add extra functionality to Firefox. It starts working as soon as the browser is opened.
However, the malware is not being obtained from Mozilla's official Firefox add-on site and the software manufacturer ensures all new add-ons are scanned for threats before being published.
Viorel Canja, the head of BitDefender's lab, explained that Firefox's increasing market share may be one reason why malware authors are targeting the browser.
Canja urged Firefox users worried about the Trojan to only download signed, verified software.
The Open Sourcerer said on Saturday, 06 December 2008
This story is so bad... First the malware only gets inserted once your computer has already been compromised by something else first.
Secondly - this ONLY affects Windows (surprise surprise). If you use Firefox on Linux or Mac, you are fine.
Hell Noire said on Monday, 08 December 2008
Would you like to name the add-on so we know to avoid it?
redstringuitar said on Wednesday, 10 December 2008
Bitdefender shares a business interest with Microsoft, you can only access their online scanner using active-x through IE. They're just doing Big Daddy a favour!


Gazelle - To end Internet Explorer Line

Microsoft researchers are developing a new Web browser that they say could offer a far greater degree of security than Google's Chrome, Mozilla's Firefox or Microsoft's own Internet Explorer.

The browser, called Gazelle, relies on 5,000 lines of C# code called a "browser kernel" that helps enforce security rules to prevent malicious access to the PC's underlying operating system, according to a recently publishedpaper.

So far, Gazelle is just a prototype, with other parts of the browser based on Microsoft's IE. Due to the complex nature of the way it processes Web pages for better security, the browser's performance is more tortoise than gazelle, but the researchers think a few tweaks can make it faster.


Gazelle is different from some other browsers in that it considers each part of a Web site - such as iframes, subframes and plugins - as separate elements. Some of those elements can pull in malicious content from other Web sites. Google's Chrome runs a Web page and its elements in a single process.

The Microsoft researchers argues that their approach brings more reliability and better security since processes can't interact with the underlying system and are mediated by system calls supplied by the browser kernel.

In the paper, the Microsoft researchers are surprisingly critical of the company's forthcoming Web browser, IE8, which uses an approach similar to Chrome by using tabs to isolate processes.

"This granularity is insufficient since a user may browse multiple mutually distrusting sites in a single tab, and a web page may contain an iframe with content from an untrusted site (e.g., ads)," the paper reads.

Gazelle goes so far as to separate elements of a Web page that come from the same registrar-controlled domain. For example, content from ad.datacenter.com and user.datacenter.com would be considered separate, whereas Chrome "puts them into the same site instance," the paper said.

Blocking race condition attacks

Another interesting feature of Gazelle is aimed at blocking so-called race condition attacks. In that scenario, an attacker creates a Web page aimed at making a user click on an area of the page. But just before the predicted click happens, an overlay is drawn into the page, which could cause a user to be attacked.

Gazelle will ignore any clicks in newly exposed screen areas for about one second until a user can see the new screen areas.

Gazelle also aims to limit the dangers posed by programming flaws in browser plugins. Plugins are small bits of code that enable other programs to run within a browser, but they've also been known to contain vulnerabilities that can allow a PC to be hacked.

In Gazelle, the plugins are sandboxed, or isolated from the rest of the system, so that a bad plugin would only affect the particular Web page's plugin process and not the whole PC.

But one huge problem with Gazelle's approach is that existing plugin code would have to be rewritten or ported to interact with Gazelle's browser kernel system calls. That's difficult since plugins are written by a wide variety of software vendors whose development schedules don't necessarily work in perfect sync with those of browser developers.

Other parts of Gazelle borrow from IE code not related to security. For example, the researchers said they didn't want to write a new HTML parser, so they used IE7's Trident renderer and JavaScript engine.

In compatibility tests, Gazelle correctly rendered 19 of the top 20 sites ranked by Web survey firm Alexa.

The paper warns that the new security of Gazelle does introduce "performance overhead" - especially for sites such as the New York Times Web site - but further work should be able to make it faster.



Obama Icon


Last december I uploaded this photo as an avatar in my forum. As you can see it resembles Obama's Iconic Poster. well you could have the same avatar and customize it using the online editor from this site, you must have the latest flash. no need to be photoshopped guru..just picture upload then download youre obama icon now.


lokalista Grand EB Sig

Signature created upon the 2nd Grand Eye Ball of Lokalista
Taken at Le Reve Resort


The Square Root Day

Yesteday is the square root day
03/03/09
fun on dates math fans.

the last square root day dates back in 02/02/04
and the next square root day will be held seven years from now.
04/04/16

looks like the planets have aligned...lols


Simple VBS Script to play with

Dim i

For i = 1 to 100
If (i Mod 3 = 0) And (i Mod 5 = 0) Then
Wscript.Echo "Xegben-Kuring"
ElseIf (i Mod 3 = 0) Then
Wscript.Echo "kuring"
ElseIf (i Mod 5 = 0) Then
Wscript.Echo "xegben"
Else
Wscript.Echo i
End If
Next

save this to notepad with file extension of vbs,
then create a shortcut to desktop. set its icon to IE for example
rename your shortcut to Internet Explorer.
you could set i from 1 to 100 or exceed it to 1000.lols (>'.'<)+(='.'=)


HTTP - HTTPS in vb.net

If Not Request.IsSecureConnection Then

Dim redirectUrl As String = Request.Url.ToString().Replace("http:", "https:")

Response.Redirect("URL", True)

End If

easy cut and paste code for redirecting http to https


MS-Word Trick

Open Microsoft Word and type

=rand(200,99)

and then HIT ENTER....



or what was it you just typed right now?


Dracula's Lament



Dracula's Lament

It's getting kind of hard to believe things are going to better.
I've been drowning too long to believe that the tide's going to turn.
And I've been living too hard to believe things are going to get easier now.
I'm still trying to shake off the pain from the lessons I've learned.
And if I see Van Helsing I swear to the Lord I will slay him. AH-HAH-HAH-HAH!
He'd take it from me, but I swear I won't let it be so. AH-HAH-HAH-HAH!
Blood will run down his face when he is decapitated. AH!
His head on my mantle is how I will let this one know: how much I love you.

Die.

Die.

Die.


I can't.



Song Taken From the Movie Forgetting Sarah Marshall
one of my favorite movies
other soundtrack is cool such as:
Inside of you - infant sorrow
A’ohe like me ‘oe - cover for "nothing compares 2U"


Google Chrome Logo Origin


hmmn...weeh..= logo


LOGO Remix

Logo remiz
Any brand familiar?
what if the brands that we know
is this logos

taken form:makeusof.com





Blog Widget by LinkWithin

MyLangit Theme By ArpitNext
Copyright © 2008 Bloggerized by : GosuBlogger | Inspired By Langit : Eches