Wednesday, December 30, 2009

Heathrow Express Promotions

Locking Down Firefox. How? With a couple of plugins! The twelve

Mozilla Firefox is currently the most used browser by the average user. This popularity, gained over the years was surely due to the security features that this browser than Internet Explorer. Not everyone knows, however, that the "fox fire" once downloaded from the official site, requires some plugins (free!) to make it safe and (almost) invincible, otherwise, empty and bare, is no different from all Other browsers currently in circulation. Here I propose
some plugins that, in my humble opinion should not miss in our Firefox:

CookieSafe : Allows you to check the permissions of cookies (especially illegal ones).
Click here to add it to your Firefox!

NoScript : Allow execution of JavaScript, Java, and optionally other plug-in sites only permits the user directly. An extension essential to anyone who does not want on your PC to enter junk and viruses!
Click here to add it to your Firefox!

XSS Me : protection against XSS attacks.
Click here to add it to your Firefox!

RefControl : allows you to control what is sent as the HTTP Referer for each site.
(For effective protection, go to the "Tools" menu> "Add"> "RefControl"> "Options"> "Edit" and put the check mark on "Contraffai)
Click here to add it to your Firefox !

BetterPrivacy : helps protect you in the best way by LSO, and erase cookies normal of flash ( settings.sol ).
Click here to add it to your Firefox!

WOT : stands for "Web of Trust " and is due to its extended community, to catalog parameters through the web pages in safe and unsafe . By installing this extension you will notice a circle next to each page, if it is green it means that users of the Wot have been given a clean and safe and then, on the contrary it is the color red means that it is an untrusted site, or from unsuitable content to children, or even a shop not reliable.
If we also enter into a site Malfidano la pagina diventa nera con al centro il logo di Wot, il quale ci avverte del pericolo. Per visualizzare la pagina basta scegliere l'opzione " visualizza comunque ". Possiamo anche informarci del perchè il sito non è ritenuto affidabile. E una scheda ci darà ad esempio che il sito ha dei programmi con dialer, o una volta registrati si riceve spam ecc.
Installata l'estensione faremo parte anche noi della community di wot, dando così (se vogliamo)le nostre valutazioni ai siti che riteniamo o non riteniamo sicuri.
Se vogliamo condividere la nostra esperienza di un determinato sito con gli altri utenti ci basterà cliccare sul logo di wot presente nel nostro browser e apparirà una piccola finestra con quattro parametri da votare.
I parametri sono
  • Attendibilità
  • Affidabilità fornitore (per gli acquisti)
  • Riservatezza
  • Sicurezza per i bambini
Wot si serve anche di elenchi di siti anti-phishing.
Installando questa estensione saprete sempre la reputazione di un sito, forum , blog o altro che andrete a visitare.
Clicca qui per aggiungerlo al tuo Firefox!

AdBlock Plus : Per chi odia la pubblicità presente nei vari siti web, e per chi gradirebbe non vederla più, sicuramente AdBlock Plus è un estensione per Firefox che fa per lui. Facilissima da usare, blocca tutte le pubblicità che si desidera e può isolare anche un sito dal filtraggio. Installarla ed utilizzarla è semplicissimo, come tutte le altre extension, mentre la configurazione è abbastanza automatica: quando si ha una pubblicità, accanto al banner compare un tasto con scritto BLOCCA - premendolo la pubblicità non verà più visualizzata. Per filtrare un sito, basta andare nel menù strumenti, cliccare su AdBlock Plus, Aggiungi filtro ed inserire il link del sito da filtrare ed il gioco è fatto.Per chi vuole invece eliminare tutte le pubblicità, può usare uno dei filtri presenti in rete. Segnalo quello di GxWare . Sul sito ci sono tutte le istruzioni su come applicarlo.
Clicca qui per aggiungerlo al tuo Firefox!

Stealther : With this extension we will not save on your local history, cache, cookies, downloaded files list, recently closed tabs, enter information on forms. At the same time, we will not send to the sites visited and the browser version of the operating system.
Click here to add it to your Firefox!

LinkExtend : Provides level of safety, ethics, safety to children, pagerank and other information of the page you are visiting or a link.
Click here to add it to your Firefox!

only problem is that sometimes (often) Firefox is to occupy different memory resources and depending on your PC you may experience delays and performance degradation . Here, then, that the plugin Cache Status comes to our rescue: frees up the memory usage in excess of this web browser resulting increase speed and improve the performance of Firefox.
Click here to add it to your Firefox!

If you want to add a few plugins that you should be involved in the security package from the list below, write in comments.

