http://www.uploadfile.org./download.php?id=yyP9bifM9hbiSYyXICU7
Blondes have suffered decades of ridicule, but it's time they embrace the jokes. When it comes to a hot-pink boost of self-confidence (or at least a few good laughs), the Keyboard for Blondes may do the trick.
The all-pink keyboard swaps out standard keys with funnier, dumber key names. The backspace key now says "Oops!" and the entire row of function keys spells out USELESS KEYS. Hit the "$" sign and you get the sound of a cash register clinking.
Blondes can even get a little technical and use special keys that type out "OMG," "ALI" (Absolutely Love It!) or "XOXO." My favorite? The caps lock key now says: "Warning! size XXL letters."
Though this fully functional keyboard would be a great gift to poke some fun at your fair-haired friends, regular computer users may find it a bit challenging. However, like the completely blank Das Keyboard, the Keyboard for Blondes might help poor typists improve their skills, since the keys are 1) a distracting pink, and 2) no longer have the standard labels.
According to its manufacturer, European Trends, the keyboard has already been released in the U.K. to some success, and at $49.95 probably only a true blonde would purchase this novelty item. It's compatible with Mac, Windows and Linux. I know what Paris Hilton will be getting for Christmas.
Punisher War Zone (2008)
How Download MP3s from Fanscape.com or other Streaming Audio/Video Page
Part1
1- Download CoCSoft Stream Down here:
http://www.projectw.org/viewtopic.php?t=40095&highlight=cocsoft+stream
2- Go to Fanscape.com or other Streaming Audio/Video Page (like MTV or VH1) search
for your Artist or Band, and play your song, a pop up will appear, with a
windows player preview, then, right clic on this player, and clic on properties
3- Will appear a options,stay in File tag, go down to Location Select all the link address and copy
4- Go to CoCSoft Stream Down program, and clic on ADD icon, and paste the link address, that u copied on the page, choose your directory to download, and clic in Ok
5- Now, You are downloading the .ASF File
Part 2
1- When you finished of download the .ASF File, open River Past Audio Converter
Download here: http://www.projectw.org/viewtopic.php?t=24947&highlight=river+past
Note: To extract audio from ASF (Advanced Systems Format) files to MP3 with River Past Audio Converter, you should have DirectX 8.0 or above (9.0 highly recommended), and Windows Media Format 9 runtime installed.
2- Once River Past Audio Converter is installed properly, launch Audio Converter.
3- Add File
Click on the "Add" button on the tool bar. The standard file open dialog appears. Select "Windows Media Video" in its "Files of type" c****o box.
Select the file you want to convert and click "Open". The file will be added to the conversion file list.
4- Select output format
Use the "Audio Format" setting panel on the bottom of the window to control the output format. Select "MP3" as the "File Type".
You can change the sample rate, channel (stereo or mono) and bitrate. Audio CD's native format is 44.1 kHz, stereo.
5- Select output directory
Expand the "Output Directory" panel. Use the button to select an output directory.
6- Convert!
Click the "Convert" button on the tool bar.
7- Enjoy!!!
Important Notes:
1- The First part, can be used for VIDEOS file, just try it, I do it icon_lol.gif
2- This Tutorial is not 100% perfect, just do it
3- The final Quality from your Mp3, will sound like streaming Audio, cuz we
extract it from a streaming File(maybe 20 or 32 kb/s).
4- If u think, that I'm in a mistake or I'm a fool, please tell me, I will to
learn
5- if u wanna add something, plz Do it, We gonna appreciate your
colaboration
Dvd Copying/ripping Definitions
Rip
To take off the audio or video from a CD or DVD. Often CD Audio is "ripped" to MP3 files or DVD video ripped to VOB files.
Compression
The process of removing redundancies in digital data to reduce the amount that must be stored or transmitted. Lossless compression removes only enough redundancy so that the original data can be recreated exactly as it was. Lossy compression sacrifices additional data to achieve greater compression.
Encoding
Encoding is the process of changing data from one form into another according to a set of rules specifiec by a codec. The data is usually a file containing audio, video or still image. Often the encoding is done to make a file compatible with specific hardware (such as a DVD Player) or to compress or reduce the space the data occupies.
