tag:blogger.com,1999:blog-11814262950261802972024-03-13T12:10:58.212-07:00XegbenSmells Like G33K SpiritUnknownnoreply@blogger.comBlogger50125tag:blogger.com,1999:blog-1181426295026180297.post-76012590476115317882010-08-06T01:43:00.001-07:002010-08-06T01:46:04.889-07:00Stencil<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbO21b6C15iOAr3H8ObtWwvBnYiJQaYAFMcaXY_ROKWFYzpggPzPrcA_d2DaigiIutxQTSSJL9R2IH4T3yNH0PgsRu-oyKOTknj1I0rXTu0u49TC-mcr5dB1XTtWdPrBINouP23Y1qj5Og/s1600/acs.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 200px; height: 194px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbO21b6C15iOAr3H8ObtWwvBnYiJQaYAFMcaXY_ROKWFYzpggPzPrcA_d2DaigiIutxQTSSJL9R2IH4T3yNH0PgsRu-oyKOTknj1I0rXTu0u49TC-mcr5dB1XTtWdPrBINouP23Y1qj5Og/s200/acs.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5502214830380111874" /></a><br /><br /><br />Just practicing photo manipulation..<br />using stencil spray technique..Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1181426295026180297.post-1184323777345061952009-09-18T19:07:00.000-07:002009-09-18T20:31:15.622-07:00Guy DupuyThe Best Dunk Ever<object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" width="400" height="350" id="viddler"><param name="movie" value="http://www.viddler.com/player/8a7db6a5/" /><param name="allowScriptAccess" value="always" /><param name="allowFullScreen" value="true" /><embed src="http://www.viddler.com/player/8a7db6a5/" width="400" height="350" type="application/x-shockwave-flash" allowScriptAccess="always" allowFullScreen="true" name="viddler" ></embed></object><br /><br />This is the best dunk ever.<br />Dunker showed here is Guy Dupuy.<br />3 combination off-the-bounce, then a guy standing, <br />and between the legs dunk.<br />no one has ever done that before.<br />This is THE one crazy best dunk ever.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1181426295026180297.post-47081675432723734652009-09-14T22:36:00.000-07:002009-09-14T22:41:23.923-07:00Xegben is Iron Fist<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://online-gamers-pro.com/images/feat/mybrute-feat.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 120px;" src="http://online-gamers-pro.com/images/feat/mybrute-feat.jpg" border="0" alt="" /></a><br />After how many months my brute is now One of the ranking Iron Fist.<br />I am rank as Iron Fist because <a href="http://xegben.mybrute.com/cellule">Xegben</a> reach the 128th final for the tournament.<br />Its been quite some time since my rank advanced, from padawan, desert batterer to Iron Fist.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1181426295026180297.post-28616068360995661742009-09-06T21:15:00.000-07:002009-09-06T21:22:15.631-07:00Adolf Hitler Sex Video<object id="flashObj" classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=9,0,47,0" width="486" height="412"><param name="movie" value="http://c.brightcove.com/services/viewer/federated_f9/25500650001?isVid=1&publisherID=1138077173"><param name="bgcolor" value="#FFFFFF"><param name="flashVars" value="videoId=37150158001&playerID=25500650001&domain=embed&"><param name="base" value="http://admin.brightcove.com"><param name="seamlesstabbing" value="false"><param name="allowFullScreen" value="true"><param name="swLiveConnect" value="true"><param name="allowScriptAccess" value="always"><embed src="http://c.brightcove.com/services/viewer/federated_f9/25500650001?isVid=1&publisherID=1138077173" bgcolor="#FFFFFF" flashvars="videoId=37150158001&playerID=25500650001&domain=embed&" base="http://admin.brightcove.com" name="flashObj" seamlesstabbing="false" type="application/x-shockwave-flash" allowfullscreen="true" swliveconnect="true" allowscriptaccess="always" pluginspage="http://www.macromedia.com/shockwave/download/index.cgi?P1_Prod_Version=ShockwaveFlash" width="486" height="412"></embed></object><br />This video is a campaign for aid on hiv victims.<br />The supposed video would be released in Germany television.<br />It has sparked criticism from other charity organization for HIV victims.<br /><br />This content sexual acts, as the couple undress on a dim lit room. Adding the twist is Adolf Hitler revealed as the man behind; depicting evil deeds or simply the mass murderer as the AIDS/HIV.Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-1181426295026180297.post-57260729166868602402009-08-23T21:16:00.000-07:002009-08-23T22:31:54.437-07:00The Most Insane Martial Arts Movie Ong-Bak2<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://geektyrant.com/wp-content/uploads/2009/07/poster_ong_bak_2_trio.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 450px; height: 250px;" src="http://geektyrant.com/wp-content/uploads/2009/07/poster_ong_bak_2_trio.jpg" border="0" alt="" /></a><br />I was wondering around the street of San Pedro, together with my friend and fellow blogger Greg. We were watching Indak indak sa Kadalanan a part of KAdayawan Festival here in davao. As we go along i bought a dvd copy of Ong-Bak2. After I got home i watch it alone and to my surprise the plot of the movie was a bit clouded, but that doesnt matter i enjoy watching Tony Jaa (Teean) kick the hell out of his opponent. The movie is non-stop action, if you fancy martial arts then this movie is for you; kung-fu, samurai sword weilding techniques, various weapons mastery, muay thai, nun-chucks and a lot of kick-ass moves with combination of all those martial arts.<div>Favorite part of this movie was the time Teean fighting to guys with kung fu and muay thai. and the back flip of teean from the tusk of the elephant.