Wednesday, August 31, 2011

The Sims Medieval Pirates and Nobles-RELOADED

The strangeness of The Sims Medieval is still here, of course; the title is not-quite a strategy game, not-quite an RPG, not-quite The Sims. And fans of each of these different genres will still find the gameplay to be a bit odd. But for all its quirks, it’s still extremely more-ish, and the Pirates and Nobles expansion just brings even more good stuff to the game.


Description:

The Sims Medieval Pirates & Nobles Adventure Pack introduces new quests, treasure hunting, and hundreds of new objects for your medieval kingdom! Your epic story starts when the Pirates of Aarbyville and the Nobles of Tredony arrive in your kingdom, followed quickly by sword fights, love affairs, grand adventures and mysteries. Go treasure hunting to uncover hidden objects. Embark on new quests to help your kingdom achieve a new ambition. Stylize your kingdom and Sims with new pirate and nobility themed objects and wardrobe. The fun never ends with this new adventure pack!

Austrian blogger/developer Florian Rohrweck, who discovered unreleased Google+ features by exploring the source code, was hired by Google. Rohrweck's main claim to fame was a period of snooping on the code behind Google's various web apps, during which time he uncovered pre-launch evidence of things like Google+ Games, telling the world of the impending release and somewhat taking the wind of of Google's sails.

On his blog Rohrweck now has posted that he “has gone Google”:
“Or at least I will be have gone soon. Or something like that  I will post new articles again. Not so much about leaks but more about the dark arts of mastering Google products and APIs. Or something else. Time will tell!
Thanks to all of you, who supported me on my way and made my work so much fun and enjoyable! You guys are awesome!
Rock on!”

AnDOSid the DOS tool for Android


A new product released by SCOTT HERBERT for Android mobile phones,Its AnDOSid - the DOS tool for Android Phones. The rise of groups like Anonymous and LuzSec, as well as constant India / Pakistan cyberwar has raised the issue of cyber-security high(er) in the minds of web owners.

Pentesting tools exist to simulate such attacks and help website security people defend against them, however for the most part they currently only exist for desktop computers. Mobile phones
have, over the last few years, grown from simple devices that send and receive calls to mobile computing platforms which can be purchased for less than $100 a device.

AnDOSid fills that gap, allowing security professionals to simulate a DOS attack (An http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones. AnDOSid is actively being developed and I welcome feedback from the security community as to how you would like the application to evolve.

What's in this version:

  • Requires Internet access to send the http post data

  • Requires phone state to access the IMEI (one of the two identifiers sent with each post)

AnDOSid can be downloaded from the Android Market place and costs just £1 or Rs.74.58/-Only.

Iranian Man-in-the-Middle Attack Against Google certificate


Recently discovered attempts of an SSL man-in-the-middle attack against Google users - spotted by a number of Iranian Internet users - have revealed that Dutch Certificate Authority DigiNotar has issued an SSL certificate for all *.google.com domains.

What’s worse than discovering that someone has launched a man-in-the-middle attack against Iranian Google users, silently intercepting everything from email to search results and possibly putting Iranian activists in danger? Discovering that this attack has been active for two months.
"This is a wildcard for any of the Google domains," said Roel Schouwenberg, senior malware researcher with Kaspersky Lab, in an email interview Monday.
"[Attackers] could poison DNS, present their site with the fake cert and bingo, they have the user's credentials," said Andrew Storms, director of security operations at nCircle Security.

As the problems with the certificate authority system become clear, lots of people are working on ways to detect and mitigate these attacks. Chrome's pinning feature is available not only to Google web sites but to any webmaster; if you run an HTTPS site, you can contact the Chrome developers and get your site's keys hard-coded. Other browser vendors may implement a similar feature soon. The same result could also be achieved by giving web sites themselves a way to tell browsers what certificates to anticipate—and efforts to do this are now underway, building on top of DNSSEC or HSTS. Then browsers could simply not believe conflicting information, or at least provide a meaningful way to report it or warn the user about the situation.
Mozilla has announced the release of new versions of their browser, mail client and Internet suite in which trust of DigiNotar's root certificate will be revoked.

Hacking a Facebook Account using Facebook


Many of us know that phishing is also a trick to hack a facebook and session hijicking but hacker can do both at a same time. This vulnerability was happened on Facebook (static FBML) .Example here

What user will do ??
1. Checks for the URL.
2. Checks for which year the page was create.



Is it easy to fool the people?
Yes, by creating a new page in facebook in such way that user has to beliveness.

How its work??
1.Once the user clicks the link the session(cookies) where stolen by the hacker using That he can login any users account without a username and password
2. usually the users will check for the URL once it was known 1 they can enterning a userename and password.
3.After hitting the button Test your Password , Page will reflect a Thankyou Msg and it will popup with a paswd Rank
4. Check ur email spam there must a email on this and it will say that ur password was wrong trying again

Countermeasures:
1.Dont click a new link from a person u don’t know..
2.Facebook is not going to ask ur password is strong are not.
3.Some of the virus and worm (scam) was spreading in facebook applications.

Submitter By Noah Franklin

VA - Summer Dance Hits 2011-2CD-2011





 Part 1    Part 2    Part 3

cd1

01 loona - el tiburon (radio version)
02 r.i.o. - miss sunshine (video edit)
03 bingo players - cry (just a little) (radio mix)
04 brooklyn bounce feat. king cronic & miss l. - cold rock a par
05 tom hangs feat. shermanology - blessed (avicii edit) (german
06 fragma - everytime you need me 2011 (radio version)
07 voodoo & serano - no sleep (radio mix)
08 paffendorf - be cool 2011 (djs from mars radio edit)
09 alcazar feat. dream beats - feel 4 you (fear of tigers radio
10 ritmo playaz - everybody loves the sunshine (sunloverz edit)
11 andrew spencer feat. pit bailay - i'm always there (baywatch
12 tosch feat. carolina lopez - the one (marc reason edit)
13 polis & les helleniques - dirlada 2011 (radio mix)
14 g&g - beautiful day (original radio mix)
15 tom mountain - excited (original mix edit)
16 arnold palmer feat. antoine montana - keep on movin' (scotty
17 funky chicos - girls in love (single mix)
18 sean finn - no good (original mix 2011 edit)
19 the goooniez - a loch (dabruck & klein remix)
20 michael mind project feat. sean kingston - ready or not (de-g

cd2

01 atb with dash berlin - apollo road (short cut)
02 lexy & k - paul - gonna fly now (video version)
03 plastik funk - upside down (radio edit)
04 dbn & matty menck feat. rosie henshaw - redemption (radio mix
05 crystal waters & fred pellichero feat. bruck up - say yeah (r
06 dabruck & klein feat. stella attar - heartbeat (radio edit)
07 dj falk - boogie man (radio edit)
08 jesus luz, david amo & julio navas feat. selda - you are mine
09 coco fay - not the same (video edit)
10 peter gelderblom - waiting 4 2011 (twice nice remix edit)
11 hardwell - encoded (radio edit)
12 house rockerz - testosteron (finger & kadel radio edit)
13 alex megane - gefuehle (radio edit)
14 the teachers feat. linda newman - let the music play (brockma
15 filip jenven feat. max c - lifting it higher (micha moor remi
16 tv rock & hook'n'sling feat. rudy - diamonds in the sky (radi
17 alex kenji & federico scavo - get funky (radio edit)
18 tim mason - the moment (steve angello edit)
19 axwell - heart is king (dbn eemix)
20 sandy rivera - dirty sax (original mix edit)

