Vampires and Dracula



Vampires and Dracula:
You must have heard about Vampires and Dracula. You must have also seen their movies or read books about them. Are they myth or reality? Is there anything such as a Vampire or Dracula? Those of you who are superstitious might say they are real, but those of you who are not will say they are myth. Let's read how they were conceived, what they are afraid of and even how to become one.
How they started?
In 1897, an Irish writer, Bram Stoker published a book. It was about a Count who lived in a large abandoned castle and sucked people's blood by biting them with his long canine teeth. The book was called Count Dracula. This book was the beginning of a legend, Dracula. Authors around the world started to write stories about this blood-sucking creature. It is said that the writer, Bram Stoker got the idea from a forgotten creature, called Vlad the Impaler or Vlad Dracula.
About the Vampire:
Vlad the Impaler
The word Vampire came into the English language in 1732, through an English translation of a German report of a much-publicized vampire staking in Serbia. The fear of vampires was so widely spread that even some government officials went out hunting and placing stakes on vampires. This scare was responsible for England's current vampire myths. However, vampire myths go back thousands of years and occur in almost every culture around the world.

Lengends portray many varieties of vamLamia, from glowing red-eyed monsters with green or pink hair as in China, to the Greek Lamia, which has the upper body of a woman and the lower body of a winged serpent. Japan belPenanggalangpire foxes and Malaysia has its own version with trailing entrails known as Penanggalang.

The most common legend as portrayed in films and on television is of a blood drinking man who has the ability to change into a bat at will, wears a black cape with a suit underneath, has black jelled back hair and not to forget, has fangs in his mouth. He preys on his human victims at night, biting and sucking the blood from blood vessels in the side of the neck. He is an undead creature who cannot stand the sunlight, and usually sleeps in a coffin in the basement of an old mansion on a castle.
A Vampire Story
The first case took placKisilova mid 1700Rahmeter Plogojowitz was a Serbian peasant who lived in the village of Kisilova, in the Rahm district. He died at the age of 62 and lay in his grave for 10 weeks when villagers reported seeing him at night. They claimed that he came to their beds at night and attacked them. Nine people died within a week. His wife then claimed to have seen him. The woman was extremely scarePlogojowitz's left the village


It was then decided to dig up Plogojowitz's body to dispose of him and odourhis night-time attacks. Odecompsition was dug up, people noticed that the body was odour-free with little, if no decompsition at all. The only thing that was decomposed was the nose and the skin- but the strange thing was that his skin was regrowing and new skin could be seen where the old had fallen away! The same was for his nails. There was also blood flowing from his mouth. They quickly destroyed the Vampires' body by driving a wooden stake through his heart, at which point it was said that fresh blood gushed from his body. There is also some talk of the body containing some other "wild signs", but it's not clear what these were. The body was then burnt and luckily there were no more attacks on the villagers.
How to ward off or kill a Vampire
Garlic- will ward off
Wooden skile through the heart- will kill
Decapitation of the head- will kil
Sunlight/fire- will burn and kill
Nailing clothes to coffin walls- will ward off
Falling snow- will burn and kill
Rain or running water (rivers)- will burn and kill.
A vampire cannot and will not drink the blood of the dead if he knows what's good for him (slightly deadly too).
How to become a Vampire
A cat jumping over the corpse turns the dead body into a vampire.
To be bitten by a vampire- will turn you into one (of course) .
Having red hair.
Wild dogs jumping over a dead body.

read more...

Laptops to buy in 2011

Laptops to buy in 2011




10.Dell Inspiron 17

Laptops to buy in 2011
If you are looking to have one of the most powerful laptops in the world, the Dell Inspiron 17 is the best thing for you. In addition you will be able to choose among 7 colors, which will make it looking a very fresh compared to the other laptops that are available on the market. This laptop has full size keyboard and also a separated num pad. In addition, it weights 8.7 pounds, which makes it one of the lightest available on the market. The lowest price for which you will be able to buy that laptop is $449.


