This 6 Companies 'Tourism' Space

 (AP Photo/Kyodo News)

VIVAnews - a new era of commercial space flight began. Falcon 9 rocket from the company Space Exploration Technologies (SpaceX) has been launched from Florida, Friday, June 4th, 2010 ago.

SpaceX is not alone through the atmosphere for sending cargo and astronauts into space.

United States space agency, NASA has been known to ask for SpaceX and other companies, Virginia's Orbital Sciences to build unmanned rocket to send cargo to the international space station.

After that, SpaceX plans to modify the design of capsules Oriental Lockheed Martin as a space station lifeboat. Meanwhile, corporate giants Boeing also hopes to provide commercial crew of space flight.

Several smaller companies are also ambitious to build a space rocket to carry humans into the sky. Already there are six companies in the list.

1. Space Exploration Technologies (SpaceX)

Name of aircraft: Dragon and Falcon 9, can carry seven passengers or less - if coupled with the transport of cargo.

Founder of the company: Elon Musk, founder of the site money transfer, PayPal, wealth worth U.S. $ 100 million of wealth Musk and U.S. $ 20 million from outside investors.

Location: Hawthorne, California, began operations in 2002

Flights: Debut rocket launch in 2010. While the first flights will be conducted in 2011.

Two unmanned rocket that SpaceX, Falcon 9 and Dragon, originally intended to transport cargo to the international space station. Dragon will be ready to fly astronauts in watu three years after receiving a contract from NASA.

2. Orbital Sciences

Name of aircraft: 2 Cygnus and Taurus, Cygnus is designed as an unmanned aircraft.

Founder: David W. Thompson, Bruce W. Ferguson, Scott L. Webster, with a fortune: Approximately U.S. $ 1 billion

Location: Dulles, Virginia, began operations in 1982
Plan flight to outer space: 2011

Orbital Sciences has a contract worth U.S. $ 1.9 billion, with NASA to provide eight cargo delivery mission to the international space station using the Cygnus and Taurus 2. The launch is planned in 2011 from Wallops Island, Virginia.

Orbital has not announced plans to change the Cygnus became a manned aircraft.

3. Blue Origin

Name of aircraft: New Shepard, at least, can carry three astronauts
Founder: Jeff Bezoz, who is also the founder of Amazon.com
Location: Kent, Washington, began operations in 2004
Plan rocket launch, mid 2010

This company plans to close the meeting information about the launch of human spaceflight. However, Blue Origin has been testing prototype aircraft, the New Shepard in Texas.

Earlier this year, NASA chose the Blue Origin to develop an astronaut rescue system and build a prototype composite space capsule as part of a commercial crew launch the program.

4. Bigelow Aerospace

Name plane: Sundancer - can carry three crew and BA-330 - can carry six passengers.
Founder: Robert Bigelow, with a fortune of U.S. $ 180 million company from the wealth of Bigelow.
Location: North Las Vegas, Nevada, began operations in 1999
Rocket launch plan: 2015

Rocket Sundancer and BA-330 is expected to be a space station, not just a rocket. Company founder, Robert Bigelow dreaming develop the station on the Moon with inflatable technology. - Can be pumped.

Although Bigelow did not have a rocket or spacecraft to fly to the station, the company has worked with Boeing in the provision of crew members.

5. SpaceDev / Sierra Nevada Corp.

Name plane: Dream Chasers, can carry four passengers in suborbital flight, and 6 in orbital flight.

Founder of the company: Jim Benson (died), replaced by Fatih Ozmen
Location: Poway, California, began operations in 1997
Mengangkasa Plan: under development

California-based SpaceDev, wholly owned by Sierra Nevada Corp.. This company has developed the Dream Chaser - a plane that can carry crew and cargo into space, through the Atlas 5 rocket.

In February, the Sierra Nevada won projects worth U.S. $ 20 million from NASA to continue development Dream Chaser's.

6. Virgin Galactic

Name of aircraft: Spaceship Two, can carry six passengers and two pilots.

Owner: miyuner England, Sir Richard Branson, as well as providers of funds.

Location: London, England and Spaceport, New Mexico, began operations in 2004.

The flight plan: the end of 2011 or early 2012.

Virgin Galactic aircraft designed for a trip into space. Passengers who want to be a tourist is required to pay approximately U.S. $ 200 thousand per seat.

Meanwhile, aircraft carriers, WhiteKnightTwo - can be modified to launch small rockets or satellites for NASA or other users.

SpaceShipTwo is designed by aerospace engineer Burt Rutan. These are larger versions of SpaceShipOne, which flew successfully in suborbital flights in 2004.

Arriving Soon, Sun Storm Threat

Solar storms (BBC)

VIVAnews - solar activity would become more active and will result in negative effects for the Earth.

To prepare for the worst, a leading solar scientists gathered in Washington DC, USA Tuesday, June 8, 2010, to discuss the best ways to protect satellites and Earth's vital systems of the solar storm.

Solar storm occurs when some point the sun burst and spew splattered particles that can be damaging. This activity takes place in cycles of 11 years.

"The sun has got up from bed length. And in the next few years we will see solar activity in the higher level," said the head of NASA's Heliophysics Division, Richard Fisher, like the Christian Science Monitor published pages.

"At the same time, technological society is developing a new sensitivity to face the storm the sun."

Society in the 21st century rely heavily on high-tech systems in everyday life are susceptible to storm the sun.

GPS navigation, air travel, financial services and emergency radio communications could all die suddenly by solar activity.

Economic damage caused by solar storms are expected twenty times larger than Hurricane Katrina - as a warning, issued the National Academy of Sciences in a report in 2008.

Fortunately, a lot of damage can be overcome if it knows when a storm is coming. That is why understanding of solar weather and a better ability to provide early warning, it is very important.

Placing the satellite in 'safe mode' and release the transformer in order to protect the electronics from damaging power surge.

"Space weather forecast is still under development, but we're making rapid progress," said Thomas Bogdan, director of the National Oceanic and Atmospheric Administration (NOAA).

NASA and NOAA are working together to manage the fleet of satellites that monitor the sun and help to predict changes in solar.

A pair of spacecraft called Stereo (Solar Terrestrial Relations Observatory) is located on the opposite side of the sun, which can display a mix of 90 percent of the solar surface.

In addition, the SDO (Solar Dynamics Observatory which), which has just launched in February 2010, can produce new photo active part in the solar surface.

Also, an old satellite called the Advanced Composition Explorer (ACE), which was launched in 1997, still monitoring the sun.