</div><div><br /></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1181426295026180297.post-18081382588910465302009-07-26T22:37:00.000-07:002009-07-26T22:39:42.457-07:00Darth Vader Dance<div>vader dance to MC Hammer's You Can't Touch this.</div><div>Awesome video.</div><div>I miss watching starwars. </div><object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/vIRQf0S3oD0&color1=0xb1b1b1&color2=0xcfcfcf&hl=en&feature=player_embedded&fs=1"><param name="allowFullScreen" value="true"><param name="allowScriptAccess" value="always"><embed src="http://www.youtube.com/v/vIRQf0S3oD0&color1=0xb1b1b1&color2=0xcfcfcf&hl=en&feature=player_embedded&fs=1" type="application/x-shockwave-flash" allowfullscreen="true" allowscriptaccess="always" width="425" height="344"></embed></object>Unknownnoreply@blogger.com2tag:blogger.com,1999:blog-1181426295026180297.post-72953938823158328482009-07-20T16:45:00.000-07:002009-07-20T20:45:44.805-07:00TAGGED- 5 School Facts<a href="http://iamrichgirl.blogspot.com/">Rich</a> Tagged Me..So Here's My School facts....<div><br /></div><div>1. I am always the last one to enroll my subjects, because I have a hard time arranging my class schedule(irregular student). And i have to work as Student Assistant Collecting Fees.</div><div><br /></div><div>2. I dont have any troubles with Registrar's Office..I can get documents there and do not require to fall in line (my mom work's there).</div><div><br /></div><div>3. Im always late, doesnt wear uniform. had a long hair.(lagi nasisita ng guard)</div><div><br /></div><div>4. I failed in Physics Lecture. I got a bunch of INC and 3.0 grades.(self proclaimed genius)</div><div><br /></div><div>5. One of my Professor told me i can't graduate on time. (I prove him wrong, thus becomes my motivation.) But I graduated on time, manage to defend my projects and get a high mark.. tsk tsk (chamba lng :D XD)</div><div><br /></div><div>And that's it Im Tagging: <a href="http://virced07.blogspot.com/">Doy</a>, <a href="http://www.selfaholik.blogspot.com/">Marai</a>, <a href="http://boykidlat.blogspot.com/">Julio</a>, <a href="http://chinky-eyes.blogspot.com/">Chinky Eyes</a>, and <a href="http://geekerzz.blogspot.com/">Gerald</a></div>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-1181426295026180297.post-638761397801528992009-07-20T15:04:00.001-07:002009-07-20T15:09:53.759-07:00Simpsonize Me<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuIddAoO1CWsloQgCSN7tURAB8LIvoujkuEGpBgZX2QeB2Tis9EFYwy7Hakh0iRHCDuyk5Rg_g2GKHqwmYezU0UDWm7XXWuhVKY8v6yViOKPKW9Ff5r5l32TMENEbAGm3Pl4ppzO3j4OGq/s1600-h/arbensimpson.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 159px; height: 200px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuIddAoO1CWsloQgCSN7tURAB8LIvoujkuEGpBgZX2QeB2Tis9EFYwy7Hakh0iRHCDuyk5Rg_g2GKHqwmYezU0UDWm7XXWuhVKY8v6yViOKPKW9Ff5r5l32TMENEbAGm3Pl4ppzO3j4OGq/s200/arbensimpson.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5360666752180158114" /></a><---My Version in Simpsons World.<div>This is auto generated from a website</div><div>promoting the simpson's movie.</div><div>You can have your version <a href="http://simpsonizeme.com">here</a>.</div><div>You Must Upload your own photos</div><div>specifically 640X480 for guess.</div><div>And there are more options for registered </div><div>Users.</div><div>Neat Avatar or forum signatures.</div><div>You can surprise your friends and amaze them</div><div>with your cartoon version from the simpsons</div><div><br /></div>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-1181426295026180297.post-51097472446381253742009-07-16T20:52:00.000-07:002009-07-16T21:24:50.147-07:00Police arrest naked 'Terminator'<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://spotovi.org/files/celebrity/7.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 200px; height: 300px;" src="http://spotovi.org/files/celebrity/7.jpg" border="0" alt="" /></a><br /><div>A man found naked at a casino claimed he was a Terminator sent from the future.<br /></div><div>19-year-old Sean Stanley Smith was arrested on the Nevada border after he was spotted by a motorist wandering around the highway nude. He was ordered by police to stop but proceeded into a nearby casino - where he was then tasered in front of a group of children.</div><div><br /></div><div><br /></div><div>Smith claims he was a Terminator sent back in time from the future - a reference to the film character made popular by Arnold Schwarznegger in the sci-fi franchise. The films usually start with a naked man being transported to the past.</div><div>However, it turned out that Smith was not a time-travelling Terminator but was in fact suffering from the effects of LSD and marijuana. He was charged with indecent exposure and resisting a police officer.</div><div><br /></div><div><a href="http://uk.movies.yahoo.com/13072009/5/naked-man-casino-terminator-0.html">source</a></div>Unknownnoreply@blogger.com3tag:blogger.com,1999:blog-1181426295026180297.post-64919198480370443232009-07-13T16:44:00.000-07:002009-07-13T16:47:56.454-07:00Gorrila Foot Shoes<div>This shoe makes you look like wearing a plastice gorrila foot</div><div>well if i have a chance i might buy one of this.