Google
 

Dr.Watson - Who is he

Dr. Watson for Windows is a program error debugger that gathers information about your computer when an error (or user-mode fault) occurs with a program. Technical support groups can use the information that Dr. Watson obtains and logs to diagnose a program error. When an error is detected, Dr. Watson creates a text file (Drwtsn32.log) that can be delivered to support personnel by the method they prefer. You also have the option of creating a crash dump file, which is a binary file that a programmer can load into a debugger.

Note Windows XP also provides an Error Reporting service that monitors your computer for both user-mode and kernel-mode faults ("stop" error messages or error messages that are displayed on a blue screen, as well as improper shutdown events) that affect both the operating system and any programs. This service allows you to send error reports to Microsoft when an error occurs. Because all error reports are confidential and anonymous, Microsoft Support Professionals do not have access to any error report that you have sent to Microsoft over the Internet using the Error Reporting service. As a result, you may need to send a Dr. Watson for Windows log file to a support professional. For additional information about Error Reporting Service in Windows XP, click the article number below to view the article in the Microsoft Knowledge Base:
310414 (http://support.microsoft.com/kb/310414/EN-US/) HOW TO: Configure and Use Error Reporting in Windows XP
If a program error occurs, Dr. Watson for Windows starts automatically. To configure Dr. Watson, follow these steps:
1.Click Start, and then click Run.
2.Type drwtsn32, and then click OK.
By default, the log file created by Dr. Watson is named Drwtsn32.log and is saved in the following location:
drive:\Documents and Settings\All Users.WINNT\Application Data\Microsoft\Dr Watson


To disable Dr. Watson

1.Click Start, click Run, type regedit.exe in the Open box, and then click OK.
2.Locate and click the following registry key:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\AeDebug
NOTE: Steps three and four are optional, but they necessary if you want to restore the default use of Dr. Watson.
3.Click the AeDebug key, and then click Export Registry File on the Registry menu.
4.Enter a name and location for the saved registry file, and then click Save.
5.Delete the AeDebug key.
Registry entries for debugger programs are located in the AeDebug key in Windows. The Dr. Watson program is installed by default in Windows, and is configured to run when an application error occurs (with a data value of 1 for the Auto value). The default values are:
Value Name = Auto
Type = String (REG_SZ)
Data Value = 1 or 0. (Default is 1)

Value Name = Debugger
Type = String (REG_SZ)
Data Value = drwtsn32 -p %ld -e %ld -g

NOTE: This data value (drwtsn32 -p %ld -e %ld -g) is specific to Dr. Watson. Alternative debuggers will have their own values and parameters.

To enable Dr. Watson

1.At a command prompt, type the following line, and then press ENTER:

drwtsn32 -i
2.Double-click the .reg file you created in steps three and four above.

How to start windows programs quickly with Run Command...?

The run option of Start menu is used to run a program or to open a document directly. If you

do not know the exact location of the program or document then click on Start button to open

Run and type the programs shortcut name to open it directly.

Run Commands

appwiz.cpl -- Used to run Add/Remove wizard

Calc --Calculator

Cfgwiz32 --ISDN Configuration Wizard

Charmap --Character Map

Chkdisk --Repair damaged files

Cleanmgr --Cleans up hard drives

Clipbrd --Windows Clipboard viewer

Control --Displays Control Panel

Cmd --Opens a new Command Window

Control mouse --Used to control mouse properties

Dcomcnfg --DCOM user security

Debug --Assembly language programming tool

Defrag --Defragmentation tool

Drwatson --Records programs crash & snapshots

Dxdiag --DirectX Diagnostic Utility

Explorer --Windows Explorer

Fontview --Graphical font viewer

Fsmgmt.msc -- Used to open shared folders

Firewall.cpl& nbsp; -- Used to configure windows firewall

Ftp -ftp.exe program

Hostname --Returns Computer's name

Hdwwiz.cpl -- Used to run Add Hardware wizard

Ipconfig --Displays IP configuration for all network adapters

Logoff -- Used to logoff the computer

MMC --Microsoft Management Console

Msconfig --Configuration to edit startup files

Mstsc -- Used to access remote desktop

Mrc -- Malicious Software Removal Tool

Msinfo32 --Microsoft System Information Utility

Nbtstat --Displays stats and current connections using NetBIOS over TCP/IP

Netstat --Displays all active network connections

Nslookup--Returns your local DNS server

Osk ---Used to access on screen keyboard

Perfmon.msc -- Used to configure the performance of Monitor.

Ping --Sends data to a specified host/IP

Powercfg.cpl -- Used to configure power option

Regedit --Registry Editor

Regwiz -- Registration wizard

Sfc /scannow -- System File Checker

Sndrec32 --Sound Recorder

Shutdown -- Used to shutdown the windows

Spider -- Used to open spider solitaire card game

Sfc / scannow -- Used to run system file checker utility.

Sndvol32 --Volume control for soundcard

Sysedit -- Edit system startup files

Taskmgr --Task manager

Telephon.cpl -- Used to configure modem options.

Telnet --Telnet program

Tracert --Traces and displays all paths required to reach an internet host

Winchat -- Used to chat with Microsoft

Wmplayer -- Used to run Windows Media player

Wab -- Used to open Windows address Book.

WinWord -- Used to open Microsoft word

Winipcfg --Displays IP configuration

Winver -- Used to check Windows Version

Wupdmgr --Takes you to Microsoft Windows Update

Write -- Used to open WordPad

Boot Sector Virus Removal

Boot sector virus removal can be a tricky business as these are some of the most evil and difficult kinds of viruses. They lidge in your boot sector, the part of your computer that is responsible for loading or “booting” the rest of it, so that as soon as your computer is turned on, the virus is already loaded into memory. This can be a big problem, because a cleverly designed boot sector virus removal can convince your computer that there is no virus at all when it loads.

The best way for boot sector virus removal is to make a backup “clean” disk. This disk loads your computer when you stick it in the drive, so it is not loading from the boot sector, which has been contaminated by a virus. This way, you can load your computer virus free, and then clean the virus off of it.

The best way to prevent boot sector virus removal is to switch operating systems away from Microsoft Windows. Windows is the only system which is commonly infected by viruses. They strike macs and linux machines, almost never at all. This is because windows is badly programmed. If, for example, you get an email with an attachment, it is designed to automatically open the attachment and to follow its instructions even if they put your computer in danger!

Mac OS and Linux both have safeguard built in to protect you from these problems, but Microsoft doesn't care about anything except about whether or not their system looks pretty and they are making money.

Boot sector virus removal isn't the only protection you might need on your computer. You need spyware removal as well. Spyware is a little like viruses, but much less harmful. When you visit certain websites with spam, they will put a program in your web browser which keeps track of your information and sends it back to them. It follows what websites you go to, what you buy, etc., and uses it to market things to you.

It also slows down your computer and opens pop-up windows which you don't want to see repeatedly, which is very distracting and annoying. Some adware can even devert your web browser, sending you to websites you don't want to see, and stopping you from getting to the ones which you are trying to get to. Fortunately, these harmful nuisances are easily removed using one of any number of commonly avalable adware removal programs.

How To Select The Best Student Laptops

Laptops are the perfect educational tool for students. They can handle an innumerable amount of tasks and serve many different functions that allow students to consolidate all of their class assignments and home studies into one convenient location, which simplifies workflow and increases productivity.

The two most important things to look for in a student laptop are portability and battery life. This laptop will likely be carried in a backpack or shoulder bag from class to class, so you will definitely want a system that is light and easy to transport. There is also no guarantee that you will have access to an auxiliary power supply in your classroom or on campus, so you will most likely want a battery that lasts up to several hours per charge.

Desktop real estate can be limited in your class, so you want to make sure your laptop is compact and economical in size, preferably around 14" X 10" in general dimensions.

As far as individual specifications, you can get by with most base configurations. A 1.66GHz processor, 512MB of RAM, a 40GB hard drive, and a standard DVD/CDRW drive should suffice, but you may wish to upgrade certain components depending on whether or not you want to use your notebook for any extra curricular activities, such as gaming or multimedia production.

Unless you intend to do higher-level networking, or unless your school requires domain-based authentication to access the school network (check with your IT department), Windows XP Home Edition should more than meet your needs for an Operating System.

Lastly, you will need some office suite software to process and edit your reports and class assignments. Microsoft Office Basic will be able to handle most of your needs, however, if you plan on doing any slide-show presentations or website creation, you will want to go with Office Pro.

These are the main things you need to know and consider before purchasing a student laptop. This is just a general outline. Feel free to make additional customizations if you have specific requirements for school.

Tamil woman in U.S.(its FUNNY) - tamil padum kashtam !!!

Superb! Tamil woman in U.S. - nice blog article...
read it when u need a break...really superb...!


The following is an excerpt from a blog
(written by an Indian in America )
Wednesday, September 28, 2005

En per padum paadu!!!

My full name is Kalaivani, but I call myself Kalai. This is not for scene, ....like how Madhavan does in Anbe Sivam (Anbarasu --> Ars).it has a looooong and pathetic history...
I started hearing different versions of my name after coming to this country, and the painful fact is all the possible permutations and combinations of vowels in my name give meaningful words in tamil!!!
When I first joined the university, my professor wrote to me..
Dear KALAvani (meaning: thief; context: kalavani paya..)
.... ... ...

Sari adhuvachum typo nu free ya vittudalam..

Then after a year, I joined a company for internship.those people called me before I joined, to inform me about some test which I had to take..
"Hello is this Ms. Kizhavaani?" (meaning: old; context : kizha bolt..etc.)