"I believe we are on the verge of new era where space weather can affect our lives everyday like usual weather of the earth." Fisher said. "For us, this is very serious." (Hs)

Unfolding, Ever There Alien Life on Titan

  Illustration of the lake on the surface of Titan (NASA)

VIVAnews - Titan - Saturn's largest satellite has long been suspected to have signs of life.

And alleged that leads right. Scientists of the National Space Agency (NASA) to reveal the facts leading to the evidence that there is life on one of Saturn's largest moon.

NASA scientists believes it has found vital evidence which indicates that the possibility of primitive alien life on Titan ever.

As quoted from page Daily Telegraph, June 5, 2010, data explorer rocket NASA's Cassini analyze complex chemical conditions that exist on the surface of Titan - known as the only satellite or moon has an atmosphere dense.

Scientists discover, life beings Titan, whatever it is, breathing inhaling the atmosphere and get food from the surface of Titan.

Previously, astronomers claimed that the satellite or months is generally too cold to support life. Even so there can be no water flowing on its surface.

Studies on Titan is described in two separate papers.

The first report was published journal Icarus. Reveal that the hydrogen gas flowing through Titan's atmosphere vanished while on the surface. This shows that the aliens in the process of respiration or breathing.

Meanwhile, a report to the two in the Journal of Geophysical Research, concluded, chemicals on the surface of Titan minimal. Reduction of minerals consumed by the creature allegedly due to Titan.

Chris McKay, NASA astrobiologi Moffett Field, California, who led the study says, "we concluded that the hydrogen consumption occurred. Therefore, it is clear that the gas consumed in the Titan, the same as humans consume oxygen on Earth."

"If indeed this is a sign of life, it will be very interesting because it means that could prove the existence of these two life forms - which are different from life on Earth which sustained the water," said McKay.

Meanwhile, Professor John Zarnecki of the Open University, said the conclusion that there is life on Titan's getting close.

"We are convinced the chemicals that currently there is the composer's life. Just add the element of heat and warmth to begin that process.

"In the past four billion years, when the Sun turned into a red giant, Titan could be a paradise," he added.

However, scientists warn there may be other explanations for these findings.

How to Make Writing Reversed on Facebook

For Example:

http://exactelki.blogspot.com >>> ɯoɔ˙ʇodsƃolq˙ıʞlǝʇɔɐxǝ//:dʇʇɥ

How do I write upside down and backwards? JavaScript program to convert unicode characters and symbols that looked backward, to look like you have made the text upside down in the computer. Most of them came from a series of character "Latin Extended" and "International Phonetic Alphabet." Unfortunately there are no numbers backwards and upside down capital letters is not enough, so this tool supports only lowercase letters. This page uses the font "Arial Unicode MS" to reverse the text display.


To create a reverse way of writing this:

   1. Open the following website: http://www.upsidedowntext.com or this site http://www.sevenwires.com/play/UpsideDownLetters.html
   2. Or if you are able to directly open facebook: http://apps.facebook.com/upside_down_text
   3. Make a paper you would like to make reversed. Will automatically reverse these papers will appear below the text you typed.
   4. Copy and Paste the text upside down in your facebook or your blog.

Easy-Chord: Help Finding Chord with Winamp Plugins

Many ways that we can do to find the chords of a song. From finding himself or with the search for chords from track on the internet. Sometimes the songs that we like are not known or very difficult to find guitar chords. Or try his own taste never connect. Well, maybe this could be the solution for readers of all.

One way we can do is to use winamp plugin whose name is Easy Chords. Simply download first, then install (run) chord search facility can be done.


Following his detailed steps.

First of all make sure you have previously installed on the computer programs music player Winamp. Download Winamp.

Note: For those who already have winamp on the computer first before we check which version of winamp installed on the computer. How to run winamp and select the Help menu and highlight the About Winamp. In writing under winamp version Bismol. If the installed version of winamp 2 downwards you must first update to the latest version of winamp to be able to run the Easy-Chord. For those who are ok just to the next stage.

Now you download the program once it Easy-Chord here.
If it has been able to file off first if winamp is open. After closing open files intaller Easy-Chord.

If successful it will now run winampnya display showing the Easy-Chord.

select the song you want in the search chordnya, then click on START in his Easy-Chord. Alright stay wait until finished.


Hopefully useful!

KidZui: Web Browser for Kids

Never teach your pet to play the internet alone, let alone use a regular Web browser you use, it could be when you do not pay attention to your child innocently clicking on a favorite site that focused directly on adult sites. Of course as parents you avoid this happening right?

KidZui, is an alternative web browser that was built specifically for children. With this browser you do not have to worry anymore with their idle hands. KidZui, currently has a large database and offers more than 2.5 million games, Website, Photos and Videos, and of course that is accessible services your child have all been approved. What is clear, with Browser KidZui your child can easily be routed directly to the services that are targeted specifically for them.

Pet Society: Flowers Topiary + Win or Lose Cheat

Flowers Topiary by Yagami
Download this dat file
replace shopfood with the one you download via fiddler 

head to shop and buy all topiaries, and save

Win Or Lose by Sohexy
with this cheat you will You can buy for example 99 Pink Elegant Throne for 150 coins each and then sell for 999 coins each

download this zipped file
replace database.dat and shopgarden.dat with the ones in file via fiddler
go to shop graden buy boxes for 150 each
go home open all boxes
then save the game
close fiddler
load the game & sell for 999 each
Source: Pet Society News

Pet Society: Gaint Monster Plushie Coins Cheat By Nofil2000

Updated Gaint Monster Plushie Coins Cheat (old one is not working)
Steps:

1- download the following database and use fiddler to load database.dat and ShopGarden2106.dat http://www.mediafire.com/?zwznmnnlwe1

2- Go to the Garden and buy Giant Monster Plushie . it will be bought as mystery box for 500 coins

3- buy 99 Giant Monster Plushies

4- open all boxes

5- turn off Fiddler and reload the game

6- sell each Giant Monster Plushie for 999

7- total you get from 99 = 99x 499 =~50,000 Credits : nofil2000


More Info: Pet Society News

Action 'spies' Google sparked strong protests

(AP Photo/Jae C. Hong)

VIVAnews - Action Google's 'spying' Internet users through a vehicle whose task was to retrieve the data for Google Street View, invited strong protests from various parties.

German consumer protection minister, Ilse Aigner, protested strongly to the Google over privacy violations and urged the company to be more willing to work with the relevant authorities for the protection of consumer data.

"Based on the information we collect, Google has to penetrate into the private network, which is done by illegal ways," Aigner said, quoted from the AP. He also accused Google to withhold information requested by regulators in Germany.

About two weeks ago, Google said the German consumer protection authorities, through Google Street View vehicle, they just collect the data, a WiFi network name (SSID) and a WiFi router data unique address (MAC number).