9.Sony Vaio BZ Series

Laptops to buy in 2011
That is one of the best solidly built laptops that you can buy. It has really good keyboard and also a fingerprint scanner. However, that laptop has a low resolution screen, which is one of the major disadvantages of it and also it comes for a very high price, which makes it not suitable for people, who have limited finance. The lowest price where you will be able to buy that laptop is $969, which compared to all the other laptops that are available on the market makes the Sony Vaio BZ series not suitable at all.
8.HP Compaq 6535b
Laptops to buy in 2011
The HP Compaq 6535b is suitable for all the people, who want slim and light laptop for their everyday use. Furthermore, you will be able to get a lot of power, because that laptop have really powerful processor and also comes with a really large hard drive. In addition, the price of that laptop is really affordable which means that the lowest price you will find in the internet is $699.
7.HP ProBook 5310m
Laptops to buy in 2011
This laptop has one of the most impressive designs you will ever see and I can assure you that you will experience love at first sight. It is light and also according to HP the battery lasts for 6-7 hours. In addition it has really good keyboard, which is well placed and well arranged, so you will have great time using it. However the mouse has really small buttons that you will find hard for hitting, but you can always buy a new mouse. If you buy HP ProBook 5310m, you will be impressed for sure.
6.Gateway NV7802u
Laptops to buy in 2011
Like all the products that are available on the market, the Gateway NV7802u have good and negative features and it is up to you to choose if you will be buying it. It offers very good performance and long battery life. In addition, the price is very affordable and is $518. However, have in mind that it doesn't have Bluetooth and very poor angles of view. In my opinion you will get very useful laptop for reasonably low price.
5.Apple MacBook 13-inch
Laptops to buy in 2011
The Apple MacBook 13-inch is offering a very good performance and functionality, but all of that comes for a reasonable price, which is $1000. The Apple MacBook 13-inch have powerful processor and stylish design, which you will surely be impressed. It supports MacOS, Windows and Linux, so you will not have to use Apple products only, like with all the predecessors of that laptop. It is a very good solution if you are looking for reliable and fast laptop.
4.Dell Inspiron 15
Laptops to buy in 2011
The Dell Inspiron 15 is a mixture of very stylish design and also from a very good functionality. It comes in 7-8 color schemes and also the prices that you will have to pay for them are very affordable – from $40 to $80. In most of the cases you will be able to buy that laptop with Core 2 Duo T600 at 2.1Ghz, 3 GB RAM and also it has 320 GB hard disk. That combination gives a score of 846 on 3DMark, which makes the performance of that laptop really impressive.
3.Sony VAIO SR series
Laptops to buy in 2011
Sony is well known for presenting some of the highest quality consumer electronic products and the Sony VAIO SR series is not an exception, because you will get very good performance and stylish design. However, have in mind that all this comes for a reasonable price of $950.
2.HP Compaq 6730b
Laptops to buy in 2011
That laptop is a combination of exceptional performance, design and affordability. If you are looking for a reliable laptop, that is the best solution for you. The base laptop is very powerful, but have in mind that all the upgrades can rise the price a lot quickly, so use the website of HP to calculate the price of the laptop after a couple of improvements.

1.Dell Inspiron 14
Laptops to buy in 2011
The Dell Inspiron 14 is one of the best solutions for all the people, who are looking for a small, but powerful laptop. The basic configuration of the Dell Inspiron 14 comes with great features – Intel Core 2 Duo T600 processor, 4 GB RAM and also Windows 7 64 bit OS. However, most of the customers prefer to make upgrades on the basic configuration, but have in mind that this will increase the price. The cost of the basic configuration of the Dell Inspiron 14 is $604.
read more...

A Boy with Seven Limbs

A Boy with Seven Limbs
These photos are of eight year old Kumar Paswan from a remote Indian village who has an astonishing medical condition. He was born with a parasitic twin. The twin stopped developing in the womb before it separated fully from Kumar and has left him with seven limbs. He has launched an appeal for the thousands of pounds needed for an operation to remove the parasite.










read more...

Amazing Infinite Photos Art

Amazing Infinite Photos Art

Amazing creative art on photos. Photos in photos is the most popular art on internet. Photoshoped Photos.



Have you ever been in a house that had a bathroom where all the walls were mirrors?  Man I love those.
You get to see yourself in like 1000 positions.  What’s coolest is when you’re angled so that it looks
like there is an infinite amount of you.  You know, where it looks like it goes on forever.
With the right angles and equipment you can easily create this effect through photography.  Though
I’m not quite sure of the literal term for these kinds of photos I just assume call it
“infinite photography.”  However if you search that phrase none of these pictures will come up in
the results.
In any event, I’m glad I was able to find 20 pictures that I would deem “infinite.”
Enjoy after the jump

















read more...

Be Careful!