Common video encoding methods are DivX, MPEG-1, MPEG-2 and MPEG-4. A common audio encoding method is MP3 although many others exist including MPEG1 audio, DTS, and Dolby Digital.
Transcoding
On this site generally another name for encoding.
A more technical term would be "The reformatting of content, without changing the source, to another type of content - most often of a different format than the original (but does not have to be)"
To disable the stupid feature in WinXP which tries to send a report to microsoft every time a program crashes you will have to do this:
*************************************************************************
Open Control Panel
Click on Preformance and Maintenance.
Click on System.
Then click on the Advanced tab
Click on the error reporting button on the bottom of the windows.
Select Disable error reporting.
Click OK
Click OK
***********************************************************************
Windows Xp: Speed Up Your, Speed Up Your Network and Internet Access
I have a dial up connection and it improve my speeds about 25% in surfing the internet. give it a try. Im IT , only do it if you feel comfortable with changing registry.
Increasing network browsing speed
Does your computer slow down when you browse your local area network and connect to other computers that are sharing data? One of the most common causes of this slowdown is a feature of Windows Explorer that looks for scheduled tasks on remote computers. This effort can take some time on some computers and can really slow down your browsing. The window with which you are browsing the network may appear to freeze momentarily, as the system is waiting for a response from the remote computer.
Windows XP: Speeding Disk Access
Although this problem is a complex one, the solution is very simple. Instead of having to wait for the remote scheduled tasks, which is useless information to anyone who is not a system administrator remotely configuring scheduled tasks, you can disable this feature.
In order to do this, you will have to change the System Registry and delete a reference to a key so that this feature will not be loaded. To do this, follow these steps:
1. Open up the Registry Editor by clicking the Start Menu and selecting Run. Then type regedit in the text box and click the OK button.
2. Once the Registry Editor has loaded, expand the HKEY_LOCAL_MACHINE key.
3. Next, expand Software and then Microsoft.
4. Locate Windows and expand that as well.
5. You will want to be editing the main system files, so expand CurrentVersion.
6. Because this feature is a feature of the Windows component known as Explorer, expand the Explorer key.
7. Next, you will want to modify the remote computer settings, so expand the RemoteComputer key and then expand the NameSpace key to show all of the features that are enabled when you browse to a remote computer.
8. In the NameSpace folder you will find two entries. One is "{2227A280-3AEA-1069-A2DE-08002B30309D}" which tells Explorer to show printers shared on the remote machine. The other, "{D6277990-4C6A-11CF-8D87-00AA0060F5BF}," tells Explorer to show remote scheduled tasks. This is the one that you should delete. This can be done by right-clicking the name of the key and selecting Delete.
Tip:
If you have no use for viewing remote shared printers and are really only interested in shared files, consider deleting the printers key, "{2227A280-3AEA-1069-A2DE-08002B30309D}", as well. This will also boost your browsing speed.
Once you have deleted the key, you just need to restart and the changes will be in effect. Now your network computer browsing will be without needless delays.
You Want Lots Of Music, Appz, Anything?, Try Dex Hunting
So what's this Dex Hunting, anyway?
See: lots of people post files of any kind on their websites to share them with friends. Those files are "protected" by not mentioning them. There's no visible link given, and for literally hundreds of thousands this seems to be enough.
What they don't know: There are many nice techniques to locate the invisible stuff.
I don't want to get in too deep - and as I'm rather new here it's possible some of the tricks might have been posted elsewhere.
But if you want to find lots of music the way I described it - and want other people doing the "dirty" work I recommend:
STAIRWAY TO HEAVEN
A free message board - gathering place of the best "dex hunters" in the universe. There you will find loads of *fresh* (!) mp3 links. Not only this - they update with lightspeed. This is a site you won't visit once a month or once a week. I visit them hourly, and I know why.
CODE
http://www.fionasforum.com/Stairway/
Remember: as soon as a fresh dex is posted there, it will be invaded and can die within hours. But I swear there will be enough left for your needs.
