Jun 29, 2012

American Reunion 2012 BRrip 720p MEDIAFIRE 750MB



American Reunion Movie Poster


GetMediafire Information Image


IMDB:American Reunion 2012
[Format]…………..[ Matroska
[Genre]……………[ Comedy
[Cast]…………….[ Jason Biggs, Alyson Hannigan, Seann William Scott, Chris Klein
[Writer]:………….[ Adam Herz, Jon Hurwitz
[Director]:………..[ Jon Hurwitz, Hayden Schlossberg
[Size]…………….[ 750 MB
[Duration]…………[ 1 h 53 min
[Search Subtitles]….[ Subscene.com



 Download :
 

Lockout 2012 BRrip 720p MEDIAFIRE links 550MB


Lockout Movie Poster

Lockout 2012 BRrip 720p 550MB



























































GetMediafire Information Image





[Format]…………..[ Matroska
[Genre]……………[ Thriller, Action, Sci-Fi
[Cast]…………….[ Guy Pearce, Maggie Grace, Peter Stormare, Vincent Regan
[Writer]:………….[ Stephen St. Leger, James Mather
[Director]:………..[ James Mather, Stephen St. Leger
[Size]…………….[ 550 MB
[Duration]…………[ 1 h 35 min
[Search Subtitles]….[ Subscene.com
[Source]…………..[ UNRATED.720p.BluRay.X264-BLOW




Download Here :    


Jun 25, 2012

A virus specialized for AutoCAD, a perfect cyber espionage tool

11751368-3d-product-A+virus+specialized+for+AutoCAD,+a+perfect+cyber+espionage+tool
In recent years we are assisting to a profoundly change in the nature of malware, it is increased the development for spy purposes, for its spread in both private and government sectors. The recent case of Flame malware has demonstrated the efficiency of a malicious agent as a gathering tool in a typical context of state-sponsored attack for cyber espionage.

Event like this represent the tip of the iceberg, every day millions of malware instances infect pc in every place in the world causing serious damages related to the leak of sensible information. Specific viruses are developed to address particular sectors and information, that is the case for example of “ACAD/Medre.A”, a malware specialized in the theft of AutoCAD files. The virus has been developed to steal blueprints from private companies mostly based in Peru according the expert of the security firm ESET.
pic

The virus is able to locate AutoCAD file on infected machines and to send them via e-mail to accounts provided by two Chinese internet firms, 163.com and qq.com.

The malware detected is written in AutoLISP, an AutoCAD scripting language, ACAD/Medre for the shipment of stolen data creates a password protected RAR-file containing the blueprints and the requisite “acad.fas” file and a “.dxf” file and send it separately by e-mail. The .DXF file generated by ACAD/Medre contains a set of information that the recipient uses to the collecting of stolen files.

The password used for the RAR file is just one character equals to “1”.
pic

Once discovered the email accounts used to transfer the stolen data the group of researcher noticed that the InBox for each of them was full, they turned out all saturated by over 100,000 mails giving an idea of the dimension of the attack.

The virus has been detected several months ago but only in the last weeks it has been observed an explosion of the number of infected systems.
The researcher Righard Zwienenberg researcher of ESET declared “It represents a serious case of industrial espionage,” “Every new design is sent automatically to the operator of this malware. Needless to say this can cost the legitimate owner of the intellectual property a lot of money as the cybercriminals have access to the designs even before they go into production.”

“They may even have the guts to apply for patents on the product before the inventor has registered it at the patent office.”

The malware not limits its action to steal Autocad projects, it also checks the presence of Outlook email client to steal the pst file containing contacts, calendar and emails, confirming its genesis of espionage tool.

For completeness of information ESET provided a free stand-alone cleaner available for the ACAD/Medre.A worm. Every time we speak about of cyber espionage we could not think other that China, however the practice is really diffused and the fact that the accounts are related to Chinese accounts is clue but not a certainty.

It’s clear that Chinese hackers are considered worldwide specialist in cyber espionage, the case of Nortel is considered a case study for the impact of cyber espionage on the business of private companies.

The Chinese government, and not only, at least a decade sponsored espionage activities for stealing trade secrets, confidential information and intellectual property of various kinds. Many experts are convinced that thanks to their ability to spy they were able, through the theft and reverse engineering of products, to clear the technological gap with the western industry.

