most played online games on phillipine..mas masaya to sa warrock, at ngaun nga napalitan na ng special force ang warrock online, unlike kasi sa warrock, pra sakin mas maganda ung graphics niya, at challenging ung game.hehehe
tulad din ito sa ibang RPG games may ranking system kung saan makakakuha ng experience yung player para tumaas ung kanyang ranking.
Mas sikat pa to kay ibang online games..hehehe, prang counter strike tlaga..
happy gaming to all!
o0oAND1o0o Clan..lol!
The parrot says, "I was born this way. I'm a defective parrot."
"Holy crap," the guy replies. "You actually understood and answered me!"
"I got every word," says the parrot. "I happen to be a highly intelligent thoroughly educated bird."
"Oh yeah?" the guy asks, "Then answer this -- how do you hang onto your perch without any feet?"
"Well," the parrot says, "this is very embarrassing but since you asked, I wrap my weenie around this wooden bar like a little hook. You can't see it because of my feathers."
"Wow," says the guy. "You really can understand and speak English can't you?"
"Actually, I speak both Spanish and English, and I can converse with reasonable competence on almost any topic: politics, religion, sports, physics, philosophy. I'm especially good at ornithology. You really ought to buy me. I'd be a great companion."
The guy looks at the $200.00 price tag. "Sorry, but I just can't afford that."
"Pssssssst," says the parrot, "I'm defective, so the truth is, nobody wants me cause I don't have any feet. You can probably get me for $20; just make the guy an offer!"
The guy offers $20 and walks out with the parrot.
Weeks go by. The parrot is sensational. He has a great sense of humour, he's interesting, he's a great pal, he understands everything, he sympathizes, and he's insightful. The guy is delighted.
One day the guy comes home from work and the parrot goes, "Psssssssssssst, " and motions him over with one wing. "I don't know if I should tell you this or not, but it's about your wife and the postman."
"What are you talking about?" asks the guy.
"When the postman delivered the mail today, your wife greeted him at the door in a sheer black nightie and kissed him passionately. "
"WHAT???" the guy asks incredulously. "THEN what happened?"
"Well, then the postman came into the house and lifted up her nightie and began petting her all over," reported the parrot.
"Oh No!" he exclaims. "Then what?"
"Then he lifted up the nightie, got down on his knees and began to kiss her all over, starting with her breasts and slowly going down...."
"WELL," demands the frantic guy, "THEN WHAT HAPPENED?"
"Damned if I know. I got a hard-on and fell off my perch!"
CIGARETTE: A pinch of tobacco rolled in paper with fire at one end and a fool at the other!
LAS VEGAS – It wasn't age that made Oscar de la Hoya look like an old man, slowed down by an arthritic condition in his arms and legs, as he was decisively thrashed by Manny Pacquiao in their "Dream Match" here Saturday night.
The fact is De la Hoya, 35, isn't an old man. Archie Moore and George Foreman were in their 40s when they reigned as world champions. Bernard Hopkins and Evander Holyfield are still active in their 40s. Surely, age can't be blamed for De la Hoya's inability to cope with Pacquiao's blinding speed.
It's also a fact that De la Hoya had fought more rounds than Pacquiao, 300-283, before their meeting and turned pro three years before the Filipino icon. And it's also a fact that Pacquiao had logged eight more bouts, 52-44.
For over three months, De la Hoya worked out to prepare himself physically for Pacquiao. From his walking weight of 160 pounds, he trimmed down to 145 – the lightest he's scaled since making 140 in decisioning Miguel Angel Gonzalez in 1997 (over 10 years ago). De la Hoya even brought in legendary trainers Nacho Beristain and Angelo Dundee to advise him on what to do strategically to beat Pacquiao.
Beristain was in Juan Manuel Marquez' corner for two fights against Pacquiao and no doubt, the Mexican counterpuncher has had the most success in engaging the Filipino in recent years. Marquez held Pacquiao to a draw and lost a close split devision. De la Hoya recruited Beristain to pick his brains and turn him into another Marquez.