</div><div>But nothing will replace my converse all-star...lol<br /><br /></div><object id="flashObj" width="404" height="436" classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=9,0,47,0"><param name="movie" value="http://c.brightcove.com/services/viewer/federated_f9/1813626064?isVid=1&publisherID=1564549380"><param name="bgcolor" value="#FFFFFF"><param name="flashVars" value="videoId=29013939001&playerID=1813626064&domain=embed&"><param name="base" value="http://admin.brightcove.com"><param name="seamlesstabbing" value="false"><param name="allowFullScreen" value="true"><param name="swLiveConnect" value="true"><param name="allowScriptAccess" value="always"><embed src="http://c.brightcove.com/services/viewer/federated_f9/1813626064?isVid=1&publisherID=1564549380" bgcolor="#FFFFFF" flashvars="videoId=29013939001&playerID=1813626064&domain=embed&" base="http://admin.brightcove.com" name="flashObj" width="404" height="436" seamlesstabbing="false" type="application/x-shockwave-flash" allowfullscreen="true" swliveconnect="true" allowscriptaccess="always" pluginspage="http://www.macromedia.com/shockwave/download/index.cgi?P1_Prod_Version=ShockwaveFlash"></embed></object><div><br /></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1181426295026180297.post-79942199622259181152009-07-09T17:00:00.000-07:002009-07-09T21:29:59.949-07:00NK suspect for US and South Korea Cyber Attack<span class="Apple-style-span" style=" ;font-family:Verdana;font-size:11px;"><p style="padding-right: 0px; padding-left: 0px; display: block; padding-top: 0px; padding-bottom: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.25em; margin-left: 0px; font-size: small; line-height: 1.25em; text-align: left; ">The powerful attack that overwhelmed computers at U.S. and South Korean government agencies for days was even broader than realized, also targeting the White House, the Pentagon and the New York Stock Exchange.</p><p style="padding-right: 0px; padding-left: 0px; display: block; padding-top: 0px; padding-bottom: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.25em; margin-left: 0px; font-size: small; line-height: 1.25em; text-align: left; ">An early analysis of the malicious software used in the attack found its targets also included the National Security Agency, Homeland Security Department, State Department, the Nasdaq stock market and<em>The Washington Post</em>. Many of the organizations appeared to successfully blunt the sustained attacks.</p><p style="padding-right: 0px; padding-left: 0px; display: block; padding-top: 0px; padding-bottom: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.25em; margin-left: 0px; font-size: small; line-height: 1.25em; text-align: left; ">The Associated Press obtained the target list from security experts analyzing the attack. It was not immediately clear who might be responsible or what their motives were.</p><br /><span class="fullpost"><br /><p style="padding-right: 0px; padding-left: 0px; display: block; padding-top: 0px; padding-bottom: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.25em; margin-left: 0px; font-size: small; line-height: 1.25em; text-align: left; ">The attack was remarkably successful.<br /><br /> Some of the affected government Web sites were still reporting problems days after it started during the July 4 holiday.</p><p style="padding-right: 0px; padding-left: 0px; display: block; padding-top: 0px; padding-bottom: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.25em; margin-left: 0px; font-size: small; line-height: 1.25em; text-align: left; ">The widespread attack knocked out the Web sites of the Treasury Department, the Secret Service and other U.S. government agencies, according to officials inside and outside the government.</p><p style="padding-right: 0px; padding-left: 0px; display: block; padding-top: 0px; padding-bottom: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.25em; margin-left: 0px; font-size: small; line-height: 1.25em; text-align: left; ">Sites in South Korea were also affected, and South Korean intelligence officials believe the attack was carried out by North Korean or pro-Pyongyang forces.</p><p style="padding-right: 0px; padding-left: 0px; display: block; padding-top: 0px; padding-bottom: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.25em; margin-left: 0px; font-size: small; line-height: 1.25em; text-align: left; ">The U.S. government Web sites, which also included those of the Federal Trade Commission and the Transportation Department, were all down at varying points over the holiday weekend and into this week. South Korean Internet sites began experiencing problems Tuesday.</p><p style="padding-right: 0px; padding-left: 0px; display: block; padding-top: 0px; padding-bottom: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.25em; margin-left: 0px; font-size: small; line-height: 1.25em; text-align: left; ">U.S. officials refused to publicly discuss details of the cyber attack.</p><p style="padding-right: 0px; padding-left: 0px; display: block; padding-top: 0px; padding-bottom: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.25em; margin-left: 0px; font-size: small; line-height: 1.25em; text-align: left; ">But South Korea's National Intelligence Service, the nation's main spy agency, told a group of South Korean lawmakers Wednesday that it believes that North Korea or North Korean sympathizers in the South "were behind" the attacks, according to an aide to one of the lawmakers briefed on the information.</p><p style="padding-right: 0px; padding-left: 0px; display: block; padding-top: 0px; padding-bottom: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.25em; margin-left: 0px; font-size: small; line-height: 1.25em; text-align: left; ">The aide spoke on condition of anonymity, citing the sensitivity of the information. The National Intelligence Service — South Korea's main spy agency — said it couldn't immediately confirm the report, but it said it was cooperating with American authorities.