Sunday, August 26, 2012

14 Best Facebook Tricks Ever | You Might Not Know

                        I already posted many Facebook Tips and Tricks on this blog.But now its something different.This time I wanted to place all the Facebook Tips and Tricks at one place and make a huge collection of all the best Facebook Tricks.I tried my best to include all the Best Facebook Tricks at one place .If I missed any which is worth including in the list then let me know in your comments.I will update the list with your Tricks.

Best Facebook Tips/Tricks of All Time:

1.Watch Streaming TV Live on Facebook:

There is a Facebook Application that provides free streaming live TV channels on Facebook.You can watch a lot of International Channels using this Application.I am able to watch live channels without buffering on my 2G connection.This application is totally at free of cost.2012 Olympics are also broadcasted on this channel.

Application Used:http://apps.facebook.com/tvdream-app/

2.Send SMS from Facebook:

Yes you are right now you can send sms from facebook.There are no country restrictions.You can send sms to any country.The message sending is instant and takes only few seconds to reach the destination.All this is possible with a cool facebook application.

Login to your Facebook Account.
Go to this Facebook Chat Application.
Check the below screenshot how it looks like.

Select your country.
Then in the next line enter the mobile number to which you want to send sms.
After that enter your message that you want to deliver.
Limitations:

You can send only sms upto 100 characters long.
You can only send 4 SMS per day.
Dont do any illegal things with this service as it will first display your name at the beginning of the message.

3.Create a Video With Your Pictures on Facebook:

You can easily create a video with your Facebook Pictures.To create a video with your facebook photos go to pixable.com[click here].

4.Trick to see who is online when you are offline:

Sometimes it becomes necessary to check who is online which being offline.At such times there is a very cool Facebook Application which can make your job easy.Use the below application to know who are online while you are offline.

http://www.facebook.com/onlinenow.

5.Trick to publish empty status:

Login to your facebook account.Then click on update status and enter the following code and hit enter.

@[2:2: ]

6.How to find who deleted/Unfriended you on facebook?


You can find who deleted or unfriended you on facebook using an application called who delete me[click here].
This application will back up all your friends list when you sign up for the first time and notifies via mail whenever there is a change in your friends list.

7.Download Videos From Facebook For Free:

To download videos from facebook go to Downfacebook.com[click here]
There put the Facebook Url of video and your video will be ready to download.

8.Place Facebook Chat on Firefox Sidebar:

                  Open Mozilla Firefox browser and press Alt key.
Select bookmarks and select "show all bookmarks"
A box will open from that select unsorted bookmarks > organise > new bookmark.
Again a box will open in that type "facebookchat" in first boxand type " http://www.facebook.com/presence/popout.php " in second box .
Click on load this bookmark >add.
Now again press alt key > view > side bar > bookmarks>.
Then select facebook chat from the bookmarks in slide bar.
You are done.Now you will be able to see chat bar on the left side of your Mozilla Firefox Browser.

9.Post your Status in All Facebook Groups in a Single Click:

Some times you want to post your status or write message in all groups.If you do the job manually then its a time consuming frustrating process and you end up in posting your status only in few groups.But now your job has become very easy.There is a facebook application using which you can post your Facebook status in any number of groups you wish.
Using Multiple Post Application you can make your job easy to post your status in multiple groups.

9.Tips and Tricks to get more likes for your Facebook Fanpage:

Now a days almost most of the Facebook users have some Facebook pages.May be it is Music,Dance , Actor,Brand Page,whatever page it may be all you need is to get more likes for that fanpage.I listed few Tips and Tricks using which you can get more likes for your fanpage just follow the below link.

10.Add Images in your Facebook Chat:

You might have known that you can add smileys and emotions in your Facebook Chat Box.Not only smileys but also you can add any picture in your facebook chat box.


11.Cool Facebook Chat Tricks-Link:

Chat tricks will enhance your ability of using facebook and with these tricks you can easily impress your friends while chatting.

12.Facebook Status Tricks-Link:

I already posted few Status tricks.This is a very cool trick using which you can update your facebook status via Blackberry,Iphone,Android,Ipad etc using Facebook Applications.
There are many such applications, I mentioned few best applications. Follow them and update your status.


Just Follow Below Links To Use Applications:

To update your facebook status via blackberry
To update your facebook status via blackberry torch
To update your facebook status via blackberry playbook
To update your facebook status via iPhone
To update your facebook status via iPhone4
To update your facebook status via iPhone5
To update your facebook status via iPad
To update your facebook status via iPad2
To update your facebook status via iPad3
To update your facebook status via Android
To update your facebook status via Calculator .

13.Facebook Ghost Profile Prank:

              This is the best prank ever that I played on my friends. Ask your friends to check this [GOST PROFILE ] . It will look like a scary ghost profile.But that's not the interesting part here, Ask your friend to click on photos.
Here come the scary part, Out of nowhere a ghost face comes out from the centre with a scary shout.
Your Friends shouts-Our prank rocks.
When I tried this prank on my friends few girls even shouted in fear.

More Funny Facebook Pranks Here.
19.Remove Facebook Advertisements:
Using this Greasemoney script-Facebook:Cleaner you can easily remove annoyingFacebook Ads.

Also Check:How To Block Youtube Ads.
Conclusion:
I listed all the best facebook tips and tricks.If I missed out any its worth including in your comments.I will update the list with your trick.Lets make this a huge list of All Facebook Tricks Collection.

Saturday, August 25, 2012

All Premium Accounts 25-08-2012

Here i am giving you the free premium accounts of all the hosting site for free. You can download it by simply clicking a downloading link.

                                           

DOWNLOAD

Adobe Photoshop 7.0 Update 7.0.1



photoshop now saves alpha transparency data in Targa files in the same way it did in previous versions.
-If the color settings color management policy is set to "Off," Photoshop no longer asks to save changes unless other edits have been performed.
-The total ink now defaults to 300% as it did in previous versions of Photoshop.
-The color of white areas in CMYK files saved as JPEG files no longer shifts.
-TIFF files with LZW compression are now written correctly.
-Files made with Photoshop now work better with Microsoft Windows XP's automatic thumbnail generation.
-Favorites now function correctly in the Open dialog box.
-Picture Package no longer locks up when it encounters incorrect file types while using custom page layouts.
-Metadata is better preserved in certain JPEG files.
-Photoshop no longer appears frozen when applying KPT3 filters.
-Photoshop now offers better compatibility with older Intel Pentium III hardware.
-Photoshop no longer produces a program error when resampling certain large 16-bit documents.
-An issue that prevented Photoshop 6.0 from opening certain files containing layer effects and edited in Photoshop 7.0 has been fixed.
-The Maximize Backwards Compatibility for Photoshop Files preference now correctly sets the state of the Maximize Compatibility checkbox in the Photoshop Format Options dialog box when you save a file as Photoshop (PSD) format.