This time the Chinese authorities have demonstrated a collaborative approach identifying and blocking the accounts used for theft. Tens of thousands of AutoCAD blueprints leaked, the team of ESET experts promptly contacted the Chinese authorities such us Tencent company, owners of the qq.com domain, and also the Chinese National Computer Virus Emergency Response Center, their collaboration was essential to access to the account blocking them.

Another lesson learnt is an efficient fight to the cybercrime must be conducted with a total collaboration of all the involved actors. Only in this way it’s possible to conduct an efficient immunization
.
Written By: Pierluigi Paganini
[Source

Ghost Recon:Future Soldier BlackBox Repack 5.5GB




Ghost Recon:Future Soldier BlackBox REPACK [5.5GB]  PosterGhost Recon:Future Soldier BlackBox REPACK [5.5GB]  screen 5Ghost Recon:Future Soldier BlackBox REPACK [5.5GB]  screen 1Ghost Recon:Future Soldier BlackBox REPACK [5.5GB]  screen 4 




 FREE Download  Ghost Recon:Future Soldier BlackBox Repack 5.5GB + Mediafire Links :



  Part1       Part2
  Part3       Part4


  Part5       Part6
  Part7       Part8


  Part9       Part10
  Part11     Part12


  Part13     Part14
  Part15     Part16





  Part17     Part18
  Part19     Part20




  Part21       Part22
  Part23       Part24


  Part25       Part26
  Part27       Part28


  Part29       Part30
  Part31       Part32


  Part33       Part34
  Part35       Part36





  Part37       Part38
  Part39       Part40



  Part41       Part42
  Part43       Part44


  Part45       Part46
  Part47       Part48


  Part49       Part50
  Part51     Part52


  Part53     Part54
  Part55     Part56





  Part57     Part58
  Part59     Part60

  Part61












Jun 22, 2012

Advance Java Guide (235.2 MB)

Advance Java Guide - (235.2 MB)     on mediafire 

Download : Part1    Part2    Part3

Distributed Computing in Java (506.9 MB)

Distributed Computing in Java (506.9 MB) only on mediafire .com


Download    : Part1     Part2     Part3     Part4     Part5

XML by Example

XML by Exemple  only on mediefire  :)

Download  : Part1   Part2    Part3    Part4

RDBMS - relational database management system - Relational Database Management System (146.2 MB)


 RDBMS - relational database management system - Relational Database Management System (146.2 MB) downloads on mediafire :

 Download :   Part1    Part2

Java by Example Curriculum - Learn Java by Example (186.4 MB)

Learning Java  :

Download : Part1     Part2     Part3

JAVA language video learning : 18 CD on MEDIAFIRE

JAVA language video learning : 18 CD  on MEDIAFIRE





Password if needed  : http://free-4-free.blogspot.com

CD1    : Part1     Part2
CD2    : Part1     Part2
CD3    : Part1     Part2    Part3
CD4    : Part1     Part2
CD5    : Part1     Part2
CD6    : Part1     Part2
CD7    : Part1     Part2
CD8    : Part1     Part2
CD9    : Part1     Part2    Part3
CD10    : Part1     Part2   Part3
CD11    : Part1     Part2   Part3
CD12    : Part1     Part2
CD13    : Part1     Part2
CD14    : Part1     Part2
CD15    : Part1     Part2    Part3      Part4
CD16    : Part1     Part2    Part3      Part4
CD17    : Part1     Part2
CD18    : Part1


Jun 21, 2012

How to Jailbreak iPad 3, iPad 2, iPad 1 Running iOS 5.1.1 Using Absinthe 2.0.2 [Updated]


greenpois0n absinthepod2g and Chronic Dev team has just released Absinthe 2.0 - iOS 5.1.1 untethered jailbreak.
In this guide, we will take you through the step by step procedure to jailbreak iPad running iOS 5.1.1 using Absinthe for both Mac and Windows users.