Curious?
Wanna try it for yourself?
Try this one. It's a search bot, and instead typing complicated data strings for Dex Hunting just type what you're looking for, and the bot does the rest for you. Sounds nice, huh?
not very sexy at first sight - but very effective.
Hope you'll like it!
Are you scared that the RIAA is about to track you down for illegally downloading songs.
Well, here is a method of obtaining many songs absolutely free that is virtually untrackable
by modern technology. This has to do with capturing streaming audio, which in many cases, believe it or not
are plain old mp3s just waiting for you to "download." I have found most of the current top-40 as well as many others you may like, so keep searching. The music is waiting for you to find it.
Step 1:
First of all, you need to find a good site that hosts streaming audio. My favorite that has brought me many songs to date is hxxp://www.windowsmedia.com . Some others are just as good, but this is the site that I will be referencing (plus, I know you guys love to steal from Microsoft).
Step 2:
Alright, go up to the left hand corner where there is an empty text box. This is the search box, just fill it with a songname or artist just like you would in kazaa and click search. This will bring up a page with links to many websites hosting a stream by that artist. The ones with music notes are just that...music, this is what you want. In many cases, this is all you need. Just right click on one of the links and click "save as" to save the song. This works if the file extension is .mp3 or .wma or .asf or well-other known formats. If this worked, you are finished, otherwise continue reading.
Step 3:
However, if you encounter a .asx file, there are a few more steps you will have to endure. First of all, do exactly like the above example and save the file locally. After the file is downloaded, check to see how large the file is. If it is a large file in the megabyte range, then you should be able to play it in your favorite music program. However, if it is less than 1 kilobyte, open it as a textfile. You will then see many script commands that communicate to windows media player. Don't worry about these, just look for some URLs which will most likely be pointing to a .asf file. It will have at least one if not more. Open the new found URL in your browser and save it like in step 2 and you should be good to go. (I use Mozilla, because Internet Explorer likes to open things rather than save them as I tell it)
NOTE: If any of the URLs are preceded with "mms://" instead of "http://" find another URL, because this technique will not work.
This technique is especially useful to avoid prosecution because streaming audio, and downloading it appear the same to a web server, therefore you are seen as just another "legal" listener, so "download" away my friend and don't blame me if this soon becomes illegal (if it isn't already).
Step 4:
If you are picky then search for a program that will convert these file types to mp3s. I assure you there are many sites out there.
If this technique does not work for some reason, there is another technique which is manually recording streaming audio, with an audio capture program. I use the one that came with my soundcard (Audigy 2ZS, great soundcard), but I would recommend it only as a last resort such as with "mms://" files. There is a degredation in quality compared to the other formats and it records every sound your PC makes while it is recording so don't chat on AIM while recording (lol I can hear random doors slamming now).
Cracking Zip Password Files
Tut On Cracking Zip Password Files..
What is FZC? FZC is a program that cracks zip files (zip is a method of compressing multiple files into one smaller file) that are password-protected (which means you're gonna need a password to open the zip file and extract files out of it). You can get it anywhere - just use a search engine such as altavista.com.
FZC uses multiple methods of cracking - bruteforce (guessing passwords systematically until the program gets it) or wordlist attacks (otherwise known as dictionary attacks. Instead of just guessing passwords systematically, the program takes passwords out of a "wordlist", which is a text file that contains possible passwords. You can get lots of wordlists at www.theargon.com.).
FZC can be used in order to achieve two different goals: you can either use it to recover a lost zip password which you used to remember but somehow forgot, or to crack zip passwords which you're not supposed to have. So like every tool, this one can be used for good and for evil.
The first thing I want to say is that reading this tutorial... is the easy way to learn how to use this program, but after reading this part of how to use the FZC you should go and check the texts that come with that program and read them all. You are also going to see the phrase "check name.txt" often in this text. These files should be in FZC's directory. They contain more information about FZC.