Monday, December 7, 2009

Compaq Cq50-105nr Atheros Xp Driver



Happy Christmas to you! - Merry Christmas
This year I turned so my PC with Christmas themes Ubuntu
Desktop cube and snow scene (do from you) Login ChristmasHamper Christmas with logo (download here )

And there is also a theme for Beril downloaded from here


For users of Windows instead:





&




And of course the video version of the 3 Little Pigs Christmas



Now I still wish you ... Merry Christmas and Happy New Year!
Majorana

What To Wear With Red Sweater

Ubuntu Plus 4 Remix

The institute has decided to save on software to move towards' open source and has created a distribution of Ubuntu created by Prof. Antonio Cantaro.
Ubuntu plus, thanks al'intervento Professor offers more than windows and did not cost more.
It is strongly recommended to test mode live o di installarlo con windows, tutto su un unica macchina.

Ubuntu plus fai da te
Ubuntu iso download:

Saturday, December 5, 2009

7 Week Old Baby With Phlegm On The Chest

Publish a video blogger on youtube

Oggi qualcuno mi ha chiesto come mettere un video su blogger.
Farlo è alquanto semplice anche se bisogna seguire qualche passo:
  1. Prima di tutto sotto la descrizione ci sono due link, e vicino al secondo c'e un ingranaggio.
  2. Scegliete la dimensione (la più piccola possibilmente), il colore ed altre impostazioni.
  3. Copiate il secondo link e andate su Blogger

  1. Su blogget Click "New Post"
  2. Choose ticket "edit html"
  3. Copy the code you copied earlier
  4. Publish the post.
These were all simple steps to bring a video from youtube to blogger

Thursday, December 3, 2009

How Much Panadol Kills You

scams Christmas.

McAfee offers in guardia gli utenti sulle 12 truffe di Natale e sugli attacchi online più diffusi in occasione delle festività: secondo l'indagine State of the Net 2009 di Consumer Reports, i criminali informatici hanno sottratto agli utenti 8 miliardi di dollari

nei due anni scorsi.

Truffa I : Truffe di phishing di beneficenza. Durante la stagione delle feste, gli hacker sfruttano la generosità dei cittadini inviando email che sembrano provenire da enti di beneficenza legittimi; in realtà si tratta di siti web fasulli creati per appropriarsi delle donazioni, delle informazioni delle carte di credito e delle identità dei donatori.

Truffa II : Fatture fasulle da servizi di consegna volti a sottrarre denaro. I criminali informatici spesso inviano fatture fasulle e notifiche di consegna che sembrano arrivare per esempio da Federal Express o UPS chiedendo i dettagli della carta di credito per il riaccredito sul conto: le informazioni dell'utente vengono così rubate.

Truffa III : Social Networking. I criminali approfittano di questo di questo periodo particolare dell'anno inviando email di "Nuova richiesta di amicizia" che sembrano autentiche e provenire da parte di siti di social networking; cliccare sui link contenuti in queste email può portare all'installazione automatica di malware on your computer and steal personal information.

Fraud IV: The Dangers of Christmas cards electronically. In the last holiday season, it was discovered a worm disguised as e note Hallmark and festive promotions for McDonald's and Coca-Cola also email attachments Christmas-themed PowerPoint are very popular as a vehicle for malware.

Scam V : Costume "luxury" at exorbitant prices. A campaign brings festive shoppers to phony sites that have malware luxurious gifts "discounted" of big names (like Cartier, Gucci and Tag Heuer), also using fake logos of the Better Business Bureau to deceive shoppers into buying products they never receive.

Scam VI: Making Christmas shopping in a safe manner. Forrester Research Inc. predicts that online holiday sales will increase this year, as many people looking for opportunities will turn to the web to do business. As users shop and surf open hotspots, hackers can spy on their activities in an attempt to steal their personal information, the suggestion is for people never to buy online from a public computer or using a Wi open-Fi.

Scam VII: The lyrics of Christmas carols can be risky. During the holidays, hackers create fraudulent websites Christmas theme for those looking to hit a ringtone or wallpaper for your PC to the Christmas theme, the lyrics of Christmas carols or a screen saver theme: in this way is likely to infect your PC with spyware, adware or other malware.

Scam VIII: Unemployment. Fraudsters take advantage of desperate people looking for a job with the promise of high-paying jobs and income opportunities working from home, once the parties have submitted their information and pay the share of "goodwill", the hackers steal money instead of following the promised employment opportunity.

Scam IX: The fraud of the auction sites. Buyers should beware of auction sites on occasions that seem too good to be true, because often these purchases are never delivered to the buyer.

X Scam: The "password stealing." password theft is rampant during the holiday season: the thieves are using tools to discover the password of a user and send malware to record the keystrokes of the PC, a technique known as keylogging.