"No..this is KALAIvaani"

"Ohh..am sorry KALAvaani"
(Marupadiyum. ..)
Then I decided.periya pera irukkinala thane ivlo confusion?!! So, I started calling myself 'Kalai'... but the story continued..
I joined my full-time position in another company recently. On my first day, we had a meeting..
"Let's all welcome our new associate.Ms. Kulai" (meaning: bunch; context: kulai kulaiyai vazhaipazham kaaithadhu)

CLAP! CLAP! CLAP! CLAP! Followed by smiles.

(Dei.ennangada. .. ellarum serndhu comedy panreengala? ??)

Anniku arambichadhu. ..

Once my boss and I were talking about a project... after finishing the meeting...
"Ok, Kali. Nice to have you here!" (meaning: last yuga; context: kali muthi pochu.)

"That's KALAI"
(Enakku idhu thevaya?!)
"Ohh kAALi?" (meaning: goddess; context: badrakaali.. )

"Hee hee .very close"
(Podaannnggg. ..!!)
So, I stopped correcting my name after that..!

One fine morning, I was working.

"Hey kiLai (meaning: branch; context: marakiLai) .howz it going?"

"Yea good"
(Sollitu thirumbitten. Nammaluku edhuku indha per thiruthura business nu...)
"Is that how you say your name?"

(Aaahaa arambichutanya. ..!!!)

"Uhhh. It's KALAI"

"Kolaai?" (meaning:pump; context: kozhai adi sandai.)

(Venaaammm.. .)

"Kolai?" (meaning: murder; context: kolai panniduven.. )

(Venaam!)

"kaLai?" (meaning: weed; context: kaLai pud
unguradhu.)
(Valikkudhu. .. azhudhuduven. ..)

"May be I'll get your name with practice. Haha."

(Idhellam remba over da dei... Tamil la paatha rende rendu ezhuthu thaan da!!!)

Ennada, Chandramukhi la thalaivar 'durga' perai nakkaladikkira maathiri... namma per ayiduche nu nenaikkum podhu... my friend came up with a brilliant idea!
Adhavadhu... to compare my name with a word.so I started using this word 'kaleidoscope' ; which has the same pronunciation as 'kalai'!

So, I started telling everyone. 'Kalai as in kaleidoscope' !. Ippo kooda romba ellam ozhunga solradhulla. They are saying 'kalaai' (kalaaikiradhu)..

"Hey Kalaai!!"

"Yea?"

"Just trying to say your name. Ha ha ha"

"Ohhh ..how sweet!"
(thooo thEri..)
Yedho vaandhi edukkira effect la per irundhalum.. . my life was in peace... until few days back...
My net connection was down, so I called up the customer service
(En kiragam. Madras call center ku pochu!)
Enakku andha vishayame theriyala. So I started in complete American accent...
"Your name ma'am?"

"Kalaai"

"What? Can you repeat ma'am?"

"
Kalaai as in kaleidoscope"
"I didn't get that ma'am. Can I have your number? I can check the records"
(Sigh!... and gave the number)

"Ohh, Kalaivani, right?" (in a sarcastic tone.)

( Ada paavi makka... nee nammooora??! !! All American accents stopped. Back to Indian accent.)

I could clearly see what he was thinking... per paatha 'urs pammingly' nu podra category maathiri irukku... scene podradhu mattum princess Diana range kaa...

"Anna... naan sathyama andha maathiri illeeengana. ..

iPhone Unlocking Benefits

Many awaited the launch of the iPhone and when it finally arrived in the summer of 2007 the line to get one was a long one. For people who didn’t live in the USA the waiting in this line would have to continue till November the same year and by then it stood clear that the phone needed to get unlocked to live up to its full potential. To get an iPhone and not unlock it would be considered a waste of money by many, especially since unlocking became so easy as clicking your mouse.

Cheating Customers

It is questionable if it is OK to unlock an iPhone but this could easily be turned around as a customer that buys this expensive phone is forced to accept the terms of the operator it is tied to. In the USA the phone operator is AT&T and in some cases buying the phone means that a customer has to stick to the phone company for 2 years! It is evident that such an arrangement robs the customers of the benefits of a free market where prices are influenced by the competition of the phone companies. To unlock the iPhone means to get a better variety of rates and subscriptions.

In Europe it is only possible for people living in the UK, Germany or France to enjoy the locked iPhone. It is not unusual with business relationships between these nations and that means that customers in Europe will not only have to accept the rates of the company with the rights to the iPhone in their own country but also the conversion rates that are added as they cross into one of the other countries. By unlocking the iPhone it will gain a better reputation as a phone that can be fit for everyone.

Immobile mobile

For people living in countries other than the UK, France, Germany and the US, the only way to enjoy an iPhone is to unlock it. It is quite remarkable that a phone that is meant to be used as an all around tool isn’t fit to be used globally. Without a simlock the phone becomes affordable and more attractive and it can better be used globally. Taking away the lock-feature will not only benefit the great many customers who would like to use it but also the producers that certainly want to see their phone conquer the world.

If you decide to unlock your iphone its recommend you do it with a reputable firm that knows what its doing and can give you propper support. There are many cases where an iPhone has been bricked by malfunctioning software.

Build A PC Plan To Save

If your number one reason for building a computer is to save money, than you need to Plan to Save. An old Indian proverb says "All the flowers of all the tomorrows are in the seeds of today." The flowers that you seek are a highly functional computer that by building it saves you money. Well, you are in luck. I just so happen to have 4 seeds that I am going to give you. All you need to do is water these seeds and nurture them.

Create a budget

Have you ever tried to save money without first setting up some ground rules to spending? Well, if you are Bill Gates, this article isn't for you. For the rest of us, we need to create some sort of budget. The budget is used as a guideline to spending. It makes us aware of how much we spend and what we are spending it on. Ok, enough with the Personal Budget 101 course (if you haven't taken this course yet, I highly recommend you contact your local college and get enrolled). I just wanted to point out that in order to effectively save money; you need to be aware of what you are doing with your money. This way, you can adjust your spending accordingly, in order to accomplish short term and long term financial goals.

Know what you need to buy

Well, the same principle of budgeting can be applied when building a computer. In order to not over spend on a project, you need to focus specifically on what you need to buy and how much it costs. Let me help you out. Here is a list of what you need to buy:

Processor

Motherboard

Power Supply

RAM

Computer Case

Hard Drive

Optical Drive

DVD ROM

Monitor

Keyboard/Mouse

Operating System

This is just what you need to buy. You still have to consider what you want to buy. Now that you have a general idea of what you have to buy, now you have to think about what you want to budget for this project. $200 $300 $1000 It's solely up to you.

How will the computer be used?

Next, you need to think about what you expect from your computer; not just what you want it to do today, but as far out as 3 to 5 years from now. You should always build a computer with future upgrades in mind. Do you plan on using it for word processing and internet surfing or for intense gaming? This will help you to determine how much RAM you need and how fast the CPU will be.

Put it all together

Now, this part is just like creating a personal budget. Either use an excel or equivalent spreadsheet, or a sheet of lined paper and write on the top the name of this project (Billy's Computer Build) and how much money you've allocated for the project. Next, list all the components you need and want to buy. Beside each, write how much you want to spend on that particular component. Your motherboard, power supply and processor are your most important parts and I suggest you not short change these. Also, you should do some research on each component, so you have an idea of its cost.

This budget or plan will help you to stay within the funds you allocated to the project. If you have $50 allocated for your case and you catch a deal after rebate for $29.99, then you have $20 that you can re-allocate. Also keep in mind shipping and handling and taxes. This is money that you are spending too, so it should be posted against your budget.

Asus Eee PC Review

The Asus EEE PC is hot, hot, HOT! Who would have thought that a sub-compact laptop would become so popular in a world where "bigger is better"? Everyone wants more storage and bigger screens and more features - and yet these small computers grow in sales every month!

The first surprise is that the Asus EEE PC is a sub-compact laptop that runs on "Linux" and not Windows. Right away that pigeonholes the purchasers to geeks and technophiles. The Macbook and Mac air are both geeky devices, and Mac's OS share went from 9% to 14% from 2007-2008. Linux use on low-end PC's is growing, the Everex gPC sold at Wal-Mart online sold out. Consequently, the gPC got pulled from Wal-Mart retail shelves, probably because geeks don't shop in brick and mortar stores for tech gear. Currently, the Asus Eee PC 4G Surf is in the Amazon top 10 lists for "Computers and Hardware" beating out all Apple models.

Why is it that Makes the Asus Eee PC so popular?

I think one obvious point it that it's cheaper than an iPhone, but a fully fledged computer. Both the screen and keyboard are smaller than a conventional laptop, but completely usable. If you're tired of carrying around a PDA type phone with a folding keyboard from hell or tiny thumbkeys - why not just get an Asus EEE PC? It's probably around the same money.

Features:

- affordable pricetag (from $300-$500)
- Built in camera (0.3 megapixel 30fps)
- Durable Solid State Drive (4-20GB SSD)
- MMC / SD memory card slot and 3 USB Ports
- 512MB - 2GB RAM
- 800x480 screen resolution
- Wifi b/g 10/100 wired connections
- Xandros Linux installed
- Great for Personal Use
- Only 2 lbs
- No bigger than a hardcover book

The company that makes these (Asustek) predicts selling 2 million units in 2008. That's significant for a Linux based OS. It should be no surprise however that one of the most popular hacks is to convert the Asus Eee PC to Windows XP (if you have a valid license of course). Linux is great, but some of the most popular complaints in Amazon comments for the Eee PC are that it's not user-friendly or for the first time Linux user. That's where the geek factor comes into play. The happiest customers for the Eee are geeks that have no problems configuring and using Linux. Even though the Xandros distribution is very user-friendly, your average non-geek might run into problems when plugging in their store bought iPod, printer, or digital camera. Comment squakers will attest to this, but geeks will boast how easy-to-use and configurable it is.

