Friday, December 29, 2006

Almost Naked

Photos by Shen Wei



























































































Source

Wednesday, December 20, 2006

Derek Jackson - photographer

































































Source

Sex museums

Amsterdam

Temple of Venus

Temple of Venus” in Amsterdam is definitely a King of sex-museums in the world. It is situated near Central Railway Station and was opened in 1985. Every year more than half of a billion people visit this museum. Underwear, literature, photos, movies, pictures and making love bodies of people – everything there. Three floors of sex artefacts, mostly XVIII and XIX century is very interesting but mostly innocent composition. But on the way to exit there is a small room with a tablet, which is saying “Some of exhibits in this room may seem to you offensive. Enter this room for your own fear and risk. Complaints are not accepted.” And you know everything is truth. Room is full of photos, for which definition “mind-blowing” seems too soft.


“Erotic museum”

It is situated in a very center of famous “red lights” section. There are two main sights. First one is TV room, in which chairs look like toadstools and on all walls there are TV screens, which broadcast all the time porn Disney cartoons. Second one – obscene pictures by John Lennon, which he gave as a wedding present to Yoko Ono. The rest exposition is bigger than in “Temple of Venus” – five floors instead of three, but not so varied. Pictures, photos and big collection of erotic game cards.

“MoSex”

Someone called Daniel Glitch opened this museum in 2002 as “devoted to history, evolution and culture meaning of human sexuality”. Exposition here is much more structured than in other museums, and in fact is more educational. Separate rooms devoted to porn, erotic, BDSM, homosexualism and other variants and aspects of sex life. By the way, American porn kings were ready to sponsor this museum, but Glitch refused money. Unlike sex shops, which have allocation limits, “MoSex” is situated almost near the school and church. For this it has problems with religious and social organizations. Hurry up, while it is not closed!

Tuesday, December 19, 2006

Monday, December 18, 2006

Win Antivirus Pro

These are few things about Win Antivirus Pro, I’ve found again.

Overview


Vendor Description


WinSoftware is a world-class business services company focused on delivering first-class security solutions to a wide range of clients. Our software is mostly designed to help individuals, small businesses and educational organizations to secure their computers from different threats coming from all sides and growing in number and complexity. We provide a complementary range of products and services that enable every customer to choose the product that suits him/her best. Our solutions include virus protection, content and advertising filtering, firewall solutions, optimization software and more.

Alias


winantivirus pro [Webroot],

Category


Trojan : Any program with a hidden intent. Trojans are one of the leading causes of breaking into machines. If you pull down a program from a chat room, new group, or even from unsolicited e-mail, then the program is likely trojaned with some subversive purpose. The word Trojan can be used as a verb: To trojan a program is to add subversive functionality to an existing program. For example, a trojaned login program might be programmed to accept a certain password for any user's account that the hacker can use to log back into the system at any time. Rootkits often contain a suite of such trojaned programs.

Reasons For Retention


This program provides, displays fake alerts, and downloads other programs onto user's machine without permission.



Origins


Group


WinSoftware Inc.

URL


http://winantivirus.com/

Date of Origin


June, 2006



Detections:


List of Objects Present:


PestPatrol detects the following files and registry entries for this software..


Executable Files:


Autorun References:

HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runonce fat.exe
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run winantiviruspro2006



DLL Files:

Registry Items:


Files:


I took this info from here.


Saturday, November 18, 2006

Monty python-married

Friday, November 03, 2006

Best video game levels of all time

From Mario to Shadow of the Colossus, from Call of Duty to Beyond Good & Evil, from Goldeneye to many more, Destructoid has taken time to poll gamers over a few weeks to decide one some of the best video games ever. Feel free to comment and contribute to the list!

read more | digg story

Wednesday, October 25, 2006

Christmas holidays in Paris

Time goes so fast! Christmas will come in less than 60 days. And I was thinking of traveling again somewhere. For example to Paris, why not? Shopping at this time of year is awesome there. And I started to look for Paris Hotels of course.