                                        

Sasikumar The Superman





It's not without reason we give this sobriquet to Sasikumar, the man who kickstarted his journey with 'Subramanyapuram' a few years ago.

For, in the recent times, hardly anyone had proved himself/herself in the top three trades of cinema industry- actor, director and producer.

After establishing himself in all the above said areas in his very first film itself, Sasikumar has since then been switching from one trade to another in the movies that followed.

'Nadodigal' brought out the actor in him, while 'Pasanga' spoke about his penchant to produce meaningful movies. 'Easan' is his directorial venture once again, while in 'Poraali', he fared well as an actor and producer.

And now, Sasi is busy with 'Sundara Pandian', a film which he is producing besides playing the lead role. It is being directed by Prabhakaran, who is none other than his former associate.

"For the first time, I am playing a romantic hero in this film," says Sasi with a smile. "Sundara Pandian is a refreshing story and I enjoyed doing it," he adds.

Interestingly, Sasikumar has stepped into Mollywood too. He has played a crucial role in 'Masters' and his performance has won him accolades.

With 'Sundara Pandian' getting ready to hit the screens, all eyes are on Sasikumar. And he will not disappoint, one can say, going by his past records.

Shankar's I becomes Manoharudu





Shankar is one of the pioneers in the south who started making bilinguals, years before such a trend emerged. Now that making movies in Tamil and Telugu simultaneously is becoming the order of the day, will the director's next be an exception?

Obviously, Shankar's forthcoming flick 'I', which has Vikram in the lead, is being simultaneously made in Telugu. The title of the Tollywood version, according to sources, is 'Manoharudu'.

Starring Amy Jackson as the leading lady, the movie is touted as a romantic thriller, with Suresh Gopi, Ramkumar and others playing crucial roles. Music is by A R Rahman. The film also sees Powerstar Srinivasan as a robot according to rumor mills.

Aascar V Ravichandran is said to be producing the film at a whopping budget of Rs 140 crore, thereby making 'I' one of the costliest movies of the decade.

Friday, August 24, 2012

PARIS WALPPAPER


DUBAI WALLPAPER


Sunday, August 19, 2012

All bulk SMS-es banned for 15 days to stop rumours



New Delhi: After reports of threatening SMS-es being sent to North Eastern students in Bangalore and other cities like Hyderabad, the government has banned bulk text messages for the next 15 days. So no cellphone user can send a message to more than 5 people.

Cities like Hyderabad and Pune have been on edge with their large North Eastern communities feeling insecure about their safety. In the last month, nearly 80 people have died in ethnic violence in Assam and doctored MMS-es and text messages have infected other states, warning that students and professionals from the North East will be attacked.

Thousands have been boarding special trains in Bangalore, Pune and Hyderabad to head back home, though many have clarified that they are visiting their families for the long weekend. The Karnataka government has stressed that nobody from the North East has been attacked and the police is patrolling neighbourhoods popular with people from states like Assam, Manipur and Mizoram, "The whole government is with you....don't worry," said chief minister Jagadish Shettar yesterday.

Helplines have been set up in Hyderabad ( 040-27852333 and 23261166) and Bangalore (080- 22250999, 080- 22942222).

The government has said those who are spreading rumours online and through text messages will be identified and punished. The Home Affairs Ministry has ordered online surveillance.

In parliament, leaders across political parties said that all Indians from the North East must rest assured that their safety is a priority for the government and that they must work and live wherever they want.



Saturday, August 18, 2012

AVATAR WALLPAPER


Wednesday, August 15, 2012

Chitika – A Good Way To Make Money With Your Blog

Chitika is a free service which displays revenue-earning ads to your website visitors featuring different types of ads for different types of traffic. It is very similar to Google AdSense but it's a bit different so the best news is that you can have both on the site at the same time. Google AdSense and Chitika can work friendly and don't violate Terms of Use of each service.

Chitika is the only ad-network which knows when not to show an ad, helping to preserve your user experience.

Chitika charges advertisers to be featured alongside your site's content. At the end of every month you are paid based on the previous month's earnings (Net 30). Payments are sent after your account earns at least $10.00 (USD) for PayPal payouts or $50.00 (USD) for checks.

I recently got an email from the folks at Chitika which informed me that I could make referral commissions on anybody I refer to Chitika for a full 15 months. They even provided me a shortcut link to send my referral link out to Twitter. But, is Chitika really any good?

I have been using Chitika for some time over on PCMech.com. I do not put very much into the program and it has been very much one of my minority income streams. But, even without putting much into it, I have been making a couple hundred dollars per month with it. It might not be much, but considering how little “face time” it gets with my readers, I’m not complaining. And surely, if I took the time to optimize it, I could probably increase my monthly income fairly easily through Chitika.

If you’re not familiar, Chitika is a company which delivers search-targeted ads. The ads are completely compatible with Google Adsense and does not compete, so you don’t have to worry about running Chitika and Adsense on the same pages. Whenever a user clicks into your site via a search engine, Chitika will deliver that user a targeted ad block based on the keywords used to find your website. So, it is super-well targeted. And as of just a few days ago, they are no longer auditing traffic using these types of ads. The auditing process has been a source of frustration for publishers because it usually means your actual monthly income ends up being less than what your stats showed.

This is the kind of ad I am running on PCMech, which means the ads are only visible when the site is entered from a search engine. If you go directly to the site or click in from another site, you will see no ad from Chitika.

These ads have been working extremely well for Chitika, so much so that it appears as if they are now making this ad type their priority. When you log in as a publisher, this is the kind of ad you will see first. Only when you click the link for other ad types will you see the other options, including Lynx (contextual ads ala Kontera), whitespace ads (which use your site’s white space on larger screen resolutions), the eMiniMall and the Multiple Product Unit (or MPU). Those last two are PPC ads which lead primarily to products.

The other ad types they’ve offered have been pretty disappointing in the past and this is the primary reason Chitika hasn’t gotten much play on PCMech.com. The ads they’ve given were poorly targeted and generated very little revenue. So, I’m not surprised at all that their Premium search-targeted ads are working so well. They alleviate the problem of poor targeting. With the new ad types, my CTR climbed dramatically and my income climbed to the point that it is.

Chitika works best when (1) you have a lot of incoming traffic from search engines, and/or (2) you have a product oriented website which people come to when looking for particular kinds of products (i.e. a review site). Additionally, you can make money by referring people to Chitika. That won’t work for everybody, but for some it can.

So, if you’re running a site and want to try making some extra month with it, I would recommend Chitika. I’m still not making enough from Chitika to justify replacing any of my other ad sources with Chitika, but specifically targeting my search traffic makes a lot of sense and it does provide a little boost to my income. If you run a review site, you could probably make a killing with Chitika. As anybody in this business will tell you, you want a bunch of different income streams and, for me, Chitika is one of them.