Here are some important points to note before you proceed.
  • This guide is meant for iPad users. iPhone users can check out this step-by-step guide, while
  • Absinthe 2.0 performs an untethered jailbreak
  • Absinthe 2.0 supports iPad 1, iPad 2 and iPad 3 (the new iPad).
  • Please do not forget to backup your iPad to iCloud or iTunes before you proceed.
  • Please ensure you've updated iTunes to the latest version.
  • Absinthe 2.0 is compatible with only iOS 5.1.1, so if you're on iOS 5.1 or lower (Settings -> General -> About - Version), then you should update your iPad to iOS 5.1.1 either using iTunes or using the OTA software update before proceeding further.
  • Please note that jailbreaking your iPad may void your warranty and hence proceed with caution and at your own risk.
  • Please do not jailbreak your iPad to pirate apps from the App Store
Step 1: Download Absinthe for Mac OS X 10.5, 10.6, 10.7 from this link and Windows XP, Windows 7, Windows Vista from this link and save the application in a folder named "Absinthe" on your desktop.
Step 2: Double click the Absinthe zip file and extract the application to the Absinthe folder (Windows users). Navigate back to the Absinthe folder and launch the Absinthe application

Windows users: Please launch the application as an Administrator. Right Click on the Absinthe exe and select the "Run as Administrator" option.

Step 3: After launching Absinthe, you will be prompted to connect your iPad.

Step 4: Please disable the passcode as the jailbreak may fail, if the passcode is enabled (Settings -> General -> Passcode Lock On -> Turn Passcode Off).

Step 5: After the passcode is disabled, connect your iPad to the computer. Absinthe should detect your iPad and also mention the iOS firmware that is running on it. Click on the Jailbreak button.
After clicking on the Jailbreak button the tool will give a progress update on the various stages of the jailbreak process such as:
"Beginning jailbreak, this may take a while …"
"Sending initial jailbreak data. This may also take a while…" 
"Sending initial jailbreak data.Your device will appear to be restoring a backup, this may take a while…"
"Waiting for reboot … not done yet, don't unplug your device yet!"
"Waiting for process to complete… "

Step 6: In the end you'll be prompted with the message informing you "Done Enjoy". You can now close the Absinthe 2.0 application. The process should take 5 to 10 minutes.
That's it, your iPad should be successfully jailbroken and you should see the Cydia icon on the Home screen (it may not be on the first page so search for it to locate it).

Update 1:
If you're having problems jailbreaking your iPhone then following these steps, which will involve erasing all content and Settings.
  • Make a backup of your iPhone in iTunes by right clicking on your iPhone's name under the ‘Devices’ menu and click ‘Back Up’.
  • Once your backup is complete return to your device and go to Settings –> General –> Reset –> Erase all Content and Settings.
  • Follow the instructions mentioned above from step 1 to step 6.
  • Once jailbroken return to iTunes and restore your backup from earlier. Right click on your device name under the ‘Devices’ menu in the left panel of iTunes and click ‘Restore from Back Up…’ then select the latest backup you created before to restore your Settings, apps, photos etc.
Update 2:
  • If the solution in Update 1 doesn't work then take a backup of your iPad in iTunes and try to do a full restore and then use Absinthe.
  • Once jailbroken return to iTunes and restore your backup from earlier. Right click on your device name under the ‘Devices’ menu in the left panel of iTunes and click ‘Restore from Back Up…’ then select the latest backup you created before to restore your Settings, apps, photos etc.
Update 3:
Chronic Dev Team has released Absinthe 2.0.1, which includes fix for some minor bugs. So we've also updated the download links.
 
Update 4:
GSM iPhone 4 users if you're having trouble jailbreaking after restoring your iOS device then check out this post for more details.
 
Update 5:
Chronic Dev team has released Absinthe 2.0.2, which includes support for revised iOS 5.1.1 (9B208) that was released for GSM iPhone 4 users. So we've also updated the download links.
 
Update 6:
You can follow these simple steps to find out if you own an iPad2,4:
  • Download the linpack - the free benchmarking app from the App Store (direct iTunes link)
  • Launch the app and on the Home screen, it should display your iPad's model number as seen below:
 
Update 7:
You can check out this post for the latest update on jailbreak for iPad2,4 model.
 