VA-In_Love_With_Ibiza_Vol.1_(Mixed_By_Henri_Kohn)-2CD-2011

CD1
01 in love with ibiza vol.1 (mixed by henri kohn) 75:44

01 Dabruck & Klein feat. Stella Atar - Heartbeat
02 United Sounds of Italy & Miss Ann-P - I Wanna
03 DJ Chus & David Penn feat. Cevin Fisher - Libres Para Siempre
04 Jason Chance & Michelle Weeks - Looking Forward
05 Menini & Viani - Ice
06 DJ Salah feat. Kelli Leigh - Reach Out
07 Harry Choo Choo Romero & Erick Morillo - Pa Ra Ra
08 Tim Mason - The Moment
09 Prok & Fitch vs. Todd Terry - Something Going On
10 Gabriele Carasco - Get Down
11 Sandy Rivera & Yasmeen - Love
12 Steven Lee & Granite feat. Zander Bleck - Everybody Wants To Ru
13 Tom Shark - Love Thang
14 Geoff M, Terrence T & Eman - In The Club

CD2
02 in love with ibiza vol.1 (mixed by henri kohn) 78:30

01 Mucky Pups aka M.in & Jonas feat. Nick Maurer - What Makes You
02 Haldo with Henri Kohn & Miss Ann-P - Feel Free
03 Martin Eyerer feat. Kosheen - Your Move
04 Eduardo Tuccillo & Richie Tune - Luciana
05 Ivan Weber - People Are Strange
06 Copyright feat. Nuwella Love - I'm All Yours
07 Tuccillo - Disco En Paradiso
08 Kiko Navarro ft. C.B. - Sonando Contigo
09 Topspin & Dmit Kitz - Elvis' House
10 Ismael Sanchez & Stevan Chavez - Sneak In
11 Prok & Fitch - The Tribe
12 Style of Eye - Whizkid
13 Chiqito - Tinoh
14 Niko Bellotto & Erik Holmberg feat. JB - Running Up That Hill

Part 1    Part 2     Part 3

VA-Nu House Clubsession Vol.1 2CD 2011-MST

Part1    Part2    Part3

Va - Summer Club Megamix 2011-2Cd-2011



VA - Club Summer Essentials 2011 CD1
01 Rocco & Bass-T Feat. Juve - Give Me Your Sign
02 Bryce Feat. Carlprit - Dance with Me
03 Crystal Waters Vs Fred Pellichero - Say Yeah
04 Sasha Dith - I Love Dance
05 Micha Moor Feat Terri B - Keep on Rising
06 Timo Graf Feat. Pearl Ira - Follow Me
07 Dbn - All My Life
08 Sofa Tunes - Feel
09 Steve Angello - Rave 'n' Roll
10 Paul Gardner - Music in My Soul
11 Midnite Sleaze & Lost in Waves - The Distortion
12 Antranig - Shake that Ass
13 G&g - Beautyful Day
14 Jewelz Feat. Stephen Pickup - Coming Down
15 Avicii - Sweet Dreams
16 Domenik De Leon - Gray
17 Starbreeze - Reviens Moi
18 Lock'n'load - Blow Ya Mind 2011
19 Le Shuuk & Geen Plank - Energy
20 Sean Finn - No Good
21 Davis Redfield - Out of Town
22 La Chris Feat. Marlon Bertzbach - Shine on
23 Duke & Robin - Hostess
24 The Teachers Feat. Linda Newman - Let the Music Play
25 Melanie Morena Feat. Andy P. - How We Gonna Live
26 Sven & Olav Vs Clubfeeling - Way Home Berlin
27 Dirty Dansk - Song of A Bitch
28 Richard Dinsdale - Dj, You've Got My Love
29 John Le Park - Nasty Boy
30 Nick Austin - I.O.U.
31 Felix Navarro - Tanya!
32 Ian Siga - Check Thiz Out
33 Moguai & Westbam - Original Hardcore
34 Tube & Berger - Free Tribe
35 Housemates - Younger
36 Tikki Tembo Feat. Kyla Sexton - Ride
37 Jerome Isma-Ae Vs Snap! - Cult of Snap
38 David Tort Feat. Gosha - One Look
39 Xavi Canar - Club Essential
40 Royaal'n'black Feat. Byran B - Come Home 2011
41 The Henchmen Feat. Tiff Lacey - As We Ride
42 Disco Freak - Me & Myself
43 Hard Rock Sofa & St. Brothers - Blow Up
44 Laidback Luke Feat. Jonathan Mendelsohn - Timebomb

VA - Club Summer Essentials 2011 CD2
01 Axwell - Heart is King
02 Dave Young - Watching the Moon
03 David Tort & Norman Doray - Chase the Sun
04 Brooklyn Bounce Feat. King Cronic & Miss L. - Cold Rock A Party
05 Kevax - Can U Feel It*
06 Rocco - Everytime
07 Niels Van Gogh Vs Daniel Strauss - Emergency
08 Mike De Ville Vs La Calling - Pump it Up
09 Scotty - Braveheart 2k11
10 Laidback Luke & Steve Aoki Feat. Lil Jon - Turbulence
11 Trilogy - Good Vibrations
12 Supahit - Everything About You
13 Brockman & Basti M Feat. Nic - Free Your Mind
14 Pulsedriver - You Take Me Away
15 Housemaxx - Going Back to My Roots
16 George F. Zimmer - Soma is Language
17 Duke & Robin - Square House
18 Redroche Vs. Armstrong - Make Your Move 2011
19 Klik Klak - Are You Klik Klak
20 Dabruck & Klein Feat. Stella Attar - Heartbeat
21 Mac Zimms - My Feelings
22 Kaelig Feat. Jayhem - Bring Back
23 Wippenberg - Phoenix
24 Dirty Funker - Flat Beat
25 Dinka - Constant Sorrow
26 2-4 Grooves - Your Lies
27 Cassey Doreen - Girls Just Wanna Have Fun
28 Michael Feiner & Eric Amarillo - Sensation
29 Carsten Fischer - Summer Drugs
30 The Hoxtons Feat. Seany B - On the Other Side
31 Sun at Night - Where is Your Mind
32 Moguai - Get Fresh
33 Bk Feat. Nina Hall - All the Girls
34 Helvetic Nerds - Hammer & Tongs
35 Dimitri Vegas, Like Mike, Dada Life & Tara Mcdonald - Tomorrow
36 Tim Mason - The Moment
37 Casanovy - I Need Your Lovin' 2011
38 Johnny Bravo - Sunrise I Feel
39 Richard Dinsdale - One Step
40 Jean Elan Feat. Cosmo Klein - Feel Alive
41 Boysdontdance - Tangula
42 Dabruck & Klein Feat. Aleksey - Music
43 Boogie Pimps Feat. Darryl Pandy - Knocking
44 Croatia Squad - Rockafeller Rockets