                                     CLICK HERE TO JOIN CHITIKA

Google Adsense tutorial




Google AdSense is a great tool to begin earning revenue on your website. Google will pay you for visitors seeing and clicking on those ads. You can also earn money by recruiting others to place ads on their site or by including a Google search box on your pages. This tutorial will guide you through the process of using iWeb and iWeb Enhancer to add Google AdSense to your site.


Step 1: Aply to Google Adsense quick and easy ...

Step 2: Select Ad

Log in and go to "Ads Setup" to choose a ad

Step 3: Choose a type:

Step 4: Choose a format

Step 5:Get the html code

Step 6: DONE


In this lesson I will show your how you can setup Google Adsense Account for your web site and start earning money from your web site. As you have learned in the last lesson that Affiliate programs are good option for earning money from web site. Google Adsense is top program that helps the web sites to earn extra money. In fact it is the excellent way to make money online.



Steps to earn money from Google Adsense program

Obtain and Activate Google Adsense Account for your web site.
Obtaining the Goolge Adsense Account for your website is the first step towards earning money from Google Adsense. Before applying for the Google Adsense make sure that your site is working properly and there in no dead links. To apply for Google Adsense account visit http://www.google.com/adsense and fill out the application form and confirm an email that Google will send you. If you own several sites you need to apply only once. After this Google will evaluate your site and follow-up with you email within 2-3 days. If your application is accepted you will be able to login to your ad sense account.


Placing Google Adsense Ads on your web site
The next step is to place adds on your website. Logon to your Adsense account and select the appropriate ads for your web site. Then copy the ads code and paste on your web pages. Once you pasted the code on your web pages, next step is to upload your web pages. Now you upload the web pages and then browse your web site. You will notice that Google ads appears on you web site.

Placing the Ads correctly is very import for good earnings. The best placement for Google Adsense ads varies from page to page, depending on the content. The best place to place Google Adsense Ads is wherever the web site visitor will be looking.

Ads on the Top of the Page
Advertisements at the top of the page perform well. Chose the ads format which mixes with your page color and style. For example if your web page has a white background color and default color of your links is blue, then you remove the border from Adsense, make the ads background color white.

Ads on the bottom of the Page
Ads on the bottom of page does not perform well. So, don't concentrate on the bottom page ads

Ads on the right bar
Usually the right bar is for web site navigation, usually right side ads performs best.

Ads on the left bar
The left bar ads performance is also good.

Monitor You Earning
Now your web site is earning for you. Your web site will earn while you are sleeping. You can logon to the Google Adsense account and check your earnings.


About The Free Libraray




Since 2003, The Free Library has offered free, full-text versions of classic literary works from hundreds of celebrated authors, whose biographies, images, and famous quotations can also be found on the site. Recently, The Free Library has been expanded to include a massive collection of periodicals from hundreds of leading publications covering Business and Industry, Communications, Entertainment, Health, Humanities, Law, Government, Politics, Recreation and Leisure, Science and Technology, and Social Sciences. This collection includes millions of articles dating back to 1984 as well as newly-published articles that are added to the site daily.

The Free Library is an invaluable research tool and the fastest, easiest way to locate useful information on virtually any topic. Explore the site through a keyword search, or simply browse the enormous collection of literary classics and up-to-date periodicals to find exactly what you need.

                                                         See The Library

How To Achieve 119% Business Growth In The Next 90 Days In Just 3 Easy Steps






know that your number one challenge right now may be how to ATTRACT MORE CLIENTS.

How do I know this?

Because it is the most common issue for small business owners. Generally small business owners are very good at the thing they do (their product or service) but they struggle to understand how to develop a MARKETING SYSTEM that draws a large number of new clients to them.

The good news is this ...

There Is A Simple 3 Step System To Growing Your Business
By As Much As 119% In The Next 90 Days!

Even better news is we are going to give you a FREE CD & Report (Valued at $77) which will explain to you what those three steps are and how you can apply them into your business.

All you need to do to request your copy of the CD & Report is to enter a few details below:

As soon as we receive your request we will organise to have your CD & Report sent to you in the mail.

I can assure you that when you learn about and apply these three simple steps into your business you can achieve results like 119% in the next 90 days. We have had clients grow their business by as much as 10 times in less than 60 days using these ideas.

Regards


Philip Reinecke
Attract More Clients Ltd
'An Attraction Marketing Associate Member'

PS ... This offer is available for a short time only. Once the existing supply of CD's is gone we will be removing this offer. So please request your CD now.


                                                         REQUEST FREE

7 Important Security Tips For Your Windows PC





We know that Windows is by far the most popular operating system in the world. However, that doesn't make it the most secure operating system.

Since Windows has the widest reach among masses, it has always been the prime target of hackers and spammers. Hence, when compared to other major operating systems like Mac and Linux, you'd find Windows to have the most risk.

There are many ways for regular people to protect themselves from these vulnerabilities. I will share seven such tips below and while these tips may not guarantee foolproof security, they do make your computer less prone to attacks and hence, more secure.

Use OpenDNS
This tip should be considered as a general tip for every personal computer connected to the internet, irrespective of the operating system installed. Recently discovered was a major threat to DNS, the system that translates names you can remember, like dumblittleman.com, to computer readable IP addresses. Hence it became important that the DNS servers used by your ISP are safe.

OpenDNS is an independent, free and secure DNS service which can be implemented on your system in a few easy steps mentioned on their website. It secures you from phishing attacks and provides many other features like content filtering and privacy controls.

Use A Good Antivirus And Firewall
If you are a windows user, it's never recommended that you connect to the internet without a good antivirus and firewall. With new viruses being identified everyday, it's important that you secure your PC against them. If you cannot buy one, there are many quality free options available. I personally use Avira Antivirus.

If your antivirus package includes a firewall then that's good. However, if it doesn't then you could go for good free firewalls like ZoneAlarm or Comodo. These are better than the Windows' in-built firewall.

Use Process Explorer
Process Explorer is a free tool provided by Microsoft which lets you analyze the running processes and programs and identify any suspicious activity. It can be used as an alternative to the Windows task manager, which is not as comprehensive and doesn't reveal all the running processes.

Install Malware Protection software
Malware are malicious programs disguised as genuine software and designed to infiltrate your system for the purpose of spying or causing other damage. Many malware can dodge the antivirus and therefore it is advised that you install a separate malware protection software. There are many good malware protection softwares available like Spybot and Comodo BOClean.

Shut Down Unnecessary Services
Many services, like Telnet and Windows Remote Registry Service, should be turned off if you don't need them. Although these services are important if you want to connect remotely to your computer, they also make your PC more vulnerable to getting compromised.

You should be cautious while trying this step because disabling an important service could stop your computer from functioning properly. Here is an article which gives elaborate step-by-step details for turning off unnecessary services in Windows XP. The steps are almost the same for Vista.