Update 8:
Chronic Dev team has released Absinthe 2.0.4, which includes support for iPad2,4 model. So we've also updated the download links.
After the jailbreaking process is complete, do not forget to checkout our article on tips to keep your iPad secure.
If you're new to the jailbreaking world and wondering what to do after jailbreaking your iPad, checkout our jailbreak apps category page to find out the apps you can install on your iPad using the Cydia app.
Hope this helped. Please don't forget to let us know how it goes in the comments and drop us a line if you hit any issues.
If you want to show your appreciation for iOS 5.1.1 Jailbreak team's hard work, then don't forget to give them a donation via PayPal using this link.

Absinthe 2.0 – iOS 5.1.1 Untethered Jailbreak Released


greenpois0n absintheAbsinthe 2.0 is finally here! pod2g and the Chronic Dev team have just released Absinthe 2.0 - iOS 5.1.1 untethered jailbreak for iPhone, iPad, iPod touch and Apple TV at the HITBSecConf 2012.
Absinthe 2.0 is the first jailbreak for the new iPad (3rd generation iPad).
Chronic Dev team write:





After copious amounts of work and many sleepless nights Absinthe 2.0 is finally here to jailbreak your device. This release has been a large collaborative effort between Chronic-Dev Team and iPhone Dev Teams (Jailbreak Dream Team)
This jailbreak supports firmware 5.1.1 ONLY and is again one of the most easiest jailbreaks to use (so easy your grandma could do it ;D)

As we've seen in the video earlier, Absinthe 2.0 - the user friendly jailbreak tool makes it very easy to jailbreak iOS devices.
Absinthe 2.0 supports the following iOS devices running on iOS 5.1.1:
  • iPhone 3GS, iPhone 4, iPhone 4S
  • iPad 1, iPad 2, iPad 3 (except for the $399 iPad 2 with the tweaked A5 chip as pod2g hasn't been able to get hold of it to test and confirm it)
  • iPod Touch 3G, iPod Touch 4G
Absinthe 2.0 does not support Apple TV 3 currently. There is no  mention of Apple TV 2, it looks like it was missed out.
Absinthe 2.0 is compatible with only iOS 5.1.1, so if you're on iOS 5.1 or lower (Settings -> General -> About - Version), then you should update your iOS device to iOS 5.1.1 either using iTunes or using the OTA software update.
But if you depend on Ultrasn0w to unlock your iPhone, then you should wait for iPhone Dev team to release Redsn0w that adds support for iOS 5.1.1 untethered jailbreak, which will allow you to create a custom iOS firmware file, which will allow you to update to iOS 5.1.1 while preserving the baseband.
Please don't forget to take a backup of your iOS device to iCloud or to iTunes before jailbreaking.
You can download Absinthe 2.0 from this link for Mac, this link for Windows and this link for Linux.
Update 1:
If you need help, check out our step-by-step guide to jailbreak your iOS device using Absinthe 2.0:
Update 2: If you're having problems jailbreaking your iPhone then following these steps, which will involve erasing all content and Settings.
  • Make a backup of your iPhone in iTunes by right clicking on your iPhone's name under the ‘Devices’ menu and click ‘Back Up’.
  • Once your backup is complete return to your device and go to Settings –> General –> Reset –> Erase all Content and Settings.
  • Try using Absinthe again. Windows users please ensure you are running it as an administrator.
  • Once jailbroken return to iTunes and restore your backup from earlier. Right click on your device name under the ‘Devices’ menu in the left panel of iTunes and click ‘Restore from Back Up…’ then select the latest backup you created before to restore the Settings, apps, photos etc.
Update 3:
If you've a tethered jailbroken iOS device on iOS 5.1.1, then you can check out this guide to convert it into an untethered jailbreak using Rocky Racoon 5.1.1 Untether.
Update 4:
Chronic Dev team has released Absinthe 2.0.2, which includes support for revised iOS 5.1.1 (9B208).
As always, let us know how it goes in the comments.
If you want to show your appreciation for iOS 5.1.1 Jailbreak team's hard work.