Scam XI: The bank email scams. Cyber \u200b\u200bcriminals trick consumers into divulging their bank details by sending emails that appear to come from financial institutions real. They ask users to confirm details of the bank account details including username and password, with the warning that if not provide this information your account will be closed.

XII Scam: Your files in exchange for a ransom: the fraud "ransomware". Hackers gain control of computer users through a series of festive these scams, then behave like "Virtual kidnappers' to seize files and encrypt , making it unreadable and inaccessible. Confidence Man holds hostage the user's files requiring payment of a ransom to return them.

Wednesday, December 2, 2009

Pinky And The Brain Moto

Virus evil



you afraid of viruses?? Well
can not do more than this (at least in the meantime)

Noughts And Crosses Strategy

black screens of death in Windows because of Windows? No, an update ...

Miscellaneous generalist and specialist sites including sites like the BBC are reporting a problem that apparently could afflict millions of users of Windows 7 and was affectionately named the Black Screen of Death .

In practice, when Windows 7 is completely black screen after login: no desktop, taskbar or sidebar, but (at best) only an Explorer window. This makes it understandably difficult to work. The problem also affects Windows Vista, XP, NT, and 2000.

The software company Prevx has prepared a temporary and partial remedy. The cause seems to be one of the recent updates Windows, that of November 25, which has changed the management of the Registry. Microsoft are looking in the archives of information for XP, but seem to involve another problem that produces a black screen. According InformationWeek, Microsoft for now only to say that "is investigating the reports" and that investigation is complete provide "detailed instructions on how to prevent or manage these issues" .

I will keep you updated on any developments and if you have info on post them in comments.

Especially a recommendation: do not trust unknown Web sites that offer remedies for this problem. Pests and cyber criminals are already taking advantage of the news. Avoid
also for a few days to perform downloading and installing updates, at least until you have a better idea about it and / or will not be released an update to update (pardon the pun, but this thing makes me smile. ..) that could plug the leak.

Tuesday, December 1, 2009

Heathrow Express Promotion

Warcraft-dependent? You can cause Blizzard!

name Erik Estavillo will not say anything to most people, but for the big game makers to do the same effect of mosquitoes in summer: a constant annoyance but hardly threatening.

Estavillo, a university student from California, has sued Blizzard Entertain for "deceptive trade practices" in viodeogioco World of Warcraft: having created a virtual world that forces players to "walk or run at a slower pace, requiring more time than necessary to move from one place another "has led in Estavillo a severe form of dependence from the game itself that has turned into an alien no longer able to function normally in the real world.

Not only the environment of World of Warcraft would be "harmful to many of its customers, which forces them to stick to gaming activities vile and mendacious" . And that's why Estavillo Blizzard asks for compensation one million dollars.

To support its argument, in case the student has included the names of some witnesses: Martin Lee Gore, founder of Depeche Mode (as "he famously sad, lonely and alienated, as can be derived from the songs that composed ") and actress Winona Ryder (as passionate Estavillo to Catcher in the Rye and therefore can " explain the meaning of alienation in that book and how this alienation can be transposed in real life and in games like World of Warcraft ").

As crazy they may seem requests Erik Estavillo part of the routine del personaggio apprendendo che nella lista delle aziende già querelate sono presenti Microsoft, Sony e Nintendo.

La prima era stata accusata di avergli causato stress in seguito al malfunzionamento della console Xbox (segnalato dall'apparizione del problema dei "Tre Led Rossi", Red Ring of Death): per riaversi aveva chiesto 75.000 dollari.

Sony, invece, ha osato escluderlo dal PlayStation Network per via del suo comportamento (come previsto dalla licenza) negandogli così i suoi diritti costituzionali (la libertà di parola nella fattispecie): in questo caso la richiesta è stata di soli 55.000 dollari, diventati 180.000 nell'appello seguito al fallimento first grade.

Finally, the lawsuit aimed at Nintendo is motivated by the disappearance Homebrew Channel following an updated Wii would interfere in "pursuit of happiness" of Estevillo, which needed to take only $ 5,000.

Estavillo has never received anything from any of their lawsuits, for which prefer not to go to a lawyer but act in person.

Tuesday, November 24, 2009

Can You Wear Ripped Jean Shorts For A Pirate

The Pirate Bay closes: the end of the download? Not really ...

The news that the "pirate ship" is sinking has been around the world in a few hours. One of the many reasons that led them to three "Amigos" at the end of the world's largest BitTorrent tracker was certainly not a few had legal problems recently, but not all. The computing world is evolving every day and the same applies to technologies intended for download:

Pirate Bay BitTorrent tracker ceases to be a tracker because the technology is outdated: the future is the magnet link and Distributed Hash Tables . In practice, the old centralized system is replaced by a distributed system.