So - it may be no surprise that Asustek is going to play to the masses and release a Windows XP version of the Asus Eee PC installed from the factory. In just the last month the Asus Eee PC 4G and 12G have been released with Windows XP Home installed. The main difference most will notice between the 4G and 12G an increased screen size to 8.3", allowing a default 1280x600 resolution (much closer to a standard desktop). With the Windows versions selling well, Asus should have no problems reaching their 2008 sales goals.

That does raise the price slightly, but at just over $500 it's not much more than an Xbox 360 or Playstation 3. All in all the "bang for the buck" is pretty good with the Eee PC considering how much high end gaming systems and cell phones cost. Small portable computers are going to get more and more popular, will you be the next to buy one?

Ink Refill Refilling Printer Ink And Avoiding New Cartridges

Tired of purchasing new cartridges for your printer? Don't worry, In this article i will show you the importance of ink refilling and how you can save a lot of money which you are currently spending on purchasing new cartridges.

The printer is a very well thought out machine that is easy to operate and is very very good to make your work a lot more easier and faster. It also consumes ink which will cost you a lot money if you want to replace the whole cartridge but ink refilling is popular nowadays, that it has even given birth to lots of ink-refilling stations. Ink refilling is where a printer becomes either a means offprinting affordable or making lucrative profits for manufacturers. It is an effective way to make great savings on your printer ink. The need to provide ink refilling is especially acute in the case of color ink cartridges, because typically one color will run out of ink before the other colors are depleted. With a strong awareness of recycling today, ink refilling is a demand service.

Refilling applies to nearly all makes and models, with or without integral print heads, (although some printers will need to have the cartridge chip override codes). Refilling means recycling your ink jet cartridge. Refilling is good for the environment and can save you a lot of money on your cartridges costs. Ink refilling is popular nowadays, that it has even given birth to lots of ink-refilling stations. You can actually do the refilling yourself provided you have the materials and the knowledge how to do it. Once again you will save big time by refilling your own cartridges, its a process that will not take much of your time, and with the easy to follow instructions you will be done in minutes.

Separate ink refilling is important mostly for intensive printing of unbalanced (monochrome) color images which are typical of studio and art photography. With a strong awareness of recycling today, ink refilling is surely killing the need of cartridges at crucial stages, one can easily afford some cash for purchasing ink.

It is not very much difficult to integrate ink in your cartridge, read some manuals and you will be on your way, don't waste too much money, just refill your existing cartridge.

In short words, I have just explained about the importance of ink refilling, it's uses and how much efficient it is in now a days.

How To Disable The Shutdown Event Tracker On Microsoft Windows Server

Microsoft Windows has a feature which enables the operating system to record information about why the machine is going to be shut down or in the event of an unexpected shut down; why it was shut down.

This functionality is called the Shutdown Event Tracker. The feature is turned off by default in Windows XP Home & Professional and most other desktop versions of the operating system. In the case of Windows Server 2003 and other versions in the server family it is enabled by default.

In our experience this functionality is not required for many server installations and in fact gets in the way frequently. It is intended to act as a audit tool to understand what has happened to the server, but in reality it make shutting down/restarting the server annoying. I switch this functionality off on all server's I run, the process outlined below will allow you to do the same:

1. Go to Start > Run and type gpedit.msc and press ok

2. Open the Computer Configuration > Administrative Templates > System Folder

3. Double click the Display Shutdown Event Tracker setting in the right hand pane.

4. Select the Disable option on the pop up window and press ok

When you attempt to Reset or Shut Down the computer next time the Shut Down Event Tracker option will no longer be displayed and you will be free to perform the operation without its annoyance. To turn it back on - repeat the above but select enabled.

A Brief Outline Of LCD Television

Nowadays very one is concerned about the quality, what ever the products is. Even in the market of TV, LCD televisions have taken the place from the traditional CRT televisions. Technologies are so advanced that LCD TV technology has now reached the position where picture quality is exceptionally good as compared to traditional CRT TV. LCD's technology is commonly using in the standard TV sizes, but it is also extended for large screen sizes with PLASMA technology.

As far as the price of LCD TVs is concerned, it continues to fall rapidly. LCD TVs are more portable as compared to huge CRT TVs. It occupied a fraction of the floor space of a traditional CRT television. But people are not stopping of using their large CRT set. In fact, some models of LCD TVs are quite useful that they are possible to mount on a wall or sit them on a shelf; which in turn helps to free up all of your valuable floor space.

LCD TVs comes in different sizes. Typically LCD TVs start at 15". The LCD TVs technology is moving forward all the way. 40" to 45" sets were widely available in October 2004, and Sharp announced the manufacture of a 65" set. Shortly afterwards, Samsung announced an 82" LCD TV, in March 2005. LG Philips announced a 100" set, in August 2006.

The no of television viewer is increasing day by day. At the moment we can clearly see the undergoing huge changes in television viewing experience. Competition in the market is quite challenging since technology continues to go far ahead but prices are falling. So take the advantages, don't forget to check out the prices of different LCD TVs before you decided to purchase an LCD TV.

Rentfusion is a Audio-Visual-Rentals Company in USA supplying all type of computer products nationwide. Rental Distribution center Chicago, Orlando, New York, Las Vegas and New Jersey. Call Toll free no Nationwide: 1-866-RENTFUSION (1-866-736-8387).

Hitachi And Their 320GB Laptop HDD

SSD (Secured Storage Data) is thought to be the next best thing in hard drive technology for mobile computers. Even though it's tougher, it doesn't reach its market appeal yet. Highly expensive and relatively slow, SSD is still on its baby-phase: It might be years before we could see a 320GB SSD that will not cost us more than a thousand dollars.

For now Hitachi is banking on the good old hard drive. Called the Travelstar 7K320, this laptop hard drive will show you that the soon to be old is not that bad especially for your laptop. Aside from 320GB of storage capacity, the 7200 RPM should turn any laptop junkies head into considering this hard drive. According to their recent press release, the 7K320 promises 60% increase of storage capacity, 12% increase of performance. All of these are possible while driving down 22% of power consumption. With this speed, data transfer is also at its peak. Standard data transfer is 3GB/s while the encrypted transfer is up to 1GB/s. If that speed will never amaze you, nothing will. The 7K320 also promises to be very silent: during operation it only provides 2.8Bels of sound while 2.5Bels of sound is expected when it is not on operation.

What's even better with Hitachi's Travelstar 7K320 is the security it offers. Most of the security that we offer today for our hard drives comes with the software. Hitachi however has developed a built-in security technology that is hardware based. Available during encrypted transfer, Bulk Data Encryption (BDE) scrambles the data while it is being written. After the transfer or writing on the hard drive is done, BDE again reassembles the data so that it could be read by application.

The Hitachi Travelstar 7K320 is expected to hit the market in a few weeks and the price is expected to be from US$200 to US$250.

Diagnosing Computer Hardware Faults

When your PC goes wrong and you have lost all hope the normal final stage is to reformat your computer and start afresh. This will most likely resolve any software issues, remove viruses or any other nasties and give you a clean start. But what happens if you have already reformatted and the problem still exists?

This means, most likely, you have a hardware fault. This is where problems can start.

Diagnosing a computer hardware fault can be a right pain as any of the computer components could the cause. Unless you are intending to replace the entire machine you need to carefully diagnose with what components the fault lies with.

I would advise you look at the computer into these main areas to analyse.

Memory / RAM

Power Supply

Hard Disk

Motherboard

This isn't a complete definitive list, obviously depending on your issue ie if your issue is that you don't get sound then it could be a sound card issue, similarly if you don't get a display then graphics could be the culprit. If it is a random fault then either of the above could be the cause.

Memory - this is fortunately quite easy to diagnose. Search the Internet for a memory tester. Generally these can be put onto a CD (or Floppy if you are stuck in the past!!), boot up from the CD which then enters the memory test. This will constantly cycle through, testing the memory for errors. It is wise to leave this on for several hours or even better over night. It will advise you if the memory fails.

Power Supply - this can be a strange one. People generally assume that if the power supply does fail then you would get no life from you computer at all. This sometimes is not true. I have had computers that turn off at random times, computers that have the power light on, but do not start up etc and it has turned out to be the supply - I would advise this should be one of the first things to test as can be a problematic area. Testing it can be difficult without the right equipment. Really the only way is to get a volt tester and check the voltage and current coming out.

Hard Disk - this can be one of the worst problems to have as if your hard disk does fail, unless you have been sensible and done regular backups of your most valuable data, you stand to lose it all. Hard disks can go at any time and usually you will hear a harsh sounding clicking noise that is coming from your computer. If this is the case you need to probably replace the hard disk. Get someone who then knows what they are doing here to try and recover your old data for you.

If none of the above solves your problem then you could possibly be looking at the fault being with the motherboard or any other plug in cards or devices you have. Remove everything to leave only the very basics. Take out all sound cards etc and any other PCI devices that are not essential. If you have more than one stick of ram then leave in only one and see if the problem resolves.

Really, solving hardware issues comes down to a case of trial and error here so take the time to test everything out. Bear in mind that even if your keyboard or mouse is faulty, very strange things can happen to a computer, so if you can, try to remove and test every single item.