Apple Announces New Next Generation MacBook Pro With Retina Display; New MacBook Air

Phil Schiller took the stage at today's WWDC keynote to announce a refresh to the MacBook line of products and a next generation MacBook Pro with a Retina display.
As per tradition, the Apple Store went down earlier today ahead of the keynote, and will be back up with listings of new Mac Pros, MacBook Airs and MacBook Pros.
Retina MacBook Pro
Yes, as rumored, Apple brought the Retina display to the MacBook. They are positioning this as a notebook that re-envisions the current consumer notebook category by abandoning legacy technologies.
  • It's thin and light. Measures 0.71 inches thick  and weighs 4.46 pounds.
  • 15.4 inch Retina display with a pixel density of 220ppi and a resolution of 2880 x 1800 pixels. More than 5 million pixels! World's highest resolution notebook display.
  • Deeper blacks, higher viewing angle and reduced glare.
  • Upto 2.7GHz quad core i5 or i7 processor.
  • Next generation Kepler graphics. (GeForce GT 650M)
  • Built in flash storage going up to 768GB.
  • 7 hours of battery life with upto 30 days of standby.
  • SD slot, Magsafe connector slot, USB 3.0, HDMI and Thunderbolt ports.
  • HD FaceTime cameras, dual microphones and stero speakers.
  • Starts shipping today! Will set you back at $2199.


 
MacBook Pro
  • Intel Ivy Bridge chips. Option to bump up the processor to 2.6GHz quad core i7.
  • Upto 8GB of 1600MHz memory.
  • Kepler GeForce GT 650M with upto 1GB of memory improving graphics performance by 60 percent.
  • Seven hours of battery life.
  • 13 inch models start at $1199 and go upto $1499 for the dual-core i7
  • 15 inchers start at $1799 and go upto $2199.
  • Shipping from today!
MacBook Air
  • Faster, Intel Ivy Bridge Processors. Upto 2GHz dual-core i7.
  • 60 percent improved graphics.
  • Upto 8GB of 1600MHz RAM.
  • An option to bump up flash storage to half a terabyte (512GB).
  • Two USB 3.0 ports.
  • 720p FaceTime camera.
  • 1366 x 768 display (no Retina screens).
  • Starts at $999 and goes up to $1099 depending on optional hardware upgrades.
  • Starts shipping today!

How to Jailbreak iOS 5.1.1 For iPhone 4S, iPhone 4, iPhone 3GS Users Using Redsn0w [Untethered]

iPhone Dev team has released Redsn0w that includes support for untethered iOS 5.1.1 for iPhone, iPad and iPod touch. It includes Rocky Racoon and untethered iOS 5.1.1 jailbreak developed by pod2g and planetbeing that was used in Absinthe 2.0.x jailbreak.
In this article, we will take you through the step-by-step procedure to jailbreak your iPhone on iOS 5.1.1 using Redsn0w for both Mac and Windows users.
Here are some important points to note before you proceed.
  • This tutorial is meant for iPhone users. iPad users can check out this tutorial, while iPod touch users can check out this tutorial.
  • Redsn0w 0.9.12b2 supports untethered jailbreak.
  • Redsn0w 0.9.12b2 supports iPhone 4S, iPhone 4, iPhone 3GS running on iOS 5.1.1.
  • Please ensure your iPhone is on iOS 5.1.1 (Settings --> General --> About --> Version should be 5.1.1) before proceeding.
  • Please note that jailbreaking your iPhone may void your warranty and hence proceed with caution and at your own risk.
  • Please do not forget to backup your iPhone before you proceed.
  • Please ensure you are running latest version of iTunes.
  • Important: iPhone 4, iPhone 3GS users who have a lot of media on your device, then you can jailbreak your iOS device by putting it in DFU mode (we'll update this guide with additional instructions for it shortly).
You can follow these step-by-step instructions to jailbreak your iPhone:
Step 1: Download Redsn0w for Windows from this link and Redsn0w for Mac from this link and save the application in a folder named "Redsn0w" on your desktop.
Step 2: Double click the Redsn0w zip file and extract the application to the Redsn0w folder and then launch the Redsn0w application.
Windows users should run Redsn0w as ‘Administrator’ (right-click on the Redsn0w exe and select 'Run as an Administrator').
Step 3: After launching Redsn0w, click on the Jailbreak button.
Step 4: Redsn0w will start the jailbreak process and go through the following three steps:
1. Preparing
2. Processing
3. Finishing up
Step 5: Once the three steps are completed, Redsn0w will inform you that the jailbreak was successfully installed. But please wait, leave your device alone. Your iPhone will reboot on its own. After it has rebooted, wait for it respring again.
After the respring, your iPhone will be successfully jailbroken and you should be able to find the Cydia icon on the Home screen (please note that the Cydia icon may not be on the first page, so don't assume that your iPhone hasn't been successfully jailbroken, use Spotlight to search for it).
After the jailbreaking process is complete, do not forget to checkout our article on tips to keep your iPhone secure.
If you're new to the jailbreaking world and wondering what to do after jailbreaking your iPhone, checkout our jailbreak apps category page to find out the apps you can install on your iPhone using the Cydia app.
Hope this helped. Please don't forget to let us know how it goes in the comments and drop us a line if you hit any issues.
If you want to show your appreciation for iOS 5.1.1 Jailbreak team's hard work, then don't forget to give them a donation using the link on the Redsn0w application.