</p><p style="padding-right: 0px; padding-left: 0px; display: block; padding-top: 0px; padding-bottom: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.25em; margin-left: 0px; font-size: small; line-height: 1.25em; text-align: left; ">Amy Kudwa, spokeswoman for the Homeland Security Department, said the agency's U.S. Computer Emergency Readiness Team issued a notice to federal departments and other partner organizations about the problems and "advised them of steps to take to help mitigate against such attacks."</p><p style="padding-right: 0px; padding-left: 0px; display: block; padding-top: 0px; padding-bottom: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.25em; margin-left: 0px; font-size: small; line-height: 1.25em; text-align: left; ">Others familiar with the U.S. outage, which is called a denial of service attack, said the fact that the government Web sites were still being affected three days after it began signaled an unusually lengthy and sophisticated attack.</p><p style="padding-right: 0px; padding-left: 0px; display: block; padding-top: 0px; padding-bottom: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.25em; margin-left: 0px; font-size: small; line-height: 1.25em; text-align: left; ">Two government officials acknowledged that the Treasury and Secret Service sites were brought down, and said the agencies were working with their Internet service provider to resolve the problem. The officials spoke on condition of anonymity because they were not authorized to speak on the matter.</p><p style="padding-right: 0px; padding-left: 0px; display: block; padding-top: 0px; padding-bottom: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.25em; margin-left: 0px; font-size: small; line-height: 1.25em; text-align: left; ">Ben Rushlo, director of Internet technologies at Keynote Systems, said problems with the Transportation Department site began Saturday and continued until Monday, while the FTC site was down Sunday and Monday.</p><p style="padding-right: 0px; padding-left: 0px; display: block; padding-top: 0px; padding-bottom: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.25em; margin-left: 0px; font-size: small; line-height: 1.25em; text-align: left; ">Keynote Systems is a mobile and Web site monitoring company based in San Mateo, Calif. The company publishes data detailing outages on Web sites, including 40 government sites it watches.</p><p style="padding-right: 0px; padding-left: 0px; display: block; padding-top: 0px; padding-bottom: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.25em; margin-left: 0px; font-size: small; line-height: 1.25em; text-align: left; ">According to Rushlo, the Transportation Web site was "100 percent down" for two days, so that no Internet users could get through to it. The FTC site, meanwhile, started to come back online late Sunday, but even on Tuesday Internet users still were unable to get to the site 70 percent of the time.</p><p style="padding-right: 0px; padding-left: 0px; display: block; padding-top: 0px; padding-bottom: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.25em; margin-left: 0px; font-size: small; line-height: 1.25em; text-align: left; ">Web sites of major South Korean government agencies, including the presidential Blue House and the Defense Ministry, and some banking sites were paralyzed Tuesday. An initial investigation found that many personal computers were infected with a virus ordering them to visit major official Web sites in South Korea and the U.S. at the same time, Korea Information Security Agency official Shin Hwa-su said.</p><p style="padding-right: 0px; padding-left: 0px; display: block; padding-top: 0px; padding-bottom: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.25em; margin-left: 0px; font-size: small; line-height: 1.25em; text-align: left; "><br /></p><p style="padding-right: 0px; padding-left: 0px; display: block; padding-top: 0px; padding-bottom: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1.25em; margin-left: 0px; font-size: small; line-height: 1.25em; text-align: left; "><a href="http://www.npr.org/templates/story/story.php?storyId=106379469">source</a>:</p></span></span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1181426295026180297.post-62341266703789444762009-07-02T20:13:00.000-07:002009-07-02T21:32:11.470-07:00Google Chrome Offline Installation<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.blogsdna.com/wp-content/uploads/2008/09/google-chrome-logo.png"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 112px; height: 134px;" src="http://www.blogsdna.com/wp-content/uploads/2008/09/google-chrome-logo.png" border="0" alt="" /></a><br /><br />Let Me share some hack for installing google chrome. <div>as much as I love using this browser, it annoys me with its online installation, the installation sometimes get interrupted, especially for me cause my connection changes IP address at any given time, thus installing google chrome online would not work.</div><div>So here is a downloadable stand alone installer for google chrome. <a href="http://rapidshare.com/files/142199853/chrome_installer.exe">Download here</a></div><div><br /></div>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-1181426295026180297.post-36082698658282851032009-05-28T22:36:00.000-07:002009-05-28T23:20:56.430-07:00Click Sense Web siteHi i wanna share this site..<div>actually this a site that gices you money</div><div>for viewing thier ads.</div><div>its just simple and legitimate.</div><div>just create an acount and you are now entitled </div><div>to be a partner, and make money while you view site ads</div><div>for 30 seconds.</div><div><br /></div><div>you can drop at their site <a href="http://www.clixsense.com/?2796157">here</a> and start making money</div>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-1181426295026180297.post-45045431112459461652009-05-19T16:19:00.001-07:002009-05-19T16:24:50.169-07:00Transformers USB Drive<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvoVf5d8No4QKCV_JxKHvualZZdz1-BTW-hi4yABPqyndp9BhUiuwacch9mVTEmhjZI5P80viJGDxhwk08fSUI23kL3cKMQUiELSDkYcwP6Jv9pkojmJkpwFb6vnNabYfGDor3r32DCiSn/s1600-h/TAK10927.