But was it all for show? Was De la Hoya just fooling the public into thinking he could still hold his own inside the ring despite enjoying the good life?
Hunger makes a fighter risk things in the ring an ordinary human wouldn't ever dare. A hungry fighter throws caution to the wind and isn't frightened by the prospect of death.
De la Hoya has amassed a vast fortune as a fighter. In pay-per-view receipts alone, his fights have drawn over $600 Million. Today, he sits on top of a financial empire that has interests in real estate, media, sports and show business.
With several millions in his bank account, De la Hoya has learned to live like a king. He has five children, four with different women. There are at least three books about his life. He has cut an album of songs and showed the way for fighters to realize there is a meaningful life to be lived after boxing.
De la Hoya fell in love with life and got soft. In 2005, he didn't bother to fight. He fought only once in 2001, 2002, 2006 and 2007. While it's a fact that he has faced some of the world's most dangerous men (like Julio Cesar Chavez, Arturo Gatti, Sugar Shane Mosley, Fernando Vargas and Hopkins), De la Hoya deteriorated as a fighter more because of inactivity and lack of motivation than anything else.
Against Pacquiao, De la Hoya was just a shadow of his old self. He was reduced to a pitiful sight, unable to find his target and getting repeatedly outboxed and beaten to the punch by a fighter who moved up two weight classes to face the biggest challenge in his career.
When De la Hoya realized he couldn't match Pacquiao's speed, he tried to land one big punch in hoping to turn the tide. The problem was Pacquiao wouldn't oblige. Pacquiao charged in with guns blazing, firing 1-2 combinations then sliding away to the right to spin De la Hoya off balance. The constant motion threw off De la Hoya's rhythm. His feet got tangled up like a novice student of a dance instructor whenever Pacquiao twisted and shimmied.
De la Hoya's pals from the good life watched in horror at ringside. Jennifer Lopez, Marc Anthony, Eva Longoria and a horde of Hispanic beautiful people gasped as their hero was transformed into a human punching bag. Russell Crowe, who witnessed the demolition in De la Hoya's section, could hardly believe his eyes. Crowe was trained in Australia over a month by Dundee for the movie "Cinderella Man."
Pacquiao's trainer Freddie Roach knew what would happen all along. As a former fighter, he has the uncanny knack of recognizing the things to do to win a bout. It was Roach who broached the idea of Pacquiao fighting De la Hoya to The Star early this year and convinced Bob Arum to put it together. Only a few faithful believed Pacquiao could pull an upset despite De la Hoya's size advantage. Some doubters even feared for Pacquiao's life and called it a fool's dream.
As it turned out, the fool was De la Hoya and the dream became his worst nightmare.
De la Hoya had no legs, no arms and no power to threaten Pacquiao. The fire in the belly was gone. He thought he would feast on Pacquiao and send him to the cleaners. He was sadly mistaken. Pacquiao showed up with his heart on his sleeve, displaying the stuff he's made of. In contrast, De la Hoya was a poor excuse for an actor disguised as a fighter, hoping the klieg lights would save him from tragedy.
* * *
Pacquiao demysti-fied De la Hoya and exposed him as nothing more than a fraud. Hiring Beristain and Dundee was a cheap trick made at the expense of Hall of Famers. De la Hoya probably never had in mind to listen to them because in his history as a boxer, he's just been too egotistic to bow down to anyone. That's why De la Hoya has collected over seven trainers in his career while Pacquiao has stuck to Roach exclusively since breaking into the US market in 2001. That's why when De la Hoya loses, he blames his trainer and never himself.
This isn't to say that De la Hoya wasn't once a great fighter because he certainly was. But when he lost the hunger to fight, he also lost his will to win. De la Hoya might have trained well and hard for Pacquiao but inside the ring, where the real test is, he just wasn't the same anymore.
