Selasa, 13 Desember 2011

Top 10 films of all time great Hijacked


1. ‘Avatar’


According to research published by TorrentFreak, the pirated movie of all time director James Cameron "Avatar" is. The film was downloaded 21millions times since it was published in 2009.

2. ‘The Dark Knight’


A history of the Batman with Christian Bale, "The Dark Knight 'came in second place on the most downloaded movie of all time. Christopher Nolan's film has been downloaded 19 million times.

3. ‘Transformers’


The first three are the movie 'Transformers' Michael Bay. The film, starring Shia LaBeouf and Megan Fox sexy actress has downloaded over 19 million times. The presence of Fox in the film is believed to be one of the causes for the high rate of downloading.

4. ‘Inception’


It looks like director Christopher Nolan has become a magnet for illegal downloaders. Evidence, Nola film entitled "Inception" was the fourth most downloaded movies on space illegally. The film, with some of the best artists in the world, such as Leonardo DiCaprio, Ken Watanabe, Joseph Gordon-Levitt, Marion Cotillard and downloaded 18 million times.

5. ‘The Hangover’


Comedy movie "The Hangover" has become the fifth film of the most frequently downloaded illegally. Films with boxer Mike Tyson as one of the cameo has been downloaded 17 million times. Movie "The Hangover" with the world's people magazine sexiest man, Bradley Cooper, Ed Helms and Zach Galifianakis actor.

6. ‘Star Trek’


Since it was published in 2009, the film "Star Trek" 16 million have been downloaded so many times. The film received positive response from film critics. The film received four Academy Award nominations in the race for the Oscar-82.

7. ‘Kick-Ass’


The research shows that the movie Kick-Ass "illegally downloaded 15 million times. The movie" Kick-Ass "from a comic book titled the same done.

8. ‘The Departed’


Leonardo DiCaprio film more in the top 10 most pirated movie "The Departed". The film is also starring Matt Damon, Jack Nicholson, Mark Wahlberg and Martin Sheen downloaded 14 million times.

9. ‘The Incredible Hulk’


Movie "The Incredible Hulk" was ranked as the ninth illegally downloaded movies. Since its publication in 2008, the movie has downloaded 14 million times.

10. ‘Pirates of the Caribbean : At World's End’


Compared to the first series and the second sequel, the movie "Pirates of the Caribbean: At World's End" appear more attractive to illegal downloaders, the movie with actor Johnny Depp has been downloaded 14 million since. He was released in 2007.




Senin, 12 Desember 2011

Top 5 Haunted World

1.Tuen Mun Road – Hong Kong



He is considered one of the deadliest roads in the world, the streets of Tuen Mun many sacrifices over the years. This way is the way The largest and one of the most used roads in Hong Kong, making it almost impossible to avoid. Tuen Mun Road, from those who were killed on the road going to say that they are in the bloodstream, causing the driver turned off the road and in a serious or fatal accident. The victim then come back to track and traffic accidents.


2.A229 – Inggris

The A229 Kent, Sussex has two famous ghosts. The first is a woman named Judith Langham, who was on the road on their wedding day in 1965 killed. He appeared on the road in her white dress and then disappear. The second spirit is a hike that goes into the car and talk about everything. Once the driver reaches a certain point, he disappeared.

3.Bloodspoint Road – Illinois, Amerika Serikat


Blood Point only one of several ways of Boone County, Illinois, which can stand the hair on the neck cut. This street has witnessed a murder, suicide and even a child who is hit by a train. Some children died when a bus skidded on a bridge in this area. It is also said, a witch, the children stuck in an old farmhouse, and although the building no longer exists, some people report seeing ghosts of trees.

4.M6 – Inggris


M6 has in the UK in a form or manner as it was for 2000 years it is not surprising that over the years, a dirty legend connected with him from time to time. The road was used by soldiers during the Roman occupation of Britain and the Roman soldiers are still visible along the road and go through the traffic. There is also a ghost truck that goes against the flow of traffic and the spirit of a woman on the side of the road.

6.A75 Kinmont – Skotlandia


The nickname "Ghost Road", this street has become in the south-west of Scotland
where hundreds of unexplained sightings. Many drivers have reported a few passes in front of her car looks, the birds flew into the glass in front of them, then he disappeared, the observations of people walking in the direction of the vehicle and other scary creatures (including goats, wild dogs and cats), which appears out of nowhere.


10 dolls and mysterious world of Ceram

Burnt Baby Doll


Butchered Baby Dolly


Chucky Doll


Fancy a Cuddle


Discarded Doll


Doll Abuse


Helma German Doll


Killer Dolly


Scary Mary


Trilogy of Terror Doll


While hackers are now easier

Once a hacker has its own program to create pirate. Now a lot of tools.