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 240px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvoVf5d8No4QKCV_JxKHvualZZdz1-BTW-hi4yABPqyndp9BhUiuwacch9mVTEmhjZI5P80viJGDxhwk08fSUI23kL3cKMQUiELSDkYcwP6Jv9pkojmJkpwFb6vnNabYfGDor3r32DCiSn/s320/TAK10927.jpg" alt="" id="BLOGGER_PHOTO_ID_5337678801533102098" border="0" /></a>The Best USB Drive ever. the model is Ravage, a fierce jungle cat Decepticon. This is a transforming USB Drive from normal usb drive to Ravage. you can order it <a href="http://www.bigbadtoystore.com/bbts/product.aspx?product=TAK10927&mode=retail&picture=out">here</a><br /><span style="font-size:85%;">Features :<br /><br />- Windows98/Me/2000/XP/Vista,Mac<br />- Interface : USB 1.1 & USB 2.0<br />- Speed USB 2.0 : 480mpbs<br />- Speed USB 1.1 : 12mpbs<br />- Memory : 2 gigabytes<br /> </span> <table width="580" border="0" cellpadding="2" cellspacing="2"> <tbody><tr> <td><span style="font-size:85%;">Product Number: TAK10927 <br /> Shipping Weight: 0.84 pounds</span></td></tr></tbody></table>Unknownnoreply@blogger.com4tag:blogger.com,1999:blog-1181426295026180297.post-79746621641031133772009-05-18T21:48:00.001-07:002009-05-18T21:55:04.387-07:00MyBruteI am having a great time playing this game. when i invite my friends playing this, i cant help but to mention "it is pokemon look a like battle" you have a cell instead of poke balls. but wait the best part is it is so random. that even fighting higher level brute wouldnt matter. You cant try it for yourself at <a href="http://xegben.mybrute.com">My Brute Website</a> You have a fight limit per day so you dont need to have addict mode MMORPG style to level up, just choose the right opponent and have some random luck<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgofCe2fP68C6PaQeobMOJQlEjNBzIgBadZTsn1ljh0rWmH4gmciOT0vyFFnxrnAmFy2HQYDg3Eb54MTi36oajJyAMtlOJvfJVePkB6VuIHDL4Ghi4LKcW94LUwlkxXrQpc-NYBMwfl6d8v/s1600-h/wewepawned.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 209px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgofCe2fP68C6PaQeobMOJQlEjNBzIgBadZTsn1ljh0rWmH4gmciOT0vyFFnxrnAmFy2HQYDg3Eb54MTi36oajJyAMtlOJvfJVePkB6VuIHDL4Ghi4LKcW94LUwlkxXrQpc-NYBMwfl6d8v/s320/wewepawned.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5337392541838079634" /></a><br /><br />the picture above is my brute winning in a battle against another brute. have a nice battle in the arena. and hope to see you rise on the ranks of elite brute.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1181426295026180297.post-2610619286087393462009-05-18T21:45:00.001-07:002009-05-18T21:47:49.420-07:00Funny Vintage Ad<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgn-3VdbK6OCtJo17U3FlPn8lgp7apHt17mYZgvaLn9TUAknKdO96l461nnEnujLWlEWBIG_E0XPK06QIDXtIsxHPfqn0fUXuI5PQUfipburnAlFNaloyzDb26nKFzJQBTz8x66jS0Y-eVv/s1600-h/a150_a7.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 312px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgn-3VdbK6OCtJo17U3FlPn8lgp7apHt17mYZgvaLn9TUAknKdO96l461nnEnujLWlEWBIG_E0XPK06QIDXtIsxHPfqn0fUXuI5PQUfipburnAlFNaloyzDb26nKFzJQBTz8x66jS0Y-eVv/s320/a150_a7.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5337391836962385602" /></a><br />this picture reveals a secret..<br />just follow the instruction..<br />and you'll get it..lol...SFWUnknownnoreply@blogger.com2tag:blogger.com,1999:blog-1181426295026180297.post-1383533747255627422009-03-25T15:50:00.000-07:002009-04-16T15:48:38.599-07:00A Taste for Love Lyrics<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://popculturezoo.com/wp-content/uploads/2008/12/51bw1o968wl_sl500_aa240_.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 240px; height: 240px;" src="http://popculturezoo.com/wp-content/uploads/2008/12/51bw1o968wl_sl500_aa240_.jpg" border="0" alt="" /></a><br />Dracula:<br />This is a song that I never thought I would write<br />On the night that I'm dying<br />Sorry for all the wrong I've done.<br />I'm finished trying.<br />It was a wonderful dream...<br />Now let him come and slay me.<br /><span class="fullpost"><br />Van Helsing:<br />There he is!<br />The demon who haunted the streets of London!<br />I've come to slay you,<br /><br />Dracula:<br />Here I am!<br />I'll leave you bleeding in my dungeon...<br />I'll never obey you,<br />I'll rip out your oesophagus!<br /><br />Dracula's Lover:<br />Please, Mr Van Helsing,<br />Listen to me.<br />He is just a man<br />Who wishes to be free!<br /><br />Female Villager:<br />Lay him in a hearse<br />You must end this curse!<br /><br />Male Villager:<br />He is the worst!<br /><br />[ Dramatic fight, Van Helsing stabs Dracula with a stake into his heart. ]<br /><br />Dracula's Lover:<br />Don't go, my love.<br />I can't say goodbye...<br /><br />Dracula:<br />My reign is done!<br />It's time to die.<br /><br />Dracula's Lover:<br />I'm pregnant.<br /><br />Chorus:<br />Dracula ...<br /><br />Van Helsing:<br />What have I done!<br />Who killed Dracula!<br /><br />Chorus:<br />... Has flown above,<br />But he found a taste<br />A taste for love.<br /><br />Van Helsing:<br />My life is a lie...<br /><br />Dracula's Lover:<br />Sweet Dracula,<br />I miss my undead prince.<br />I'll never see him again,<br />Until my death.<br /><br />Chorus:<br />... What a wonderful dream,<br />To find a taste for love,<br />A taste for love.