Update Regularly
Make sure that Windows Automatic Updates is turned on and that you update regularly. It installs important security patches and should not be ignored. Also keep your antivirus software and other programs up to date.

Protect Your Data
No matter how many steps you take to secure your computer, a dedicated hacker with time can find a way in. Hence you should make sure that you regularly backup your important data, or take it off your computer completely and keep it in an external hard drive. Also make sure that you use strong passwords which aren't dictionary words but a weird combination of letters, numbers and special characters which you can remember.

Top 10 Most Popular Programming Languages




There are hundreds of programming languages in use today. How can you know which one to learn first? How do you know which ones are the best for your IT field of choice? Well, I can't answer that question for you. But why not start by learning one of the top 10 most popular ones? That way you will always be able to get a job in the IT industry.

Learning a programming language is not easy, but it can be very rewarding. You will have a lot of questions at first. Just remember to get help when you need it! You can find out the answer to almost everything on Google nowadays.... so there is no excuse for failure. Also remember that it takes years to become an expert programmer. Don't expect to get good overnight. Just keep learning something new every day and eventually you will be competent enough to get the job done ;)

This article covers the top 10 most popular programming languages as ranked by Tiobe.com in June 2009. I have added some general reviews and comments about each language they listed. Remember these are my own personal opinions. Other IT professionals might have different opinions.

1. Java
Java uses a compiler, and is an object-oriented language released in 1995 by Sun Microsystems. Java is the number one programming language today for many reasons. First, it is a well-organized language with a strong library of reusable software components. Second, programs written in Java can run on many different computer architectures and operating systems because of the use of the JVM ( Java virtual machine ). Sometimes this is referred to as code portability or even WORA ( write once, run anywhere ). Third, Java is the language most likely to be taught in university computer science classes. A lot of computer science theory books written in the past decade use Java in the code examples. So learning Java syntax is a good idea even if you never actually code in it.
Java Strengths: WORA, popularity
Java Weaknesses: Slower than natively compiled languages

2. C
C is a compiled, procedural language developed in 1972 by Dennis Ritchie for use in the UNIX operating system. Although designed to be portable in nature, C programs must be specifically compiled for computers with different architectures and operating systems. This helps make them lightning fast. Although C is a relatively old language, it is still widely used for system programming, writing other programming languages, and in embedded systems.
Strengths: Speed
Weaknesses: Memory management can be difficult to master

3. C++
C++ is a compiled, multi-paradigm language written as an update to C in 1979 by Bjarne Stroustrup. It attempts to be backwards-compatible with C and brings object-orientation, which helps in larger projects. Despite it's age, C++ is used to create a wide array of applications from games to office suites.
Strengths: Speed
Weaknesses: C++ is older and considered more clumsy than newer object-oriented languages such as Java or C#.

4. PHP
PHP uses a run-time interpreter, and is a multi-paradigm language originally developed in 1996 by Rasmus Lerdorf to create dynamic web pages. At first it was not even a real programming language, but over time it eventually grew into a fully featured object-oriented programming language. Although PHP has been much criticized in the past for being a bit sloppy and insecure, it's been pretty good since version 5 came out in 2004. It's hard to argue with success. Today, PHP is the most popular language used to write web applications. Even English 4 IT, the program you are currently using, is written in PHP ;)
Strengths: Web programming, good documentation
Weaknesses: Inconsistent syntax, too many ways to do the same thing, a history of bizarre security decisions

5. VB ( or Visual Basic ) Visual Basic is an interpreted, multi-paradigm language developed by Microsoft Corporation for the Windows platform. It has been evolving over the years and is seen as a direct descendant of Microsoft's old BASIC from the 1970's. Visual Basic is a good language for scripting Windows applications that do not need the power and speed of C#.
Strengths: None.
Weaknesses: Only runs in Windows

6. Python
Python is an interpreted, multi-paradigm programming language written by Guido van Rossum in the late 1980's and intended for general programming purposes. Python was not named after the snake but actually after the Monty Python comedy group. Python is characterized by its use of indentation for readability, and its encouragement for elegant code by making developers do similar things in similar ways. Python is used as the main programming choice of both Google and Ubuntu.
Strengths: Excellent readability and overall philosophy
Weaknesses: None

7 C#
C# is a compiled, object-oriented language written by Microsoft. It is an open specification, but rarely seen on any non-Windows platform. C# was conceived as Microsoft's premium language in its .NET Framework. It is very similar to Java in both syntax and nature.
Strengths: Powerful and pretty fast
Weaknesses: Only really suitable for Windows

8. JavaScript
JavaScript is an interpreted, multi-paradigm language. A very strange one too. Despite it's name, it has nothing whatsoever to do with Java. You will rarely, if ever, see this language outside of a web browser. It is basically a language meant to script behaviors in web browsers and used for things such as web form validation and AJAX style web applications. The trend in the future seems to be building more and more complex applications in JavaScript, even simple online games and office suites. The success of this trend will depend upon advancements in the speed of a browser's JavaScript interpreter. If you want to be correct, the real name of this programming language is ECMAscript, although almost nobody actually calls it this.
Strengths: it's the only reliable way to do client-side web programming
Weaknesses: it's only really useful in a web browser

9. Perl
Perl is an interpreted, multi-paradigm language written by Larry Wall in 1986. It is characterized by a somewhat disorganized and scary-looking syntax which only makes sense to other PERL programmers ;) However, a lot of veteran programmers love it and use if every day as their primary language. 10 years ago, Perl was more popular than it is today. What happened? A lot of newer programmers and even old Perl programmers (such as myself) have switched to other languages such as PHP, Python, and Ruby. Perl is perhaps still the best language for text processing and system administration scripting. I personally do not recommend it however as a primary programming language.
Strengths: text processing and system administration
Weaknesses: strange syntax, and perhaps too many ways to do the same thing

10. Ruby
Ruby is an interpreted, object-oriented language written by Yukihiro Matsumoto around 1995. It is one of the most object-oriented languages in the world. Everything is an object in Ruby, even letters and numbers can have method calls. It's a great language to learn if you love objects. The only negative is that it's love of object-orientation makes it a bit slow, even for an interpreted language.
Strengths: Perhaps the world's most object-oriented language
Weaknesses: its superior object model comes at a price... namely speed

Okay! Those are the top 10 programming languages in use today and some personal comments about them. Remember that opinions are like noses, everyone has one and they all smell ;) If you disagree, please feel free to email me or write your own opinions on the forum.

TIOBE Programming Community Index for August 2012




Microsoft's C# programming language shows a downward trend for 8 months now. What is happening? On the one hand C# is generally recognized as the enterprise language with most modern and expressive features available today and C# has shown more downward trends in the past and always recovered from this. But, Microsoft announced recently the revival of C++ (in favor of C#) within its company. C# appeared to be too high level to build high performance systems. This is confirmed by what we see happening to TIOBE's embedded software customers: after years of enthusiastic adoption of C#, there is now no significant growth any more. Let's see what happens to C# the next few months.