FZC is a good password recovery tool, because it's very fast and also support resuming so you don't have to keep the computer turned on until you get the password, like it used to be some years ago with older cracking programs. You would probably always get the password unless the password is longer than 32 chars (a char is a character, which can be anything - a number, a lowercase or undercase letter or a symbol such as ! or &) because 32 chars is the maximum value that FZC will accept, but it doesn't really matter, because in order to bruteforce a password with 32 chars you'll need to be at least immortal..heehhe.. to see the time that FZC takes with bruteforce just open the Bforce.txt file, which contains such information.
FZC supports brute-force attacks, as well as wordlist attacks. While brute-force attacks don't require you to have anything, wordlist attacks require you to have wordlists, which you can get from www.theargon.com. There are wordlists in various languages, various topics or just miscellaneous wordlists. The bigger the wordlist is, the more chances you have to crack the password.
Now that you have a good wordlist, just get FZC working on the locked zip file, grab a drink, lie down and wait... and wait... and wait...and have good thoughts like "In wordlist mode I'm gonna get the password in minutes" or something like this... you start doing all this and remember "Hey this guy started with all this bullshit and didn't say how I can start a wordlist attack!..." So please wait just a little more, read this tutorial 'till the end and you can do all this "bullshit".
We need to keep in mind that are some people might choose some really weird passwords (for example: 'e8t7@$^%*gfh), which are harder to crack and are certainly impossible to crack (unless you have some weird wordlist). If you have a bad luck and you got such a file, having a 200MB list won't help you anymore. Instead, you'll have to use a different type of attack. If you are a person that gives up at the first sign of failure, stop being like that or you won't get anywhere. What you need to do in such a situation is to put aside your sweet xxx MB's list and start using the Brute Force attack.
If you have some sort of a really fast and new computer and you're afraid that you won't be able to use your computer's power to the fullest because the zip cracker doesn't support this kind of technology, it's your lucky day! FZC has multiple settings for all sorts of hardware, and will automatically select the best method.
Now that we've gone through all the theoretical stuff, let's get to the actual commands.
--------------------------------------------------------------------------------
Bruteforce
--------------------------------------------------------------------------------
The command line you'll need to use for using brute force is:
fzc -mb -nzFile.zip -lChr Lenght -cType of chars
Now if you read the bforce.txt that comes with fzc you'll find the description of how works Chr Lenght and the Type of chars, but hey, I'm gonna explain this too. Why not, right?... (but remember look at the bforce.txt too)
For Chr Lenght you can use 4 kind of switches...
-> You can use range -> 4-6 :it would brute force from 4 Chr passwors to 6 chr passwords
-> You can use just one lenght -> 5 :it would just brute force using passwords with 5 chars
-> You can use also the all number -> 0 :it would start brute forcing from passwords with lenght 0 to lenght 32, even if you are crazy i don't think that you would do this.... if you are thinking in doing this get a live...
-> You can use the + sign with a number -> 3+ :in this case it would brute force from passwords with lenght 3 to passwords with 32 chars of lenght, almost like the last option...
For the Type of chars we have 5 switches they are:
-> a for using lowercase letters
-> A for using uppercase letters
-> ! for using simbols (check the Bforce.txt if you want to see what simbols)
-> s for using space
-> 1 for using numbers
Example:
If you want to find a password with lowercase and numbers by brute force you would just do something like:
fzc -mb -nzTest.zip -l4-7 -ca1
This would try all c****inations from passwords with 4 chars of lenght till 7 chars, but just using numbers and lowercase.
*****
hint
*****
You should never start the first brute force attack to a file using all the chars switches, first just try lowercase, then uppercase, then uppercase with number then lowercase with numbers, just do like this because you can get lucky and find the password much faster, if this doesn't work just prepare your brain and start with a brute force that would take a lot of time. With a c****ination like lowercase, uppercase, special chars and numbers.
--------------------------------------------------------------------------------
Wordlis
--------------------------------------------------------------------------------
Like I said in the bottom and like you should be thinking now, the wordlist is the most powerfull mode in this program. Using this mode, you can choose between 3 modes, where each one do some changes to the text that is in the wordlist, I'm not going to say what each mode does to the words, for knowing that just check the file wlist.txt, the only thing I'm going to tell you is that the best mode to get passwords is mode 3, but it takes longer time too.