Be careful otherwise It can be very dangerous like this.


read more...

Wikileaks : About and History

Wikileaks is an international new media non-profit organisation that publishes submissions of private, secret, and classified media from anonymous news sources and news leaks. Its website, launched in 2006, is run by The Sunshine Press. Within a year of its launch, the site claimed its database had grown to more than 1.2 million documents.  The organisation has described itself as having been founded by Chinese dissidents, as well as journalists, mathematicians, and start-up company technologists from the United States, Taiwan, Europe, Australia, and South Africa.  Julian Assange, an Australian Internet activist, is generally described as its director.

Wikileaks has received praise as well as criticism. The organization won a number of awards, including The Economist's 2008 New Media Award. In June 2009, Wikileaks and Julian Assange won Amnesty International's UK Media Award, in the category "New Media", for the 2008 publication of "Kenya: The Cry of Blood – Extra Judicial Killings and Disappearances",  a report by the Kenya National Commission on Human Rights about police killings in Kenya.  In May 2010, New York City's Daily News listed Wikileaks as first in a ranking of "websites that could totally change the news".  Julian Assange was named the Readers' Choice for TIME's Person of the Year for 2010.  Several U.S. government officials have criticized Wikileaks for exposing state secrets, harming national security, and compromising international diplomacy.  Human rights organizations such as Amnesty International criticized Wikileaks for not adequately redacting the names of civilians working with the U.S. military.  Some journalists have criticized the lack of editorial discretion when releasing thousands of documents at once and without sufficient analysis.  Negative public reactions in the United States have characterized the organization as irresponsible, immoral, and illegal.

In April 2010, Wikileaks posted video from a 2007 incident in which Iraqi civilians and journalists were killed by US forces, on a website called Collateral Murder. In July of the same year, Wikileaksreleased Afghan War Diary, a compilation of more than 76,900 documents about the War in Afghanistan not previously available for public review.  In October 2010, the group released a package of almost 400,000 documents called the Iraq War Logs in coordination with major commercial media organisations. In November 2010, Wikileaks began releasing U.S. State department diplomatic cables.

Wikileaks was originally launched as a user-editable wiki site, but has progressively moved towards a more traditional publication model, and no longer accepts either user comments or edits. The site is available on multiple servers and different domain names following a number of denial-of-service attacks and its severance from different Domain Name System (DNS) providers.

History: The Wikileaks.org domain name was registered on 4 October 2006.  The website was unveiled, and published its first document in December 2006. The site claims to have been "founded by Chinese dissidents, journalists, mathematicians and start-up company technologists, from the US, Taiwan, Europe, Australia and South Africa".


The creators of Wikileaks have not been formally identified. It has been represented in public since January 2007 by Julian Assange and others. Assange describes himself as a member ofWikileaks ' advisory board.  News reports in The Australian have called Assange the "founder ofWikileaks ". According to Wired magazine, a volunteer said that Assange described himself in a private conversation as "the heart and soul of this organisation, its founder, philosopher, spokesperson, original coder, organiser, financier, and all the rest".  As of June 2009[update], the site had over 1,200 registered volunteers  and listed an advisory board comprising Assange, Phillip Adams, Wang Dan, C. J. Hinke, Ben Laurie, Tashi Namgyal Khamsitsang, Xiao Qiang, Chico Whitaker and Wang Youcai.  Despite appearing on the list, when contacted by Mother Jones magazine in 2010, Khamsitsang said that while he received an e-mail from Wikileaks , he had never agreed to be an advisor.

Wikileaks states that its "primary interest is in exposing oppressive regimes in Asia, the former Soviet bloc, Sub-Saharan Africa and the Middle East, but we also expect to be of assistance to people of all regions who wish to reveal unethical behaviour in their governments and corporations."

In January 2007, the website stated that it had over 1.2 million leaked documents that it was preparing to publish.  An article in The New Yorker said:

One of the Wikileaks activists owned a server that was being used as a node for the Tor network. Millions of secret transmissions passed through it. The activist noticed that hackers from China were using the network to gather foreign governments’ information, and began to record this traffic. Only a small fraction has ever been posted on Wikileaks , but the initial tranche served as the site’s foundation, and Assange was able to say, "[w]e have received over one million documents from thirteen countries."