LCD Monitors Is Now The Time To Upgrade

If you get the Sunday paper, and happen to be looking at the sales sections. You may have noticed that LCD monitors have really come down in price. The question is, is now the time to get an LCD monitor.

And I'd have to say yes, for many different reasons.

First off, LCD monitors are getting to be really cheap. Where just a few short years ago, you'd have to spend $500 or more on a decent LCD monitor. It's now not uncommon to get a good monitor between $150-250 depending on the size and manufacturer.

Second, they perform better than they used to. One of my big hang-ups about LCD monitors was that they didn't perform that well. Particularly for gaming, there was a latency in the screen, which means that you could see residual images on the screen during fast action. That has changed as the monitors have gotten much more efficient in recent years.

Third, they take up less space than normal monitors. It allows for smaller desks, more space for more essential things on your desktop, etc. They really can save quite a bit of space, so much so that it seems like a 19" or 22" LCD monitor is smaller than your 15" CRT monitor was, even though the screen seems much larger.

Fourth, they take up much less energy than the older CRT monitors. I've seen some reports that some of the Viewsonic models are up to 3 times more efficient than older CRT monitors. And that's a good thing in today's age of rising energy costs.

Definitely times have changed and the technology has gotten cheaper, more effective and more reliable. If you have been holding off, I believe the price to performance ratio has gotten there. Now you just have to wait for the new Organic LED's, which can be as thin as 1mm (think about half as thick as a nickel), Kodak and other manufacturers are betting on the technology in a big way.

Hard Drive History 50 Years In The Making

September 2006 marked the 50th anniversary of hard drive storage. When IBM delivered its first hard drive on September 13th, 1956, few could have imagined the impact it would have on our everyday lives. The RAMAC (also known as 'Random Access Method of Accounting and Control') was the size of two refrigerators and weighed a ton. It required a separate air compressor to protect the heads, had pizza-sized platters and was able to store a then whopping 5 megabytes of data. Now you can do all that with a mere pocket drive! What's more - the RAMAC was available to lease for ?18,500 , the equivalent of ? 134,500 in today's pounds.

25 years on, the first hard drive for personal computers was invented. Using the MFM encoding method, it held a 40MB capacity and 625 KBps data transfer rate. A later version of the ST506 interface switched to the RLL encoding method, allowing for increased storage capacity and processing speed.

IBM made technological history on 12th August 1981, with the launch of their first personal computer - the IBM 5150. At a cost of ?830 the 5150 had just 16K of memory- just enough for a small amount of emails. It's difficult to conceive that as recently as the late 1980s 100MB of hard disk space was considered ample. In today's era, this would be totally insufficient, hardly enough to install the operating system, not to mention a large application such as Microsoft Office.

When asked about the limitations of the early PC, Tom Standage, the Economist magazine's business editor says: "It's hard to imagine what people used to do with computers in those days because by modern standards they really couldn't do anything."

As a result of these major breakthroughs, the industry has grown from several thousand disk drives per year in the 1950s to over 260 million drives per year in 2003. During this period, the cost of magnetic disk storage has decreased from ?1,088 per megabyte in the 1960s to 0.03 pence today.

The future is bright
At present, the standard 3.5 inch desktop drive can store up to 750 gigabytes (GB) in data. But disk drives are set to become even smaller, more powerful and less costly. According to Bill Healy, an executive at Hitachi, drives containing hundreds of gigabytes will be small enough to wear as jewelry. "You'll have with you every album and tune you've ever bought, every picture you've ever taken, every tax record."

Having five disk drives in your household is becoming increasingly commonplace: PCs, laptops, game systems, TiVo? video recorders, iPods? - just to mention a few. Experts believe that someday households will have up to 15 disk drives, some of which may appear in your TV set, mobile phone or car.

In fact, the industry is expected to deliver as many drives in the next five years as it did in the last 50 years. Industry anaylsts such as Gartner, IDC and TrendFOCUS believe that the global HDD market will continue to experience impressive unit and revenue growth.

Take the good with the bad
As new devices hit the market, and the amount of stored data escalates the potential for data loss is greater than ever. No matter how strict your back-up policy or how heavily you invest in data protection- somewhere along the line data loss will occur. With 20 years' experience, Ontrack Data Recovery? has certainly seen its fair share of data disasters. From the dog that ate one man's memory stick - to the frustrated user so angry he shot his laptop with a gun! Not to mention the businesswoman who spilt coffee on her laptop and the father who accidentally deleted his child's baby photos.

Ontrack Data Recovery has the technical capability to recover data from any media, operating system or storage device -no matter how old or cumbersome! Preparation is the name of the game. By establishing a relationship with a reputable data recovery provider, you can reduce the stress surrounding data loss and relax with a ready-made action plan for data recovery and restoration.

Ontack Data Recovery specialises in data recovery services & software as well as data management solutions for businesses and individuals.

How To Avoid Get Rich Quick Scams

Get rich quick scams are everywhere! You can find them in

newspapers, magazines, Television and more, but the place where

they have flourished the most is certainly the internet.

If you think that there are ways to make money overnight, I have

bad news for you; there is simply NOT such thing as get rich

overnight.

If you have fallen for one or more of those get rich quick

scams, don't be ashamed, a lot of us have too. It's something

most people who want to get out of the 9-5 job machine are

falling prey to. I have fallen myself as well. Experiences

like these, however, helped me never to fall for them again, as

well as becoming an expert to warn others.

One of the first clues to look for, to avoid get rich quick

scams, are statements like; it will not take much work at all to

get to your first $1000 per day, all you need to do is plug in

and follow the system. This is a false statement, or more

simply said, a lie. If you are starting in network marketing,

or even if you already know what you are doing, it will take you

some work to get to this kind of figure. Just think about it

for a minute. You are going to plug in to their system, do

close to nothing, maybe just a few clicks here and there, and at

the end of the day, wow! You've just earned $1000! That is when

you know that you've just found a get rich quick scam.

You will NEVER make money just by plugging into a system. You

are going to make money by doing the work of a network marketer.

Big difference! That is where those less than honest companies

catch their prey, based on the lack of knowledge of the

difference between plugging into a system, and actually do the

work NEEDED which will bring you success, after you've plugged

in.

Getting rich overnight! IT is NOT going to happen. When you

fall for these types of advertisements, what happens is that you

just lose the money you invest in it. The one who is getting

rich is the get rich quick scam system you've just signed up

with.

This being said, there is still hope for an entrepreneur like

you, who wants to get free from his 9-5 JOB. There are

legitimate resources that can build you a foundation to make

money online. They will teach you the best techniques, and

practices for earning money online, building the foundation of

your business for you.

These programs are of the absolute best quality, and very

affordable. If you are truly looking to start a business

online, or take your business to the next level, you must

investigate them. You will not regret you did, and never fall

for a get rich quick scam again.

How To Avoid Being A Victim Of Paid To Read Email Scams

Anyone who has been a member of a number of paid email programs is likely at one time or another to have been a victim of a scam. While there are many well run paid to read email sites that pay its members there are also many that are there to take advantage of the members. Those sites will typically promise to pay members once their accounts reach a certain amount but never actually do so. The unfortunate result is that many people never see the little money they earned for all their hard work. What is even more tragic is the members who spend money on advertising to build their downlines for the scam sites and lose all the money they invested. All the while the owners take in money from the advertisers.

While there is no foolproof way of avoiding all the paid email scam programs there are some things you can look out for. Here is a list of what to look at before joining.

1. How long has the site been around? Generally speaking the longer the site has been in business the greater the chance it is well run and the members get paid regularly.

2. How large of membership does the site have? If there is a large number of members usually that means they are paying and have a decent reputation.

3. How much does the site charge for advertising versus how much it pays members for each email? It is a matter of judgement. For example if a site offers to pay members 50 cents an email and only charges 10 dollars for advertising that is obviously a scam.

4. Check out what others who have been members think of the site. A simple search for a review of site will bring up people who have left their opinions on various websites. Don't rely on just one review or opinion though. Try to get at least 3 different reviews before joining.

Finally I would like to caution not to spend money advertising a new site you have joined to build downlines. First use free marketing such as blogs, forums, web 2.0 sites and articles. Once you have actually been paid you can consider it more safe to spend money promoting the program. If you consider all those things just covered and use caution your chances of success in generating income with paid email will be much greater than simply jumping in to new programs.

Is It Safe To Limewire Your PC

Before I begin, I just want to make something perfectly clear: NOTE TO ANY ATTORNEYS WHO MAY WORK FOR LIMEWIRE - I think that your clients' product is WONDERFUL! Aside from the wheel and the internal combustion engine, it's probably the SINGLE GREATEST ACHIEVEMENT in the history of mankind. REALLY!... So please don't sue me.

Now that I've cleared that up we can get down to business. In my line of work, I get calls on a daily basis from people who are having issues with viruses on their computer. Some of these people have relatively minor infections and some have MAJOR PROBLEMS. Here's the pattern I've noticed, though (I just call 'em like I see 'em): When someone has a serious virus and/or spyware infection on their PC, they almost always have a copy of Limewire installed as well. Now, don't interpret that the wrong way. The Limewire software (assuming you get it from a legitimate source) is perfectly safe (Are all of the attorneys still paying attention?). To my knowledge, their software contains no spyware or viruses and I'm not just saying that to avoid a lawsuit. I really mean it. So, if the question is posed to me "is it safe to install Limewire on my computer?", my answer is an unwavering "Yes".