</span>Unknownnoreply@blogger.com4tag:blogger.com,1999:blog-1181426295026180297.post-11179251294442913382009-03-20T18:44:00.000-07:002009-03-20T18:59:05.002-07:00Save the Developers!<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEio6SeACPSrMLqGY_SIXUVqNxLRc1DzUCSvHx76-j-QqSLOBL5cIrIW8a1b_y8iEqyo7pFoJI7lvnAaM5IOl4cEbi2NDiw9YSrfCN5pJ4o6rQaunbD_Qs57WTFrtGsOu3I7Z99Z9pFcFird/s1600-h/SaveDevelopers_3.png"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 286px; height: 270px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEio6SeACPSrMLqGY_SIXUVqNxLRc1DzUCSvHx76-j-QqSLOBL5cIrIW8a1b_y8iEqyo7pFoJI7lvnAaM5IOl4cEbi2NDiw9YSrfCN5pJ4o6rQaunbD_Qs57WTFrtGsOu3I7Z99Z9pFcFird/s320/SaveDevelopers_3.png" alt="" id="BLOGGER_PHOTO_ID_5315451974553415378" border="0" /></a> Please Stop Using IE6 and save a lot of time for the web developers.<br /><br />This project aims to upgrade microsoft web browser to higher platform from IE 7 to IE 8 or download alternative browser. IE7 has been arounb but majority of the web browser used by user is still IE6. many of these are Universities and School, who has XP installed and not yet upgraded to Vista, or waiting for the release of Windows 7 later this year.<br /><br />The problem is IE6 dont follow web standards, many sites are messed up through IE6 browser. I personally hate to create a second css file to hack IE6 rendering.<br />save us some time to be more productive...or go to this <a href="http://savethedevelopers.org/">site</a><br /><span class="fullpost"><br />The main problem is i have to install IE tester on vista just to simulate IE6, IE 5.5, IE 7, IE 8 for my projects, removing IE lower versions would be a real relief. heheheXD...</span>Unknownnoreply@blogger.com6tag:blogger.com,1999:blog-1181426295026180297.post-61418113446630407792009-03-19T19:01:00.000-07:002009-03-19T19:04:52.313-07:00Researcher cracks Mac in 10 seconds at PWN2OWN, wins $5kCharlie Miller defends his title; IE8 also falls on Day One of hacking contest<br /><br />March 18, 2009 <a href="http://www.computerworld.com/action/article.do?command=printArticleBasic&taxonomyName=Security&articleId=9129978&taxonomyId=17">(Computerworld)</a> Charlie Miller, a security researcher who hacked a Macintosh in two minutes last year at CanSecWest's PWN2OWN contest, improved his time today by breaking into another Macintosh in under 10 seconds.<br /><br />Miller, an analyst at Independent Security Evaluators in Baltimore, walked off with a $5,000 cash prize and the MacBook he hacked.<br /><br />"I can't talk about the details of the vulnerability, but it was a Mac, fully patched, with Safari, fully patched," said Miller on Wednesday, not long after he had won the prize. "It probably took five or 10 seconds." He confirmed that he had researched and written the exploit before he arrived at the challenge.<br /><span class="fullpost"><br />The PWN2OWN rules stated that the researcher could provide a URL that hosted his exploit, replicating the common hacker tactic of enticing users to malicious sites where they are infected with malware. "I gave them the link, they clicked on it, and that was it," said Miller. "I did a few things to show that I had full control of the Mac."<br /><br />Two weeks ago, Miller predicted that Safari running on the Macintosh would be the first to fall.<br /><br />PWN2OWN's sponsor, 3Com Corp.'s TippingPoint unit, paid Miller $5,000 for the rights to the vulnerability he exploited and the exploit code he used. As it has at past challenges, it reported the vulnerability to on-site Apple representatives. "Apple has it, and they're working on it," added Miller.<br /><br />According to Terri Forslof, manager of security response at TippingPoint, another researcher later broke into a Sony laptop that was running Windows 7 by exploiting a vulnerability in Internet Explorer 8. "Safari and IE both went down," she said in an e-mail.<br /><br />TippingPoint's Twitter feed added a bit more detail to Forslof's quick message: "nils just won the sony viao with a brilliant IE8 bug!"<br /><br />Forslof was not immediately available to answer questions about the IE8 exploit.<br /><br />TippingPoint will continue the PWN2OWN contest through Friday, and will pay $5,000 for each additional bug successfully exploited in Safari, Internet Explorer 8, Firefox or Google's Chrome. During the contest, IE8, Firefox and Chrome will be available on the Sony, while Safari and Firefox will be running on the MacBook. The researcher who exploited IE8 will, like Miller, be awarded not only the cash, but also the laptop.<br /><br />"It was great," said Miller when asked how it felt to successfully defend his title. "But I was really nervous for some reason this time. Maybe it was because there were more people around. Lucky [the exploit] was idiot-proof, because if I had had to think about it, I don't know if I'd had anything."<br /><br />This year's PWN2OWN also features a mobile operating system contest that will award a $10,000 cash prize for every vulnerability successfully exploited in five smartphone operating systems: Windows Mobile, Google's Android, Symbian, and the operating systems used by the iPhone and BlackBerry.<br /><br />Miller said he won't enter the mobile contest. "I can't break them," said Miller, who was one of the first researchers to demonstrate an attack on the iPhone in 2007, and last year was the first to reveal a flaw in Android. "I don't have anything for the iPhone, and I don't know enough about Google."<br /><br />CanSecWest, which opened Monday, runs through Friday in Vancouver, British Columbia.