There's a server but to lean on each node of the network peer to peer perform the research work and sharing. From the legal point of view this means that no longer exists a server close on charges of copyright infringement because the operation of the system is decentralized: it is a bit 'suffered the same evolution of the technology underlying the transition from eMule Kademlia network server.

For users, who are interested basically have a link to click to start the download, change little: they can always use the search engine Bay of Pirates (at least until summer 2010, when it begins the process of 'appeal) but then clicking on a link magnet.

The torrent client that will download must be updated to support system (le ultime versioni dei software più usati sono già al passo) ma, a parte questo, tutto resta come prima.


Per chi invece si occupa di lotta alla pirateria tutto ciò può significare qualche problema in più: la mancanza di un tracker porta sia all'impossibilità di avere un server da chiudere o mettere in difficoltà (come sta accadendo ultimamente) - dato che tutto è gestito dai singoli nodi della rete - sia alla mancanza di un punto di partenza stabile per le indagini mirate a stanare i condivisori.

Anche senza tracker, Pirate Bay resterà il punto di riferimento per lo scarimento tramite protocollo Torrent, ma forse cambierà logo: a Swedish company - the Sandryds Handels AB - became aware that the famous galleon is a registered trademark and is attempting to appropriate to locate it on a line of USB flash drive.

secono Peter Sunde, who occasionally seems to take over the role of spokesman for the Bay (despite has officially abandoned ) to Sandryds is only a preliminary registration yet to be approved by the authorities and will be easily set aside.

Mal going, maybe we'll see Pirate Bay in court to defend intellectual property that belongs

Monday, November 23, 2009

How To Clean Refurbished Bathtubs

The computer that thinks like a cat.

IBM announced the world's most powerful artificial brain. It has 147,456 processors, more than 150 terabytes of memory, requires six thousand tons of cooling, occupies about 4000 square feet and consume megawatts of power. All this produces the equivalent of the brain of a cat very, very slow. More than a hundred times slower than your beloved cat.

gattofili If you are, you might be tempted to say that this shows how intelligent is your beloved flock the retractable claws, which, moreover, have always known this, but go there with caution. The supercars of IBM is a mortgage of the brain, not a copy, and simulations require more and much more computing power than the copies.

It 's a remarkable simulation. At Almaden Research Center in San Jose, California, was in fact virtually replicated the coordinated operation of 1.6 billion interconnected neurons from 9 trillion synapses (complexity compared to a brain of a cat), shattering the record Previous 55 million neurons, which is the brain of a rat. A record obtained by the same team only two years ago. A

when a simulation of the human brain? Probably not between more than two decades. The computing power required is a thousand times higher than the mortgage of a cat, but the pace of progress present such a supercomputer should be available by 2019. Just in time to hunt for Sarah Connor.

The purpose of this research is not to create a breed of cats or the Terminator robot, but under controlled conditions to study the behavior and dynamics of the brain slices without anyone. The real challenge, in fact, is how does the brain to self-organize, it is not enough that there are billions of neurons must also be coherent structure. It is one thing to have a house, another is to have a shapeless pile of bricks in it. The spontaneous organization, created by experience and interaction with the world, is completely different from the current computing model, where everything is preset, and is the reason why organic farming requires a supercomputer to simulate the intelligence dragged by the neck.

But the results are starting to see. A more modest simulation, called Darwin and based on 50,000 virtual neurons, equal to one quarter of the brain of a gnat, was installed in a robot on wheels. As the robot interacted with the surrounding world, its virtual neurons altered their own interconnections, producing spontaneous organization.

The other significant result, which will be presented shortly in detail by the researcher Dharmendra S. Almaden Modha, is the use of supercomputers to decipher non-invasively (without slices to anyone, in fact) the interconnections of the human brain by analyzing images obtained using MRI. It's like an X-ray to make a big pot of spaghetti and figuring out the route taken by each noodle. This work is essential, Modha explains in his blog , to understand how each of us is to represent and process information.

To what purpose do all this? Why is cool, but mostly because today's computers are stupid and unable to handle the ambiguities of the real world and to analyze information based on context, and in an increasingly complex world should be complementary intelligence natural and artificial, as well as complement our muscle strength with that of the machines. And also because, to be frank, the current record holder of intelligence on this planet is proving all too often not up to the task.

Saturday, November 21, 2009

Can I Buy Visiora Products In Uk

The pirate ship sinks: The Pirate Bay closes!