The problem, it seems, is when people start using the service to actually download files to their computer. This is where a lot of people get a bit confused about why their computer gets so badly infected in a relatively short period of time. From my observations as a working pc repair tech I have come to the conclusion that most people don't have even a basic understanding of how file sharing services work, nor (in a lot of cases) do they care. That's too bad really, because it's difficult to protect yourself from threats if you don't even know what those threats are or where they come from. Alas, the lure of "free" music is just too much for many people, so they will just blindly download files and hope for the best.

There, now that I have that off my chest, I feel much better. The real purpose of this article though, is not to chastise people for their wide-eyed naive trust of free things they get from total strangers over the internet, but to (hopefully) help educate those who want to use a file sharing service and provide them with a little bit of knowledge so that they can better protect themselves.

The first thing I want to do before I go any further with this discussion is to let the folks at Limewire off the hook. They are not responsible for their users' reckless online activities any more than the people at Ford are responsible for their customers reckless driving. It's up to the end users to monitor their own activities and to become part of the solution instead of being part of the problem. It really wasn't my intention to single them out because most file sharing services are essentially the same. The only reason I mentioned these guys by name is that they are far and away the most popular service of this type operating today. Had I written this article a few years ago I probably would have the Napster people annoyed with me. So for the remainder of this discussion I will just refer to all of these services collectively as "file sharing services". Now all you lawyers can go back to what you were doing before, such as suing somebody (other than me).

Anyway, as I said before, most users of file sharing services may not completely understand how the file sharing process works. There seems to be this perception that there is some gigantic free music repository full of perfectly safe, virus free, downloadable content stored somewhere out there in cyberspace. I assure you that this is not the case. OK, you ask, then where do the file sharing services get all of this music that they offer for free downloads? I'm glad you asked. The answer is that they don't. File sharing services don't store any music files or movies or anything of the sort on their servers. More importantly, they don't own any distribution rights for any of the copyrighted material. So where does the music come from? Again, thanks for asking. It comes directly from the computers of other users of the file sharing services.

You see, file sharing services are in essence a very large peer-to-peer (P2P) network. When you join one of these services, you are sharing a portion of your computer with other members of the service and they are in turn sharing access to their files with you. Now, you may think that this is somewhat of a security risk, but probably not a huge one, as these services upon installation of their software, designate a default folder on your PC to share on the network. Other than that one folder, nobody has access to your PC. The real threat with this type of network is in the files you download. If someone in the network has infected files on their computer (trust me, a lot of them do) and then you download one of these infected files, guess what!? You've just invited a virus onto your computer. Multiply this scenario by the hundreds of thousands of other P2P members and the MILLIONS of files being passed back and forth and you can see how this can quickly become a real threat to your PC.

So as a computer tech that deals with virus infested computers on a daily basis, I have to say that I HIGHLY RECOMMEND downloading your music from a "pay-per-track" service such as itunes or amazon.com. I only say this because from a PC security standpoint, using P2P file sharing is just too costly in the long run. Think of it this way, how many itunes could you have purchased with the $200 that you just gave to the computer repair guy after he cleaned up your PC? When you look at it that way, all that "free" music just doesn't seem like such a great deal, huh?

I will say this. Many people insist on using file sharing services even when they know the risks, so if you are absolutely dead-set on using a file sharing service to build your music collection, at least get some good antivirus and antispyware on your computer and make sure that your virus software is always updated with the latest definitions. This will at least give you a fighting chance at keeping your computer safe. Also, learn how to effectively use your antivirus software. Most antivirus software will let you scan individual files in real time (after you download but BEFORE you open the file) by right clicking the file and using the scan option in the menu. Other than that, all I can do is wish you the best of luck and hope you know a good computer guy.

So again, if you ask me if it's safe to install Lime...um...file sharing software, the answer is yes. Is it safe to actually USE file sharing software? No, probably not.

Why Is My Computer Running Slow AntiSpyware Might Be Your Answer

Back in the early days of the Internet, which for many was not that long ago, if you asked the question: why is my computer running slow? Your answer was pretty simple, you more than likely had to delete some programs from your computer or the worse of the two was that you had a virus on your computer. Ask that question today and you could be staring at multiple problems. A registry fix, scandisk or virus could all be reasons why your computer runs slow.

The good thing is, for the most part, those just mentioned mostly have solutions for them. You can get software to help clear up most of those problems. However, today's Internet has now become a double-edged sword. We can get any information right at our fingertips. You can even type in the phrase "why is my computer running slow?" and come up with loads of answers.

The internet offers us all kinds of great information from how to instructions to gossip and great products that we can buy without ever leaving our homes. The bad side of that is while we are searching for answers or products we can have all of our identity stripped from us with adware or spyware programs secretly placed on our computer in secret locations on our computers.

Lucky for us there are many great anti adware companies out there. Many great antispyware software companies have made it their business to remove adware from unknowing consumers. Chances are you have downloaded some product from some of these companies already. Many companies who offer great antispyware software give a free scan of your computer to let you know exactly what kind of aware or spyware is lurking on your computer.

A good antispyware program will let you detect Trojans, worms and malicious programs. It will also repair damage left by malware. You can usually use a good antispyware software to load extremely helpful features such as a registry shield that will protect your registry, one of the first things that cause your computer to slow down.

There are times when it is hard to trust shareware, as we might not know if it is just another malicious program wrapped in a shareware package. So it's good to do some research before you download anything. You can find good reviews on antispyware programs all over the net and it's also a good thing to check out the company and make sure it is a legitimate software company before you download anything. If you are asking your self "why is my computer running slow?" Then antispyware could be an easy fix. If you are looking for free or paid adware software you do some research and read some reviews.

More about spyware: www.computers.pcriot.com

SEO Security

Whether the tools of script kiddies or more advanced hackers; a breach in security can result in a website being flagged as badware by Google.

This wouldn't affect a mom and pop personal website to a major degree but would surely carry a negative view for a site which purports to be somewhat professional in nature.

Supposing one was to sell hosting, scripts themselves or security even; then it would look particularly bad for a customer or client to stumble upon a search engine result page which won't bring them to their site but rather to a page which suggests that they should pick another result........Disaster!

Of course in real terms, its not a disaster but perception can be everything.

Following are some guidelines which may be helpful.

  1. If you don't already have a Google webmaster account, then sign up. Ensure too that your account email address is kept functional rather than forgotten.
  2. If using a content management system for publishing, ensure also that heed is paid to the security aspects associated with that particular cms. Its not enough to publish and forget!
  3. As a matter of good practice, be sure to chmod files and directories with as tight permissions as possible without upsetting the functionality of the site.
  4. Passwords can be a pain, but are so called, for a reason. Make these difficult to crack.
  5. Sometimes, it can be enough to view the source code of a webpage, to find hidden and malicious code. Seeing iframes where they don't belong is a give away.
  6. Patrol files on your server to see if anything is there which shouldn't be there. Remove such files once you determine that you or your host are not the instigators. Sometimes, new files are created to quickly help a hacker to quickly find re-entry information such as database names and passwords.
  7. While it is good practice to become familiar with all files and directories of a given cms, some will not be competent to this level. If this is the case, then the total clearance or deletion of all server files and folders may be the quickest option. Once done, known and safe backup copies can be quickly uploaded. Likewise for the database, where undesirable code may be inserted.
  8. While one might feel popular by having hundreds or thousands of users; not everyone is your friend. Limit the ways which your users can manipulate your database, usually by limiting their webform input. If you don't know how, then ask someone trustworthy.
  9. Get the latest possible update to your software. As well as increased functionality, updates are for plugging security vulnerabilities as they arise.
  10. A reliable host is a great line of defense as well, as some of the better ones will monitor activity on their servers and can spot nastiness. Most of the time though, responsibility is yours. In the western world at least, there are choices of where to shop and set up your stall.
  11. Finally, Google does not appear to punish publishers harshly and tend to help actually. For an established domain, they seem to have a good idea that such hacks are not the intention of good people. If hacked, join the forum at www.stopbadware.org where these great volunteers may help you to clean out your cupboard.

One thing for sure is that it is difficult enough to get into the serps in the first place. When that is done, you don't want anyone to find a page which might suggest that your site and all indexed pages of it; are not exactly fit for public consumption. Worse again, would be complaints to you that the innocent surfer suffered pesonal computer damage and associated malware, by simply visiting your website. What good then, is an S.E.O.?


Want to know more about SEO: www.computers.pcriot.com

Security and the Family Internet Experience

The Internet is all about freedom. It is the freedom to explore, the freedom to learn new things and the freedom to pursue a business that can make money.

There are certain countries that restrict the freedom of their citizens when it comes to online exploration, but the free exchange of information and ideas is what makes using the Internet so appealing to many.

According to each individual's way of thinking there are a lot of strange websites out there. You can find websites that offend and may seem distasteful to your senses. Yet, you will also find many more that will connect with your interests and values.

Some, who may have never used an online entry point, may view the web as a place where evil can be found on every site. If you use a search engine you can quickly find an abundance of sites that will easily offend, but the truth is the Internet is simply a tool that can be useful for either positive or negative purposes.

If you go online in a deliberate attempt to find something negative you will find it, but the opposite is also true. The same logic can be applied to television. The form of media can contain material that is positive and negative depending on your point of view. That doesn't make the television good or bad - it simply causes the user to exercise caution when using this form of media.

When parents discover objectionable programming they can use available technology to block certain channels and use other technology to block any shows with a rating they don't want their family to see.