To start a wordlist attak you'll do something like.
fzc -mwMode number -nzFile.zip -nwWordlist
Where:
Mode number is 1, 2 or 3 just check wlist.txt to see the changes in each mode.
File.zip is the filename and Wordlist is the name of the wordlist that you want to use. Remember that if the file or the wordlist isn't in the same directory of FZC you'll need to give the all path.
You can add other switches to that line like -fLine where you define in which line will FZC start reading, and the -lChar Length where it will just be read the words in that char length, the switche works like in bruteforce mode.
So if you something like
fzc -mw1 -nztest.zip -nwMywordlist.txt -f50 -l9+
FZC would just start reading at line 50 and would just read with length >= to 9.
Example:
If you want to crack a file called myfile.zip using the "theargonlistserver1.txt" wordlist, selecting mode 3, and you wanted FZC to start reading at line 50 you would do:
fzc -mw3 -nzmyfile.zip -nwtheargonlistserver1.txt -f50
--------------------------------------------------------------------------------
Resuming
--------------------------------------------------------------------------------
Other good feature in FZC is that FZC supports resuming. If you need to shutdown your computer and FZC is running you just need to press the ESC key, and fzc will stop. Now if you are using a brute force attack the current status will be saved in a file called resume.fzc but if you are using a wordlist it will say to you in what line it ended (you can find the line in the file fzc.log too).
To resume the bruteforce attack you just need to do:
fzc -mr
And the bruteforce attack will start from the place where it stopped when you pressed the ESC key.
But if you want to resume a wordlist attack you'll need to start a new wordlist attack, saying where it's gonna start. So if you ended the attack to the file.zip in line 100 using wordlist.txt in mode 3 to resume you'll type
fzc -mw3 -nzfile.zip -nwwordlist.txt -f100
Doing this FZC would start in line 100, since the others 99 lines where already checked in an earlier FZC session.
Well, it looks like I covered most of what you need to know. I certainly hope it helped you... don't forget to read the files that come with the program
http://rapidshare.com/files/164328084/Vista_Transformation_Pack_9.0.1.rar
Blazing Angels 2: Secret Missions Of WWII-PROCYON
INFO : http://www.gamespot.com/pc/sim/blazingangels2/index.html
Download
ba2sm-pro.part01.rar
ba2sm-pro.part02.rar
ba2sm-pro.part03.rar
ba2sm-pro.part04.rar
ba2sm-pro.part05.rar
ba2sm-pro.part06.rar
ba2sm-pro.part07.rar
ba2sm-pro.part08.rar
ba2sm-pro.part09.rar
ba2sm-pro.part10.rar
ba2sm-pro.part11.rar
ba2sm-pro.part12.rar
ba2sm-pro.part13.rar
ba2sm-pro.part14.rar
ba2sm-pro.part15.rar
ba2sm-pro.part16.rar
ba2sm-pro.part17.rar
ba2sm-pro.part18.rar
ba2sm-pro.part19.rar
ba2sm-pro.part20.rar
ba2sm-pro.part21.rar
ba2sm-pro.part22.rar
ba2sm-pro.part23.rar
ba2sm-pro.part24.rar
ba2sm-pro.part25.rar
ba2sm-pro.part26.rar
ba2sm-pro.part27.rar
ba2sm-pro.part28.rar
ba2sm-pro.part29.rar
ba2sm-pro.part30.rar
ba2sm-pro.part31.rar
ba2sm-pro.part32.rar
ba2sm-pro.part33.rar
ba2sm-pro.part34.rar
ba2sm-pro.part35.rar
ba2sm-pro.part36.rar
ba2sm-pro.part37.rar
ba2sm-pro.part38.rar
ba2sm-pro.part39.rar
ba2sm-pro.part40.rar
ba2sm-pro.part41.rar
ba2sm-pro.part42.rar
ba2sm-pro.part43.rar
ba2sm-pro.part44.rar
ba2sm-pro.part45.rar
Code: |
http://rapidshare.com/files/118604117/P2K-Tools-3.zip |
MeGaUpload 1GB PER LINK:
http://www.megaupload.com/?d=TGF4AV34
http://www.megaupload.com/?d=D3V1T9PI
http://www.megaupload.com/?d=TQ3IK1UN
http://www.megaupload.com/?d=NZ91EVFD
http://www.megaupload.com/?d=2ZTFSFBS
or
http://rapidshare.com/files/165020389/NFSU00008.part01.rarPASS:
irfree.com
-- Edited by dekaNo at 11:24, 2008-11-20
AMD Turion 64 X2 dual-core mobile technology TL-60;
4GB DDR2 memory;
DL DVD±RW/CD-RW drive; LightScribe labeling;
14.1" WXGA high-definition widescreen with BrightView technology (1280 x 800)