The staff of the world's largest BitTorrent tracker, The Pirate Bay , announced that is slowly fading.

adventure which began 21 November 2003, when a group of friends ( Gottfrid Svartholm , known under the pseudonym Anakata , Fredrik Neij , TiAMO , and Peter Sunde , brokep ) Sweden decided to start a BitTorrent tracker called ' The Pirate Bay ' which soon became one of the largest BitTorrent tracker on the Internet used by millions of users to share files.

Although the site will remain operational (for now) millions of people lose the use BitTorrent your favorite tracker, and (fortunately) can still count on the many alternative tracker still working. The site of the bay of pirates continue to operate as it search engine for torrent files . Instead the old server where the years have passed more than 25 million users will be donated to a museum.

Unfortunately The Pirate Bay will not be remembered only for being the largest BitTorrent tracker , but especially for the lawsuit move by the majors for copyright infringement. In fact the four April 17, 2009 founders of "The Pirate Bay" have been sentenced to one year in prison for complicity in the violation of copyrights. The four will also have to pay 30 million kronor (2.7 million euro) in damages and interest to the music industry, film and video games, claiming 117 million crowns by way of lost earnings.

The lawyers of the four have now announced plans to appeal. Now the press is waiting for the next summer, when the appeal process will be held by The Pirate Bay. But come rumors that one of the judges presiding over the court of appeal has to do with Spotify, the legal department of streaming online, listen to streaming full length album. The lawyers of the parties involved have already reported this anomaly, it is perhaps for such reasons that the appeal process has been moved to the summer of 2010.

Ironically fatal destiny, or just that this news is posting the exact date, November 21, 2009, exactly six years after the founding of "The Pirate Bay"? Maybe both, because with "The Pirate Bay dies a piece of history as it has been for Napster before when there were no" mules "," torrents "or more.

2 Month Old Has Watery Stools

Google Chrome OS: Revolution in the long term.

http://www.wired.com/images_blogs/gadgetlab/2009/07/gchrome-660x427.jpg

Waiting for pre-launch (webcast here ) of Google Chrome OS, operating system, Google signed, was very high, but as often happens, expectations are rarely rewarded. Many thought that this was a move by the search giant on the Net to undermine the substantial monopoly of Microsoft in operating systems for personal computers, but what has emerged is far from his debut.

Google Chrome is based on Linux OS (Debian), as expected, but can not be installed instead of Windows, Linux or Mac OS X on any PC: it works only on devices blessed by Google (or a virtual machine in VMWare be downloaded as described on Lifehacker.com ), which for now does not exist but will be substantially the netbook and mobile phones (running on x86 and ARM). The actual launch of Chrome OS will in fact at the end of 2010: today was presented a preview only to smell the scent of what is churned out in a few months.

Chrome OS does not support hard disks, for example, but only those solid state is Linux, but has traditional applications to install, everything happens inside the browser (which of course is Google's browser, or Chrome), nothing local data or so, because everything resides on the Net exists in two versions, the closed source (Chrome OS) and open source ( Chromium ). How much tells

informally explanatory video Google Chrome OS is an operating system whose only purpose is to start as quickly as possible to allow the user to do the thing which is now more than any other computer to: access Internet: in the demo, the boot and loading in all browsers require only seven seconds. The computer essentially becomes a terminal with a few more ornaments. The applications reside in the browser and use the HTML5 to be more powerful and versatile applications via the Web today. There is no Start menu or Dock: all interaction is via the browser tabs, including configuration. The e-mail will consult with Gmail, you edit documents with Google Docs, and so on.

Google Chrome OS is not so immediate for the PC revolution that many expected, but it is a long-term challenge to Microsoft, Apple and the Linux world, because it makes the operating system largely irrelevant for most applications does not require handling of large amounts of data (audio and video editing, for example). All this resembles the story of Netscape, which was irrelevant to make the operating system a few years ago. We know what happened, and there is always the bottom line: we trust to delegate everything, absolutely everything, including our personal data, nostre foto, le nostre mail, a Google?

Friday, November 20, 2009

Lobster Boats For Sale In New England

Windows 7 to be paralyzed by remote: possible? It seems so ... Creating photomontages with Juxtaposer


Il nuovo Windows 7 è nato da pochissimo e già ha fatto parlare di sè moltissimo, ma non solo per le migliorie apportare dopo Vista purtroppo. Recentemente è stata scoperta una nuova falla, che se Windows 7 fosse una nave, il suo capitano urlerebbe senza pensarci su due volte "Abbandonare la nave!". Fortunatamente Windows 7 non è una nave e, nel momento in cui viene scoperto un buco, viene trovato anche (solitamente...) il "tappo" con cui bloccarlo.