In the same way there is a form of security for parents when it comes to allowing their children to gain access to the web. In some cases parents who supervise their children online do not have much problem of their children encountering site content that may be objectionable. They may also be able to divert online messaging that could pose potential dangers to their child.

There are programs like Net Nanny that allow parents to gain remarkable control over what their children are allowed to see online. They can monitor where they have been, and they can do this without the need to stay with their child every moment they are online.

A program called Covenant Eyes can also help individuals who may be attracted to material on sites that may not be healthy to an ongoing relationship or finances. This site can help by providing an accountability partner with a report about sites that have been visited. The idea is to help an individual who may have a gambling addiction or may be prone to visit sites with pornography to kick the habit using a trusted friend who can monitor online activity and gently confront the problem.

These and similar programs provide family security online because sometimes we can stumble into a place we know we shouldn't be and decide to stay too long.

The Internet is not evil, but we could all use a little help in making sure we are comfortable in using it wisely.

Old Scam New Twist

There is a old scam with a new twist that people need to be aware of. This one involves a mystery shopper site called Value Max Service. It is not yet established if the site is at fault or if a fraudulent client has compromised the information given to the site. As of this writing, no charges have been laid against the site and the person who obtained funds has not been found.

A Red Deer, Alberta Canada women answered an ad in a local paper for mystery shoppers. She went to this site and provided information and then was contacted by a man who gave her assignments. He then sent her a bank draft of approximately $1360.00 and asked her to deposit it, which she did. She deposited the bank draft in an instant teller. She was to wire the money to a woman in Toronto. Then the man sent her another bank draft for over a thousand dollars and asked her to deposit it and then wire him the money.

She caught on to the problem when the bank machine would not take the deposit but informed her that she needed to speak to a bank representative. She found out that the first draft had been a fraud and the one she almost deposited was also a fraud. As she was the one that was depositing fake drafts, she was held responsible for the money lost. She was out almost $1500.00 of her own money.

Several attempts were made to contact the phone number listed on the website but no calls have been replied to as of yet. Another woman in Prince George, British Colombia had a similar experience with this site and is out $3660.00. Although the matter has not been resolved in terms of who is responsible for the scam, the website or another party, this is an old scam that keeps coming up in new ways.

No matter what the work is that you are offered online, you should be aware that anyone that sends you a money order, bank draft or cheques and asks you to deposit it is scamming you.

If you think about it, why would they need you to deposit money for them? You are a relative stranger to the business, why would they let strangers deposit their money? None of the money orders, bank drafts and cheques are real. They make money from getting you to transfer the money out of your own pocket before the money has cleared. When it bounces, they already have your money. The worst part is, these sleazy scam artists slip away leaving little information to track them down and you as the depositor are in fact doing a crime by depositing fake money orders, bank drafts or cheques.

Be aware the same scam is used in different ways. Some "hire" you as a bookkeeper, or another position that seems real. They almost always give you some legitimate looking work to do before they send you the fake funds to deposit. They also use this scam by emailing you that they for some desperate reason have a huge amount of money they need to deposit in another Country or they will lose it all. They generously offer you a percentage to help them out. Of course it is a fake again and you are out a lot of money.

Again, stay away from any work online or off that offers you work and then wants you to deposit funds for them. Call the police if any work you have taken online or through an ad in the paper and they ask you to do this. Do not deposit the funds. Take it to the authorities.

Generate Encrypt and Keep Your Passwords Safe

With technology comes convenience, and the technology of the Internet grows each day allowing busy people and consumers to do more in less time. Some of the most often used Internet sites include; on-line banking, internet shopping, on-line bill paying, research at our fingertips, e-mail, instant messaging, photo image storing and creation and so much more. Not only can we communicate, pay bills complete many other day to day tasks, but we can also help our children with homework, do research, plan a vacation, make reservations (for restaurants to travel) and so many other things. But with this technology comes risks, especially as websites try to "personalize" the site to each individual, even to greeting you by name when you log in. As a result, more and more information is gathered, and to keep that information safe, more and more passwords created.

As personalization becomes standard as does our reliance on many websites to do everything from pay bills to monitoring assets the security of this information becomes of utmost importance. So, how do we complete all the forms for the sites we need as well as create passwords that are unique, unusual and that will protect our online services and accounts?

If you are like many people, you probably use one or two passwords, alternating them between sites, so you don't forget your password. Or you write them down and store them somewhere-but not too far from the computer so you don't have to go looking for them. Internet security experts, as well as many websites warn us of the dangers of an easy password as well as the dangers of having our passwords within easy access. Another situation that needs to be considered is what happens in the event of emergency, disability, illness or even death, and your family needs those passwords in order to keep your finances in order, and you are the only one who knew what your passwords are and where they are located.

Is there a safer alternative to writing them in an address book or on a piece of paper underneath my keyboard? Absolutely, there is a software system available to consumers called Roboform. This software not only generates original passwords but stores them, and personal and financial information frequently used when working online.

Roboform software completes online forms and creates securely encrypted passwords. It will even generate a random, highly safe password for you when you hit generate. It uses an artificial intelligence system that is created to identity forms, complete them as well as generate and safely store passwords, keeping your account information safe.

This form filler and password service saves time and effort as well as provides security by: managing passwords and logging you in automatically as well as filling in long forms for registration or shopping checkout with just a click. This function also cuts down on "keystrokes" making it more difficult for keylogger software to work in any possibly attempts to "steal" your information.

Roboform Features:

-The ability to create one identity, but have multiple credit cards, addresses, user names and passwords stored.

-Roboform detects and fills in drop down boxes.

-This software detects what formation of numbers need to be used, for example is the telephone number field presented in ten digits or a different format and completes the form correctly.

-Customization of information according to country locations and traditions. For example, date formats will be completed based on country location, so US dates will be month, day, year while foreign forms require day, month and year.

-Customization based on language.

-A highlight function that indicates that Roboform should only complete specific sections of the form.

Roboform Protection and Security services include:

-Encrypting passwords for increased security.

-Generation of random passwords.

-Detection of "phishing" websites and only completing forms on legitimate sites.

-Eliminates keyloggers, because the keyboard is not used to complete forms.

Roboform first became available in 1999. Because of its popularity and reliability, it has been translated into 30 languages and is used by millions around the world. Also available is RoboForm2Go, one of the first of applications that can operate from USB flash drives. RoboForm2Go is a portable version of RoboForm that allows consumers to their passwords with them and enjoy the conveyance of this service anywhere. Roboform and Robofrom2Go are compatible with many different operating systems and software, including: Internet Explorer, AOL, MSN, Firefox, IE 7 and Vista.

The cost for a lap or desktop computer is $29.95. Roboform2Go for U 3 drives or non-U 3 drives is available for $19.95. The PALM version is $9.99. A 30 days free trial is available with a "No Questions Asked" Money Back Guarantee.

This service has been awarded PC Magazine's Editor's Choice Award, Soft32.com's Editor's Review Award (Excellent in 5/5 categories) and the blue ribbon FDM (Free Download Manager) User's Choice Award. Independent consumer reviews say over and over that it is "easy to use," "a quality time saver" and "fast, fast, fast."

Roboform software can not only save consumers time (and time is money in many cases) but it also protects their personal and financial information. The creation of unique passwords as well as elimination of keylogger access makes all the conveniences of using the Internet, not only convenient but safe. Financial information, online bill paying and more can be done safely and effectively, and in case of emergency your family will have the information it needs all stored in one place, permitting them one more level of security not only financially but personally.

Who Needs Paid Internet Security 2 Recommended Ones

In my opinion the necessity is marginal for normal internet user who surf the internet from their home. Why? Well, because I have been surfing from my home for a decade or more & have not used anything but free anti-virus software. So who really needs paid anti-virus suites? My guess is that businesses, corporations, & big organizations need them because the free anti virus programs does not seem to be appropriate for large computer networks. There are more threats online & on computer networks to be cautious of other than viruses.

Integrated Protection: Kaspersky Internet Security 7.0

The Kaspersky Internet Security is a very popular & effective program that is able to effectively detect & prevent malicious programs from entering your computer. It is efficient & provides thorough security for computers that are frequently connected to the internet & because of it, is a popular choice of internet security programs for many experienced internet users today. Identity thieves & other malicious online threats will be unable to breach your computer when it is installed with the Kaspersky Internet Security 7.0. There are many products from Kaspersky, divided into home, business category, & also for mobile phone users. Also, Kaspersky provides services like Kaspersky hosted security.

Some of the features of the Kaspersky Internet Security 7.0 software:

? Integrated protection from all Internet threats

? Integrated antivirus protection: 1) Hourly automated database updates, 2) Preliminary behavior analysis, 3) New On-going behavior analysis.

? Real-time scanning for email, Internet traffic and files

? Improved Personal firewall with an IDS / IPS system.

? New Protection from leaks of confidential data.

? New Parental Control.

? Protection from spam and phishing

? Automatic database updates

Kaspersky Internet Security 7.0 has all the online security that your computer needs. You do not need to have any other security programs (commercial of free) on your computer. The total online security Kaspersky Internet Security 7.0 provides is why you should consider it for your computer. Now, in 2008, the newest version is 7.0 (about $60 per computer) which are only available for Microsoft Windows users. A 30 day trial version is available online for download at Kaspersky.com. You could alternatively decide to only purchase the cheaper Kaspersky Anti Virus 7.0 (about $40 per computer) too & combine the usage with anti spyware software from other vendors, even free ones like Spybot.