Here are some I found at Superbreak.
1. Holiday Inn Paris La Villette
The Holiday Inn Paris La Villette is a hotel of modern design located opposite the museums of music, science... ( Prices from £36.75 pp).
2. Hotel d’Argentine
Located in the centre of Paris, the hotel is close to the Arc de Triomphe and the famous Champs... ( Prices from £64.25 pp)
3. The Novotel Paris Tour Eiffel
The Novotel Paris Tour Eiffel faces the River Seine and dominates the Parisian skyline whilst the Eiffel... ( Prices from £65.00 pp)

They are nice; if I will go there I will probably choose “Holiday Inn Paris La Villette” (the cheapest one).

Anyway I’ll continue to think where to go on Christmas break.

Thursday, October 19, 2006

Party Poker video

Party Poker video

Tuesday, October 17, 2006

Russia won the cold war?

Found this interesting article and decided to post it here. It is written by Tom Attea, humorist and creator of NewsLaugh.com, has had six shows produced Off-Broadway. Critics have called his writing "delightfully funny," "witty," with "great humor and ebullience" and "good, genuine laughs."

So... read =)

Is everybody happy with the way the US is behaving as the world’s most powerful nation? No? Well, when has everybody ever been happy about anything? So let’s think about what other nations might do a better job.

What if Russia had won the cold war? How much do you really enjoy vodka? And do you long to drive a Zil?

How about if China hadn’t decided that military conquest would be too self-destructive and opted to give economic conquest a go? Wish you could dress like Chairman Mao? Or wonder when you look at the rulers in Beijing why you never see a woman? Could there be such a thing as the wonton ceiling?

Now let’s move ahead to the contentious moment in which we find ourselves. Who qualifies as being especially pestiferous? Who else? Iran can. And the leaders there seem to think they have all the right ideas, not only for their own repressed populace, but as the way the whole world ought to conduct itself.

So let’s go with that. Iran is now the most powerful nation of earth. What happens?

First, let’s deal with the response. Nations worldwide rejoice. Even some people in America rejoice. They just love the fact that the U. S. is no longer the title holder.

Prime Minister Jacques Chirac, lounging in the Élysée Palace, attired in a robe with a turban, Koran in hand, expostulated, “Actually, I’m looking forward to becoming a fundamentalist Muslim. All of France is. We’ve had Western Civilization for long time and, to tell you the truth, we could use a change. So out with old – like Plato, Aristotle, Shakespeare, Rembrandt, Voltaire, Mozart, Beethoven – and in with the new,” he apostrophized, holding the Koran high, “like my new favorite author Mohammed. I’m just not quite sure how to break the news to the folks in Bordeaux that wine is now forbidden fruit.”

Tony Blair, refusing to accept that Iran has any influence in the UK, addressed Parliament, maintaining, “I don’t care who’s on top in Tehran. In England, we’re going to go on as we always have. That means we’ve still got Shakespeare, Wordsworth, Keats, Shelly and, yes, Dickens, too, and I wish you, one and all, a very merry Christmas!”

And on the home front, President Bush requested TV time to address the nation, and said, “It’s my sad duty to tell you that the United States of America is no longer the most powerful nation on earth. We have surrendered the distinction to Iran. Worse yet, a lot of people around the world seem pretty happy about it. But we can be proud. We did our best to defend and spread freedom and democracy. A lot of people seem upset with that. So let me just say, let’s see how much happier they are with Iran running the show.”

Meanwhile, in Tehran, President Mahmoud Ahmadinejad, now the leader of the unfree world, gave a speech acknowledging his newfound imperium. It was unexpectedly harsh.