Assange responded to the suggestion that eavesdropping on Chinese hackers played a crucial part in the early days of Wikileaks by saying "the imputation is incorrect. The facts concern a 2006 investigation into Chinese espionage one of our contacts were involved in. Somewhere between none and handful of those documents were ever released on Wikileaks . Non-government targets of the Chinese espionage, such as Tibetan associations were informed (by us)". The group has subsequently released a number of other significant documents which have become front-page news items, ranging from documentation of equipment expenditures and holdings in the Afghanistan war to corruption in Kenya.

The organisation's stated goal is to ensure that whistleblowers and journalists are not jailed for emailing sensitive or classified documents, as happened to Chinese journalist Shi Tao, who was sentenced to 10 years in 2005 after publicising an email from Chinese officials about the anniversary of the Tiananmen Square massacre.

The project has drawn comparisons to Daniel Ellsberg's leaking of the Pentagon Papers in 1971. In the United States, the leaking of some documents may be legally protected. The U.S. Supreme Court has ruled that the Constitution guarantees anonymity, at least in the area of political discourse.  Author and journalist Whitley Strieber has spoken about the benefits of the Wikileaksproject, noting that "Leaking a government document can mean jail, but jail sentences for this can be fairly short. However, there are many places where it means long incarceration or even death, such as China and parts of Africa and the Middle East."

On 24 December 2009, Wikileaks announced that it was experiencing a shortage of funds  and suspended all access to its website except for a form to submit new material. Material that was previously published was no longer available, although some could still be accessed on unofficial mirrors. Wikileaks stated on its website that it would resume full operation once the operational costs were covered.  Wikileaks saw this as a kind of strike "to ensure that everyone who is involved stops normal work and actually spends time raising revenue".  While the organisation initially planned for funds to be secured by 6 January 2010,  it was not until 3 February 2010 thatWikileaks announced that its minimum fundraising goal had been achieved.

On 22 January 2010, PayPal suspended Wikileaks ' donation account and froze its assets.Wikileaks said that this had happened before, and was done for "no obvious reason".  The account was restored on 25 January 2010.  On 18 May 2010, Wikileaks announced that its website and archive were back up.

As of June 2010, Wikileaks was a finalist for a grant of more than half a million dollars from the John S. and James L. Knight Foundation, but did not make the cut.  Wikileaks commented, "Wikileaks was highest rated project in the Knight challenge, strongly recommended to the board but gets no funding. Go figure”. Wikileaks said that the Knight foundation announced the award to "'12 Grantees who will impact future of news' – but not Wikileaks " and questioned whether Knight foundation was "really looking for impact".  A spokesman of the Knight Foundation disputed parts of Wikileaks ' statement, saying "Wikileaks was not recommended by Knight staff to the board." However, he declined to say whether Wikileaks was the project rated highest by the Knight advisory panel, which consists of non-staffers, among them journalist Jennifer 8. Lee, who has done PR work for Wikileaks with the press and on social networking sites.

On 17 July, Jacob Appelbaum spoke on behalf of Wikileaks at the 2010 Hackers on Planet Earth conference in New York City, replacing Assange because of the presence of federal agents at the conference. He announced that the Wikileaks submission system was again up and running, after it had been temporarily suspended. Assange was a surprise speaker at a TED conference on 19 July 2010 in Oxford, and confirmed that the site had begun accepting submissions again.

Upon returning to the US from the Netherlands, on 29 July, Appelbaum was detained for three hours at the airport by US agents, according to anonymous sources. The sources told Cnet that Appelbaum's bag was searched, receipts from his bag were photocopied, his laptop was inspected, although in what manner was unclear. Appelbaum reportedly refused to answer questions without a lawyer present, and was not allowed to make a phone call. His three mobile phones were reportedly taken and not returned. On 31 July, he spoke at a Defcon conference and mentioned his phone being "seized". After speaking, he was approached by two FBI agents and questioned.

Assange is quoted as acknowledging that his practice of posting largely unfiltered classified information online could one day lead the Web site to have "blood on our hands."

In 2010, at least a dozen key supporters of Wikileaks have left the website.
read more...

How To Change Your IP in Less Than 1 Minute





1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok
You should now be at an MSDOS prompt screen.
4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"
You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.
8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again
You should now be back to the "Local Area Connection" screen.
15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address
With a little practice, you can easily get this process down to 15 seconds.
P.S:
This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back.

read more...

How to create icons to shutdown or restart on your desktop




WindowsXP has a program called SHUTDOWN.EXE which allows you to easily create icons to shutdown or restart your computer.