320GB hard drive;
Video Memory Up to 1071MB
built-in webcam;
Windows Vista Home Premium 64-bit with SP1
Digital Media Reader or Slots
Yes, digital media card reader
**This laptop is like new was purchased in September**
$80,000 Neg
Email: abutler25s@hotmail.com
Tel# 355-9592
Make your own ringtones from your own CDs and MP3s. Ringtone Media Studio gives you the tools to personalize your cell phone with your own creations. Ringtones, wallpaper and mobile videos. Transfer digital media to your phone instantlyin a single click. No cables required!
One-click transfer over-the-air. Your ringtone arrives on your phone in seconds!
Compatible with 800+ phone models
Ringtone Media Studio is compatible with all major cell phone brands. It prompts you to configure your cell phone brand and model during the set-up process. After this, all of your files will automatically be configured in the format that is supported by your cell phone.
Melody Studio:
Create your own polyphonic or real music ringtones and transfer them to your mobile phone.
Image Studio:
Create your own wallpaper from your favorite photos, or capture a piece of your PC screen and turn it into wallpaper.
Video Studio:
Edit your favorite video clips and add text or special effects, then transfer your creations to your mobile phone.
Ringtone Media Studio includes three complete editing studios all in one plus
Download Here
A Toronto-based company, Fonolo, has mapped the phone menus of more than 300 companies in the U.S. and Canada, and presents them on its website.
Fonolo works by web surfers clicking on the option they want to access in a voice menu system, like "change mailing address." The website then calls the company and sends sound signals that mimic the user's button presses. After it reaches the right place in the system, it calls up the user and connects him or her to the system.
"Sony Ericsson is excited to announce its membership of the Open Handset Alliance and confirm its intention to develop a handset based on the Android platform," said Rikko Sakaguchi, CVP and head of Creation and Development at Sony Ericsson. "We believe Sony Ericsson can bring a wealth of experience in making consumer focused multimedia handsets with new user experience to the Alliance drawing on the successes of the Walkman and Cyber-shot sub-brands. Sony Ericsson is a strong supporter of open operating systems and we believe the Open Handset Alliance offers an exciting opportunity for a new and unique user experience only Sony Ericsson can deliver."
Membership of the Open Handset Alliance will complement the company's existing Open OS strategy which is based on the Symbian and Windows Mobile platforms.
The following handset manufactures are currently member of OHA: Asus, Garmin, HTC, Huawei Technologies, LG Electronics, Motorola, Samsung, Sony Ericsson and Toshiba. Nokia is currently not a member of the alliance.
About the Open Handset Alliance
The Open Handset Alliance is a group of 47 technology and mobile companies who have come together to accelerate innovation in mobile and offer consumers a richer, less expensive, and better mobile experience. Together we have developed Android, the first complete, open, and free mobile platform. We are committed to commercially deploy handsets and services using the Android Platform. All members of the Alliance have committed to making the initial version of the platform a commercial success. Some companies have contributed significant intellectual property to the Alliance that will be released under the Apache v2 Open Source license. Others are working to make sure their chipsets support the platform. Handset manufacturers and mobile operators are working to develop handsets based on the platform. Commercialization partners are working with the industry to support the platform via a professional services model.
Code:
http://rapidshare.com/files/55294017/Retina_Network_Security_Scanner_v5.1.zip