</span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1181426295026180297.post-10658964479269190152009-03-16T21:32:00.000-07:002009-03-16T21:44:40.684-07:00Project Guru:Family Tech SupportEveryone seems to have a “go to” geek among their extended family or group of friends — someone who handles all their tech problems for them. But that go-to geek doesn’t necessarily live close enough to drop in whenever there’s a problem. <a href="http://www.symantec.com/">Symantec</a>’s new “Project Guru” service, which it’s announcing today, gives those geeks a way to provide tech support to friends and family members remotely. <p>This project — Symantec’s third presentation at the <a href="http://www.demo.com/">DEMO </a>show in recent years — is a work in progress aimed at setting up a trusted network for family members.</p> <p><a href="http://venturebeat.com/wp-content/uploads/2009/03/project-guru.jpg"><img class="alignright size-full wp-image-104550" style="float: right;" title="project-guru" src="http://venturebeat.com/wp-content/uploads/2009/03/project-guru.jpg" alt="" width="425" /></a><br /><p><br />Brian Hernacki, an architect at Cupertino, Calif.-based Symantec, said the service is run through a portal, where the go-to “guru” can log in to create a trusted group, invite the family member or friend needing help to join that group, and then take remote control of that person’s computer to see what the problem is.</span></p><span class="fullpost"> <p>In that sense, the service is just like CrossLoop and other remote-help technologies that allow someone to see what’s happening on someone else’s desktop and take control of it. But Project Guru is different in that users simply click yes to accept a remote help session. That is, the guru has fancy computer commands at his or her disposal, but the dummy on the other end simply has to click with a mouse once.</p> <p>On the guru’s desktop, Symantec will provide a bunch of data about the other PC that can help the guru diagnose any problems from afar. The exact details on this data have yet to be announced, Hernacki said. The connection between the guru and the friend or family member is secured via encryption technology.</p> <p>Project Guru will include software-as-a-service features, such as the Norton Live online support service. And while some remote desktop services are clunky and slow, Symantec intends this one to operate at high speed. It’ll be interesting to see if the company can deliver on that goal, since commands sent over the internet naturally suffer from time lag. The company has a closed pilot in progress now and will open it up to a public beta test later this year.</p> <p>The <a href="http://www.demo.com/">DEMO 2009</a> conference starts today and runs through Tuesday in Palm Desert, Calif. We will be covering it live throughout the show.</p></p></span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1181426295026180297.post-1256959385167508382009-03-12T15:44:00.000-07:002009-03-12T15:57:46.575-07:00Attack on Firefox<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://media.pcadvisor.co.uk/cmsdata/news/108016/Firefox_logo_100.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 100px; height: 92px;" src="http://media.pcadvisor.co.uk/cmsdata/news/108016/Firefox_logo_100.jpg" alt="" border="0" /></a><br />Mozilla Firefox users are being targeted by a new Trojan that steals online banking passwords.<br />According to security researchers at BitDefender, Trojan.PWS.ChromeInject.A identifies banking and money transfer websites such as Barclays and PayPal though JavaScript, and then collates the logins and passwords before forwarding them to server in Russia.<br /><span class="fullpost"><br />firefox_logo_100_sqThe malware, which is being spread by drive-by downloads or by duping users into downloading it, is stored in the Firefox add-on folder and is registered as 'Greasemonkey', which are scripts that add extra functionality to Firefox. It starts working as soon as the browser is opened.<br />However, the malware is not being obtained from Mozilla's official Firefox add-on site and the software manufacturer ensures all new add-ons are scanned for threats before being published.<br />Viorel Canja, the head of BitDefender's lab, explained that Firefox's increasing market share may be one reason why malware authors are targeting the browser.<br />Canja urged Firefox users worried about the Trojan to only download signed, verified software.<br />The Open Sourcerer said on Saturday, 06 December 2008<br />This story is so bad... First the malware only gets inserted once your computer has already been compromised by something else first.<br />Secondly - this ONLY affects Windows (surprise surprise). If you use Firefox on Linux or Mac, you are fine.<br />Hell Noire said on Monday, 08 December 2008<br />Would you like to name the add-on so we know to avoid it?<br />redstringuitar said on Wednesday, 10 December 2008<br />Bitdefender shares a business interest with Microsoft, you can only access their online scanner using active-x through IE. They're just doing Big Daddy a favour!