At that time, Google said that Google's mobile Street View it does not collect information that is sent through the WiFi network (data payload).

However, through the company's newest blogs, Google claimed that by mistake, Google is also collecting data that milling on the WiFi network was not encrypted, which they watched.

"We are one of the samples had been collected the data payload from the open WiFi network (which is not protected by a password), although we also never use the data to Google's products," wrote Alan Eustace, Senior Vice President, Engineering Research Google .

Thus, the information in the form of pieces of mail or the internet pages of information that is accessed by people who use open WiFi networks through which the cars Google Street View, can be read by Google.


Google Street View is a Google service that provides photographs in various places taken by the Google camera car. This service has provoked controversy in Germany and in several countries, disputed by the defenders of privacy rights, because of fears they will be caught Google's cameras.

According to Eustace, this error occurs inadvertently. In the year 2006 a Google staff working on an experimental project to create a program that is able to take samples of all categories of data that is accessed via WiFi.

A year later, when Google started the project of data collection WiFi network SSID information and MAC address for Google Street View, it turns out that the program code is included into the new software project, so that the payload data that is accessed via an open WiFi, also collected by Google.

Aigner Minister requested that Google followed the rules to declare their activities to all consumer protection authorities around the world.

Until now, Google has collected about 600 GB for a single data from WiFi network in over 30 countries, including the US. Google's own team admitted to delete all the data.

"Google's technical team really worked hard to earn your trust, and we are very aware we are failing in this regard. We are very, very sorry for this error and decided to learn from mistakes that we do." In addition Google has also decided to stop the activities of its Street View vehicle. (Hs)

10 Tips for Safe on Twitter

TEMPO Interactive, Jakarta - The development of Twitter social networking in Indonesia so fast. A report from ReadWriteWeb.com states that at the beginning of 2010 Indonesia has been a Twitter user countries of the world's sixth largest.

Popularity was also followed by increased threats from hackers and cyber criminals. When Twitter account belongs to the President Barrack Obama could just hacked, let alone yours.

"Only in four years, the popularity of Twitter increases rapidly around the world. The increase was made Twitter as an easy target cyber criminals," said Ema Linaker, Global Head of Online Engagement AVG, a computer security company, in his press release.

One type of threat is quite popular these days is a fake phishing site alias. Performers usually rip off the victims account and use that account to send a private message or Direct Message (DM) to the follower of these accounts.

DM that will contain links that will lead users to a fake site. After that, theft of information and data began.

Linaker offers ten tips for users of Twitter to keep it safe:

* Limit your talk

Users often feel it's easy mencericit about their location and activities. The comments provided in response to light over time can be used to determine the daily schedule of activities and plans for that user. Criminals ready to make it as following the victim.

* Beware of Opening Links

Many people use a URL shortening service on Twitter, so it is often difficult to really know the site. AVG LinkScanner feature in AVG Antivirus can be used to check these links. But if rising doubts in the liver, the link should not be opened.

* Watchful

Be aware of suspicious activity in the timeline or inbox. When starting any suspicious messages or your friends start sending spam messages smell, should confirm whether such co acount or not broken.

* Think before Tweet

Tweet can be read by everyone even after deleted. Think carefully what you write.

* Do not Hurry Believe

You never know who your follower. Do not easily believe in and make friends with people who may have bad intentions.

* Check the Third Party Applications

There are hundreds of applications on Twitter. Before you use, ensure its security. Look for a lot of applications are discussed in the trusted sites. Remember that applications always ask for a keyword and IDs.

* Password Information

Use passwords and e-mail is different for each of your social networking account. That way, when you close the account,

You can easily delete the e-mail account.

* When Log in

Check your browser settings, make sure that the information is not recorded when you use the computer together.

* Beware of Phishing Attacks

Beware of attempts to obtain personal information through a Tweet or DM.

* When Using Cell Phones

Be careful with cell phones and anyone who can use it. If you have a Twitter application, make sure you always log out after use.

Deddy Sinaga

Geologists Discover Relations and Climate Earth Orbit

TEMPO Interactive, Jakarta - From the analysis of 1.2 million last year, geologist at the University of California Santa Barbara Lorraine Lisiecki claimed to have found a pattern of orderly change in the relationship obit the earth's climate cycles. The findings are reported in the scientific journal Nature Geoscience.

Lisiecki analyze core temperature (core) marine sediments from 57 locations around the world. By analyzing the sediment, scientists can create a chart of the earth's climate over millions of years in the past.

Lisecki linking climate with the historical record of the earth's orbit. He obtained data on the sun orbits the earth changes shape every 100 thousand years. Orbit is better or more oval on the time interval.

The form known as eksentritas orbit. One related aspect is the 41 thousand year cycle in the slope of the axis of the earth. Earth glaciation also occurred every 100 thousand years.

Lesiecki find the time to climate change and eccentricity occur together. »Clear relationship between time changes in the earth's orbit and climate change is strong evidence of the relationship between the two," Lisiecki concluded. »It is not possible that these events would not be related to one another."

In addition to finding the relationship between the change in the form of the orbit and early glaciation, correlation Lisiecki find surprising. He found the largest glacial cycles occur during the change of the weakest in the eccentricity of the orbit of the earth and vice versa.

He found strong changes in the earth's orbit associated with climate change is weak. »This may mean that Earth's climate has internal instability in addition to sensitivity to changes in the orbit," Lisiecki said.

He concluded that the pattern of climatic changes during the last one million years may involve complex interactions between different parts of the climate system, as well as three berebda orbital system, namely obrit eccentricity, tilt, and precession or changes in axis orientation.

ScienceDaily | PURW

There's an Alien Hiding in Glacier Dengue?



Antarctica, KOMPAS.com - In recent years, the panorama Glacier Blood reappeared at a location of the Antarctic continent. The phenomenon is located in Mc Murdo Dry Valleys are famous as vast areas without ice, is one the most unique regions in the continent of Antarctica.

The valley is located at the South Pole though, but there are rarely ever the ice, because the winds that sweep into the valley with the speed (hurricanes) 320 km / h capable of grabbing all the moisture.

When someone walked alone up the valley, after the carcasses of penguins and other animals, can finally see a glacier, "Blood."

It is said that the bloody glacier was discovered by Robert Scott's expedition team in 1911, later proved to be caused by iron pengoksidasian.

Reportedly, each specific period, the glacier can shoot clear fluid that is rich in iron oxidation and then immediately going into an old red menggiriskan.

Discover Magazine mention, the liquid is derived from lake-rich salty water content of salt at a depth of 390 meters of ice.

Recent studies have found there are bacteria in such a difficult situation whose lives rely on the substance of sulfur and iron compounds.