Stando al suo scopritore Laurent Gaffié: è possibile paralizzare Windows 7 (e anche alcune versioni di Windows Server 2008) simply by tricking a user into visiting a malicious Web site packed. No blue screen classic, but a complete block: The computer stops responding to commands. It 'then must restart, resulting in loss of unsaved data. Not a little embarrassing for Bill Gates and friends.

Microsoft is already working on updating to plug the leak, but in the meantime, the demonstrations of the extreme ease with which they could exploit the flaw began to circulate on the Net

The first demonstration, of course, is the discoverer, on 11 November he published little responsibly all the Python code to use.

How does the leak? It 'pretty simple. Microsoft software that runs in Windows 7 the SMB (Server Message Block), the one normally used on Windows computers to share files and printers, does not handle properly any inconsistencies in the data submitted under this share. Specifically, Windows 7 is blocked completely (go into infinite loop) if it 's header of a data packet SMB declaring a length different from the real one. It 'just a single byte of difference, according to tests of PraetorianPrefect.com . If this happens, the only thing you can do is press the button to shut down the computer and then restart. An attacker

non deve fare altro che predisporre un server sul quale gira il codice pubblicato da Gaffié, lasciarlo in ascolto e indurre la vittima, tramite un qualunque espediente psicologico (mail allettante, invito in chat), a visitare una pagina Web contenente un link speciale che rimanda al server ostile. Ergo, per i meno esperti , non aprite email di strani mittenti di cui non avete mai sentito parlare ed anche strane email, perchè no, di amici e conoscenti di cui non aspettate nulla; se non siete sicuri, chiedete conferma prima di aprire il messaggio, scaricare allegati o cliccare sui link contenuti in esso (questa è una regola fondamentale per la sicurezza generale del proprio computer). Quando la vittima contatta the Web page, you enable an SMB connection that sends malformed packets to Windows 7, which is paralyzed. There are also other methods ( a command dir \\ \\ IP address \\ shared resource fake from the victim machine), but this is probably the most pernicious.

Microsoft has published a advisory in English, in recommending that users of Windows 7 block TCP ports 139 and 445 at the firewall and block all communications to and from SMB Internet. Normally you should already be configured this way (if you have doubts, ask a trusted expert to check for you), so the leak would be usable only by spiteful colleagues. The Microsoft advisory

indicates that Windows XP and Windows Vista are not affected by this vulnerability, and stresses that are currently not well known sites that exploit and can not be exploited to run code or otherwise take control of the victim's computer: the worst that can happen, In short, you find the computer suddenly stopped. Just like old times.

In short, the new operating system, old problems: the same old story as always.

Thursday, November 19, 2009

Chances Of Getting Emphesyma Smoking 30 Years

Making music with the pc: Fruity Loops Studio 9

This program, also called simply Fl Studio 9 allows you to create music and then export it. You can only create a base or an entire song with musical instruments virtuali e altro. Certo, a guardarlo così a pri mo colpo sembra molto complesso ma con una guida come questa o esempi come questi si farà presto ad imparare.
L'home page del p ro gramma è a questo indirizzo: http://flstudio.image-line.com/index.html

Weird Sayings Phrases

fun.

Juxtaposer app icon

Juxtaposer is a really nice iPhone and iPod touch that allows you to combine images to create montages through a curious simple and intuitive.

The operation is simple. Cut a piece of a picture we have in our library of iPhone / iPod Touch and paste it over another picture.

The first thing to do to use this application is to choose two photos from our library.

After you select the 2 files, select the portion of the image that we want to cut, we proceed to cut out the parts you want. Draw an outline around the part of the picture that we need, for example, cut out the head of a friend or one of our pet. Juxtaposer allows to use the (zoom in and zoom out) to crop precisely the part of choice.

Or we can rotate the image, to give the desired angle to fit the second picture. In this way we can glue the head of our dog on the cat or vice versa, creating a new monument or a mythical creature with the face of a famous friend. A

help is always available to us cunsultabile at any time by clicking the image that appears on the diskette in the upper left.

summarizes some of the main features of this program:
- Possible undo and redo actions.

- Availability of different types of brushes to create or blurred edges.

- Add more pieces of images to the final image.

- Ability to save the created image in our photo album.

- Ability to save several projects at once and resume it later.

- Masking the background image, this will allow us to isolate the part of 'image to work without taking into account the background image.

- Option to switch between edit mode and display full-screen image with the touch of a finger across the screen.

- Ability to work with our device in a horizontal or vertical.

- Possibility to change the settings by clicking "Advanced Settings".

Juxtaposer

You really can do anything, Juxtaposer is definitely an app that everyone should have on your iPhone.