Pacquiao had no intention to disgrace De la Hoya. In the end, it was De la Hoya who disgraced himself.
How About The Coming Match Between Hatton and Pacquiao?
* Eavesdropping
* Snooping
* Interception
* Modification Attacks
* Repudiation Attacks
* Denial-of-service (DoS) Attacks
* Distributed denial-of-service (DDoS) Attacks
* Back door Attacks
* Spoofing Attacks
* Man-in-the-Middle Attacks
*
* Password Guessing Attacks
Eavesdropping - This is the process of listening in or overhearing parts of a conversation. It also includes attackers listening in on your network traffic. Its generally a passive attack, for example, a coworker may overhear your dinner plans because your speaker phone is set too loud. The opportunity to overhear a conversation is coupled with the carelessness of the parties in the conversation.
Snooping - This is when someone looks through your files in the hopes of finding something interesting whether it is electronic or on paper. In the case of physical snooping people might inspect your dumpster, recycling bins, or even your file cabinets; they can look under your keyboard for post-It-notes, or look for scraps of paper tracked to your bulletin board. Computer snooping on the other hand, involves someone searching through your electronic files trying to find something interesting.
Interception - This can be either an active or passive process. In a networked environment, a passive interception might involve someone who routinely monitors network traffic. Active interception might include putting a
Modification Attacks - This involves the deletion, insertion, or alteration of information in an unauthorized manner that is intended to appear genuine to the user. These attacks can be very hard to detect. The motivation of this type of attack may be to plant information, change grades in a class, alter credit card records, or something similar. Website defacements are a common form of modification attacks.
Repudiation Attacks - This makes data or information to appear to be invalid or misleading (Which can even be worse). For example, someone might access your email
Denial-of-service Attacks - They prevent access to resources by users by users authorized to use those resources. An attacker may try to bring down an e-commerce website to prevent or deny usage by legitimate customers. DoS attacks are common on the internet, where they have hit large companies such as Amazon, Microsoft, and AT&T. These these attacks are often widely publicized in the media. Several types of attacks can occur in this category. These attacks can deny access to information, applications, systems, or communications. A DoS attack on a system crashes the operation system (a simple reboot may restore the server to normal operation). A common DoS attack is to open as many TCP sessions as possible; This type of attack is called TCP SYN flood DoS attack. Two of the most common are the
Distributed Denial-of-service Attacks - This is similar to a DoS attack. This type of attack amplifies the concepts of DoS attacks by using multiple
Back door Attacks - This can have two different meanings, the original term back door referred to troubleshooting and developer hooks into systems. During the development of a complicated operating system or application, programmers add back doors or maintenance hooks. These back doors allow them to examine operations inside the code while the program is running. The second type of back door refers to gaining access to a network and inserting a program or utility that creates an entrance for an attacker. The program may allow a certain user to log in without a password or gain administrative privileges. A number of tools exist to create a back door attack such as, Back Orifice (Which has been updated to work with windows server 2003 as well as erlier versions), Subseven,NetBus, and NetDevil. There are many more. Fortunately, most anti-virus software will recognize these attacks.
Spoofing Attacks - This is an attempt by someone or something to masquerade as someone else. This type of attack is usually considered as an access attack. The most popular spoofing attacks today are IP spoofing and DNS spoofing. The goal of IP spoofing is to make the data look like it came from a trusted host when it really didn't. With DNS spoofing, The DNS server is given information about a name server that it thinks is legitimate when it isn't. This can send users to a website other than the one they wanted to go to.
Man-in-the-Middle Attacks - This can be fairly sophisticated, This type of attack is also an access attack, but it can be used as the starting point of a modification attack. This involves placing a piece of software between a server and the user that neither the server administrators nor the user are aware of. This software intercepts data and then send the information to the server as if nothing is wrong. The server responds back to the software, thinking it's communicating with the legitimate client. The attacking software continues sending information to the server and so forth.