Reputable ZoneAlarm Internet Security Suite

Viruses, spyware, adware, & etc are a constant threat to your personal information stored on your computer. You would need an internet security program that covers all the bases. You may want to install ZoneAlarm Internet Security Suite which costs about $59 per computer. ZoneAlarm Internet Security Suite is developed by CheckPoint Software Technologies, Ltd & is a very effective security system for your PC. It has a good reputation too, starting out as a free high quality firewall software provider (Zone Labs) on the internet.

Some of the features of the ZoneAlarm Internet Security Suite:

? Antivirus

? Anti-Spyware

? Anti-Spam & Anti-Phishing

? Identity Theft Protection

? Network and Program Firewall

? Operating System Firewall (OSFirewall?)

? Auto-Learn

? Game Mode

? Wireless PC Protection

? SmartDefense? Service: includes DefenseNet, an early warning system

You may want to consider purchasing ZoneAlarm Internet Security Suite for a complete online security solution. This software will effectively protect your PC from the malicious threats circulating the internet today including your identity! Go with the makers of the online security program that made the computer firewall popular. With ZoneAlarm Internet Security installed on your computer, you will definitely sleep more comfortably with the thought of having NO security breaches.

Conclusion

Spyware & Bots are more crafty & stealthier, hence more advanced than viruses. What computer networks should have are Anti-virus suites that can protect against Spyware & bots too. The Anti Virus giants like Kasperky & ZoneAlarm will probably buy out any performing new anti-bot startup companies. It's the main reason why computer networks still need to pay for anti-virus suites. Also, they are more convenient that having individual programs to protect against each threat. Typical home computer & internet users like me just use AVG free anti-virus, free anti Spyware, free anti-bot, & free what have you.

To know more about viruses,

Visit: www.computers.pcriot.com

Common Web 20 Security Measures

One of the interesting things about Web 2.0 security is that sites which are usually classified as using Web 2.0 applications tend to be very secure sites. This is good news for consumers, who these days must be concerned about credit card numbers and other personal bits of information being used illegally. Here are some of the ways that the Web 2.0 sites manage to make online commerce a little more secure.

First, any Web 2.0 commerce site will be encrypted to allow for maximum security. That means even if someone is using malicious software to monitor your movements, they are not able to read the information you enter such as a Social Security number, a credit card number, or a bank account number. The data can only be decrypted on the vendor end, where it is translated in a safe environment and then used to complete the transaction. This is why you are unable to see the characters as you enter them. The technology keeps your data safe from harm, and thus prevents you from a great deal of worry and inconvenience.

Second, many Web 2.0 sites offer consumers the choice of saving information on a secure server or re-entering the data each time you visit the site. This ability to choose your options can bring a lot of peace of mind. If you feel secure enough with the site to save your information such a credit card number, you can do so. If not, you can simply enter the data for one time use, and it is wiped from the server altogether. This type of Web 2.0 security is extremely common today and very popular.

Last, the functionality of Web 2.0 applications helps an end user to know whether he or she is attempting to view or otherwise interact with a secure site. This can be a great help when visiting an online store for the first time. Knowing that the site is secure and that nobody is likely to steal credit card numbers or other important information will make a huge difference in how much the user enjoys the shopping experience. In fact, many people refuse to purchase anything unless the site is obviously secure, which is a very wise move indeed.

Essentially, the aim of Web 2.0 security is to provide consumers with a secure way to do business online, without the worry of information falling into the wrong hands. Today's security measures are stronger than ever, and will no doubt continue to evolve as time goes on.

Hacking Tips

Hack into webcams...This is not a hacking Guide..

It's rather a tutorial to show you how to do a simple search for unprotected webcams on the net.

This is only for fun purposes...

You are totally responsible for your actions...

(note: these are not personal webcams, this is only a guide on how to view public webcams such as traffic cams)


START

Go to this link :
www.google.com

and put this into the search Bar
inurl:/view/index.shtml
or
intitle:liveapplet inurl:LvAppl

and click on google search...

it would show you a list of searched items.
Go to any of the links...Some of them don't work.

You will be able to see street/Traffic cams...

and not only this..you can also control them move them right or left or zoom in or out...

It's kind of fun

Have fun.

NOTE : You should a have high speed connection for this...

Create Folders And Files With NO! Name

This trick will allow you to create files and folders without any name.

Just follow the following steps:
1.Select any file or folder.
2.Right click on it, press rename or simply press F2.
3.Press and hold the alt key. While holding the Alt key, type numbers 0160 from the numpad.

Note: Type the numbers 0160 from the numpad, that is, the numbers present on the right side of the keyboard. Don't type the numbers which are present on top of the character keys.

4.Press Enter and the nameless file or folder will be created.

Reason: The file or folder that seems nameless is actually named with a single space.

But what if you want to create another nameless file or folder in the same directory ?

For this you will have to rename the file with 2 spaces. Just follow these steps below:

1.Select file, press F2.
2.Hold alt key and type 0160 from the numpad.
3.Release the alt key. Now without doing anything else, again hold alt key and press 0160.
4.Press enter and you will have second nameless file in the same directory.
5.Repeat step 3 to create as many nameless files or folders in the same directory.

(we've had a problem with deleting these folders, to do so, start your computer in safe mode and delete it from there.)



Hide Your Files In A JPEG !!
Well, did you know you could hide your files in a JPEG file? For this, you will only need to download WinRAR. You just need to have a little knowledge about Command Prompt and have WinRAR installed.

Ok, lets begin…

1. Gather all the files that you wish to hide in a folder anywhere in your PC (make it in C:\hidden - RECOMMENDED).

2. Now, add those files in a RAR archive (e.g. secret.rar). This file should also be in the same directory (C:\hidden).

3. Now, look for a simple JPEG picture file (e.g. logo.jpg). Copy/Paste that file also in C:\hidden.

4. Now, open Command Prompt (Go to Run and type ‘cmd‘). Make your working directory C:\hidden.

5. Now type: “COPY /b logo.jpg + secret.rar output.jpg” (without quotes) - Now, logo.jpg is the picture you want to show, secret.rar is the file to be hidden, and output.jpg is the file which contains both. :D

6. Now, after you have done this, you will see a file output.jpg in C:\hidden. Open it (double-click) and it will show the picture you wanted to show. Now try opening the same file with WinRAR, it will show the hidden archive .

Running Multiple Yahoo Messengers

It is possible to run multiple Yahoo Messenger simultaneously right after installing the official version of Yahoo Messenger.

You will need to apply a simple windows registry patch to enable this feature.

>>Follow these simple steps :

1. Open the notepad
2. Copy the following code
REGEDIT4 [HKEY_CURRENT_USER\Software\yahoo\pager\Test] "Plural"=dword:00000001

3. Save the above code as multi.reg
4. Either double click on this file or right click on it and select merge option. (aim is to merge this settings into windows registry)

Booting Xp With A Pen Drive

There are times when a minor error in the Windows Registry or a Virus Infection, can make your system unbootable. In such a condition a properly configured USB drive on hand with Bart Lagerweij's free utility (BartPE), is a handy replacement for windows operating system.

BartPE will give you a complete Win32 environment with network support, a graphical user interface (800x600) and FAT/NTFS/CDFS file systemsupport.

Don't confuse BartPE with Microsoft's Official Windows PE. BartPE has got some interesting features as compared to Windows PE and it's a freeware.

Requirements To Install BartPE:
:: USB Flash drive with at least 256 MB of storage capacity.
:: The files from your Windows Installation CD-Rom.

How It Works:
:: PE Builder, condenses the original setup data for Windows XP into a slender operating system that is ready to run from or a USB flash drive.
:: This compact, portable version of Windows includes all the important system tools for dealing with a PC emergency.
:: You can even add other programs to this collection, such as the media writing tool Nero Burning ROM or an anti-spyware package such as Ad-Aware SE Personal, during the installation process.

Steps Involved:
:: Download the latest PE Builder version (self-installing package) and install it.
Start PE Builder (pebuilder.exe) and insert Microsoft Windows XP installation/setup CD, it will condense the setup files into your pen drive.
:: At the main PE Builder dialog, select the "Pen Drive" option. Hit the "build" button. PE Builder will now ask you to create a BartPE directory, answer with "yes".
:: PE Builder will now start building BartPE. This will take a few minutes. You will see a lot of files getting copied and/or decompressed, into your pen drive. If the data verify was correct and there where no errors reported you can boot the Pen Drive.


How To Hack into MSN:
Brute force method
a. Use telnet to connect to port 110 (Hotmail´s pop-server)
b. Type USER and then the victim´s
username
c. Type PASS and then the guess a password
d. Repeat that until you have found the correct password.
!. This
is called brute force hacking and requires patience.
It´s better than trying to guess the victims password on
hotmail
homepage only because it´s faster.
____
I_2_I - The Best way
a. Get the username of the victim (It usually stands in
the adress-field
)
b. Then type " www.hotmail.com/cgi-bin/start/victimsusername "
c. you´re in!
!. This hack only works if you are on the same network or computer as the
victim and if he doesn´t log out.
____
I_3_I - The old way
a. Go to
http://www.hotmail/proxy.html
b. Now type the victims username. (press login)
c. Look at the source code.
d. On the fifth row
U should find "action=someadress"
e. Copy that adress and paste it into the adress-field
f. You are in...
!. As you can see
it´s a long procedure and the victim has
plenty of time to log out.
____
I_4_I - Another...
a. Go to hotmail´s homepage
b. Copy the source code.
c. Make a new html file with the same code but change method=post to
method=enter
d. "view" the page
e. Change the adress to www.hotmail.com/ (don´t press enter!)
f. Make the victim type in his username and password
g. look in the adress-field. There you´ll see ...&password:something...
!. This is the way I use, because it lets you
know the password.
(If he exits the browser you can see the password in the History folder!)