“Welcome to the first worldwide Iranian Empire. Darius couldn’t do it, but Ahmadinejad did. Here are some new rules of conduct. Everybody is hereby ordered to buy a Koran. Start to memorize it. During your period of indoctrination, you are forbidden to read anything else. There will be a test in one year. All those who haven’t committed it to memory will be in danger of losing more than their memory. Next, all fashion houses in France, Italy, and 7th Avenue are henceforth only allowed to design conservative robes and turbans for men and bourkas for women. On a social note, no more dating. All parents must do the matchmaking. No more music. It is forbidden. No more drinking – no wine, beer, hard liquor or the infidel beverages Coca-Cola and Pepsi-Cola. No more bikinis, either. We’re quite repressed sexually and we want you to be, too. More rules as soon as the mullahs who are really running the world give me my marching orders.”

The reaction was swift and Ahmadinejad, who had by now acquired the nickname of Ahmadinejab, because he always seemed to be poking his fist in where it didn't belong, had begun to learn the harsh lessons of empire – mainly, no matter how nice you are, or in his case, not so nice, the underlings will grumble.

Thus the great question came to hang over him like a scimitar. What is better, to be loved or feared? More challenging still, is either manageable?

Even as the most humble servant of Iran's Muslim clerics adjusted to his new role, a few people in scattered corners of the world began to ask, secretly and with fear of being detected even by their fellow fundamentalist family members, the most appalling question of all. Were they better off when the US was the most powerful nation on earth?

Friday, October 13, 2006

Job Interview - Monty Python

Safekeeper Plus - Chat Monitor

Well, as I wrote before, I continue to post features about Safekeeper Plus. This time it is:

Chat Monitor

Chat Monitor software shows exactly what your children say online. Know who they chat with. Read a transcript of all conversations.

Read more

Safekeeper monitors and records all instant message (IM) conversations, adding another layer of protection. Safekeeper will monitor IM sessions on each of the main services, including ICQ, AIM, Yahoo! and MSN. This is ideal for parents who are interested in blocking Instant Messaging or just monitoring who their children are chatting with.

Safekeeper records both sides of the conversation, showing exactly what was said. Then, parents can sit with their child in a calm moment and discuss specific concerns. Parents can access these chat reports – or change settings - from any PC in the world! Safekeeper also includes a ‘chat dictionary, so you can decode your kid’s secret conversations.

About other features – later, I hate very long posts =)

Wednesday, October 11, 2006

Send and recieve funds instantly

Decided to write about e-card I’m using. Very useful thing IMO. (again info from website)

Using ePassporte :

  • Shop Online
    Use your ePassporte Virtual Visa to make secure and anonymous purchases over the Internet. Only you will be able to make balance inquiries and access transaction history. Your ePassporte Virtual Visa transactions are CVV2/CVC2 protected which provides the highest security protection against fraud on the Internet. Additionally, you can load ePassporte with funds whenever you want. This means that you can avoid overspending by budgeting effectively.
  • Shop or Get Cash Anywhere in the World
    Use your ePassporte Visa Electron card to get cash at ATMs bearing the PLUS and/or Visa logo or make purchases at Visa merchant terminals.
  • Transfer Money Instantaneously
    Transferring money between ePassporte members is immediate. All you need is the User ID of the other ePassporte account holder that you want to send money to.
    It is fast, safe and affordable.
  • Family Finances
    The ePassporte Virtual Visa and Visa Electron card are the perfect solutions for your family financial needs. It is a great way to encourage financial accountability with online tracking of purchases, so you and your family's can manage spending and budgeting. Their spending will be limited to the amount of money that you load on to the account, so they will learn practical money skills with your supervision. Even if they are miles away from home, you can monitor their expenditures online daily and in real-time!
  • Use While Traveling
    Safer and more convenient than carrying cash or checks, ePassporte makes traveling easy. Load your ePassporte Virtual Visa and take the ePassporte Visa Electron card on your trip. You will be able to withdraw cash in any country in the local currency at ATMs and make purchases at Visa merchant terminals all over the world.
  • Gift Giving
    Instead of giving cash or gift certificates for a particular store, provide your loved ones with the endless possibilities of ePassporte. You can load an ePassporte Virtual Visa once for a one-time present or load it any time you want in the future. Once you load, they will have instant access to your ePassporte gift!