Part 1   Part 2    Part 3

VA - Dance Chart 31 2CD 2011






Tracklist:

Disc 1/2
———
1. Medina – For Altid 3:30
2. Shakira Feat. Pitbull – Rabiosa 2:48
3. Lucenzo Feat. Big Ali – Danza Kuduro 3:13
4. Nik Og Jay – Mod Solnedgangen 4:14
5. Ankerstjerne Og Burhan G – Tag Hvad Du Vil 3:22
6. Rasmus Thude – Til MÃ¥nen Og Tilbage 3:36
7. Studio Killers – Ode To The Bouncer 3:25
8. Abe Og Ven Feat. Linda Maria – Glemme Dig 3:23
9. Britney Spears – Till The World Ends 3:54
10. Ida Corr – Musen Efter Katten 3:27
11. Remady Feat. Manu-L – Save Your Heart 2:50
12. Ginuwine Feat. Timbaland & Missy Elliott – Get Involved 2:58
13. Bingo Players – Cry (Just A Little) 3:02
14. Raaban – One Of A Kind 3:49
15. Viktoria Metzker Feat. Mitch Crown – So Amazing 3:21
16. HD Feat. Jason Derulo And Smokey – Celebrity Luv 4:29
17. G&G – Beautfil Day 4:07
18. Steve Modana Feat. Carlprit – Mr. Dobalina 3:15
19. Ray Charles – Hit The Road Jack (The Loose Cannons Radio 2:51
Edit)
20. Rubra – Daddy 2:56
21. Bad Influence – Redemption Song 2:51
22. Kon:trast – Nordlys 3:37
23. DUS & Natalie – Come Meet Me 3:23

Disc 2/2
———
1. Sak Noel – Loca People (What The Fuck!) 3:34
2. Calvin Harris Feat. Harris – Bounce 3:33
3. Pitbull Feat. Ne-Yo, Afrjack & Nayer – Give Me 4:12
Everything
4. Michael Rune Feat. Nadia Gattas – Min Indre Stemme 3:15
5. Christian Amby Feat. Jeffrey – Pioneer3:14
6. Morten Breum Feat. Jay Colin – Never Surrender 3:15
7. Nadia Ali, Starkillers & Alex Kenji – Pressure (Alesso 2:57
Edit)
8. Kato Feat. Jeremy Carr – Celebrate Life 3:18
9. Wolfgang Gartner – Illmerica3:16
10. Roger Sanchez Feat. Mobin Master + MC Flipside -2:41
Worldwide
11. Vato Gonzalez Feat. Foreign Beggars – Badman Riddim 2:42
(Jump)
12. Kings Of Tomorrow – Finally (East & Young Remix Edit) 2:58
13. Jay Adam Feat. Clara Sofie – Serenity 4:17
14. Dex Feat. Cille – Walking In The Sun 3:49
15. Digital Magic Feat. Alex – Jeg Vil Gi’ Dig 3:14
16. Asle – Thank You (Sidelmann Edit) 3:13
17. Benny Benassi Feat. Gary Go – Cinema 3:29
18. TooManyLeftHands Feat. Clara Sofie – Flowing Over 3:18
19. The Allstars Feat. The Wood – Tonite 2:55
20. Johnny Buss & Daniel Von B Feat. J-Sun – Do You Feel The 3:19
Same
21. Matt Caseli & Danny Freakazoid – Long Legs Running 2011 3:34
22. Fedde Le Grand Vs. Sultan & Ned Shepard Feat. Mitch 3:26
Crown – Running
23. Filur! – Kom Nu 4:06


Part 1     Part 2    Part 3

Tuesday, August 30, 2011

Phineas.and.Ferb.Across.the.Second.Dimension.2011.DVDRip.XviD

Rogue Google SSL certificate allowed MITM Gmail attacks

Recently discovered attempts of an SSL man-in-the-middle attack against Google users - spotted by a number of Iranian Internet users - have revealed that Dutch Certificate Authority DigiNotar has issued an SSL certificate for all *.google.com domains on July 10.

The forged certificate has been revoked only yesterday, which means that whoever was behind these attacks had the ability to trick users into believing that they were securely accessing any of the SSL-based Google services for more than a month.


Speculations abound about who might be behind the attacks, and given that Iranian users have seemingly been particularly targeted, it is believed by some that the Iranian government is the culprit - especially because this type of attack can usually be successfully executed only if the attacker has a measure of control over the network.
The second reason to suspect them is the fact that the forged certificate was issued for Google and its services, and Gmail is often used by political dissidents all over the world.
The attack was spotted thanks to a Chrome warning that popped up for Iranian user that uses the Chrome browser when he tried to login to his Gmail account. The warning was shown because of a new security feature introduced in Chrome 13. Called certificate pinning, it makes it so that when forcing HTTPS for a domain, only a more trusted subset of CAs are permitted to identify it.
Since DigiNotar has yet to reveal how the rogue certificate has been issued - Was it tricked into doing it? Was it and its root certificate compromised? - and since many browsers do not automatically check for revoked certificates, Microsoft, Mozilla and Google have taken steps to prevent further attacks.
According to Sophos, Mozilla has announced the release of new versions of their browser, mail client and Internet suite in which trust of DigiNotar's root certificate will be revoked.
Microsoft has decided to remove the DigiNotar root certificate from the Microsoft Certificate Trust List, and to release a future update to address this issue for all supported editions of Windows XP and Windows Server 2003. Google has also marked DigiNotar as untrusted in the upcoming release of the Chrome OS.
As with the compromise of a Comodo affiliate Registration Authority and the consequent issuing of rogue SSL certificates issued for a number of high-profile sites back in March, this incidents agains shows that the current CA infrastructure is inherently faulty and not worthy of being trusted, and that we need another solution for the Internet authentication problem.

Facebook pays bug hunters $40,000 in three weeks

The recently introduced Facebook bug bounty program has proved to be a great success, says Joe Sullivan, the company’s chief security officer.



"We know and have relationships with a large number of security experts, but this program has kicked off dialogue with a whole new and ever expanding set of people across the globe in over 16 countries, from Turkey to Poland who are passionate about Internet security," he added. "The program has already paid out more than $40,000 in only three weeks and one person has already received more than $7,000 for six different issues flagged."

He also pointed out that $500 was the minimum sum received for a discovery of a bug, but that one particular report brought $5,000 to its author. Unfortunately, he didn't disclose how the Facebook security team rates the discoveries and decides on the payout.