The TIOBE Programming Community index is an indicator of the popularity of programming languages. The index is updated once a month. The ratings are based on the number of skilled engineers world-wide, courses and third party vendors. The popular search engines Google, Bing, Yahoo!, Wikipedia, Amazon, YouTube and Baidu are used to calculate the ratings. Observe that the TIOBE index is not about the best programming language or the language in which most lines of code have been written.

The index can be used to check whether your programming skills are still up to date or to make a strategic decision about what programming language should be adopted when starting to build a new software system. The definition of the TIOBE index can be found here.



1  C 18.937% +1.55% A
2  Java 16.352% -3.06% A
3  Objective-C 9.540% +4.05% A
4  C++ 9.333% +0.90% A
5  C# 6.590% +0.55% A
6  PHP 5.524% -0.61% A
7  (Visual) Basic 5.334% +0.32% A
8  Python 3.876% +0.46% A
9  Perl 2.273% -0.04% A
10  Ruby 1.691% +0.36% A
11  JavaScript 1.365% -0.19% A
12  Delphi/Object Pascal 1.012% -0.06% A
13  Lisp 0.975% +0.07% A
14  Visual Basic .NET 0.877% +0.41% A
15  Transact-SQL 0.849% +0.03% A
16  Pascal 0.793% +0.13% A
17  Lua 0.726% -0.64% A--
18  Ada 0.649% -0.05% B
19  PL/SQL 0.610% +0.08% B
20  MATLAB 0.533% +0.09% B
21 Bash 0.525%
22 SAS 0.525%
23 Assembly 0.502%
24 RPG (OS/400) 0.476%
25 Logo 0.441%
26 Fortran 0.440%
27 R 0.435%
28 COBOL 0.432%
29 ABAP 0.431%
30 Scheme 0.424%
31 Prolog 0.334%
32 Scratch 0.332%
33 D 0.322%
34 Haskell 0.301%
35 NXT-G 0.285%
36 JScript.NET 0.267%
37 Erlang 0.259%
38 Awk 0.256%
39 Smalltalk 0.241%
40 Scala 0.241%
41 Common Lisp 0.238%
42 Forth 0.231%
43 APL 0.223%
44 ML 0.221%
45 ActionScript 0.179%
46 OpenEdge ABL 0.172%
47 Algol 0.167%
48 C shell 0.166%
49 Alice 0.160%
50 PL/I 0.158%

I Am Not Yours




I am not yours, not lost in you,
Not lost, although I long to be
Lost as a candle lit at noon,
Lost as a snowflake in the sea.

You love me, and I find you still
A spirit beautiful and bright,
Yet I am I, who long to be
Lost as a light is lost in light.

Oh plunge me deep in love -- put out
My senses, leave me deaf and blind,
Swept by the tempest of your love,
A taper in a rushing wind.


                                  -by Sara Teasdale.

Human Health: Liver Health Care and Vitamins




It is a common knowledge that vitamins benefit people’s health and liver, in particular. Consider the general health tips below and you will learn about the role of vitamins in human health and liver health care.

Vitamins C (ascorbic acid), E and N are the most useful ones for healthy liver. Being antioxidants, these vitamins also enhance antitoxic function and improve immunity.

Vitamin C is a strong water-soluble antioxidant that functions both in and out of cell. Being a great source of electrons, ascorbic acid can share electrons with free radicals, thus decreasing their reactivity. Vitamin C can also protect other antioxidant from oxidation (for instance, vitamin E). Antitoxic effect of vitamin C at different liver diseases consists in stimulation of different enzyme systems in human body and, first of all, in liver. These systems are responsible for detoxication.

Protecting immune system, vitamin C helps fighting infection by fostering antibodies’ activity and activity of immune system cells (lymphocytes and macrophages).

Vitamin E also benefits liver health. It hampers and inhibits peroxidation of lipids and polyunsaturated fat acids that constitute a part of cell membrane. Reacting with phospholipids of biological membranes, vitamin E affects liver cells structure sustaining integrity and stability of intracellular membranes and hepatocyte shells.

As well as the two mentioned above vitamins, vitamin N is also an antioxidant, it captures free radicals. It is also characterized by detoxicative effect. Being a complexon, it helps cleaning the organism from mercury, arsenic, copper, thus reducing concentration of toxic products of alcohol metabolism, and reducing toxic effect of chemotherapeutical drugs.

Therefore, liver health benefits a lot from taking vitamins C, E and N. One taking them improves general health and liver health, in particular.

The Top 10 Jokes Ever | Good Humor


                             TOP 10 JOKES EVER


1.

A student is talking to his teacher.
Student: "Would you punish me for something I didn`t do?"
Teacher:" Of course not."
Student: "Good, because I haven't done my homework."

2.


A teenage girl had been talking on the phone for about half an hour, and then she hung up.

"Wow!," said her father, "That was short. You usually talk for two hours. What happened?"

"Wrong number," replied the girl.

3.


Two boys were arguing when the teacher entered the room.
The teacher says, "Why are you arguing?"

One boy answers, "We found a ten dollor bill and decided to give it to whoever tells the biggest lie."

"You should be ashamed of yourselves," said the teacher, "When I was your age I didn't even know what a lie was."

The boys gave the ten dollars to the teacher.

4.

The patient says, "Doctor, I have a pain in my eye whenever I drink tea."
The doctor says, "Take the spoon out of the mug before you drink."
mug = cupThe patient says, "Doctor, you've got to help me. Nobody ever listens to me. No one ever pays any attention to what I have to say.
The doctor says, "Next, please."

5.


A: Just look at that young person with the short hair and blue jeans. Is it a boy or a girl?
B: It's a girl. She's my daughter.
A: Oh, I'm sorry, sir. I didn't know that you were her father.
B: I'm not. I'm her mother.

6.


A: Hey, man! Please call me a taxi.
B: Yes, sir. You are a taxi.

7.


Principal: "I've had complaints about you, Johnny, from all of your teachers. What have you been doing?"
Johnny: "Nothing, sir."
Principal: "Exactly!"


8.

A: Why are you late?
B: There was a man who lost a hundred dollar bill.
A: That's nice. Were you helping him look for it?
B: No, I was standing on it.

9.

My friend said he knew a man with a wooden leg named Smith.
So I asked him, "What was the name of his other leg?"

10.

Three mice were being chased by a cat.

The mice were cornered when one of the mice turned around and barked, "Ruff! Ruff! Ruff!" The surprised cat ran away scared.

Later when the mice told their mother what happened, she smiled and said, "You see, it pays to be bilingual!"

Be Happy.!!

