Tuesday, April 19, 2011

ROASTe Coffee Online Shop "We Deliver Your Order"





With just over a year under our belt, and with close to a thousand coffees, we are proud to have become the largest coffee store on the Web!

ROASTe is the one-stop shop for people who want the at-home gourmet coffee experience. ROASTe connects coffee-lovers to the greatest variety and selection of award-winning, micro-roasted coffee, premium brewing equipment and accessories, original coffee content and a vibrant coffee community.

User-generated reviews, and intuitive search and recommendation features offer consumers an unparalleled ease of selection. Fresh coffee is shipped directly from our micro-roasters, making ROASTe the next evolutionary step in the world of gourmet coffee consumption at home.

ROASTe is the only ecommerce site offering user reviews for micro- roasted coffee. User reviews have proven to be a key online sales driver, which explains ROASTe’s high conversion rates.

- Free Shipping on order $35+

- Use coupon code for $5 off your first coffee purchase- BLOGME5

Visit here for more info ROASTe

Please dont forget to leave a comments.. thanks and have fun

Stumble
Delicious
Technorati
Twitter
Digg
Facebook
Reddit

Facts of Amazing


* Charlie Chaplin once won third prize in a Charlie Chaplin look alike contest.
* During the chariot scene in "Ben Hur" a small red car can be seen in the distance.
* A rat can last longer without water than a camel.
* A snail can sleep for three years.
* You can't kill yourself by holding your breath.
* A mathematical wonder: 111.111.111 multiplied by 111.111.111 gives the result 12.345.678.987.654.321.
* No word in the English language rhymes with month, orange, silver, and purple.
* Canada is an Indian word meaning "Big Village".
* There are two credit cards for every person in the United States.
* "I am." is the shortest complete sentence in the English language.
* The most common name in the world is Mohammed.
* The international telephone dialing code for Antarctica is 672.
* Mel Blanc (the voice of Bugs Bunny) was allergic to carrots.
* The very first bomb dropped by the Allies on Berlin during World War II killed the only elephant in the Berlin Zoo.
* Sherlock Holmes never did say "Elementary, my dear Watson."
* The average person falls asleep in seven minutes.
* Money isn't made out of paper, it's made out of cotton.
* Every time you lick a stamp, you're consuming 1/10 of a calorie.
* An ostrich's eye is bigger than its brain.
* The longest recorded flight of a chicken is thirteen seconds.

Please dont forget to leave a comments.. thanks and have fun

Stumble
Delicious
Technorati
Twitter
Digg
Facebook
Reddit

Top10 Best Hacking History


Here is a list off the top 10 hacks of all time.

Early 1990s
Kevin Mitnick, often incorrectly called by many as god of hackers, broke into the computer systems of the world’s top technology and telecommunications companies Nokia, Fujitsu, Motorola, and Sun Microsystems. He was arrested by the FBI in 1995, but later released on parole in 2000. He never termed his activity hacking, instead he called it social engineering.

November 2002
Englishman Gary McKinnon was arrested in November 2002 following an accusation that he hacked into more than 90 US military computer systems in the UK. He is currently undergoing trial in a British court for a “fast-track extradition” to the US where he is a wanted man. The next hearing in the case is slated for today.

1995
Russian computer geek Vladimir Levin effected what can easily be called The Italian Job online – he was the first person to hack into a bank to extract money. Early 1995, he hacked into Citibank and robbed $10 million. Interpol arrested him in the UK in 1995, after he had transferred money to his accounts in the US, Finland, Holland, Germany and Israel.

1990
When a Los Angeles area radio station announced a contest that awarded a Porsche 944S2 for the 102nd caller, Kevin Poulsen took control of the entire city’s telephone network, ensured he is the 102nd caller, and took away the Porsche beauty. He was arrested later that year and sentenced to three years in prison. He is currently a senior editor at Wired News.

1983
Kevin Poulsen again. A little-known incident when Poulsen, then just a student, hacked into Arpanet, the precursor to the Internet was hacked into. Arpanet was a global network of computers, and Poulsen took advantage of a loophole in its architecture to gain temporary control of the US-wide network.

1996
US hacker Timothy Lloyd planted six lines of malicious software code in the computer network of Omega Engineering which was a prime supplier of components for NASA and the US Navy. The code allowed a “logic bomb” to explode that deleted software running Omega’s manufacturing operations. Omega lost $10 million due to the attack.

1988
Twenty-three-year-old Cornell University graduate Robert Morris unleashed the first Internet worm on to the world. Morris released 99 lines of code to the internet as an experiment, but realised that his program infected machines as it went along. Computers crashed across the US and elsewhere. He was arrested and sentenced in 1990.

1999
The Melissa virus was the first of its kind to wreak damage on a global scale. Written by David Smith (then 30), Melissa spread to more than 300 companies across the world completely destroying their computer networks. Damages reported amounted to nearly $400 million. Smith was arrested and sentenced to five years in prison.

2000
MafiaBoy, whose real identity has been kept under wraps because he is a minor, hacked into some of the largest sites in the world, including eBay, Amazon and Yahoo between February 6 and Valentine’s Day in 2000. He gained access to 75 computers in 52 networks, and ordered a Denial of Service attack on them. He was arrested in 2000.