In spite of many requests to include bugs found in third-party applications and websites that can be connected to the users' Facebook identity, the bug bounty program remains limited only to bugs that could compromise the integrity or privacy of Facebook user data.

Bug bounty programs have previously been instituted by Google and Mozilla. And even though Adobe and Microsoft still decline to make that step, Microsoft has instituted a competition that aims to amply reward security researchers who develop innovative computer security protection technologies.

Cable: US pressured EU to approve Oracle-Sun merger

Leak reveals US Government lobbied on behalf of Oracle.

The US Government met with European competition officials to lobby on behalf of Oracle during its purchase of Sun Microsystems, according to leaked diplomatic cables.
The cables, released this week by whistleblowing site Wikileaks, reveal that the Obama administration had monitored the European Union’s investigation into the competition issues that could arise from the merger and tried to convince them to let the deal go ahead.

The EU had investigated the merger due to concerns for the future of Java and the open source MySQL database.
The cable noted that Oracle representatives were “unwilling or unable to make certain divestitures to satisfy the Commission's concerns” and that without the merger Sun would “go bankrupt.”
The cable suggests the US Government lobbied on behalf of Oracle to prevent Sun from shedding any further jobs and to save face for the US Department of Justice’s Antitrust division, which had approved the acquisition months earlier.
“The Department of Justice/Antitrust views this matter as a high priority,” said the Deputy Chief of the US Mission to the European Union, Ambassador Christopher W. Murray.
“Its senior officials and investigative staff are currently engaging productively and intensely with their DG COMP [EU Director-General for Competition] counterparts, and are in close touch with Oracle and Sun, in the hopes of preventing a divergent outcome.”
One month later, another cable sent to the US Secretary of State Hillary Clinton, the USTR (United States Trade Representative), the US National Security Council, the US Departments of Treasury, Justice and Commercial and the Federal Trade Commission, went into great detail about the EU’s competition commissioner’s opinions on the open source software movement.
Anthony Whelan, chef du cabinet to Competition Commissioner Neelie Kroes told the US Mission to the EU that Kroes sympathised with “the argument that open source software is by definition pro-competitive, since the theory is that everyone has access to it and can contribute to improving open source programs" but was equally swayed by “subtle and complex counterarguments to this.”
Whelan was quoted in a second cable as saying that "in the dynamic, real marketplace in Europe, this open source argument needs to be examined."

Virtual watchdog: Internet users banned from browsing privately for ‘security reasons’



KARACHI:  In an effort to ramp up the monitoring of internet security, Pakistan Telecommunication Authority (PTA) has directed all ISPs to prevent internet users from using technology that would allow them to privately browse the internet. This was stated in a PTA notice provided to The Express Tribune by a source at an Islamabad-based internet service provider (ISP).

The notice states, ‘In line with [Monitoring & Reconciliation of International Telephone Traffic] Regulations 2010 and national security, Authority prohibited usage of all such mechanisms including encrypted virtual private networks (EVPNs) which conceal communication to the extent that prohibits monitoring.’ The notice further stated, ‘It is observed that the aforementioned directive has not been followed in true letter and spirit as EVPNs are heavily being used on the Licensees Network.’
A PTA spokesman said that the directive was intended only to stop militants from using secure internet connections to communicate with each other, but admitted that this could only be done by preventing all internet users in Pakistan from using VPNs. A VPN allows two or more users to share data without letting anyone else monitor it.
‘Access denied’
Meanwhile, the PTA has become increasingly aggressive in blocking websites in the country. The entire website of Rolling Stone, a pop-culture and politics magazine, has been blocked since July. The PTA spokesman confirmed that the website has been blocked but said he did not know why it had been done so.
The source at the Islamabad ISP said that they had been issued a notice to block a blog post by a writer, Matt Taibbi, on the Rolling Stone website. However, the source said that ISPs are unable to block specific URLs on websites and have to block the whole domain.
The post in question was titled ‘Pakistan’s insane military spending up there with America’s.’
The post quoted a column written by Thomas Friedman of the New York Times that criticised the Pakistan Army for having a vast budget that was used only to guard against India, and not to fight militants. Taibbi has quoted this section to point out that most of the criticisms directed against Pakistan could be applied to the US and its military budget too.

VA-The Ronnie James Dio Story-Mightier Than The Sword-2CD-2011


Track List:
01. Elf – Carolina County Ball (04:47)
02. Roger Glover & Friends – Love is All (03:19)
03. Rainbow – the Temple of the King (04:43)
04. Rainbow – Catch the Rainbow (06:38)
05. Rainbow – Stargazer (08:28)
06. Rainbow – Run with the Wolf (03:41)
07. Rainbow – Kill the King (05:31)
08. Rainbow – Long Live Rock ‘n’ Roll (04:21)
09. Rainbow – Lady of the Lake (03:38)
10. Rainbow – Gates of Babylon (06:48)
11. Black Sabbath – Die Young (04:44)
12. Black Sabbath – Heaven and Hell (06:56)
13. Black Sabbath – Children of the Sea (05:35)
14. Black Sabbath – the Mob Rules (03:14)
15. Black Sabbath – Voodoo (04:34)
16. Black Sabbath – Country Girl (04:04)
17. Dio – Holy Diver (05:53)
18. Dio – Rainbow in the Dark (04:16)
19. Dio – We Rock (04:35)
20. Dio – Rock ‘n’ Roll Children (04:34)
21. Dio – All the Fools Sailed Away (07:13)
22. Black Sabbath – I (05:12)
23. Dio – Push (04:09)
24. Dio – One More for the Road (03:19)
25. Black Sabbath – Shadow of the Wind (05:40)
26. Heaven & Hell – Neon Knights (Live) (07:51)
27. Heaven & Hell – Bible Black (06:28)


Part 1     Part 2      Part 3

VA-Musica_Total-2011





Tracklist :
01. Sasha Lopez - All My People (the Harmony Group) 03:54
02. Jason Derulo - Don't Wanna Go Home (the Harmony Group) 03:56
03. Don Omar Ft. Lucenzo - Danza Kuduro (the Harmony Group) 03:21
04. Herman Dune - I Wish that I Could See You Soon (the Harmony Group) 02:56
05. Shakira Ft. Pitbull - Rabiosa (the Harmony Group) 02:51
06. Red One DJ Team - on the Floor 03:52
07. Melendi - Cancion De Amor Caducada (the Harmony Group) 04:09
08. Dr Far - L'amore (the Harmony Group) 03:04
09. Enrique Iglesias - Tonight (I'm F**kin' You) (the Harmony Group) 03:51
10. Lauren Postigo - La Ramona (the Harmony Group) 03:53
11. Duck Sauce - Barbra Streisand (the Harmony Group) 03:13
12. Shakira - Loca (the Harmony Group) 03:05
13. Alexandra Stan - Mr. Saxo Beat (DJ Team) 03:15
14. Nadir Khayat - Bumpy Ride (DJ Team) 03:44
15. Mikkel Stoleer and T.E. Hermansen - S&M (DJ Team) 04:04
16. Yolanda Be Cool & Dcup - We No Speak Americano (the Harmony Group) 04:32
17. Dr - Lore Lore Macu Macu (the Harmony Group) 03:52
18. Hermoza - La Lambada (the Harmony Group) 03:19
19. D. Vangarde & A. Jaen - Acalorao (Los Sobraos) 03:17
20. Los Manolos - Amigos Para Siempre (the Harmony Group) 03:44