According to researchers, since the glacier was born from the lake, creating an ecological environment in such a cold, dark and without oxygen. Such a group of bacteria already isolated over 150 million years.

Besides the scientists also think, bloody glacier produced by the bacteria there is the possibility of outer space creatures that live in our solar system, for example under the polar ice sheets both Mars and (a month's) Jupiter is also the possibility of life there.

The Standing Cat!

Cat family is known for high-level equilibrium. They also cited have nine lives. But, quite rare cat that can stand on two legs.

Except for this one cat!

Pet Society: Get Coyote Petling + New MIs


Tools:
                                          -------------------------------------------------------

  1. Open Fiddler
  2. Clear Cache of Your Browser (click here if you don’t know how)
  3. Go into Pet Society (if you don’t know to how to use fiddler+Firefox use IE or Chrome)
  4. In Fiddler, search for this line ‘/game/pets/swf/2.9.23/shops/shopLuxury2094.dat
  5. Right click this line, copy > just url
  6. Go to Autoresponder
  7. Click Add
  8. The url that you copied will appear
  9. Now click on the arrow at the bottom besides the Save button
  10. Select ‘Find a File’ and browse for the database that you’ve just downloaded from me
    “SDCMI.dat”
  11. Click Save
  12. Click Clear Cache and refresh your Pet Society
  13. Enter the Luxury Shop and you should see the Coyote Petling+ New Mystery Items
  14. Have fun!

Source: get coyote petling+ New MIs

Pet Society: Race Bot & Stadium Editor by Patiniox

Video now is included

all credits to PATINIOX

To used code hack you must see: Pet Society Race Bot & Stadium Editor by Patiniox

Requirements:

* Flash 9/10
* Cheat engine 5.6
* Browser

Steps:

  1. Go to Stadium then choose practice;
  2. click tick;
  3. Then click on “Add coins” it will take you to the bank;
  4. Go home;
  5. Open cheat Engine;
  6. tick hex, change 4 bytes to 8 bytes & tick also “scan also read-only memory”;
  7. Scan now 5D8B000006C1840F
  8. one address will return, right click & disassemble this memory region;
  9. Right click & choose go to address
  10. copy address in code generator
  11. now scan using this hex 000003E800002710
  12. You will get more than one address choose the 1st one &  disassemble this memory region;
  13. Right click & choose go to address
  14. copy address in code generator
  15. Now generate code
  16. Notice that generated code has 2 parts
  17. copy 1st part
  18. go to tools–>Auto Assemble (ctrl+a)
  19. Paste 1st part & click excute
  20. Now to cheat engine interface
  21. Down where is says Frozen,Description…etc
  22. copy 2nd part of the generated code
  23. now go & practice :)
  24. remember to tick the options u want to activate
Recommended options:
  • Stage speed = 3000
  • Speed of pets = 3000
  • Without slow motion = 0
  • Length of track = 500


Source: Pet Society Race Bot & Stadium Editor by Patiniox

Pet Society: 600 coins per race version 2

Credits to: Pabloox-Hacks
Requirements:

  • Flash 9 ONLY
  • Cheat engine 5.6
  • Browser
Steps:
  1. Log to Pet Society
  2. Then go to Stadium–> Bet race
  3. Don’t click READY yet
  4. Open Cheat Engine & set it as follows: Select your browser from process list,tick the hex,change 4 bytes to 8 bytes, & tick “also scan read-only memory”
  5. Paste “5D8B000006C1840F” and hit First Scan
  6. You will get one address
  7. right click & choose disassemble this memory region
  8. You will see ‘je XXXXX’ (example je FB12389)
  9. Right click & choose “replace with code that does nothing” or hit delete on your keyboard
  10. Scroll down you will see ‘jne XXXXX’ (example jne FB12389)
  11. Right click & choose “replace with code that does nothing” or hit delete on your keyboard
  12. Scroll down & look for jmp XXXXXX (example jmp 123456),you need to scroll down a lot to see it
  13. again right click choose “replace with code that does nothing” or hit delete on your keyboard
  14. Now go back to the game & click ready
  15. You will get 600 coins whether you win or lose
  16. when you finish the race quickly click on “Add coins)
  17. It will take you to bank & auto saves!
  18. repeat using mouse recorder (click here to download -Axife Mouse Recorder 5.0)


Source: Pet Society 600 coins per race version 2

Pet Society : Lose and find your petling instantly and share 220 coins per save

Pet Society : Lose and find your petling instantly and share 220 coins per save by nofil2000
Normally You need to wait 3 days and not feed your pet to lost it and let your friends gain 200 coins.
using this cheat you can lose your pelting directly ans share 200 coins to you friends and then find it and share 20 for total of 220 coins . To share another 220 save the game and reload to do the cheat again

Requirements:

* Flash 9
* Cheat engine 5.6
* Browser

steps :
1-using cheat engine scan :array of bytes + hex + scan read only memory the value =89 41 3c b8 04 00 00 00
2- disassemble the memory found and and toggle break on the instruction mov [ecx+3c],eax
3- try to touch your pelting, the game will freeze
4- go to cheat engine and copy the value of ECX
5- click add address manually and put the value of ecx+3c
6-change the value of this address to 120 and change the room . your petling will be lost . publish 200 coins
7- change the value to 121 and change the room . your petling will be found .publish 20 coins
you can publish the links in your secondary account and collect the money using you main account
remember to save and reload your game after publishing your 220 coins to get a new links .if you do not do this you will always get the same links and will not give you more then 220

Video by nofil2000


Source: Pet Society -Lose and find your petling instantly and share 220 coins per save-

Pet Society: Feed Coins and Gift Generator by nofil2000

تحياتي للسيد نــــــــــــــــــــوفل :)
This Cheat looks complicated but it is not
For this cheat you need the following
1- Two facebook Accounts
2- multi-tab web browser :Flock,Firfox or IE
3- Fiddler 2
4- nofil200 Feed coins and gifts generator .it can be download from http://downloads.ziddu.com/downloadfile/8856284/nofil2000.zip.html
first download nofil2000.zip and unzip it in you desktop . it contains a file called nofil2000.html

step 1:
open your web browser and open two tabs : in the first one load nofil2000.html and in the second load facebook home page

step 2 (Prepare Fiddler)
open fiddler — autoresponder and add the following rule:
if URI http://apps.facebook.com/crossdomain.xml respond with C:\Users\XXX\Desktop\nofil2000\crossdoma in.xml
crossdomain.xml can be found in the same zip file . change the path according to your path then clear your cache

step 3
go to tab to 2 and login to your secondary facebook account

step 4
go back to tabe 1 and select the types of feed you want. Then type the number of each type (for ecample if you select lottery + lost and the number is 50 the it is going to generate 50 lottery feed links and 50 lost feed links)
*Note: do not produce too many links .it will slow the game and if you put too much you may not be able to load

step 5
once the step 4 is done and all links are retrived go to tabe 2 and loggout from secondary account and login with the main account

step 6
go back to tab 1 and click execute all links and wait for it it to finish

step 7
Load your Pet Socity Game

Step 8 (optinal)
this step is not required but it will make collecting the coins faster . Scan for 8B403C8945E88B45e885c0 (hex,Array of bytes,read only memory)