iPhone Security Tips to Keep your iPhone Secure


While Apple is doing its part of the job and promptly fixing major security flaws that are being reported, its important that we do ours to ensure that our iPhone is secure to reduce the risk of having our Web mail account hacked; or our online identity stolen; or losing valuable personal information.
Here are a few security tips that I would strongly recommend that you should follow to keep your iPhone secure.






Enable Passcode Lock:
The Auto-Lock feature (Settings -> General -> Auto-Lock) only locks the screen after a preset time of not using the iPhone. But the Passcode Lock takes it a step further, one needs to enter a four-digit code to get access to the iPhone's home screen. This will ensure that someone cannot access your iPhone.
By default, iPhone doesn't require you to enter a passcode to unlock it. To set a passcode,
choose General > Passcode Lock and enter a 4-digit passcode.
Passcode unlock also has two other options to "Show SMS Preview" and "Erase Data".
If you have "Show SMS Preview" enabled, you will see the name of the sender and the first few words of the text message when you get the text message when iPhone's screen is locked. If you are concerned about privacy then you can disable it. With Show SMS Preview disabled you will only get a generic "New Text Message". (The only issue is that a 12-year old kid has raised a minor privacy concern where this does not seem to work in the Emergency Call feature.)
The "Erase Data" feature lets you completely wipe your iPhone after 10 failed passcode attempts. After six failed attempts, the iPhone locks out users for a minute before another passcode can be entered. And the device increases the lock-out time following each additional failed attempt—one minute, five minutes, 15 minutes, etc. Its a nice feature to protect the data on your iPhone if it gets lost or stolen. However, you might want to be careful enabling this feature if you have kids at home.

Use Wi-Fi safely on the iPhone:
One of the best things about the iPhone is Wi-Fi support, so you can connect to hi-speed Wi-Fi whenever it is available.
However, you should ensure that the Wi-Fi network you are connecting to is a secure one using Wi-Fi Protected Access (WPA) or any other security protocol just like you would do when you connect to a Wi-Fi network from your desktop computer or laptop.
To ensure that you don’t unknowingly connect to any open (unsecure) Wi-Fi networks while on the go, you should enable the iPhone’s Ask to Join Networks function. This is enabled by default (Settings -> Wi-Fi -> Ask to Join Networks).

Use SSL to Access Emails
If you are using iPhone's Mail app to access email, please ensure that you are accessing your emails via SSL so that the mails that are sent and received are encrypted. It is turned on by default. If you have disabled it, you can enable it by going to Settings -> Mail, Contacts, Calendars -> (Select an Account) -> Advanced, then scroll down to the Use SSL option and ensure that it’s set to On.

Change the default password of your Jailbroken iPhone
This security tip is applicable to all those who have jailbroken their iPhones. Please change your iPhone's root password as the default password is "alpine".
Its extremely critical to change the password as if you decide to ignore the tip on connecting to only secure Wi-Fi networks and connect to an open non-secure Wi-Fi network, it exposes you to a security risk where a malicious hacker could get access to your iPhone using the default password without your knowledge.
To change the default password of your jailbroken iPhone, please follow this guide.
MacWorld has listed down some more security tips for the iPhone which you might want to go through. I have only listed the ones which I felt were quite important.
Let us know what you think? If you know of any other security tips, please share it with your fellow readers.

Dev Team Releases Redsn0w 0.9.12b2

iPhone Dev team has just released a new version of Redsn0w 0.9.12b2.