Features and Benefits :

  • No Credit Approval or Application Required
    To obtain an ePassporte account you are not required to go through a credit approval process.
    Just join online with your current credit card.
  • Immediate Satisfaction
    As soon as you decide to get an ePassporte Virtual Visa and you load the account, you can make purchases online in a matter of seconds.
  • The ePassporte Real-Time Environment
    Real-time transaction history - You will be able to review your transaction history immediately after the transaction has occurred. Real-time money transfers - Click the "send transfer" button and the ePassporte cardholder recipient can receive funds and use them immediately.
  • Free Message Center
    ePassporte provides a free, private message center to deliver all account data securely and safely.
  • Global Access to Funds
    ePassporte allows you to withdraw cash in any country in the their local currency at ATMs. It also allows you to make purchases at most Visa merchants worldwide.

Tuesday, October 10, 2006

Lion has a secret

Lion has a secret

Monday, October 09, 2006

Safekeeper Plus Protects Your Family

I continue trying different SW, this time it’s Safekeeper Plus.
Description of it’s components (again taken from website):

KidSafe Blocker
Blocks porn, gambling, violence, drugs and millions of offensive websites. Choose to allow or block access to specific websites. Customize for up to five family members.
Read more

Safekeeper automatically protects users from offensive websites. We have identified and blocked more than 30 million suspicious websites and dozens of threat categories. So, whenever your family members go online, they are protected from pornography, hate, drugs, gambling and other internet threats.

Safekeeper blocks ‘key phrases’ that trigger our blocking filters. Then, our human assessment team adds common sense judgment (i.e. blocks the word “breast”, but allowing “breast cancer”). Our assessment team updates the KidSafe Blocker 24 hours a day.

When Safekeeper is installed, the filter is automatically set to “ON”, blocking all potentially offensive websites. However, it can be customized for each family member, allowing you to control their access to specific categories and websites. You decide what is appropriate (or inappropriate) for each user.

About other components I’ll post later :)

Friday, October 06, 2006

Anti Virus

funny video

Thursday, October 05, 2006

DriveCleaner protects your privacy

Found one more interesting tool –
DriveCleaner.
Here are few things about it (from the site):

What evidence does your computer have?
Private companies are tracking the ISPs to record your Internet behavior and downloads for evidence. Simply deleting these files does not get rid of the evidence. Many times you are not even aware of the files that get installed by themselves and could compromise your career, your marriage or your overall status quo.

THIS IS HOW COMPROMISING FILES GET STORED IN YOUR COMPUTER!

- You surf adult related sites.
While you browse websites you might see adult related sites or just receive pornographic content.
- Many files are stored on your hard drive.
Stealth files are downloaded to your hard drive without your permission.
- These files show what sites you have visited.
These files leave tracks of your online behavior and even compromise your credit card information.
- DriveCleaner eliminates them all!
Simply deleting these files is not enough. DriveCleaner really gets rid of the evidence!

THIS IS HOW COMPROMISING FILES GET STORED IN YOUR COMPUTER!
Scans and removes Internet records, temporary files and useless data from your PC.
Prevents you from being spied or caught with inappropriate files in your computer.
Keeps your drive clean and free from useless files improving your system's performance.
Erases instant messaging system's old logs and private conversations.

Companies are investigating their employees for downloading forbidden files or entering restricted websites with inappropriate content. The FBI is intervening in these subjects. Be careful, don't take unnecessary risks.

Nice – I’ll try it =)

Wednesday, October 04, 2006

History of Computer Viruses

The History of Computer Viruses source :)

Viruses have been around for longer than you might think. Check out the timeline for a brief history of computer viruses.

Click on the highlighted virus names to learn more about them.