Wednesday, November 18, 2009

Arm Pit Hair And Period

Apply special effects to our photos on iphone with ColorSplah

ColorSplash app icon

Colorsplash is a very nice photo for lovers of "portable". The software, developed by Hendrick Kueck, can perform some special effects to photos in the gallery from our iphone. Colorsplash uses a process called desaturation to turn your photos in part or entirely in black and white.

ColorSplash

The program has a great tutorial to understand how it works. Once that is done by selecting a photo from the gallery or grab a new one with the camera, Colorsplash load the selected image, converting it to black and white.

http://www.spazioiphone.com/wordpress/wp-content/uploads/2009/11/871603_2.jpg

You can then add a selective color in some areas of the image using one of quattropennelli available: hard-edged, soft-edged , transparent or opaque .
The application offers two display modes: Normal (which shows the image black and white and colored parts) and Red showing all the colored areas of the image in a dull red.
With the Pan & Zoom you can go further in detail to cure the image details.

http://www.spazioiphone.com/wordpress/wp-content/uploads/2009/11/871603_5.jpg

Colorsplash automatically saves your work in "sessions", then you can always go back to last saved workspace. A very nice that will please all fans of "easy click."

Tuesday, November 17, 2009

Centrifuge Cold Pressed

Assassin's Creed Lineage: The Movie.

http://www.centerzone.it/images/stories/assassins_creed.jpg

Hollywood has accustomed us with film products taken from comics and video games (latest example is the recent Prince of Persia: The Sands of Time due out May 28 of 2010 in our country), in which our beloved heroes come to life and face challenges sometimes have already seen or experienced in our hours of play. Less common, however, is that a production company to produce a real video game short film. Assassin's Creed Lineage , however, goes beyond that, leaving the banks of the label of mere product advertising and ended up being a totally new and innovative product, which probably opens a new window on the world of video games, a perfect fusion of cinema and video games. Produced by Hybride Technologies (una casa di produzione di effetti visivi assorbita qualche anno fa dalla Ubisoft), Assassin's Creed Lineage è un vero e proprio film diretto dal regista canadese Yves Simoneau. Canadese anche il cast, nonostante siano stati cercati attori di origini italiane. La storia è un prologo del videogame Assassin's Creed II (in uscita il 20 novembre) e ruota attorno all' Assassino Giovanni Auditore , padre del protagonista del gioco, Ezio. L'intera trama è disponibile su Wikipedia , ma vi consiglio di vedere il film direttamente qui sotto, naturalmente in HD:



The film was developed in parallel to video games and shot in the studio on green screen: the locations have been accurately reproduced from those of the game (obviously with a more photorealistic rendering), as well as in the game have been used the faces and movements of the actors in the film, recorded by motion capture . Between October and November, UbiSoft has released the film in three segments of ten minutes each, then post the complete movie.

http://gamingbolt.com/wp-content/uploads/2009/10/assassins-creed-2-wallpaper.jpg

The film, along with a behind the scenes video will be broadcast in HD then the next Nov. 19 on Discovery Channel at 22.

Monday, November 16, 2009

An Acrostic Poem About Litter

Build your own online empire with Tribal Wars

villaggio


or Tribal Wars Tribal Wars is a browser game medieval created by InnoGames in 2006 (original name Die Staemme ) which was administered in Italy, as in other countries, by Gameforge . The situation has changed since 1st March 2009 the date on which InnoGames took under its direct management of all servers and unfortunately for players of various servers, including myself, the new servers are started from scratch with version 5.0 of the game.

This game has a medieval setting where the player must manage a village and create your own army in order to protect themselves and, later in the game, conquer other villages and expand its domain. To play just a browser and a mouse and keyboard, the game is completely free and only if you want to benefit from the organizational point of view you can subscribe. The version 5.0 introduced new features such as the church , the archers and some graphical improvements such as the complete redesign of the village, in short, has taken steps that have made that the game is more online games with the same theme but developed in 2009. The most important is the malus night or that your troops fight with half della forza dalle ore 24:00 alle 7:00 del mattino successivo, introdotta per scoraggiare i fissati del gioco a non dormire per attaccare il vicino di turno che era tra le braccia di Morfeo.

Nel gioco, che è diviso in vari server non comunicanti tra loro chiamati Mondi , vi è la possibilità di fare tribù o di partecipare a tribù già esistenti al fine di organizzare meglio difese ed attacchi coordinati. Le tribù sono per alcuni anche un punto di ritrovo virtuale con gli amici attraverso il forum interno e i messaggi privati che si posso scambiare.