Symantec Corp.. announced a new report entitled Report on the attack tools and malicious websites. The report notes that the device to find and use cyber attacks more easily. 
Devices, is to make this attack increasingly in demand by criminals who do not have traditional technical know-how to combat computer crime. With this device, they can be independent, organized and gain more profit.
"In the past, hackers have created a separate program from the first attack. This complex process is that the number of attackers that can only be a small group of highly skilled cyber-criminals limits," said Stephen Trilling, senior vice president, Symantec Security Technology and Response. How Secure Computing, 8 February 2011, quoted Trilling said, the attack toolkit that even beginners can easily start a cyber-attack."We believe that increasing the activities of the cyber-crime," said Trilling. "As a result, the chances of ordinary people who have access to the Internet, become a victim to be bigger," he said. As cyber-attacks are always more profitable to the popularity of the tool kit makes the attack is also increased dramatically, and disk manufacturer to manufacturer kit build more powerful and sophisticated attacks. "Kit is the current attacks are often sold with a subscription model with regular updates, as well as components that extend the capabilities of the kit and support services," said Trilling. "Cyber ​​criminals are systematically installation services advertising, rental prevent unrestricted access to all of the console, and with a commercial anti-piracy tools to attackers using the tool without having to pay for it" all, he said. According to data gathered by Symantec, a maker of tool-box is the most common attacks MPack, Neosploit, Zeus, Nukesploit P4ck and Phoenix.

Symantec: 80% of the world's spam e-mail


If the global economy, the BRIC acronym meaning mrupakan Brazil, Russia, India and China knows. Four countries are also a leader in the growing market. The same was true for the trend growth of spam. A report Spam & Phishing last report, the four states that there is also a market leader.
"We know the BRIC is a leading provider of development and testifies to the great economic growth," said a spokesman for Symantec, quoted by Info Security Magazine, 28 March, 2011. "The country will also show rapid growth of broadband Internet," he said.
The growth of broadband usage makes these countries vulnerable to a botnet, a network of infected computers.
"Of course, determined during the month of February, Symantec, that has an average daily volume of spam rose to 8.7 percent," said a spokesman for Symantec. "The increase in average daily e-mail was the first place since August 2010," he said.
A total of Symantec found spam accounted for 80.65 percent of all e-mails in February. Compare with the previous month, reaching 79.55 percent. However, this trend has been estimated earlier. Besides increasing the amount of spam, months ago there was also an increase in phishing, only reached 38.56 percent. "The rise of phishing is particularly true in areas such as the use of automated tools and unique areas," said Symantec. For more information, the number of phishing site (fraud) with the toolkit automatically creates around 50.33 percent. Phishing website with unique URLs increased 33.73 percent. The malicious website uses the IP-domain (figures) fell by 47.22 percent. Because the report also showed that there was a significant spike in the amount of phishing sites to use the language outside of the United Kingdom. The figure is 76.51 percent. Among the non-phishing sites in English, the website in Portuguese, French and Spanish is the most.

The transition to IPv6 has cyber-threats

Google, Facebook, Yahoo, YouTube, Microsoft Bing and others have begun to move to IPv6.



8th June 2011 is a historic day for the Internet world. That day began a series of major global companies Internet service to the old standard Internet addressing (IPv4) to IPv6, the next generation.


IPv6 City of the World Day, 9 June 2011, companies like Google, Facebook, Yahoo, YouTube, Meebo, Plurk, Bing, a vast virtual world, who are willing to deliver their services over IPv6. There are a total of 434 institutions that conduct the tests for 24 hours.


After Darric Hor, CEO of Symantec is to motivate PT Indonesia in his written statement, one of the goals of the experience of transition to other organizations in the industry.


As we know, have Internet service provider (ISP) to prepare computer hardware manufacturer, the manufacturer of the operating system and Web companies for IPv6 services. This ensures a successful transition from IPv4 addresses that have been used since 1983, has run around 2012.


As an example, using the old IP address (IPv4), it can not 4,294,967,296 IP addresses that can be used anywhere in the world. If IPv6 (implemented as of 1999) offer 340,282,366,920,938,463,463,374,607,431,768,211,456 IP address.


"The problem is, the transition from IPv4 to IPv6 is a huge opportunity for manufacturers of malware and other cyber-criminals is vulnerable," said Darric. "The introduction of IPv6 is also possibly to other problems," he said.


Firewall software and hardware, said Darric can participate if they fail to recognize the situation and come to check IPv6 traffic. "During the transition to IPv6 protocol, we are working with a situation where we need to create a new threat that is not currently facing learning look real," he said.


To this end consult each Darric offenders and users in the Internet industry to always update their security applications, including Firewall, to ensure that the threat will be present to diminmalisir.

Dance performances in Madrid Dairakudakan

Dance groups from Japan, Dairakudakan, bringing the work of the choreographer Mukai Kumotaro directory with the name "Paradise in the pot, the Odyssey 2001" in Madrid, Spain, 9-11 November 2011. Meanwhile Dairakudakan as a group, often the traditional Japanese dance, Butoh, known on international platforms.








Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | GreenGeeks Review