Tuesday, August 14, 2012

LONDON CITY WALLPAPER


New Trick to View Hidden Facebook Photos and Tabs




Last December, I posted a bit of JavaScript known as a bookmarklet that allowed you to see photo albums for any Facebook user if the album privacy settings allowed it. This highlighted an example of “security through obscurity,” since the lack of links to photos on most profiles seemed to indicate no photos could be viewed. The trick worked as advertised, though it only displayed a few albums for those who had many.

The code came from my own experiments on accessing the hidden photos. It worked quite manually, retrieving data from a particular Facebook interface and stuffing it into the current page. I figured a more elegant solution could be found by re-using the code already embedded in the page, but I had not been able to sort out all of the built-in functions.

Last night and this morning, I found what I’d been missing before, and I now present a far simpler version that gives full access to all available albums of a given user. Simply bookmark this link (right-click and choose to add a bookmark) and click the bookmark when viewing someone’s profile on Facebook.

Once again, please note that this does not in any way circumvent a user’s privacy settings. If you mark your albums as visible only to your friends, this trick will not override that setting. I do not currently know of a way to access private photo albums, and if I did find one, I would report it to Facebook. My purpose in posting this code is to prove a point, not break into users’ accounts.

Here is the new source code:

javascript:(function(){CSS.removeClass(document.body, ‘profile_two_columns’);tab_controller.changePage(“photos”);})()

As I said, much simpler! I only had to find the right commands.

But the story doesn’t end there. This new method can be very easily adapted to load other information from a user’s profile, and the new possibilities raise more privacy ramifications. Once again, the trick does not actually override any settings, but it may break some user expectations and highlight the importance of overlooked or unknown settings.

The new behavior is that once can use similar code to access the canvas pages of applications the user has interacted with, as if the user had added the application as a tab on their profile. This includes the “Boxes” tab for users who have it. From what I understand, visibility of this tab page comes from the “Privacy” box under “Edit Settings” next to each application listed in a user’s Application Settings. Such controls have often been overlooked, particularly because they may not have seemed very relevant in the past. While many users stay aware of the privacy settings on their photos and wall posts, they may not think about the content they generate in the context of applications. Often, that content has little if any privacy controls applied.

Typically, any information available on an application tab is also available through the application itself, but this technique makes it far easier to find. However, it also raises some disturbing possibilities related to application data retention, and issue I’ve noted in the past but not seen discussed much elsewhere. For example, quite a while ago (as in months to years), I used the Pieces of Flair application with my personal Facebook account, arranging various buttons on my virtual corkboard. Eventually I pared down the number of applications I had authorized, and Pieces of Flair was one I uninstalled a number of months ago. Today, however, if you use the sort of bookmarklet posted above to check my Facebook profile for a Pieces of Flair tab page, you’ll see all my virtual buttons once again.

Facebook does notify applications when a user uninstalls them, but it’s up to the developer to actually do something about the data left behind. Apparently Pieces of Flair does nothing with the data, meaning a user has to manually delete their flair before removing the application if they want to truly get rid of the content they generated. Based on my experience, many applications behave in a similar fashion. Some may argue that this behavior is similar to Facebook “deactivating” an account, but at what point should the content expire, and how many applications offer a full deletion? Such issues become matters of retention policies, and based on my past studies of whether applications even had a privacy policy, I would guess that most applications do not currently have such terms.

All of this once again highlights the current complexity of data and privacy on the Facebook Platform. Granted, dealing with third-party applications is not a simple problem to solve, and I’m not simply criticizing Facebook for failing to build a perfect system. But these issues can very easily lead to unpleasant surprises for end users, and at some point someone will have to sort them out.

IP Spoofing Attack and Defenses


IP Address: On the Internet, each computer system is identified by its IP address. The work we do on the Internet is associated with the IP address of the system we are using. We know that every request or response process on the Internet is done on packets. The basic protocol for information exchange over the Internet is TCP/IP.
TCP stands for Transmission Control Protocol and IP stands for Internet Protocol (IP). When we request a webpage or other resource from a server the request is sent in the form of a TCP/IP packet. This packet contains some information about the request, source and destination, along with the data being sent. The source and destination keeps the IP address of the sender and receiver.
What is IP spoofing: IP spoofing is the process of replacing the source IP address with a fake IP address from the IP packets to hide the real identity of the sender. The source address is the address of the computer that the packet was sent from. By changing the address in the packet an attacker can make it appear that the packet was sent by a different computer system.






Figure 1: IP spoofing
See the above figure. Two computers, victim and partner, were communicating with each other. In the meantime, a sender (the attacker) also tries to communicate with the victim by forging the IP address and tries to fool the victim with the fake IP address of the partner. So the victim computer thinks that the packets came from the partner computer while we can see the original sender is the sender system which in this case is the attacker.
The term spoofing is also sometimes used to refer to header forgery because attacker forges the header of the packets with fake information.
This process is used to send fake mail, requests or other information with a fake IP address to mislead others about the information being sent. Hackers often use IP spoofing for sending spam mail and denial of service attacks. This protects the real identity of the hacker because the IP address sent with the packet belongs to someone else. When a machine replies to a spoofed packet, the response is sent back to the forged source address. So IP spoofing is used in an attack when the attacker does not care about the response.
How it works
Internet Protocol (IP) Packets
Internet Protocol is a network protocol operating at Layer 3 (network layer) of the OSI model. Each IP packet sent contains a header with the data. The header contains some information about the sender, receiver, and other things.

Figure 2: IP packet
The header part contains additional information including the IP address of sender and receiver. The data part contains the data being sent.



Figure 3: IP Header
We can see the structure of the IP header in Figure 2. It contains much useful information about the packet. We can see the fields for SOURCE IP ADDRESS and DESTINATION IP ADDRESS. Here the source IP address, the IP address of the sender’s machine, and the destination IP address is the IP address of the receiver’s machine.
Transmission Control Protocol (TCP):
TCP stands for the connection-oriented, reliable transport protocol in the TCP/IP suite. It uses 3-way handshaking (SYN-SYN/ACK-ACK) to establish the connection. In this protocol, reliability is provided by sequence numbers and acknowledgement. See the second and third row for sequence numbers and acknowledge number fields. TCP assigns sequence numbers to every segment and acknowledges all data segments received from the other end.