Finally enjoy your gifts and coins

to collect alot of coins chooese lost pet feed and number of links =100 which give you 100 * 200 =20000

Thanks


Source: Pet Society -Feed Coins and Gift Generator by nofil2000-

Pet Society: Pet Color Maker Tool by Patiniox

Patiniox is back :)
He has a new great tool to make you choose the color you like for your pet!

You must see: Pet Society Color Maker Tool by Patiniox

Requirements:
-Cheat Engine;
-Flash Player;

# Go to Stylist
# choose any color but don’t clock ok (the tick mark)
# Open Cheat Engine, choose your browser from process list
tick Hex and change value type from 4 bytes to 8 bytes also tick “Also scan read-only memory”
# Scan 08458b0000009481
# right click & choose Disassemble this memory region
# now right click and choose Go to address
# copy the address in generator
# choose your favorite color
# click generate
# Copy all code
# Go back to Cheat Engine (to where you have copied the address from)
# Go tools–> Auto Assemble (CTRL+A)
# Paste generated code
# Execute
# now click tick & save

Original Spanish version can be found on Patiniox blog

Source:  Pet Society Color Maker Tool by Patiniox

Step Repair issues Black Screen of Death in Windows 7

As the first party interference issue has breathed Black Screen of Death on Windows 7, Prevx Ltd. provides automatic repair tool that can be downloaded from the site. Nevertheless, Prevx also provide remedial measures to the user manual that has the technical knowledge of computing. Following these steps.


1. Restart the computer.

2. Do log on and wait for a black screen appears.

3. Make sure the computer is connected to the internet.

4. Press the CTRL, ALT, and DEL simultaneously.

5. Click Start Task Manager.

6. In Task Manager, click the Application tab.

7. Then click New Task.

8. Enter the command: "C:\Program Files\Internet Explorer\iexplore.exe", and
    "http://info.prevx.com/download.asp?GRAB=BLACKSCREENFIX".

9. Click OK and the download process begins immediately.

10. Run the new program is downloaded.

11. Restart the computer.

Pet Society: Collect all 12 Roses from Hideeni

Credit : Free2sw4u , 2010HackGames, Pet Society News

Requirements:

* Cheat engine 5.6
* Flash Player 9/10
* Browser ( FireFox/Flock )
* 2 facebook accounts

Steps :

1. Open your other Facebook account
2. Go to Pet Society
3. Open Cheat Engine
4. Make sure you do this following settings [8 bytes, Hex, ASROM(also-scan-read only memory)]
5. Scan “000026840FE44589”
6. 1 address should returned.
7. Right click the address and click “Disassemble memory region”
8. You will see the next line is “je XXXXX” (XXX are random example je 12E345F)
9. Right click this “je XXXXX” and select “Replace with code that does nothing
10. Now enter any room and you will see Cupid-Hideeni.
11. Click him , share and publish those roses
12. Use your main account to claim those roses.
13. There are 12 of such roses so keep changing room and clicking on Hideeni to get all 12.

Source: Pet Society News

Pet Society: (PATCHED) 500 Coins Tree Cheat

Unfortunately this great cheat is fixed!
Flash 10 version of the cheat is down the post!

you can watch the Video:
This cheat work with Flash Player 9.0.124.0 and 10 version.
To check your flash player current version click here.

Using Flash Player 9.0.124.0 :
1. Open Cheat Engine
2. Go into Pet Society.
3. Leave your house and bump into trees till you get a coin.
4.☑ Tick hex paste “06AB820F“,leave value type 4 bytes & tick ☑ “Also scan read only memory”
5. 1 address returned. If more than 1, use the top address. (ONLY FLASH 9 !!)
6. Right click > Disassemble
7. Right click selected code and select “Replace with code that does nothing
8. Change Cheat engine settings to (Hex, Array Of Bytes, Also scan read only memory)
9. New scan “8B 40 24 85 F6 0F 84 5E 02 00 00 8B 4E 08 8B
10. 1 address returned. Right click > Disassemble
11. You will see the line “mov eax,[eax,+24]
12. Change it to “mov eax,90
13. New scan “C7 45 DC 01 00 00 00 89 45 E0 8D 45 D8 50 6A
14. 4 addresses may return. Right click the Bottom address and Disassemble it
15. You will see ‘mov [ebp-24],00000001
16. Change it to ‘mov [ebp-24],000001f4‘
17. Enter your house.
18. Exit your house and click the trees. You will get 500coins per tree.
19. Once all trees are clicked, enter your house again and exit to continue
20. You can get “500 * number of trees” coins again. Use a mouse recorder if you want.

You will need a mouse recorder Download Axife Mouse Recorder Demo (Working Link-choose Server 2 Brothersoft (US mirror))

Using Flash Player 10 :
1. Open Cheat engine
2. Play Pet Society
3. Exit your house and click on a tree to get a coin.
4. Scan “8B78088B8FFC0200008945D8C745DC” (Hex, Array of bytes, ASROM)
5. 1 address returned. Right click > Disassemble
6. Scroll UP a few lines and you should see this ”jne xxxxxxxx
7. Right click and select “Replace with code that does nothing
8. New scan “8B402485F60F849B020000″ (hex, array of bytes, ASROM)
9. 1 address returned. Right click > Disassemble
10. You will see the code ‘mov eax,[eax,+24]
11. Change it to ‘mov eax,90
12. A few lines down, you will see the code “mov [ebp-24],00000001
13. Change it to ‘mov [ebp-24],000001f4
14. Now, click on a tree. Increase about 4000-5000 coins and quickly click ‘Add Coins
If Mayor is appearing, try clicking on ‘Add Coins’ earlier.
15. Then exit shop
16. Repeat step 14 and 15 till satisfied.