Il villaggio è composto da vari edifici che sono presenti dall’inizio o che vi verranno resi disponibili developing those present below a list with descriptions and features of each:

  • Headquarters: from this building are being built all the other buildings that are used during the game, you can make a custom name to their village. From level 15 onwards you can not demolish buildings that are considered most useful. Maximum building 30
  • Cache: necessary to protect its resources from attacks that you might receive, especially in the early moments of the game, developed to the level where 10 units of 2000 protects every resource
  • Stock: in this building, developing up to level 30 you can store 400,000 of each resource, if developed to its highest level. The higher the level is high and more resources can be stored inside.
  • Iron Mine: used to extract iron useful for any development of the village, more than anything for the troops, highest level of research 30. The higher the level, more resources will be extracted per hour.
  • Lumberjacks: used to extract useful timber for each village development, highest level of research 30. The higher the level, more resources will be extracted per hour.
  • Well clay: clay used to extract useful for each village development, mainly for construction of edifci, highest level of research 30. The higher the level, more resources will be extracted per hour.
  • Farm: every village has a maximum number of inhabitants that can accommodate and the farm is the building that determines this limit, the farm grows more and more people may have. Maximum 30 per 24,000 inhabitants.
  • Walls: a strip of wall defends your village, develop them up to level 20 to give a surplus to the defense of your army is inside you.
  • Smith: here we investigate the various combat units to carry out its army, the higher the level of the blacksmith and several units can be searched.
  • First Church: the first church is a new building, which was introduced only recently in version 5.0 playable in Italy and defines an area around the main village, which means that if you have other villages within this area of \u200b\u200byour troops fight at full strength. If you have villages outside this area but your troops will fight with a penalty that weakens them.
  • Church this church can be built on the villages you have done after the first and allows, through its development up to Level 3 to expand the coverage area and fight at full power.
  • Stalla: qua potete creare le vostre unità di cavalleria come cavalleria leggera, arcieri a cavallo, cavalleria pesante ed esploratori.
  • Caserma: qui si arruolano le unità di fanteria come lancieri, arcieri, spadaccini e guerrieri con ascia.
  • Officina: potete creano arieti e catapulte fondamentali per abbattere le mura nemiche.
  • Mercato: qua potete scambiare risorse con gli altri giocatori, accettando offerte presenti o facendone di vostre.
  • Accademia: edificio dove si possono reclutare nobili, unità molto lenta e debole che serve per conquistare i villaggi abbandonati o altri villaggi nemici dopo aver sterminato troops inside.

addition to the screen of the village have access to a map that will show you your village, your allies, your neighbors where you can mark with different colors to better orient the various villages in the attacks will do. In version 5.0 the map is no longer divided into quadrants marked with + or - but continents K45 K46 and so on is to grow than to diminish. Each village has coordinates, for example (543

Below the legend to better understand the table that describes all units: mapa


-> Attack Power ->

The strength of attack shows just how strong unity in the attack.

unita1

-> General Defense ->

The defensive strength indicates that the unit is able to defend themselves against infantry attacks.

attacco -> Defence Cavalry ->

cavalry defense indicates that the unit can defend against the attacks of cavalry.

difesa-gen -> Defense archers ->

defense archers indicates how the unit can defend against attacks from archers and horse archers.

dif-cavall -> Speed \u200b\u200b->

speed indicates how many minutes are in this unit to cross a field on the map.

dif-arcieri -> loot ->

The spoils indicates how many resources can bring back the drive as booty.

velocita GETTING STARTED: TIPS

The game starts you do not have many buildings that
, only the headquarters of the farm and the warehouse, the first thing dovete sviluppare le miniere, cercando di sviluppare in modo parallelo tutte e tre le risorse (quando avrete più esperienze capirete magari che alcune risorse servono prima di altre, ma tutto dipende dallo stile di gioco). Di pari passo è bene sviluppare nascondiglio e mura per evitare razzie da parte di altri giocatori; si può proseguire il gioco creando fabbro mercato caserma e poi stalla anche se non c’è una guida da seguire come dogma ma vari stili di gioco che vano bene lo stesso. Lo stile aggressivo si prefigge di creare solo truppe d’attacco come asce e poi cavalli leggeri per

razziare i piccoli vicini bottino così da avere uno sviluppo più rapido, uno stile più difensivo punterà invece su arcieri, spade explorers with a layer of walls as fast as possible to 15.


style of defense is to continue going forward in attack often does not pay much

game and I feel discouraged. It 'good to specialize and grow style is not changing too often. Troop recent acquisition of the first worlds for players do not understand much Italian archers on horseback, even if having the heavy cavalry which has a very high cost (more than before) could be coupled in good to light cavalry. Workshop would not recommend for troops in the villages of the catapults attack, replaced by a good number of rams (250 - 300). A fairly detailed guide can be found at this address but the best guide is to read it in game and you have to play.
the game can be found at this address