READ!
Hotmail´s sysops have
changed the "system" so that the victim may log
out even
if you are inside his/her account. So don´t waste your time!

If you are a beginner, I wouldn't make this your first attempt at
hacking. When you need to do is use a port surfer and surf over to
port 80. While there, you have to try and mail the user that you
want the password from. It is best
to mail them using the words
"We" and "Here at Hotmail..." Most suckers fall for this and end
up giving out their
password. There is another way to also, you can
get an anon mailer, and forge the addres as staff@hotmail.com.
But
you have to change the reply address to go to a different addres
like user@host.com. The person that you are
trying to get the pass from MUST respond to that letter for the mail to be forwarded to you.
Have text like "Please reply to this letter with the subject "PASSWORD"
and underneath please include your user name and password.
If you have trouble logging in withing the next few days, this is
only because we are updating our mail servers but no need to
worry, your mail will still be there. Even though the server may be down
for an hour. From the staff at Hotmail, Thank You."

David Blaine Magic Hacks

I dont believe m uploading this here
anyways this ripps the secrets behind the magical magician
have a look, check the attachments below


However i personally salute this great artist in true spirit.

David Blaine's Secrets Revealed

1. Voodoo Ash

Effect: A name is written on a piece of paper on a notepad by the spectator, the paper is torn off unseen by the magician, crumpled up and placed in an ashtray. It is then set alight.

The ashes are then rubbed on the magicians arm and the name of the person written on the paper mysteriously appears.

Preparation: You will need a small notepad, pen, ashtray, lighter and a small piece of soap or wax.
Method: The spectator is asked to write the name of a person or favourite anything of theirs on a notepad.

Then to tear of the sheet of notepaper, crumple it up and place it in the ashtray, where the magician then sets the paper alight.

The magician takes the notepad of the spectator and should be able to see the imprint of the name written on the paper above in the next sheet of the notepad.

Looking at the pad should not be made obvious and some misdirection carried out while he carefully takes the small piece of wax or soap and writes the name on the imprint on his arm or hand (this action should not be visible to anyone ).

The magician can then take some ash from the ashtray and rub it over the wax where it will stick and create an impression of the spectators word to their amazement.
This is a great trick but depends on the magician creating an atmosphere with an entertaining routine and patter about black magic to enhance the effect and create misdirection to allow him time to pull off the trick.



2. M&Ms Torn and Restored Magic Trick

Trick Effect And Routine: Tear a corner from a bag of M&Ms. Pour a few M&Ms into your hand. Then reseal the bag by magically melting the corner back onto the bag.

Magic Trick Preparation: Place a few M&Ms into your" thumb tip"( This is a useful gimmick which can be purchased cheaply from most good magic shops) .You will also need to cut a corner off a different bag of M&Ms.You can place this in your thumb tip or just conceal it behind the bag. This trick is easier to perform if you sharply crease the corner on the bag that you are supposed to rip.

Method: After you show the bag of M&Ms, discreetly slip the plastic thumb tip off your thumb and conceal it behind the bag in your hand (opening facing the corner to be ripped). Remove the extra corner from the thumb tip. Fold the creased corner towards you as you act out the magical illusion of tearing the corner. Pour out the M&Ms from the thumb tip. Secretly replace the extra corner inside the thumb tip as you unfold the creased corner. Use a rubbing motion with your forefinger and thumb to give the impression that you are melting the corner back on the bag.

Slip the thumb tip back on your thumb and your done. Hand out the bag for examination! The patter is up to you, but you can tell a story of a candy crook who never gets caught or use your imagination to come up with some other interesting story with a sweet ending.



3. Coffee To Coins David Blaine Style Trick

Set up: Get one of those coffee machine dispensed cups made of waxed paper and preferably with a pattern on the outside. Remove the bottom of the cup about an inch up from the bottom with a modelling knife or scissors and then place the cup back together by gently sliding the top half of the cup into the base using a slight twisting action if needed. Stack the cup three quarters full with coins.

Pack the coins in tightly and then pour in a little cold coffee, enough to cover the coins completely.

Coffee works best because it's so dark and will hide the coins. The cup should now look like a normal cup of coffee and is now ready to present to an audience.

Performance: Comment on how the patterns on the side of the cup are magic symbols.

Holding the top half of the cup with one hand, gently push up the bottom half of the cup with a slight screwing action with your other hand, then shake the cup.

As the coins “unsettle” the coffee will spill between the cracks and the coins appear.

This trick can be done with any cup of the waxed paper type that are usually found in vending machines. Be careful not to use hot coffee. Take care when using the modelling knife as it is sharp, even better, if your a kid, get an adult to cut it for you.



4. Cigarette Through Coin Magic Trick

David Blaine again used this impressive money trick where he pushed a cigarette through a quarter.

This trick uses a very clever gimmicked coin where the middle of the coin, temporarily opens to let the cigarette through and later closes so that the hole is virtually invisible to the spectator.

This coin is available through good magic suppliers and is a great addition to any magicians collection.



5. Coin Vanish

David Blaine was seen in his TV special to visibly vanish a coin that was on a spectators outstreched palm, without touching the spectators palm and by waving his hands above the spectators palm.

This looks very impressive and is performed by using a gimmick called The Raven which is one of the most useful and worthwhile purchases for anyone interested in Street Magic.



6. Fruit Loops Pop Up Card Trick

Performance:

Incorporated into David Blaine's "Ambitious Card" routine. A signed card is placed into the centre of the deck - with a snap of the fingers the card returns to the top.

The card is again placed into the centre of the deck, another snap of the fingers and once more the card returns to the top.

The magician now takes the end of the face-up signed card and proceeds to bend it almost double, he turns the bent card face down, cuts off the bottom half of the deck and holds the deck at eye level where the bent card can be clearly seen on top. Still holding the cards at eye level the magician places the cut portion on top of the bent card, sandwiching it at the centre.

The magician holds his right hand above the cards, a snap of the fingers and the bent card passes up through the deck and pops up on the top, it is displayed and seen to be the signed card !

Method:

Fan the deck face-up and have your volunteer select a card by touching it.

As you close the fan, cut the deck one card below the chosen card and take that portion to the top of the pack. Pack is still face up at this point.

Turn the deck over and Double Lift the top two cards displaying the chosen card. Have the chosen card signed on the face. Now return the "double lifted" card(s) face down on top of the pack.

Openly lift off the top card and have the volunteer cut off half of the deck - place the spectators chosen card (really the double lifted card) onto the bottom portion of the deck and ask the volunteer to place his half of the cut deck on top.

Ask the volunteer to snap his fingers - turnover the top card to show that the signed card has returned to the top !

Place the signed card to one side.

You now have two problems.

One: You must lose the card in the centre again.

Two: At the same time you must control the chosen card to a position second from the top (in order to perform the Pop Up Card effect).

Both problems can be solved with one move.....

Hold the deck in the dealing position with a little finger break under the top card. The deck is then held (left hand) with the deck almost at right angles to the floor, in this position use the left thumb to split the deck halfway saying "That looks like about halfway doesn't it" ? The break held by the little finger should be hidden by the base of the thumb.

Pick up the signed card and bring it in from the rear, giving the appearance of returning the card at the halfway split - it is actually returned into the break held by the little finger - beneath the top card. (This move requires a lot of practice in front of a mirror.)

Once the card has been returned, the hands/cards are brought back to a level position.

Have the volunteer snap their fingers and with some flair and a riffle, double lift the signed card and place it out-jogged (face-up) on top of the deck.

Take the outer end of the face up (double lifted) signed card with your right hand and bend it almost in half, then turn the (double lifted) bent signed card face down (leaving it bent).

The right hand now cuts the deck into two (Biddle grip) and the left thumb openly slips off the top bent card onto the bottom portion of the deck as the right hand (holding the top portion)is withdrawn to the right.

The right index finger must keep pressure on the bent signed card which is on top of the half that is being held in the right hand.

Hold the left hand portion at eye level where the bent card can be clearly seen. Still holding the cards at eye level, place the right hand portion of cards on top of the bottom half, sandwiching the bent card in the centre.

The left hand thumb and index finger must now take control of the deck and hold down the bent signed card on top of the pack, ensuring that it doesn't pop up prematurely.

The magician holds his right index finger above the cards and asks the volunteer to snap his fingers, at that moment the magician releases the pressure on the top card and up it Pops !!

Turn the card over, to reveal, once again, the signed card. Click Here For Street Magic The Things You Will Need

This trick is good in its basic form but can really be hyped with some good patter and performance from you.



7. Coin Bitten And Restored Coin Trick

David Blaine performed this extremely effective trick where a coin was bitten and a piece torn off.

The coin was restored when the missing piece was seemingly spat out at it.

This trick was used using a very cleverly engineered coin which is available from good magic suppliers and is switched for the spectators coin.

You can do your own version of the trick by making your own trick coin by looking at the coin trick section of this site. Otherwise there is the professional version available which can be viewed by clicking the above link.



Adobe Portable Document Format david_blaines_magic_revealed.pdf (Adobe Portable Document Format - 435k)
posted by rahuldutt1 Apr 20 2008, 5:06 PM EDT
David Blaine secrets hacked

Unknown File David_Blaine.rar (Unknown File - 1,236k)
posted by rahuldutt1 Apr 20 2008, 4:56 PM EDT
David Blaine secrets hacked