Credits to: Davidxxx, 2010hacksgames, EnrikeZZ and dfspeter

Source: Pet Society News

CBclickbank classifieds Program

CBclickbank classifieds Program: "the leading website in internet business solutions with good traffic and real visitors. We promote your business through our classified offerings. The Great moeny earn Porgram"

Pet Society: Brush Speed Hack

Well don’t expect too much but better than nothing!

credits: trucoteca,cheats09

requirements: the usual ,F9,CE etc :)
1. Log on to pet society.
2. Open Cheat Engine,select your browser.
3. Tick Hex, Paste 5D8B000002D5840F in the box,change 4 Bytes Bytes by 8 and tick “also scan read only memory”
4.Brush your pet & then hit First scan.
5.You Should get one result.
6. Right click & Choose Disassemble this memory region
7. you will find line with address Je XXXXXX example Je 1234feff
8. Double click “Je xxxxxxx” & change it to by “jg xxxxxxx
9. Go back & scan using this hex 7D8B000005568F0F
10. Right click & Choose Disassemble this memory region
11. Double click “Jg xxxxxxx” & change it to by “je xxxxxxx
12. again scan using this hex 458BE845893C408B
13.Right click & Choose Disassemble this memory region.
14. you will find this line “mov eax, [eax +3c]“.
15. right click & choose replace with code that does nothing.
16.That’s it,Enjoy!

Note: to generate more money go & visit a friend then brush yours & your friend’s pet!!!
use a mouse recorder.

Source:  PetSocietyNews.com

Pet Society: Make some quick coins glitch! 2500 coin per refresh! [fixed]

Video is now included!-thanks to Lazar this cheat is already on other sites like lemon & mrchodis I don’t know why guys are going crazy that i added it! cheats are meant to be shared!
and also meant to be patched eventually!


Requirements: A fresh new account!

1. Simply create an account on facebook!
2. Add pet society
3. when the game is fully loaded & before you enter the house click home!
4. then go to Application–>Edit applications! (http://www.facebook.com/editapps.php)
5. You’ll find Pet Society –>click settings! and then –>Box:Available (add) –>click on add
6. now go to your profile–>boxes
7. You will find Pet society box with (Gift -visit -invite)
8. click on invite –> it will log you to the game!
9. One you are inside click on globe-Shortcut to shops etc-
10. then go to bank or cash shop (both ways work or any shop!) & let the shop owner says his crap (you can click on speech balloon if you don’t wanna wait)
11. refresh you’ll have 2500 coins
12. do step 10 again you will make another 2500 & so on

* PS: Don’t gain any paw point! don’t buy anything or it won’t work!
* You will get the daily lottery only one time every 24 hours!

that’s all!
after you are done cheating! log buy whatever u want & transfer it to your original account! but the account where u cheat will no longer work with this glitch!

It works i have just tried it!



Original Posted visit http://www.petsocietynews.com

Pet Society: Find Hideeni!

Make your friend happy by getting the Hideeni doll or get it for yourself if you have multiple accounts!

* Open Cheat Engine;
* Tick hex & copy 000026840FE44589

* Change value to 8 bytes
* Tick “also scan read-only memory”;
* First Scan;
* Right click, disassemble this memory region;
* You will get an address & below it an address that starts with je xxxxxx
example Je c0bff1234;
* Right click and choose “replace with code the does nothing” (or hit delete on your keyboard)
* Voila Hideeni is chasing you;)

Now your friends (or you from another account can claim gift)

Credits: 2010 hacks games

Mafia Wars: Special Energy Pack for Mafia Wars Toolbar

Special Energy Pack for Mafia Wars Toolbar

If You have installed the toolbar and keep it, you will have one benefit,If you have the toolbar installed, you can get a Mini energy pack every 8 hours which restores 25% of your total energy.




  • For normal energy pack, we have to wait until 23 hour and get our energy increase to 125% of max energy.
  • For Special energy pack, we have to wait for 8 hour and get our energy increase to 25% of max energy. And it's continue giving special energy pack when we have used it.


To download toolbar the link is  Mafia Wars Toolbar
Click this.
Enjoy

Year 2038 Problem: Unix Millennium bug, or Y2K38

What's wrong with Unix systems in the year 2038?
 
The typical Unix timestamp (time_t) stores a date and time as a 32-bit signed integer number representing, roughly speaking, the number of seconds since January 1, 1970; in 2038, this number will roll over (exceed 32 bits), causing the Year 2038 problem (also known as Unix Millennium bug, or Y2K38). To solve this problem, many systems and languages have switched to a 64-bit version, or supplied alternatives which are 64-bit.

What is the year 2038 bug?

In the first month of the year 2038 C.E. many computers will encounter a date-related bug in their operating systems and/or in the applications they run. This can result in incorrect and grossly inaccurate dates being reported by the operating system and/or applications. The effect of this bug is hard to predict, because many applications are not prepared for the resulting "skip" in reported time - anywhere from 1901 to a "broken record" repeat of the reported time at the second the bug occurs. Also, leap seconds may make some small adjustment to the actual time the bug expresses itself. I expect this bug to cause serious problems on many platforms, especially Unix and Unix-like platforms, because these systems will "run out of time". Starting at GMT 03:14:07, Tuesday, January 19, 2038, I fully expect to see lots of systems around the world breaking magnificently: satellites falling out of orbit, massive power outages (like the 2003 North American blackout), hospital life support system failures, phone system interruptions (including 911 emergency services), banking system crashes, etc. One second after this critical second, many of these systems will have wildly inaccurate date settings, producing all kinds of unpredictable consequences. In short, many of the dire predictions for the year 2000 are much more likely to actually occur in the year 2038! Consider the year 2000 just a dry run. In case you think we can sit on this issue for another 30 years before addressing it, consider that reports of temporal echoes of the 2038 problem are already starting to appear in future date calculations for mortgages and vital statistics! Just wait til January 19, 2008, when 30-year mortgages will start to be calculated.

What causes it?

What makes January 19, 2038 a special day? Unix and Unix-like operating systems do not calculate time in the Gregorian calendar, they simply count time in seconds since their arbitrary "birthday", GMT 00:00:00, Thursday, January 1, 1970 C.E. The industry-wide practice is to use a 32-bit variable for this number (32-bit signed time_t). Imagine an odometer with 32 wheels, each marked to count from 0 and 1 (for base-2 counting), with the end wheel  used to indicate a positive or negative integer. The largest possible value for this integer is 2**31-1 = 2,147,483,647 (over two billion). 2,147,483,647 seconds after Unix's birthday corresponds to GMT 03:14:07, Tuesday, January 19, 2038. One second later, many Unix systems will revert to their birth date (like an odometer rollover from 999999 to 000000). Because the end bit indicating positive/negative integer may flip over, some systems may revert the date to 20:45:52, Friday, December 13, 1901 (which corresponds to GMT 00:00:00 Thursday, January 1, 1970 minus 2**31 seconds). Hence the media may nickname this the "Friday the Thirteenth Bug". I have read unconfirmed reports that the rollover could even result in a system time of December 32, 1969 on some legacy systems!