Replay Attacks - These are becoming quite common, This occur when information is captured over a network. Replay attacks are used for access or modification attacks. In a distributed environment, logon and password information is sent over the network between the client and the authentication system. The attacker can capture this information and replay it later. This can also occur security certificates from systems such as kerberos: The attacker resubmits the certificate, hoping to be validated by the authentication system, and circumvent any time sensitivity.
Password Guessing Attacks - This occur when an account is attacked repeatedly. This is accomplished by sending possible passwords to an account in a systematic manner. These attacks are initially carried out to gain passwords for an access or modification attack. There are two types of password guessing attacks:
Brute-force attack: Attempt to guess a password until a successful guess occurs. This occurs over a long period. To make passwords more difficult to guess, they should be longer than two or three characters (Six should be the bare minimum), be complex and have password lockout policies.
- Dictionary attack: This uses a dictionary of common words to attempt to find the users password. Dictionary attacks can be automated, and several tools exist in the public domain to execute them.
Well, there you have it, the only way basically to prevent these types of attacks is to get a good firewall, anti-virus software, and a good Intrusion Detection System (IDS). Tell your firewall to drop ICMP packets, that will prevent ICMP flooding.
If you run a windows computer you’ll know like many others than after a while your system will in doubt start running slow. Most people will restart their computer to remove and idle processes. But if there’s a simpler way, why restart every time windows decides it doesn’t like you today?
1. Right click on an empty spot on your desktop and select New - Shortcut.
2. Type %windir%\system32\rundll32.exe advapi32.dll,ProcessIdleTasks in the box.
3. Click Next.
4. Give your shortcut a nice name like “Clear Memory”.
5. Click Finish and you’re done.
Now whenever your computer starts running slow click this shortcut to clear out your memory and get your computer running at a normal pace again
Thanks
Google SketchUp Pro 7 is a suite of powerful features and applications for streamlining your professional 3D workflow.
All the intuitive modeling, visualization and collaboration features of SketchUp 7, plus exporters for a long list of 2D and 3D vector file formats. Also, generate tabular reports based on the entities in your models.
Link your models to multi-page 2D presentation documents, add images, text and graphics, and share your designs as high-resolution prints, digital exports and onscreen slide shows.
Teach components to animate and scale like they do in real life. Add custom attributes that extend your models' usefulness. Build configurable components that are easy for everyone to use.
Guarantee that your drawings will look totally unique by creating your own Styles. Base them on strokes you make with pens, pencils, markers or anything else.
http://rapidshare.com/files/197310923/GoogleSketchUpPro7.0.8657.rar
http://rapidshare.com/files/194584631/Keygen_GoogleSketchUpPro7.0.8657.rar
Description
Firefox Optimizers for Mozilla Firefox v1.x / 2.x / 3.x was developed for an easy and fast optimization of your browsing experience with Firefox. It is based on a collection of popular and well working optimization settings used and tested by the experts. Usually you have to optimize Firefox manually, which can be time consuming and difficult for the novice user. FireTune helps you here - it includes all the performance optimizations. The only thing you must do is: make your selection. Firefox Optimizers does the work for you.Details on what exactly Optimizers does can be found in the help file.
In most of all cases you'll notice an improved browsing speed after optimizing Firefox.
System Requirements
Mozilla Firefox v1.x / 2.x / 3.x
Windows 98, Me, 2000, Windows 2003, Windows XP SP1 (or higher), Windows Vista
the regular hardware requirements for your operating system
3 MB free space on your harddrive
* .NET Framework 2.0
1. Type about:config in the address bar and then press Enter.
2. In the filter search bar type network.http.pipelining. Be sure the value field is set true,if not double-click to set true. HTTP is the application-layer protocol that most web pages are transferred with. In HTTP 1.1, multiple requests can be sent before any responses are received. This is known as pipelining. Pipelining reduces page loading times, but not all servers support it.