To create a shutdown shortcut on the desktop:
1. Right click on an open area of the desktop
2. Select New / Shortcut
3. Enter in "shutdown -s -t 00" - no quotes
4. Press the Next button
5. For the name, enter in anything you like. I just use shutdown. Click on the Finish button.
For a reboot, enter "shutdown -r -t 00"
Shutdown [{-l|-s|-r|-a}] [-f] [-m [\\ComputerName]] [-t xx] [-c "message"] [-d[p]x:yy]
Parameters
• -l - Logs off the current user, this is also the defualt. -m ComputerName takes precedence.
• -s - Shuts down the local computer.
• -r - Reboots after shutdown.
• -a - Aborts shutdown. Ignores other parameters, except -l and ComputerName. You can only use -a during the time-out period.
• -f - Forces running applications to close.
• -m [\\ComputerName] - Specifies the computer that you want to shut down.
• -t xx - Sets the timer for system shutdown in xx seconds. The default is 20 seconds.
• -c "message" - Specifies a message to be displayed in the Message area of the System Shutdown window. You can use a maximum of 127 characters. You must enclose the message in quotation marks.

read more...

How to Close All Windows Programs Quickly




How to Close All Windows Programs quickly?

A cool tip to minimize and maximize all your active windows programs. You can do all using your mouse, but if you want to do this with keyboard then simply press Windows key+M to minimize all active programs and later maximize it using Windows key+Shift+M.

If you want to minimize the all active windows programs one by one then use the shortcut by pressing Alt+Space+N keys and sequentially maximize the active windows programs using shortcut Alt+Space+X keys.


read more...

How to show your desktop quikly




You can show your desktop very quickly by minimizing all your active or inactive windows.
for this press key "windows key + D " and all of your windows will be minimized just in a second.
ANd you can again all your same windows in same condition by again pressing the same keys.


read more...

How to Turn Your Num Lock On Forever




You can set your Num Lock to stay on by default when you logon your system.


There are two different techniques to set Num Lock stay on by default.


If you can use Registry Editor correctly then Click on start button and type Regedt32.exe in Run command. Here Navigate to HKEY_USERS\.Default\Control Panel\Keyboard and change the value for InitialKeyboardIndicators from 0 to 2.


You can do same by configuring the script to change the NUM LOCK state. Click Start button and then open Notepad. Copy the giving code and paste in Notepad.


set WshShell = CreateObject("WScript.Shell")


WshShell.SendKeys "{NUMLOCK}"


Now save this file with name "num.vbs" must including the quotes. At the end copy this file to user startup folder. The path for this folder is Documents and Settings\All Users\Start Menu\Programs\Startup.


Now restart the computer. Num Lock should come on and stay on.

read more...

Newfolder.exe Manual Detection




Note: This manual removal process may be difficult and you run the risk of destroying your computer. We recommend that you use the to check for newfolder.exe.


Step 1: Use Windows File Search Tool to Find newfolder.exe Path
Go to Start > Search > All Files or Folders.
In the "All or part of the the file name" section, type in "newfolder.exe" file name(s).
To get better results, select "Look in: Local Hard Drives" or "Look in: My Computer" and then click "Search" button.
When Windows finishes your search, hover over the "In Folder" of "newfolder.exe",
highlight the file and copy/paste the path into the address bar. Save the file's path on your clipboard because
you'll need the file path to delete newfolder.exe in the following manual removal steps.
Step 2: Use Windows Task Manager to Remove newfolder.exe Processes
To open the Windows Task Manager, use the combination of CTRL+ALT+DEL or CTRL+SHIFT+ESC.
Click on the "Image Name" button to search for "newfolder.exe" process by name.
Select the "newfolder.exe" process and click on the "End Process" button to kill it.
Step 3: Detect and Delete Other newfolder.exe Files
To open the Windows Command Prompt, go to Start > Run > cmd and then press the "OK" button.
Type in "dir /A name_of_the_folder" (for example, C:\Spyware-folder), which will display the folder's content even the hidden files.
To change directory, type in "cd name_of_the_folder".
Once you have the file you're looking for type in del "name_of_the_file".
To delete a file in folder, type in "del name_of_the_file".
To delete the entire folder, type in "rmdir /S name_of_the_folder".
Select the "newfolder.exe" process and click on the "End Process" button to kill it.

read more...