Part 1    Part 2

The Orphan Killer 2011 Xvid BigPerm LKRG


Release Name: The Orphan Killer 2011 Xvid BigPerm LKRG
Release Date: 30-AUG-2011
Filename: The_Orphan_Killer_BP-LKRG.avi

Size: 574 MB
Genre: Horror
Video: 640 x 272 | 707 kbps | 29.970 fps
Audio: English | AC-3 | 256 kbps | 6 channel

The Orphan Killer is a tour de force murder flick that defies classification. It goes far beyond current trends in gore and breaks open a new suffering genre of horror. Marcus Miller is a serial murderer hellbent on teaching his estranged sister Audrey what it means to have family loyalty. His lessons are taught in massive doses of vulgar and unimaginable pain. Throughout her brutal torture we learn that Marcus is not the only Miller with Killer in the bloodline as Audrey proves to be a formidable adversary.

Monday, August 29, 2011

The Bigest iTunes ViDEOS PACKS from VOL.005 ====> VOL.023

iTunes SiNGLES PACK VOL.063


Track List:
01 Bei Maejor – Trouble (feat. J.Cole) (2011)
01 Cobra Starship – Middle Finger (feat. Mac Miller) (2011)
01 David Guetta – Night of Your Life (feat. Jennifer Hudson) (2011)
01 Destinee & Paris – True Love (2011)
01 Florence + The Machine – What the Water Gave Me (2011)
01 Hall of Fame – Hall of Fame (feat. Snoop Dogg & Deion Sanders) (2011)
01 Kid Cudi – No One Believes Me (2011)
01 Martina McBride – I’m Gonna Love You Through It (2011)
01 Obie Trice – Battle Cry (feat. Adrian Rezza) (2011)
01 Swizz Beatz – International Party (feat. Alicia Keys) (2011)

File Name: iTunes SiNGLES PACK VOL.063
Quality: MPEG-4 AAC Audio 44100Hz 16Bits 256Kbps
Size: 81.91MB


CIA Confidential S01E01 Hunt for Bin Laden 720p HDTV x264-DiVERGE


Just days after the horrific attacks of 9/11, a team of seven CIA agents snuck into northern Afghanistan and began to lay the groundwork for war. Dubbed operation “Jawbreaker,” their goal was to take out al Qaeda, find Osama bin Laden and kill him. Now, NGC tells the story of this dangerous covert mission from the point of view of the CIA officers and top-secret Delta Force operators involved.

VA-Promo_Only_Mainstream_Radio_September-2011-XXL


Tracklisting:
01 Jason Derulo – It Girl
02 Rihanna – Cheers (Drink to that) (PO Clean Edit)
03 Mat Kearney – Hey Mama
04 Simple Plan Ft. Natasha Bedingfield – Jet Lag
05 Alexandra Stan – Mr. Saxobeat
06 Swedish House Mafia – Save the World
07 Kelly Rowland – Motivation (DJ Mike D No Wayne Edit)
08 Lenny Kravitz – Stand
09 New Boyz Ft. Chris Brown – Better with the Lights Off
10 The Freshmen – Hello There (PO Clean Edit)
11 The Band Perry – If I Die Young
12 Lupe Fiasco Ft. Trey Songz – Out of My Head
13 Michael Africk – Make it Loud
14 Blush Ft. Snoop Dogg – Undivided
15 Rachel Platten – 1000 Ships
16 Lights Over Paris Ft. Game – I’m Not A Gangsta (PO Clean Edit)
17 Aloe Blacc – I Need A Dollar
18 Sally Anthony – Machine Gun
19 Manika Ft. Lil Twist – Just Can’t Let You Go
20 Iffy – Do You

Part 1     Part 2

VA-Euro_Xclusive_11-20-WEB-2011-SC_INT





Part 1     Part 2

Hurricane Irene scams hit Facebook

As predicted, Hurricane Irene-themed scams have begun spreading on Facebook.
The one spotted by Trend Micro fraud analyst Karla Agregado lures users in by offering a chilling video to watch: "VIDEO SHOCK – Hurricane Irene New York kills All."
The scam is geared towards Italian Facebook users, and in order to see the video, they are first instructed to share the link on their Wall. Then, when clicking on the link for the video, they are confronted with the usual "Security Control" they must "pass" in order to see it:



The scheme requires the users to register to one of the offers, and urges them to confirm their email address and insert real/true personal information when asked.
So, the scammers earn money for every effected registration, and the websites peddling these offers get users's personal information for free, and sometimes they can even trick them into spending some additional money.
Needless to say, the shocking video does not exist.

Prototype for first virtualized ATM

For nearly 20 years, onboard computing technology has been at the core of the ATM. But, Diebold is leveraging virtualization technology to introduce a prototype for the world's first virtualized ATM.


Diebold developed the virtualized ATM prototype in collaboration with VMware. The companies' vision for the combination of their self-service and virtualization technologies is to enable financial institutions to address their business priorities: enhancing security and mitigating fraud, improving operational efficiency, delivering optimal consumer experience and growing and retaining their customer base.
Diebold is working to identify financial institutions to serve as sites for a virtual ATM proof-of-concept study, moving the prototype toward achieving this vision.
"VMware delivers solutions that reduce complexity and enable more flexible, agile service delivery," said Parag Patel, Vice President, Global Strategic Alliances, VMware. "But that's not limited to the datacenter context. By collaborating with Diebold, we are bringing our innovations to the outermost reaches of banking, jointly delivering an innovation that extends choice, efficiency and control within the financial industry. We're delighted to be working so closely with Diebold to realize its vision for creating a more flexible, less complex self-service channel."

Virtualization of the self-service channel removes the onboard computer from the ATM, tying each terminal in a fleet to a centralized computing resource. In this scenario, the physical components of a single server provide resources to many "virtual" ATMs.
The result is not only the consolidation and sharing of resources throughout a self-service network, but also across delivery channels, opening the door for more effective channel orchestration.
Consolidation will enable the establishment of a single secure datacenter, allowing for greater control and a secure location for IP addresses. Through better server utilization and unification of ATM management, virtualization will also boost operational efficiency, enable faster failure recovery and more rapid software upgrades and services deployment. In short, virtualization will lead to a lower total cost of ownership and increased ATM uptime.
In addition to virtualization, Diebold's demonstration terminal at VMworld 2011 will showcase two continuously evolving technologies: biometrics for enhanced security and near field communications (NFC) – or contactless – technology for enhanced consumer convenience and security.
The prototype was developed using the company's new, soon-to-be released ATM series. The ATMs bring together all of today's advanced self-service functionalities – from accepting cash and check deposits and dispensing cash to full recycling in one ATM model. This comprehensive approach to the self-service channel leads to improved ATM cash management and greater operational efficiencies in the channel, as well as a decreased total cost of ownership.