1986

  • The first PC virus was created. Known as the Brain virus, it was written in Pakistan. The Brain virus was a boot-sector virus, which means it only infected the boot records of 360K floppy disks, but not hard drives. It would occupy unused space on the disk so that it could not be used. It was also the first "stealth" virus, meaning it tried to hide itself from detection. If a computer user tried to view the infected space on the disk, Brain would display the original, uninfected boot sector.

1987

  • In November, the Lehigh virus was discovered at Lehigh University in the U.S. It was the first "memory resident file infector". A file-infecting virus attacks executable files. It gets control when the file is opened. The Lehigh virus attacked a file called COMMAND.COM. When the file was run (usually by booting from an infected disk), the virus stayed in the resident memory.
  • In December, the Jerusalem virus appeared at Hebrew University in Israel. It was also a memory resident file infector. It was the first virus that contained a bug that caused it to re-infect already infected programs.

1988

  • In March, the first anti-virus virus was written. It was designed to detect and remove the Brain virus and immunized disks against Brain infection.
  • The Cascade virus is found in Germany. It was the first encrypted virus, meaning it was coded so that it could not be changed or removed.
  • Viruses started getting media attention, with articles in magazines like Business Week, Newsweek, Fortune, PC Magazine and Time

1989

  • On September 17, the Washington Post reports that a computer virus "that springs to life destructively on Friday the 13th is on the loose". The virus was called DataCrime and ended up being blown way out of proportion.
  • A virus called Dark Avenger introduced a new feature. It was designed to damage a system slowly, so it would go unnoticed at first and damaged files would be backed up.
  • In October, the Frodo virus turned up in Israel. If was the first full-stealth file infector, designed to damage the hard drive if run on or after September 22 of any year.

1990

  • Many anti-virus products were introduced, including ones from IBM, McAfee, Digital Dispatch and Iris.
  • Viruses combining various characteristics spring up. They included Polymorphism (involves encrypted viruses where the decryption routine code is variable), Armoring (used to prevent anti-virus researchers from dissembling a virus) and Multipartite (can infect both programs and boot sectors).

1991

  • Symantec releases Norton Anti-Virus software.
  • In April, the Tequlia virus is discovered. It is Stealth, Polymorphic and Multipartite!

1992

  • Media mayhem greeted the virus Michaelangelo in March. Predictions of massive disruptions were made and anti-virus software sales soared. As it turned out, the cases of the virus were far and few between.

1993

  • The SatanBug virus appears around Washington DC The anti-virus industry helped the FBI find the person who wrote it - it was a kid.
  • Cruncher was considered a "good" virus because it compressed infected programs and gave users more disk space.

1994

  • A virus called Kaos4 was posted on a pornography news group file. It was encoded as text and downloaded by a number of users.
  • A virus called Pathogen appeared in England. The writer was tracked down by Scotland Yard's Computer Crime Unit and convicted.

1995

  • Anti-virus companies worried nobody would need them anymore because of Windows 95. The most common viruses were still boot viruses that worked on DOS, but wouldn't replicate on Windows 95. But, later in 1995, macro viruses appeared. These viruses worked in the MS-Word environment, not DOS. The anti-virus industry was caught off-guard, but was happy at the same time.

1996

  • Concept, a macro-virus, becomes the most common virus in the world.
  • Boza , a weak virus, is the first virus designed for Windows 95
  • Laroux is the first virus to successfully infect Microsoft Excel spreadsheets.

1999

  • The Melissa virus, a macro, appears. It uses Microsoft Word to infect computers and is passed on to others through Microsoft Outlook and Outlook Express e-mail programs.

2000

  • The "I Love You Virus" wreaks havoc around the world. It is transmitted by e-mail and when opened, is automatically sent to everyone in the user's address book.

To learn more about computer viruses and to keep up with the latest virus news, check out F-Secure Framework's site, IBM's anti-virus webpage and Symantec's website.