Figure 4: TCP Header
By forging the header of the packet, we can make a fake IP address appear in the source IP address part.
Some tools used in IP spoofing
How to spoof IP address:
Here I am going to show IP spoofing with the help of NMap. Nmap is also known as Network Mapper. This tool is a free and open source (license) utility for network exploration or security auditing.
First of all you need to select the interfaces to spoof from. To do this, run the command
Nmap –iflist


Use the “–e” argument in the interface you have selected. The “–S” parameter can be used to specify the IP address that nmap will use as the source address. It can be our real IP address or we can spoof the IP address.



nmap -e eth0 -S 192.168.1.100 192.168.1.109


In the above command, I have used the eth0 interface and spoofed a source IP of 192.168.1.10, while scanning 192.168.1.32.
Application of the attack: This attack is widely used in Denial of Service attacks. In denial of service attacks an attacker floods the victim with large amounts of traffic. In this example, an attacker does not care to receive the responses from sent packets. Using packets with spoofed addresses is an advantage for the attack as the attacker can send packets with many different spoofed addresses. This makes it hard to filter the packets, as they seem to come from different sources. Attackers use random sequences of IP addresses to send spoofed packets in the Denial of Service attack. This attack is impossible to filter on the systems which rely on the validity of the source IP address in attack packets.
IP spoofing is also an effective way to defeat the networks which use IP address-based authentication. This attack is easy to inflict on corporations which have internal systems that trust each other’s systems based on the IP address. By spoofing a connection from a trusted machine, an attacker may be able to access the target machine without authentication.
Attacks that are launched through IP spoofing
There are a few variations on the types of attacks that successfully employ IP spoofing. Although some are relatively dated, others are very pertinent to current security concerns.
Non-Blind Spoofing
Non-Blind Spoofing attacks work on those networks where the attacker and victim are on the same subnet. In this situation, the attacker can sniff the network packets to know the sequence and acknowledgement numbers being sent in the packets. The biggest threat of spoofing in this type of attack would be session hijacking. This can be done by corrupting the data stream of an established connection with a valid user, then re-establishing the connection based on the correct sequence and acknowledgement numbers with the attack machine. Here the attacker can easily bypass the authentication mechanisms because he has the correct sequence and acknowledgement numbers – and guessing these is the hardest part.
Blind Spoofing
This attack is complicated and difficult in comparison to the Non-Blind attack because the sequence and acknowledgement numbers cannot be sniffed. In order to get the correct sequence number and acknowledgement, the attacker will send several packets to the target machine, guessing sequence and acknowledgement numbers in order to sample sequence numbers. A few years back machines used formula based sequence number generators, so it was easy to generate the formula by analyzing just a few packets and TCP sessions. But nowadays these sequence numbers are generated randomly to make it unpredictable. After sending several packets there may be a possibility to guess the right sequence number. This attack takes a great deal of time and has a lesser probability of success.
Man-in-the-Middle Attack
The man-in-the-middle attack (MITM) is a common security violation that is formed by both types of spoofing we have discussed above. In this attack, an attacker intercepts a legitimate communication between two machines (server and client).Then, the attacker controls the flow of data. He can alter the information being exchanged by two machines without the knowledge of either the original sender or the recipient.
Denial of Service Attack
Denial of service is the main attack which uses IP spoofing and are the most difficult to defend against. In this attack the attacker only tries to consume the bandwidth and resource of a server. The attacker does not care about the response, so they need not worry about properly completing handshakes and transactions. In this attack an attacker only wishes to flood the victim’s machine with as many packets as possible in a short amount of time in order to make the victim’s machine inaccessible to valid users. The attacker uses random-source IP addresses to send packets to the target machine to make tracing and stopping the DoS as difficult as possible. Most of the servers use IP block mechanisms to prevent this type of flooding. Using random spoofed IP easily bypasses those security mechanisms.
Services vulnerable to IP spoofing
Configurations and services that are vulnerable to IP spoofing:
RPC (Remote Procedure Call services)
Any service that uses IP address authentication
The X Window System
The R services suite
Most popular tools used to modify packet headers:
Tools – For Windows
Engage Packet Builder – Scriptable packet builder for Windows
HPing – Command-line oriented TCP/IP packet assembler/analyzer
Nemesis – Command-line portable IP stack
PacketExcalibur – Graphical and scriptable network packet engine
Scapy – Interactive packet manipulation tool
Spoofer – IP Spoofing Tester
Colasoft Packet Builder – Tool for creating custom network packets
Colasoft Packet Player – Packet replay tool
NMap – Utility for network exploration and security auditing
Tools – For Linux
LSRscan – Loose Source Route Scanning Tool
Scapy – Interactive packet manipulation tool
Spoofer – IP Spoofing Tester
Yersina – Tool to exploit weaknesses’ in different network protocols
Sendip – Send completely arbitrary packets out over the network
HPing – Command-line TCP/IP packet assembler/analyzer
IRPAS – Internetwork Routing Portocol Attack Suite (File2Cable etc.)
LSRtunnel – Loose Source Route Tunneling Tool
Nemesis – Command-line portable IP stack
NMap – Utility for network exploration and security auditing
PacketExcalibur – Graphical and scriptable network packet engine
Defenses against IP Spoofing
There are a few precautions that can be taken to prevent IP Spoofing attacks on the network:
Filtering packets at the Router - Implementing ingress and egress filtering on your routers is the best defense against the IP spoofing attack. Ingress filtering is the process of blocking packets from outside the network with a source address inside the network. Egress filtering is the blocking of packets from inside the network with a source address that is not inside. You will also need to implement an ACL (access control list) that blocks private IP addresses on your downstream interface. On the upstream interface you should restrict source addresses outside of your valid range, which will prevent someone on your network from sending spoofed traffic to the Internet.
Encryption and Authentication - Implementing encryption and authentication will also reduce spoofing threats. Both of these features are included in IPv6, which will eliminate current spoofing threats. Host IP based authentication must not be used based on the IP address. It is recommended to design network protocols and services so that they do not rely on the IP source address for authentication.
Conclusion: IP spoofing is really easy because there are many tools available which allow users to edit packets and send packets from the IP. So performing IP spoofing is really simple, which leads to some big hacking operations. Although many servers have secure mechanisms to prevent spoofed packets, all those mechanisms are limited. Most of the networks still does not consider this attack. So their authentication based on IP address fails.
If we take a look at recent DOS attacks, most of the attackers are still untraceable because they have used IP spoofing to perform the attack and to prevent their real identity. So server administrators and network administrators must consider this attack while designing the security rules for their servers and networks. By considering some points, it’s easy to identify the forged packet with fake IP addresses.









NATURE WALLPAPER


Monday, August 13, 2012

Scientists take quantum leap to ultrafast communication system

Communication Scientists claim to have cracked the code to creating ultra fast communication systems operating at much faster speeds without the use of cables.

          Chinese researchers were able to teleport a qubit (a standard unit of data in quantum computing) 97 kilometres across Qinghai Lake using a small set of photons without fibre-optic cables or other intermediaries, a new report said.'

          They created entangled photons by stimulating a crystal with ultraviolet light, producing a pair of photons with the same wavelength, but opposite polarisation values.

           Using these photons, the researchers copied the quantum state from the laboratory to the far station, achieving quantum teleportation over a much larger distance than the previous record of 16 kilometres.