Slow HTTP DoS vulnerability test tool

Slow HTTP DoS attacks rely on the fact that the HTTP protocol, by design, requires requests to be completely received by the server before they are processed.



If an HTTP request is not complete, or if the transfer rate is very low, the server keeps its resources busy waiting for the rest of the data. If the server keeps too many resources busy, this creates a denial of service.
Slowhttptest is sending partial HTTP requests, trying to get a denial of service from the target HTTP server.
This tool actively tests if it's possible to acquire enough resources on an HTTP server by slowing down requests to get denial of service at the application layer.
Slowhttptest is configurable to allow users to test different types of slow http scenarios. Supported features are:
  • Slowing down either the header or the body section of the request

  • Any HTTP verb can be used in the request

  • Configurable Content-Length header

  • Random size of follow-up chunks, limited by optional value

  • Random header names and values

  • Random message body data

  • Configurable interval between follow-up data chunks

  • Support for SSL

  • Support for hosts names resolved to IPv6

  • Verbosity levels in reporting

  • Connection state change tracking

  • Variable connection rate

  • Detailed statistics available in CSV format and as a chart generated as HTML file using Google Chart Tools.

The author of the project is Sergey Shekyan, Developer Web Application Scanning at Qualys.

Google servers as a DDoS tool

Google's servers can be used by cyber attackers to launch DDoS attacks, claims Simone "R00T_ATI" Quatrini, a penetration tester for Italian security consulting firm AIR Sicurezza.



Quatrini discovered that two vulnerable pages - /_/sharebox/linkpreview/ and gadgets/proxy? - can be used to request any file type, which Google+ will download and show - even if the attacker isn't logged into Google+.
By making many such request simultaneously - which he managed to do by using a shell script he's written - he practically used Google's bandwidth to orchestrate a small DDoS attack against a server he owns.
He points out that his home bandwidth can't exceed 6Mbps, and that the use of Google's server resulted in an output bandwidth of at least 91Mbps.
"The advantage of using Google and make requests through their servers, is to be even more anonymous when you attack some site (TOR+This method); The funny thing is that apache will log Google IPs," says Quatrini. "But beware: igadgets/proxy? will send your IP in apache log, if you want to attack, you’ll need to use /_/sharebox/linkpreview/."
He says he has discovered the flaws that allow the attack on August 10 and that he contacted Google's Security center about it. After 19 days of receiving no reply from Google, he published his findings.

VA-This_Is_Mexico_2-(PRGTM002)-WEB-2011


Part 1    Part 2     Part 3     Part 4

Silver Peak unveils free WAN acceleration product

Silver Peak today introduced free, downloadable low-end WAN acceleration software that can turn two x86 servers into data replication devices.
The company also announced an updated version of its flagship high-end virtual WAN acceleration software.
Silver Peak's free WAN software, dubbed VX-Xpress, is based on the Virtual Acceleration Open Architecture (VXOA) platform the company announced last month.

The VXOA software also powers Silver Peak's NX, VX, and flagship VRX WAN acceleration products.
VX-Xpress is an entry-level product aimed at organizations just starting WAN optimization, or at small branch or remote offices of larger companies.
The product leverages the same WAN optimization techniques as Silver Peak's higher-end products by using protocol acceleration, and adjusting TCP window sizes and selective TCP acknowledgements to reduce network "chattiness."
Silver Peak VX-Xpress supports 4 Mbps of WAN bandwidth with 8,000 simultaneous sessions.
A VX-Xpress-based appliance can be used to optimize backup and recovery applications such as asynchronous backup/replication tools from several vendors, including EMC, Hitachi Data Systems, Dell, NetApp, Hewlett-Packard and IBM.
Such an appliance can also be used to optimize TCP applications, such as Microsoft Windows file sharing, Microsoft Exchange, Microsoft SharePoint, Lotus Notes/Domino, Siebel, SAP, and Oracle, or interactive applications, such as Virtual Desktop Infrastructures (VDI), Citrix XenApp, Sunray, and Remote Desktop Protocol (RDP), as well as non-TCP applications, like voice-over-IP (VoIP) and video streaming.
"We're limiting [VX-Xpress] to point-to-point, so only two virtual appliances can talk to each other. Also, it's not supported by our management system [software], which is built for large networks with multiple devices," said Larry Cormier, senior vice president of worldwide marketing at Silver Peak. "You don't even have to register to get the product."
Silver Peak hopes that offering a free WAN engine can help the company help to get its foot in the door of potential customers.
"We believe 50% of those who would use this product would typically never be a customers of ours," Cormier said. "But we do believe people who use the free product will want to move onto fully-[enabled], supported products."
Instead of offering support for the free WAN acceleration engine, Silver Peak is creating an online user community that can share experiences and offer suggestions.
Silver Peak also announced enhancements to its VRX-8 data center-class, virtual WAN optimization software.
The product, first released late last year, can be run on standard x86 servers to create a WAN engine that offers up to 1Gbit/sec throughput. The new version adds support for larger networks and multiple hypervisors.
The updated VRX-8 software adds support for Citrix, Xen Server, and KVM hypervisors. It continues to support the VMware vSphere hypervisor.
The VRX-8 product was originally limited to replication-specific applications. Like entry-level VX-Xpress-based appliances, systems running VRX-8 can now support myriad applications. Previously limited to one session, the software can now support from 8 to 256,000 sessions, Cormier said.
Cormier said Silver Peak decided to expand the use cases for its WAN engines because x86-based platforms have gotten more powerful with multi-core processors, so that there's plenty of processing power to spare for WAN optimization.
"Now it's designed to be more of a general purpose WAN optimization appliance, as a hub and spoke network as well as a data center to data center replication product," he said. "Now it can address anything that runs over TCP or UDP in a network."
VRX-8 product retails for $69,995.

Scala: The Android programming language you didn't know you had

Scala, a statically typed language running atop the Java Virtual Machine, is emerging as a development option for building Google Android applications.
While developers already are aware of Java and C++ language usage for Android, they also can use other JVM languages because Android leverages the Java-compatible Dalvik VM, reasoned developer Mike Burns, of Thoughtbot, a Web and mobile application development company. "There's a growing community of people [developing] with Scala," he said.