What operating systems, platforms, and applications are affected by it?


A quick check with the following Perl script may help determine if your computers will have problems (this requires Perl to be installed on your system, of course):


#!/usr/bin/perl
#
# I've seen a few versions of this algorithm
# online, I don't know who to credit. I assume
# this code to by GPL unless proven otherwise.
# Comments provided by William Porquet, February 2004.
# You may need to change the line above to
# reflect the location of your Perl binary
# (e.g. "#!/usr/local/bin/perl").
# Also change this file's name to '2038.pl'.
# Don't forget to make this file +x with "chmod".
# On Linux, you can run this from a command line like this:
# ./2038.pl
use POSIX;
# Use POSIX (Portable Operating System Interface),
# a set of standard operating system interfaces.
$ENV{'TZ'} = "GMT";
# Set the Time Zone to GMT (Greenwich Mean Time) for date calculations.
for ($clock = 2147483641; $clock < 2147483651; $clock++)
{
    print ctime($clock);
}
# Count up in seconds of Epoch time just before and after the critical event.
# Print out the corresponding date in Gregorian calendar for each result.
# Are the date and time outputs correct after the critical event second?

I have only seen a mere handful of operating systems that appear to be unaffected by the year 2038 bug so far. For example, the output of this script on Debian GNU/Linux (kernel 2.4.22):
# ./2038.pl
Tue Jan 19 03:14:01 2038
Tue Jan 19 03:14:02 2038
Tue Jan 19 03:14:03 2038
Tue Jan 19 03:14:04 2038
Tue Jan 19 03:14:05 2038
Tue Jan 19 03:14:06 2038
Tue Jan 19 03:14:07 2038
Fri Dec 13 20:45:52 1901
Fri Dec 13 20:45:52 1901
Fri Dec 13 20:45:52 1901

Windows 2000 Professional with ActivePerl 5.8.3.809 fails in such a manner that it stops displaying the date after the critical second:
C:\>perl 2038.pl
Mon Jan 18 22:14:01 2038
Mon Jan 18 22:14:02 2038
Mon Jan 18 22:14:03 2038
Mon Jan 18 22:14:04 2038
Mon Jan 18 22:14:05 2038
Mon Jan 18 22:14:06 2038
Mon Jan 18 22:14:07 2038

So far, the few operating systems that I haven't found susceptible to the 2038 bug include very new versions of Unix and Linux ported to 64-bit platforms. Recent versions of QNX seems to take the temporal transition in stride. If you'd like to try this 2038 test yourself on whatever operating systems and platforms you have handy, download the Perl source code here. A gcc-compatible ANSI C work-alike version is available here. A Python work-alike version is available here. Feel free to email your output to me for inclusion on a future revision of this Web page. I have collected many reader-submitted sample outputs from various platforms and operating systems and posted them here.

For a recent relevant example of the wide-spread and far-reaching extent of the 2038 problem, consider the Mars rover Opportunity that had a software crash which resulted in it "phoning home" while reporting the year as 2038 (see paragraph under heading "Condition Red").
A large number of machines, platforms, and applications could be affected by the 2038 problem. Most of these will (hopefully) get decommissioned before the critical date. However, it is possible that some machines going into service now, or legacy systems which have never been upgraded due to budget constrains, may still be operating in 2038. These may include process control computers, space probe computers, embedded systems in traffic light controllers, navigation systems, etc. It may not be possible to upgrade many of these systems. For example, Ferranti Argus computers survived in service long enough to present serious maintenance problems. Clock circuit hardware which has adopted the Unix time convention may also be affected if 32-bit registers are used. While 32-bit CPUs may be obsolete in desktop computers and servers by 2038, they may still exist in microcontrollers and embedded circuits. For instance, when I last checked in 1999, the Z80 processor is still available as an embedded function within Altera programmable devices. Such embedded functions present a serious maintenance problem for all rollover issues like the year 2038 problem, since the package part number and other markings usually give no indication of the device's internal function. Also, I expect we've already forgotten how many devices are running strange mutations of embedded Microsoft Windows. I can recall encountering some telephony devices and printers running Windows CE and NT under the hood, just off the top of my head. And don't forget emulators that allow older code (both applications and operating systems) to run on newer platforms!
Many Intel x86 platforms have BIOS date issues as well. The Linux BIOS time utility hwclock has issues around the critical second in 2038 too (DO NOT try this on a production system unless you REALLY know what you're doing):
[root@alouette root]# hwclock --set --date="1/18/2038 22:14:06"
[root@alouette root]# hwclock --set --date="1/18/2038 22:14:07"
RTC_SET_TIME: Invalid argument
ioctl() to /dev/rtc to set the time failed.
[root@alouette root]# hwclock --set --date="1/18/2038 22:14:08"
date: invalid date `1/18/2038 22:14:08'
The date command issued by hwclock returned unexpected results.
The command was:
  date --date="1/18/2038 22:14:08" +seconds-into-epoch=%s
I performed this test on an Intel Celeron laptop which has a Toshiba BIOS. Note that trying to set the BIOS hardware to the "critical second" (relative to my time zone) resulted in a different error than setting the BIOS to one second later (although that failed too). Usually Linux systems do not rely too heavily on the BIOS clock and will try to synchronize themselves to an NTP server after boot anyway. Again I must emphasize, do not play with the date on a product server! This story may help illustrate why one should never try critical date testing on production machines...
"Three years ago, I had several servers timed to a single (note I say single) NTP located at a university that, unbeknownst to me, was checking for the Unix equivalent of the Y2K bug that will occur in the year 2038. Well, perhaps the university didn't realize that businesses such as mine actually rely on accurate data. During their test, they advanced their real time clock to the year 2038, and suddenly, without warning, each of my log files started writing the year 2038 instead of 1999. This caused massive problems for systems across the network. The lesson learned was that most NTP clients have the ability to reference two or more stratums, writing the average of difference to the software clock, and where the difference is [significantly] out of sync, the client will either compensate to the clock closest to the last known value or exit (1), leaving the local clock(s) unchanged." - The Importance of Choosing an Accurate NTP
I believe the year 2038 problem will more likely result in air traffic control disasters, life-support systems failure, and power grid meltdown than the year 2000 problem. The year 2000 problems often involved higher-level application programs, disrupting inventory control, credit card payments, pension plans, and the like. The 2038 problem may well cause more serious problems because it involves the basic system timekeeping functions from which most other time and date information is derived. Databases using 32-bit Unix time may survive through 2038, and care will have to be taken in these cases to avoid rollover issues. Some problems related to the year 2038 have already started to show themselves, as this quote from the Web site 2038bug.com illustrates:
The first 2038 problems are already here. Many 32-bit programs calculate time averages using (t1 + t2)/2. It should be quite obvious that this calculation fails when the time values pass 30 bits. The exact day can be calculated by making a small Unix C program, as follows:
echo 'long q=(1UL<<30);int main(){return puts(asctime(localtime(&q)));};' > x.c && cc x.c && ./a.out
In other words, on the 10th of January 2004 the occasional system will perform an incorrect time calculation until its code is corrected. Thanks to Ray Boucher for this observation.
The temporary solution is to replace all (t1 + t2)/2 with (((long long) t1 + t2) / 2)(POSIX/SuS) or (((double) t1 + t2) / 2) (ANSI). (Note that using t1/2 + t2/2 gives a roundoff error.)
Some Unix vendors have already started to use a 64-bit signed time_t in their operating systems to count the number of seconds since GMT 00:00:00, Thursday, January 1, 1970 C.E. Programs or databases with a fixed field width should probably allocate at least 48 bits to storing time values. 64-bit Unix time would be safe for the indefinite future, as this variable won't overflow until 2**63 or 9,223,372,036,854,775,808 (over nine quintillion) seconds after the beginning of the Unix epoch - corresponding to GMT 15:30:08, Sunday, December 4, 292,277,026,596 C.E. This is a rather artificial and arbitrary date, considering that it is several times the average lifespan of a sun like our solar system's, the very same celestial body by which we measure time. The sun is estimated at present to be about four and a half billion years old, and it may last another five billion years before running out of hydrogen and turning into a white dwarf star.
A recent example of the 2038 problem documented on Wikipedia:
In May, 2006, reports surfaced of an early Y2038 problem in the AOLServer software. The software would specify that a database request should "never" timeout by specifying a timeout date one billion seconds in the future. One billion seconds after 21:27:28 on 12 May, 2006 is beyond the 2038 cutoff date, so after this date, the timeout calculation overflowed and calculated a timeout date that was actually in the past, causing the software to crash.