</span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1181426295026180297.post-34348110898932514702009-03-10T16:44:00.001-07:002009-03-13T20:56:53.826-07:00Gazelle - To end Internet Explorer Line<p> <span class="fullpost"><p><img src="http://media.macworld.co.uk/cmsdata/news/25114/Microsoftx200.jpg" alt="" title="" class="inlineearticleimage" border="0" /></p></span>Microsoft researchers are developing a new Web browser that they say could offer a far greater degree of security than Google's Chrome, Mozilla's Firefox or Microsoft's own Internet Explorer. </p> <p>The browser, called Gazelle, relies on 5,000 lines of C# code called a "browser kernel" that helps enforce security rules to prevent malicious access to the PC's underlying operating system, according to a recently publishedpaper. </p> <p> So far, Gazelle is just a prototype, with other parts of the browser based on Microsoft's IE. Due to the complex nature of the way it processes Web pages for better security, the browser's performance is more tortoise than gazelle, but the researchers think a few tweaks can make it faster. </p><br /> <span class="fullpost"><p>Gazelle is different from some other browsers in that it considers each part of a Web site - such as iframes, subframes and plugins - as separate elements. Some of those elements can pull in malicious content from other Web sites. Google's Chrome runs a Web page and its elements in a single process. </p> <p>The Microsoft researchers argues that their approach brings more reliability and better security since processes can't interact with the underlying system and are mediated by system calls supplied by the browser kernel. </p> <p>In the paper, the Microsoft researchers are surprisingly critical of the company's forthcoming Web browser, IE8, which uses an approach similar to Chrome by using tabs to isolate processes. </p> <p>"This granularity is insufficient since a user may browse multiple mutually distrusting sites in a single tab, and a web page may contain an iframe with content from an untrusted site (e.g., ads)," the paper reads. </p> <p>Gazelle goes so far as to separate elements of a Web page that come from the same registrar-controlled domain. For example, content from ad.datacenter.com and user.datacenter.com would be considered separate, whereas Chrome "puts them into the same site instance," the paper said. </p> <h2>Blocking race condition attacks</h2> <p>Another interesting feature of Gazelle is aimed at blocking so-called race condition attacks. In that scenario, an attacker creates a Web page aimed at making a user click on an area of the page. But just before the predicted click happens, an overlay is drawn into the page, which could cause a user to be attacked. </p> <p> Gazelle will ignore any clicks in newly exposed screen areas for about one second until a user can see the new screen areas. </p> <p>Gazelle also aims to limit the dangers posed by programming flaws in browser plugins. Plugins are small bits of code that enable other programs to run within a browser, but they've also been known to contain vulnerabilities that can allow a PC to be hacked. </p> <p>In Gazelle, the plugins are sandboxed, or isolated from the rest of the system, so that a bad plugin would only affect the particular Web page's plugin process and not the whole PC. </p> <p>But one huge problem with Gazelle's approach is that existing plugin code would have to be rewritten or ported to interact with Gazelle's browser kernel system calls. That's difficult since plugins are written by a wide variety of software vendors whose development schedules don't necessarily work in perfect sync with those of browser developers. </p> <p>Other parts of Gazelle borrow from IE code not related to security. For example, the researchers said they didn't want to write a new HTML parser, so they used IE7's Trident renderer and JavaScript engine. </p> <p> In compatibility tests, Gazelle correctly rendered 19 of the top 20 sites ranked by Web survey firm Alexa. </p> <p>The paper warns that the new security of Gazelle does introduce "performance overhead" - especially for sites such as the New York Times Web site - but further work should be able to make it faster.<br /></p><p><br /></p></span>Unknownnoreply@blogger.com2tag:blogger.com,1999:blog-1181426295026180297.post-54429068118180137082009-03-09T15:53:00.000-07:002009-03-09T15:59:02.322-07:00Obama Icon<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhj_JmOu_Qzq-4OTRUOnO4VGxhloqfO-0lq_vu93wP1sGzcdqdUQ5vtxgAqzRAUnlAS1EaWN7TLjLQehBiALDBByPyL96D_FnOkCWTjt1g7t5-D3TOZ-EJ99Pq4DGRBlTio4NfCybl7r5Je/s1600-h/arben.gif"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 183px; height: 179px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhj_JmOu_Qzq-4OTRUOnO4VGxhloqfO-0lq_vu93wP1sGzcdqdUQ5vtxgAqzRAUnlAS1EaWN7TLjLQehBiALDBByPyL96D_FnOkCWTjt1g7t5-D3TOZ-EJ99Pq4DGRBlTio4NfCybl7r5Je/s320/arben.gif" alt="" id="BLOGGER_PHOTO_ID_5311325279008174594" border="0" /></a><br />Last december I uploaded this photo as an avatar in my forum. As you can see it resembles Obama's Iconic Poster. well you could have the same avatar and customize it using the online editor from <a href="http://obamicon.me">this site</a>, you must have the latest flash. no need to be photoshopped guru..just picture upload then download youre obama icon now.Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-1181426295026180297.post-63157566482892976232009-03-05T20:02:00.000-08:002009-03-05T20:08:13.985-08:00lokalista Grand EB Sig<div style="text-align: center;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.fileden.com/files/2007/3/6/855896/vncf.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 168px;" src="http://www.fileden.com/files/2007/3/6/855896/vncf.jpg" alt="" border="0" /></a>Signature created upon the 2nd Grand Eye Ball of Lokalista<br />Taken at Le Reve Resort<br /></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1181426295026180297.post-41713584236264020202009-03-03T15:43:00.000-08:002009-03-03T15:46:08.131-08:00The Square Root DayYesteday is the square root day<br />03/03/09<br />fun on dates math fans.<br /><br />the last square root day dates back in 02/02/04<br />and the next square root day will be held seven years from now.<br />04/04/16<br /><br />looks like the planets have aligned...lolsUnknownnoreply@blogger.com0