          The laser targeting device developed by Chinese scientist Juan Yin was necessary to counteract the minute seismic and atmosphere shifts that would otherwise break the link between the two remote locations.

            A European and Canadian group claims to have teleported information from one of the Canary Islands to another, 143 kilometres away. However, the paper has not been peer-reviewed or published.

        Quantum teleportation relies on a phenomenon known as entanglement, through which quantum particles share a fragile, invisible link across space.

         Two entangled photons, for instance, can have correlated, opposite polarisation states - if one photon is vertically polarised, for instance, the other must be horizontally polarised.

        But, with the development of quantum mechanics, each photon's specific polarisation remains undecided until one of them is measured.

Sunday, August 12, 2012

Moto GP 1 Bike Racing PC Game Full Version Free Download

Information:

                Moto GP 1 is a Spanish motorbike racing game. The goal is to beat other opponents in a circle race with skillful driving. Play in three modes: championship where you'll race in a series of races, quick race to get on the race track immediately, and time trial mode where you'll have to beat the clock. Excellent graphics and physics.

trialer :

system requirements:


Processor= 1.0GHz


RAM= 256MB


Graphics= 64MB

download need for speed most wanted full game free


                     Need for Speed: Most Wanted (NFS: MW) is a racing video game,
developed by EA Black Box game's street racing-oriented game play,
            with certain (but not all) customization options from the Need for Speed:
             Underground series. The game is also succeeded by Need for Speed:
           Carbon, which serves as a sequel to Most Wanted. Most Wanted has been released for Windows-based personal computers,
the PlayStation 2, PlayStation Portable, Nintendo GameCube,
Xbox, Xbox 360 (as a launch title), Game Boy Advance, Nintendo DS.
        And mobile phones. Another version of Most Wanted, titled Need for Speed:
           Most Wanted: 5-1-0 has been released for the PlayStation Portable.
This is the First game in Need for Speed series to be rated T (Even though
the European Version is Still Rated 3+ ). Need for Speed: Most Wanted 'Black Edition', a collector's edition of Most Wanted, was released in celebration of the Need for Speed series' tenth anniversary and in
conjunction with the release of Most Wanted. The Black Edition features additional
races, bonus cars and other additional content. The Black Edition also comes with
a special feature DVD that contains interviews and videos about the game. The Black Edition
was released for Microsoft Windows, PlayStation 2 and Xbox in the United States and Australia;
only the PlayStation 2 version of Black Edition was released additionally for Europe.

 Instructions: 

1.Download it 
2.Mount the iso file with Daemon Tools 
3.Click Install
 4.The Setup Prompts you for a cd key.
Use this keygen: http://thepiratebay.org/torrent/3412995/NFS_MW___NEED_FOR_SPEED
_MOST_WANTED_KEYGEN_DEViANCE 

5.Wait for it to install 
6.Go to the drive NFSMostWanted 
7.Go to the folder named NFSMW Patch v1.3 
8. Apply the patch 
9. Go to the folder named Crack and go to your
Need for Speed Most Wanted game directory 
10.Replace the original executable with the crack. Enjoy all People!!!!!!

screenshots:







                                                    CLICK HERE TO DOWNLOAD

Need for Speed: Carbon free full download

European cover artNeed For Speed Carbon iso with Crack. 

 System Requirements --------- 

-1.7GHz -512 Ram -5.3GB Hard Drive Space -DirectX 9.0c compatible 64MB video card
with one of these chipsets: Radeon 8500;
GeForce 4 Ti -DirectX 9.0c compatible sound card -DVD Drive (not needed) ------------------------------ Read Instructions Note: If your computer does not meet these specs then
it is your computer and not me =]. Carbon does not support onboard graphics so you
need a proper card for this to work the loading
screen will come up and then crash to the desktop
, this is not my fault. When you download this please seed as i can only
upload another 10GB this month until i go back to



Need for Speed Carbon Trailer (HD)
64Kb/s :0 

 NOTE THIS IS A TORRENT FILE

                                       CLICK HERE TO DOWNLOAD

Crysis 2 full version free downlaod



                         The world was shocked with a series of environmental disasters, and mankind is on the verge of extinction. Aliens have returned, determined to wipe people off the face of the earth and started at the same time with one of the most iconic cities of the earth.
New York streets flooded with alien invaders, and the wave of the walking nightmares gradually engulfing the city and its inhabitants. Urban communication systems are destroyed, the buildings are in ruins. This New York City you've ever seen.
Neither law enforcement organizations, nor the U.S. military machine can not cope with the invaders, and all who could not escape in time, are already dead. To survive in this chaos, you need the technology, about which neither the earth's soldiers also have no idea.
One person will inherit something that will help him survive. One super-soldiers, armed and equipped with the latest technologies of the future in Nanosuit 2, take a desperate attempt to save humanity in the streets of New York.

Minimum System Requirement

Crysis 2 requires DirectX 9.0c. You can install DirectX 9.0c by
following the onscreen prompts during the game's installation
process.
REQUIRED SYSTEM SPECIFICATIONS:
OS: Windows XP, Windows Vista or Windows 7
• CPU: Intel Core 2 Duo 2.0 GHz / AMD Athlon 64 X2 3800+ or higher
• RAM: 2.0 GB
• Hard Drive: 8 GB or more of free space
* actual install was 7.540 GB
• Video: NVIDIA 8800 GT 512 MB / ATI 2900GT or HD3850 or higher
• Sound: DirectX 9.0c compatible sound card

Note: While you will be able to play Crysis 2 with the specifications
above, play experience may improve if you have additional RAM, a
faster CPU or a better graphic card.








NOTE THIS IS A TORRENT FILE

                                         CLICK HERE TO DOWNLOAD

Call Of Duty 4 : Modern Warfare Free Download Full Version


                Call of Duty 4: Modern Warfare is a first-person shooter developed by Infinity Ward and published by Activision for PC, Nintendo DS, Playstation 3 and Xbox 360. This is the fourth product to Call of Duty video game series. The game was announced on April 25, 2007. The game was released on November 6, 2007 in North America, on November 7, 2007 in Australia, and on November 9, 2007 in Europe. This game has sold over 13 million units

              Call of Duty 4 Modern Warfare (COD4MW) differs from the previous Call of Duty series is always telling the history of the World War II, this time Infinity Ward brings you in a battle set in the modern world with a fictional story about a civil war due to a coup in the Middle East and the group 'ultranationalists' in Russia, both masterminded by Imran Zakhaev.

          At first Sergeant McTavish 'Soap', Captain Price 'Gaz' and several other SAS soldiers find nuclear missiles located inside the cargo ship in the Bering Sea. They also took a record of evidence of the missile, which ultimately proved a link between events in the Middle East and Russia.

Review






NOTE THIS IS A TORRENT FILE

                                    CLICK HERE TO DOWNLOAD