Members of the Boston Android Developers Group, for instance, have begun to leverage Scala for Android development, said Burns, who runs the group: "Scala lets you write the code more quickly and share the code more easily than you can in Java." Burns will be presenting on the notion of Scala as a replacement for Java on Android at the Android Open conference in San Francisco in October.
Scala founder Martin Odersky vouched for Burns's claims: "I can confirm what he says: Scala is an attractive development language for Android. I should also mention that there's tool support in the form of an Android plug-in for SBT, Scala's standard build tool." Google declined comment on the subject of Scala development for Android. But the Google Project Hosting website features a Scala-Android project for tools to build Android applications via Scala.
For mobile applications, Scala enjoys advantages over other JVM languages, such as JRuby or Groovy, because statically typed languages run faster, consume less memory, and generally are better optimized, said Burns. Android, he stressed, runs on embedded devices with slow processors and little memory.
In a blog post this past spring, Burns touted Scala's programming characteristics: "Scala can be thought of as a better Java. To start with, you don't need as many semicolons. But Scala gives you the power of modern abstractions. Traits, implicits, type-checked null, blocks -- everything you really need to get some solid coding done."
The Dalvik VM, said Forrester analyst Jeffrey Hammond, uses its own byte code format to execute applications. Google uses Java as the intermediate language that gets compiled into the .dex format, he said: "Looks like what Mike is trying to do is set up Scala as a way to write apps and generate .dex byte-code as an alternative."
Burns said he has written some Scala programs for Android, including one based on the Umbrella Today weather predictor. He lists benefits of Scala development for Android as speed, easier programming, and the existence of a vibrant community around it. Downsides, though, include unknowns, with the practice being uncharted and lacking documentation.
Android, of course, is the subject of a lawsuit by Oracle against Googlen, alleging infringement of Java patents in Android. But Burns is not dissuaded by the litigation. "I don't really follow that closely," he said.

Sunday, August 28, 2011

Apple Again Rumored to Be Preparing TV Release

Apple is again rumored to be preparing to release a television set.
Strong support for the idea of an Apple television (not to be confused with AppleTV, a set-top box used for streaming video to a television) comes from a source known for his Apple acumen -- analyst Gene Munster of Piper Jaffray.
In a recent interview with Dylan Tweney in VentureBeat, Munster, citing information from
component suppliers and Apple insiders, predicted an Apple television at the end of 2012 or in early 2013.
Another analyst buying into the Apple television is Stewart Alsop, of Alsop Louie Ventures. Alsop sits on the board of two companies that make media streaming products for the home -- TiVo and Sonos -- and is an avid observer of the hardware space. He told VentureBeat that multiple sources throughout Silicon Valley have told him that the television project is underway.
In the past, Apple's hardware plans have been a slave to display technology.
It had plans for a tablet as far back as 2000, but couldn't implement them because of the high cost of touchscreen displays at that time. Today, Apple is the tablet innovator thanks to its wildly popular iPad.
The same could be true for television screens.
Now that display prices have begun to decline, an Apple television in the 15- to 19-inch range and running the company's mobile operating system, iOS, is feasible. Such a TV would not only display video, but also could provide Internet access for playing games, running apps and socializing at places like Twitter, Facebook and Google+. Some of those things are available on Apple's set-top box, but a television would provide a much more seamless experience for consumers.
Alsop predicted such a TV set from Apple would be available in time for the 2012 holiday season.
Earlier this summer, the Apple television rumor generated some buzz on the Internet when a former executive at the company, speaking on the condition he remain anonymous, confirmed to DailyTech that "the company's biggest upcoming product launch" would be its entry into the flat-screen television market.
Apple's television will "blow Netflix and all those other guys away," the exec boasted to DailyTech.
He noted that Apple would team up with one of its existing suppliers to make the televisions. The problem with that theory is that Apple's display providers also make televisions. If they made televisions for Apple, they'd be competing with their own TV lines. The exec discounted that barrier to Apple's entry into television sets. "If you have to be competing with somebody, you want to be competing with yourself," he told DailyTech.
If Apple launches a television set, it will be trying to succeed where it and other high-profile, high-tech names have failed before.
Apple's set-top box hasn't captured the market's imagination since its introduction. And a television venture by Google, where a version of its mobile operating system, Android, a competitor of iOS, was incorporated into TV sets hasn't seen much success either.

Google+, Day 20: Google+ Makes 'Unfriending' More Polite

Relationships on Google+ may be online, but most of them are with real people--family, friends, co-workers--that I also interact with in real life. It can ruffle feathers and get a tad uncomfortable when I drop someone from my social network, but Google+ gives me a couple options to handle removing someone from my social network in a more gentle, acceptable way.
On Facebook, the concept of 'Friending' always seemed a bit awkward from the beginning. I mean, many of the people in my Facebook social network are my friends, but many are simply acquaintances, or they are members of my family. As weird as 'Friending' everyone is, 'Unfriending' someone just seems blatantly rude. It feels like a very official, and public rebuke of my value as a human being.

With Google+ I have three options at my disposal that I can use instead of just removing someone from my Circles and possibly creating unnecessary drama. I can mute an individual post, place the individual into a "black hole" Circle, or ignore the user.
Mute a Post
If you generally don't mind someone, but they post something annoying that seems to get a lot of comments, and shares and seems to hog your Stream it can be frustrating. If you don't believe me, just try adding Robert Scoble to your Circles and you can experience firsthand the impact it can have on your Stream when a post gets tons of comments.
I like Robert Scoble, or I wouldn't have him in my Circles in the first place. But, I don't agree with everything he posts, and even when I do agree, I don't want his posts hogging my Stream. Rather than remove him from my Circles, though, I can click the drop-down arrow at the upper-right of the offending post and click "Mute this post" to simply remove the post from my Stream.
The "Black Hole" Circle
What if I don't really want to read anything that someone posts, but I don't want to offend them by removing them from my Circles entirely? Perhaps an annoying co-worker, or my Tea Party uncle who likes to spam me with moronic assertions, and fantastic myths about the Obama administration that any 10-second search on Snopes.com or FactCheck.org would prove utterly baseless.
Thankfully on Google+ the people in my Circles can see that I have them in a Circle--but they can't see what the Circle is called, or have any insight into how or why or if I ever use that Circle. I can create a "black hole" Circle that gives the illusion that someone is still part of my social network while effectively removing them at the same time. So, I can put my uncle in a Circle called "Tea Party wackos" and just never bother looking at the Stream from the Circle.
The "black hole" Circle concept isn't perfect. If I never share any of my posts with my "Tea Party wackos" Circle, my uncle will experience an awkward silence from me. He may wonder whether I am just not very active on Google+, or he might put two and two together and figure out that I put him in a "black hole" Circle.
Ignore a User
One possible solution to the "black hole" problem would be to make sure that any time I share something with my "Family" Circle, I remember to also include my "Tea Party wackos" Circle so my uncle will still be in my loop without me having to be in his.
Another option would be to Ignore a user like my uncle. If I Ignore him, he is removed from my "People who have added you", and I will no longer receive content from him in my Stream , or receive any notifications when he mentions me in a post. He'll be able to see what I post, but for all intents and purposes he won't exist on my incoming Stream.
Well, mostly. Google explains, "An ignored person will still be able to comment on your public posts, tag you in photos, and add you to circles. You'll still receive notifications when an ignored person tags you in a photo. In addition, people you've ignored may appear as a suggestion again at a later time."
Still, it is better than Blocking him or removing him from my Circles because it is less overtly confrontational. Thanksgiving with the family will be much less tense as long as I pretend to have read some of his tripe--or just steer the conversation to how bad the Detroit Lions are playing.