3. Go back to the filter search bar and type network.http.pipelining.maxrequests. Double-click this option and set its value to 8.
4. In the filter search bar and type network.http.proxy.pipelining. Once opened doubleclick on it and set it to true.
5. In IPv6-capable DNS servers, an IPv4 address may be returned when an IPv6 address is requested. It is possible for Mozilla to recover from this misinformation, but a significant delay is introduced.
Type network.dns.disableIPv6 in the filter search bar and set this option to true by double clicking on it.
6. CONTENT INTERRUPT PARSING
This preference controls if the application will interrupt parsing a page to respond to UI events. It does not exist by default. Right-click (Apple users ctrl-click) anywhere in the about:config window, select New and then Boolean from the pop-up menu. Then:
A. Enter content.interrupt.parsing in the New boolean value pop-up window and click OK
B. When prompted to choose the value for the new boolean, select true and click OK.
7. Rather than wait until a page has completely downloaded to display it to the user, Mozilla applications will regularly render what has been received to that point. This option controls the maximum amount of time the application will be unresponsive while rendering pages. Right-click (Apple users ctrl-click) anywhere in the about:config window, select New and then Integer from the pop-up menu.
A. Enter content.max.tokenizing.time in the New integer value pop-up window and click OK
B. You will be prompted to enter a value. Enter 2250000 and click OK.
8. CONTENT NOTIFY INTERVAL
This option sets the minimum amount of time to wait between reflows. Right-click (Apple users ctrl-click) anywhere in the about:config window, select New and then Integer from the pop-up menu.
A. Type content.notify.interval in the New integer value pop-up window and click OK.
B. You will be prompted to enter a value. Enter 750000 and click OK.
9. CONTENT NOTIFY ONTIMER
A. This option sets if to reflow pages at an interval any higher than that specified by content.notify.interval. Right-click (Apple users ctrl-click) anywhere in the about:config window and select New and then Boolean from the pop-up menu.
B. Type content.notify.ontimer in the New boolean value pop-up window and click OK.
C. You will be prompted to choose the value for the new boolean. Select true and click OK.
10. Notify Backoffcount
This option controls the maximum number of times the content will do timer-based reflows. After this number has been reached, the page will only reflow once it is finished downloading. Right-click (Apple users ctrl-click) anywhere in the about:config window and select New and then Integer from the pop-up menu.
A. Enter content.notify.backoffcount in the New integer value pop-up window and click OK.
B. You will be prompted to enter a value. Enter 5 and click OK.
11. CONTENT SWITCH THRESHOLD
You can interact with a loading page when content.interrupt.parsing is set to true. When a page is loading, the application has two modes: a high frequency interrupt mode and a low frequency interrupt mode. The first one interrupts the parser more frequently to allow for greater UI responsiveness during page load.
The low frequency interrupt mode interrupts the parser less frequently to allow for quicker page load. The application enters high frequency interrupt mode when you move the mouse or type on the keyboard and switch back to low frequency mode when you had no activity for a certain amount of time. This preference controls that amount of time. Right-click (Apple users ctrl-click) anywhere in the about:config window and select New and then Integer from the pop-up menu.
A. Enter content.switch.threshold in the New integer value pop-up window and click OK.
B. You will be prompted to enter a value. Enter 750000 and click OK.
12. NGLAYOUT INITIALPAINT DELAY
Mozilla applications render web pages incrementally, they display what’s been received
of a page before the entire page has been downloaded. Since the start of a web page
normally doesn’t have much useful information to display, Mozilla applications will wait
a short interval before first rendering a page. This preference controls that interval. Rightclick (Apple users ctrl-click) anywhere in the about:config window and select New and then Integer from the pop-up menu.
A. Enter nglayout.initialpaint.delay in the New integer value pop-up window and click OK.
B. You will be prompted to enter a value. Enter 0 and click OK.