1993
They called themselves Masters of Deception, targeting US phone systems. The group hacked into the National Security Agency, AT&T, and Bank of America. It created a system that let them bypass long-distance phone call systems, and gain access to the pbx of major carriers.

Please dont forget to leave a comments.. thanks and have fun

Stumble
Delicious
Technorati
Twitter
Digg
Facebook
Reddit

Facebook Channels


hey guys wants to watch your favorite news channel or movies using facebook?
heres your chance to see for yourself.

just go here

You need Mozilla Firefox 4


Heres the sample of channels..

then choose among the available channels
Have Fun!
Please dont forget to leave a comments.. thanks and have fun

Stumble
Delicious
Technorati
Twitter
Digg
Facebook
Reddit

10 Types Of Computer Virus


Different Types of Computer Viruses

There are many types of viruses, some cause harmless but some cause devastating. They are classified into difference categories including Boot Sector Viruses, Companion Viruses, Encrypted Viruses, Logic Bomb Viruses, Macro Viruses, Multipartite Viruses, Nonresident Viruses, Polymorphic Viruses, Resident Viruses and Stealth Viruses. You can see the explanation of each type of viruses in following:


1. Boot Sector Viruses
This type of viruses has ability to hide in boot sector. The viruses will load into memory when there is booting system and trying to read from hard disk. Boot sector viruses are more spread since old time when floppy disk was popular. But now we hardly seen them since many of them only can spread through floppy disk.

2. Companion Viruses
Companion Viruses is another kind of viruses. When user computer infect by this sort of viruses, it will create another type file from an existing file in same directory (such as creating file.com from file.exe in the same folder), some companion viruses create file.exe from any folder.

3. Encrypted Viruses
This type of viruses consists of encrypted malicious code, decrypted module. The viruses use encrypted code technique which make antivirus software hardly to detect them. The antivirus program usually can detect this type of viruses when they try spread by decrypted themselves.

4. Logic Bomb Viruses
Logic Bomb Viruses or sometime know as Time Bomb is small piece of malicious code or program which have ability to insert itself to other programs or system and perform specific action when the conditions are met (most Logic Bomb developers use date as conditions). The Logic Bomb does nothing until pre-programmed date is reached. Logic Bomb can perform any malicious things based on pre-programmed within it such as deleting file or displaying unwanted message or lock program and so on.

5. Macro Viruses
When talking about Macro Viruses, we refer to viruses which infect macro of other applications such as Microsoft Word, Microsoft Excel. The viruses are written in a macro language and use it to distribute themselves. Macro viruses will run automatically when user open document. Usually this type of virus cause harmless to your computer, but instead they are annoying by automatically inserting undesired texts or symbols.

Example of Macro Virus: WM.Concept, it was introduced in 1995 the first macro virus that spread through Microsoft Word. And another popular one is Melissa that is first found in 1999, it also can spread through MS Word, Excel and Outlook.

6. Multipartite Viruses
Multipartite Viruses is type of viruses which infect user computer on both part boot sector and executable files and programs at the same time, with this condition, the viruses spread faster than boot sector or file infector alone.

Example: Ghostball, the first multipartite virus.

7. Nonresident Viruses
This type of viruses is similar to Resident Viruses by using replication of module. Besides that, Nonresident Viruses role as finder module which can infect to files when it found one (it will select one or more files to infect each time the module is executed).

8. Polymorphic Viruses
Polymorphic Virus is similar to encrypted viruses; it can infect files with an encrypted copy of itself. The viruses use difference technique to replicate themselves. Some polymorphic viruses are hardly to detect by antivirus software using virus signature based, because it do not remain any identical after replication.

Example: Pseudonym, 1260

9. Resident Viruses
Resident Viruses or known as Memory Resident Viruses is malicious module. The viruses can replicate module and installing malicious code into computer memory (RAM). The viruses are commonly classified into two main categories: Fast Infectors and Slow Infectors.

10. Stealth Viruses
Stealth Viruses is some sort of viruses which try to trick anti-virus software by intercepting its requests to the operating system. It has ability to hide itself from some antivirus software programs. Therefore, some antivirus program cannot detect them.
Please dont forget to leave a comments.. thanks and have fun

Stumble
Delicious
Technorati
Twitter
Digg
Facebook
Reddit

Sandstorm in China



Strong winds and violent sandstorms have blasted their way into northern China.

Yellow dust has been whipped up just about everywhere in suburban Hohhot. The weather is a bit better in the urban center, but people across this main hub of the Inner Mongolia Autonomous Region are still finding their commutes affected.
Shijiazhuang, the capital of Hebei Province, has also been impacted. Meteorologists are reminding residents to wear masks if they go out, to avoid getting harmful amounts of dirt in their eyes.

Please dont forget to leave a comments.. thanks and have fun

Stumble
Delicious
Technorati
Twitter
Digg
Facebook
Reddit
 

Enter your email address:

Delivered by FeedBurner

English French German Spain Italian Dutch

Russian Portuguese Japanese Korean Arabic Chinese Simplified

Feel Free Donate

AzerWorks Copyright © 2009 AzerWorks is Designed by Azer

azergwapo