What can I do about it?

If you are a programmer or a systems integrator who needs to know what you can do to fix this problem, here is a checklist of my suggestions (which come with no warranty or guarantee):
Consider testing your mission-critical code well ahead of time on a non-production test platform set just before the critical date, or with utilities such as the FakeTime Preload Library. FTPL "...intercepts various system calls which programs use to retrieve the current date and time. It can then report faked dates and times (as specified by you, the user) to these programs. This means you can modify the system time a program sees without changing the time system-wide" [emphasis theirs].
An organization called The Open Group (formerly X/Open), which maintains the Unix specification and trademark, has a number of programming recommendations which should be followed by developers to deal with the year 2038 and other problematic dates.
Also, see this article regarding Solutions to the Year 2000 Problem by my colleague Steve Manley. Many of his suggestions can be applied to the 2038 problem too. I would also suggest this very concise and well-written essay on the 2038 problem by a programmer named Roger M. Wilcox.
If you are working with Open Source code, this free library may be a useful reference for patching existing code for high-accuracy longterm time calculation: "libtai is a library for storing and manipulating dates and times. libtai supports two time scales: (1) TAI64, covering a few hundred billion years with 1-second precision; (2) TAI64NA, covering the same period with 1-attosecond precision. Both scales are defined in terms of TAI, the current international real time standard." An attosecond, defined in U.S. usage, is one quintillionth (10**18) of a second (it takes a very fast stopwatch for a researcher to clock those pesky photons). This is the kind of good timekeeping one might need for deep-space probes or high-reliability systems.
For more general applications, just using large types for storing dates will do the trick in most cases. For example, in GNU C, 64-bits (a "long long" type) is sufficient to keep the time from rolling over for literally geological eons (I can hear Carl Sagan in my head saying "beeeelions... and beeeelions..."). This just means any executables the operating systems runs will always get the correct time reported to them when queried in the correct manner. It doesn't stop the executables from having date issues of their own.
"The best way to predict the future is to engineer it." There will always be stuff we won't foresee, or simply didn't know about. Even this most exhaustive list of critical dates by Dr. Stockton may miss some critical dates - perhaps you work with emerging, proprietary, or closed source code. Check Dr. Stockton's list twice if you need to worry about "five-nines" reliability: you'd be surprised how many issues there are just within two centuries of date calculation. A lot of modern computers do a considerable amount of work within these years, since it covers a couple of recent human generations of calculable human demographics. Software for genealogy, mortgage calculation, vital statistics, and many other applications may need to frequently and reliably peer a century or two forward or backward.
Good luck, and I hope no ones flying car breaks down in 2038! :-)

How is the 2038 problem related to the John Titor story?

If you are not familiar with the name John Titor, I recommend you browse the site JohnTitor.com. I understand that my site's URL appears quoted a number of times in the discussion of this apparently transtemporal Internet celebrity. I don't know John Titor, and I have never chatted with anyone on the Internet purporting to be John Titor. The stories have not convinced me so far that he has traveled from another time. I also have some technical issues with his rather offhanded mention of the 2038 problem. Furthermore, John Titor has conveniently returned to his time stream and can not answer email on the subject. Having said that, I think it fair to say that I find John Titor's political commentary insightful and thought-provoking, and I consider him a performance artist par excellence.

Sources: The Project 2038

New Trick to Download from RapidShare with Free Account

Now I will explain about how to download without using the software, fast, and can resume via RapidShare using account "FREE". I got this from one posting on KASKUS. Here's how.

Step 1:

Sign Up in here:
http://www.enterupload.com/





Step 2:

Login, and than click "Upload files", then click "FREE RapidShare LEECH" after the "Insert Links to your RapidShare download" then click "UPLOAD".



Wait until the upload is complete ...





Step 3:

When finished, there was Direct download link. Click the link already provided, you can download the Software Download Manager like Internet Download Manager (IDM).




Step 4:

Then click "FREE DOWNLOAD"




Step 5:

Enter the captcha code was



there is a message "This direct link will be available for your IP next 24 hours" you ignore this message only.



Step 6:

You can just download it with IDM (fast and could be in the resume). Done.




Tips:


Download maximum 20 times in 24 hours. If you want to download again, please clear your browser cookies and use another IP addres pake way, such as proxy, autohide IP, or the other. Or pake this way can, Log Out > Turn off your internet connection temporarily (briefly pull the cord), Clear your browser cookies, then re-list a different email use (do not ask for verification so the contents of any email only) + other users and passwords, start downloading again as much as possible.

Popular Posts

Powered By Blogger