Never.Back.Down.2.2011.STV.DVDRip.XviD

Iron.Man.2011.S01E05.Outbreak.HDTV

Irene Wreaks Havoc on East Coast Communications

As Hurricane Irene starts to move north along the East Coast of the United States, the first reports of its affects on communications systems are coming in.
The Federal Communications Commission on Saturday activated the Disaster Information Reporting System, a online reporting tool that helps the agency understand the scope and location of disruptions to
communications. So far the damage is minimal, but the full scope may not be clear until the beginning of next week after Irene clears the coastline.
Coastal North Carolina seems to be the most affected, with many of the 130 cellular sites in that region currently inoperable, Betanews reports. Another 215 may fail soon however, as they are running on backup power with power outages widespread. Wireline customers are also affected: the FCC says 8000 are out in North Carolina, and another 4000 in Virginia.
The hardest-hit location was Carteret County in southeastern North Carolina. That locale includes Cape Lookout, where the eye of Irene made landfall on Saturday around sunrise.
Amid all the bad news is some good news: public safety communications are so far reporting no disruption or outages. But if you're out of power or the cell tower's down, that's not going to do a lot of good if you can't make the call out.
Either way, this is only the beginning of what could become a serious nightmare for communications utilities as Irene moves north. The sheer size of the storm -- roughly the size of Europe by some accounts -- and the fact that it is hitting the "megalopolis," means the effects will be magnified. And cell phones -- especially smartphones -- are otherwise a way for people in the affected area to
If a direct hit is taken in this region -- now increasingly likely -- it could mean massive disruption. It could also mean extended periods of time without communications in hardest hit areas due to the scope of repair work necessary. Officials have been warning about this for days, so those most at risk know of the risk in "riding it out."
Often, people focus on the risk to life and limb from property damage, but being cut off from any kind of communication can be just as dangerous. That's why its so important to get out of harm's way when you're told to, because you may not be able to make the call for help when you most need it.

Google's War Against Scraper Sites Continues

Scraper sites are usually operated by spammers. They copy almost all the content of the scraper site from other websites. By doing so, they hope to exploit the popularity of the material from original content makers to steer search engine traffic to their sites to make money through advertising.
"Scrapers getting you down? Tell us about blog scrapers you see... We need datapoints for testing," Google's web spam leader Matt Cutts said in a recent tweet.
Cutts' war cry illustrates Google feels more effort is needed to combat scrapers.
Along with his tweet, Cutts included a link to a form that allows
web surfers to report scraper pages to Google. Some of that information may be used to test and improve Google's algorithm, the company said.
The form asks for the text of the search query that produced the scraping problem -- such as a scraper site outranking an original content site -- as well as the URL for the original content site and scraper site. There's also a form field for top-of-head comments.
Some scrapers are so successful in what they do that their sites achieve higher search engine rankings than the sites of the content makers from whom they pinch their material. Google attempted to correct that situation in January, when it changed its top-secret search algorithm aimed, among other things, to address the scraping problem.
Scraping, along with search results poisoning, have long been a problem with search engine results, although Google has steadfastly defended the quality of its results, saying the results are better than they have ever been in terms of relevance, freshness and comprehensiveness.
Earlier this year, Google announced changes, including filter changes, in its algorithm. The filter changes, referred to as "Panda," didn't quell the problem. Quite the contrary, it may have made it worse. "We've experienced a significant drop in our traffic (almost 35%) as a result of this change (with an equivalent drop in revenue)," wrote one webmaster after the change took effect. "We believe that our only crime is that we host user-generated content."
Google took another crack at the scraping problem in June, when it rolled out version 2.2 of the Panda filters. Reviews of that move appear to be mixed.
With this latest effort by Google to garner information on scraping sites, maybe the next version of Panda will finally put the issue to bed.

Saturday, August 27, 2011

X-Men.First.Class.BDRip.XviD


Synopsis : Before Charles Xavier and Erik Lensherr took the names Professor X and Magneto,
they were two young men discovering their powers for the first time. Before they were archenemies
they were closest of friends, working together, with other Mutants (some familiar, some new)
to stop the greatest threat the world has ever known. In the process, a rift between them opened
which began the eternal war between Magneto's Brotherhood and Professor X's X-MEN

Part 1     Part 2

Google TV 'coming to the UK'

Google TV could make its way to UK shores within the next six months, the Telegraph has reported.
According to the newspaper, Google TV, for the UK will be announced by Google's executive chairman Eric Schmidt during this year's MacTaggart lecture at the Edinburgh Television Festival.
The service will let you watch content from catch-up services such as iPlayer and other web video services like YouTube on your TV. It uses the Android operating system and content is accessed via the Chrome browser.
Android phones will be the remote controls for the service, and it'll run through set-top boxes that will be available in the UK within the next six months, it is claimed.

Chris Brown - Boy In Detention-(Bootleg)-2011


Tracklist
01. First 48 2:35
02. Crazy 2:25
03. Freaky I'm Iz (Feat. Kevin McCall, Diesel and Swizz Beatz) 3:48
04. Body On Mine (Feat. Se7en) 2:10
05. Spend it All (Feat. Se7en and Kevin McCall) 3:33
06. Private dancer (Feat. Se7en and Kevin McCall) 3:24
07. 100 Bottles (feat. Se7en) 2:44
08. Leave The Club (Feat. Joelle James) 3:38
09. Real Hip Hop #4 (Feat. Kevin McCall) 2:49
10. Your Body 3:12
11. Ladies Love Me (Feat. Justin Bieber) 2:34
12. Real Hip-Hop #3 2:23
13. Real Hip-Hop (Feat. Kevin McCall) 2:13
14. Snapbacks Back (Feat. Tyga) 3:29
15. The Best Yo 3:46
16. Marvin's Room (Remix) (Feat. J Valentine, Dawn Richard, 4:31
Se7en and Kevin McCall)
17. 100 Percent (Feat. Kevin McCall) 3:05
18. Last 3:17
19. Sweetheart 4:15
20. Strip (Feat. Kevin McCall) 2:48
21. Yoko (Feat. Berner, Wiz Khalifa and Big K.R.I.T) 3:52

   Part 1   Part 2

Friday, August 26, 2011

Terrorist Takedown 3


Terrorist Takedown 3 | 2.6 GB
PC game | Language: English | Developer: City Interactive
Released: 2010 | Genre: Modern Tactical Shooter

Part 1    Part 2    Part 3    Part 4    Part 5    Part 6    Part 7