The new version will now explicitly ask users of A4 or lower powered iOS devices if they want to inject rocky-racoon using the DFU ramdisk method or the backup/restore method. It also includes a fix for the iBooks issue for iPhone 3GS with oldroom.
When iPhone Dev team released Redsn0w 0.9.12b1, which includes support for pod2g's iOS 5.1.1 untethered jailbreak, they had advised users of A4 powered iOS devices with lots of media to use the DFU ramdisk method. They've now explicitly asking users that question during the jailbreak process so that they don't run into a problem later.
iPhone Dev team has provided the following information on their blog:

Starting with version 0.9.12b2, redsn0w will now explicitly ask users with limera1n-able devices whether they want to inject rocky-racoon using the DFU ramdisk method or the backup/restore method (the ramdisk method is better for those with lots of media on their devic% that would create very large backups, and it’s required for those with unactivated iPhones).  If you’ll always want to use limera1n, you can select that in the Preferences pane.  It also fixes an iBooks issue on old-bootrom 3GS iPhones, and provides more useful error messages when things go wrong.

Here're the download links:

Department 2012 DVDrip 700MB


Department Movie Poster

Movie Info


IMDB:Department 2012
[Format]..............[ Matroska
[Genre]...............[ Action
[Cast]................[ Amitabh Bachchan, Rana Daggubati, Sanjay Dutt, Nathalia Kaur
[Writer]:.............[ Nilesh Girkar
[Director]:...........[ Ram Gopal Varma
[Size]................[ 700 MB
[Duration]............[ 2 h 21 min
[Search Subtitles]....[ Subscene.com
[Source]..............[ DVDRip

Download : Part1    Part2    Part3    Part4    Part5    Part6    Part7

Jun 20, 2012

How to install Android SDK without internet connection

I searched all over the internet and found no posts like this, hence I'm making one hoping it would be helpful for a lot of people.

The magic URL used to be - http://dl-ssl.google.com/android/repository/repository.xml (Outdated)
That is the XML file from which the URL for downloading the SDK packages are obtained.

Update :- The previous URL is now invalid, the new URL is given below
https://dl-ssl.google.com/android/repository/repository-5.xml


For e.g. if you want to download Android SDK for version 4.0.3 for all platforms, you could look up that XML file. You will find a block under tag SDK 4.0.3 like this



44758833
f2aa75133c29916b0b0b984974c2d5e46cb09e9c
android-15_r01.zip




So the URL will be is http://dl-ssl.google.com/android/repository/android-15_r01.zip


If all the above sounds too complex

You can directly download from the below links. If this page does turn out to be useful, then I might update it regularly. Do leave a comment to let me know if it has helped you.


Android SDK Platform 4.0.3 (*** NEW ***)
All Platforms

Android SDK Platform 4.0
All Platforms

Android SDK Platform 3.2 revision 1
All Platforms

Android SDK Platform 3.1 revision 3
All Platforms

Android SDK Platform 3.0, revision 2
All Platforms

Android SDK Platform 2.3.3_r2
All Platforms

Android SDK Platform 2.3.1_r2
All Platforms

Android SDK Platform 2.2_r3
All Platforms

--- OLDER LINKS (Still working) ---

Android SDK Platform Honeycomb Preview, revision 1
All Platforms

Android SDK Platform 2.3.3_r1 (Offline complete download) - Approx 80 MB
All Platforms

Android SDK Platform 2.3_r1 (Offline complete download) - Approx 80 MB
All Platforms

Android SDK Platform 2.2_r2 (Offline complete download) - Approx 80 MB
Windows
Mac
Linux

Android SDK Platform 2.1_r1 (Offline complete download) - Approx 80 MB
Windows
Mac
Linux

Android SDK Platform 2.0.1_r1 (Offline complete download) - Approx 80 MB
Windows
Mac
Linux

Android SDK Platform 2.0, revision 1 (Offline complete download) - Approx 80 MB
Windows
Mac
Linux

Android SDK Platform 1.6_r2  (Offline complete download) - Approx 63 MB
Windows
Mac
Linux

Android SDK Platform 1.5_r3  (Offline complete download) - Approx 54 MB
Windows
Mac
Linux

Android SDK Docs for Android API 7, revision 1 - Approx 48 MB
All Platforms

Android SDK Tools, revision 5  (16 to 23 MB)
Windows
Mac
Linux

Jun 19, 2012

Internet Download Manager 6.11 Build 8 Retail



Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.
 
Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.


Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.
Version 6.08 adds IDM download panel for web-players that can be used to download flash videos from sites like YouTube, MySpaceTV, and Google Videos. It also features complete Windows 7 and Vista support, YouTube grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.

What's new in version 6.11 Build 7 ?
- Improved IDM categories. Added a feature to create categories for specific sites
- Fixed false interception of web ads
- Improved HTML5 video detection in IE 9 & 10 on youtube
- Improved Youtube video downloading from Google Chrome
- Added support for Firefox 13, SeaMonkey 2.8, SlimBrowser and Epic Browser
- Added Socks traffic monitoring for Google Chrome & Opera
- Added compatibility with address hiding programs
 
 
Download : Here

American Pie Reunion 2012 Full Movie Free Download

American Reunion 2012 Movie Poster
  IMDB Link: http://www.imdb.com/title/tt1605630/
  Rating: 7.6/10
  Release Date: 13 April 2012 (India)
  Genre: Comedy
  Stars: Jason Biggs, Alyson Hannigan and Seann William Scott

  Directors : Jon Hurwitz, Hayden Schlossberg
  Writers : Adam Herz (characters), Jon Hurwitz
  Duration :112 Mins
  Country :USA
  Language :English| Subtitles : YES



 






Plot : In the comedy American Reunion, all the American Pie characters we met a little more than a decade ago return to East Great Falls for their high-school reunion. In one long-overdue weekend, they will discover what has changed, who hasn’t and that time and distance can’t break the bonds of friendship. It was summer 1999 when four small-town Michigan boys began a quest to lose their virginity. In the years that have passed, Jim and Michelle married while Kevin and Vicky said goodbye. Oz and Heather grew apart, but Finch still longs for Stifler’s mom. Now these lifelong friends have come home as adults to reminisce about-and get inspired by-the hormonal teens who launched a comedy legend.


Download on mediafire.com :  Part1   Part2

Learn php cd 1



Jun 18, 2012

Adobe Photoshop CS6 13.0 Final Multilanguage With Patch 1.79GB Free Mediafire / JUMBOFILES Download Links



Photoshop CS6 Extended Features

What's new in Photoshop Extended?

Adobe® Photoshop® CS6 Extended software delivers even more imaging magic, new creative options, and the Adobe Mercury Graphics Engine for blazingly fast performance. Retouch with greater precision, and intuitively create 3D graphics, 2D designs, and movies using new

Kaspersky PURE 2.0 Total Security 2012 with Key Updater Free Mediafire Download Links


Kaspersky PURE gives you much more than just antivirus software.
It̢۪s everything you need to protect all the most important assets in your digital
life: your computer, your online accounts, your most valuable data… even your
family. It gives you the peace of mind of knowing your digital life is safe, your
PC is in tip-top condition, your most valuable information is secure and your
family is protected.
Benefits
FIGHT digital pollution
Kaspersky PURE fights viruses, malware, spyware, spam and more without
getting in the way of your applications or your online experience.
Its security tools can erase data trails, so hackers can not

The Woman in the Fifth 2011 BRrip 720p 550MB



[Format]…………..[ Matroska
[Genre]……………[ Thriller
[Cast]…………….[ Ethan Hawke, Kristin Scott Thomas, Joanna Kulig, Samir Guesmi
[Writer]:………….[ Douglas Kennedy, Pawel Pawlikowski
[Director]:………..[ Pawel Pawlikowski
[Size]…………….[ 550 MB
[Duration]…………[ 1 h 25 min
[Search Subtitles]….[ Subscene.com
[Source]…………..[ geckos

Jun 5, 2012

Collection of video BBC English Plus 60 Lessons DVD

Collection of video BBC English Plus 60 Lessons DVD
Language: English
AVI | XviD 335kbps | 320 x 240 20fps | MP3 80kbps | 2.16 GB

Genre: E-Learning
Entertaining everyday situations played by English actors using progressive language based on the specifications of the Council of Europe?s experts.
The students may choose between watching them without subtitles or with subtitles in English or in their native language.
Explanation:
A tutor in the learner?s language explains the grammar and vocabulary used in the Presentation.
Practice:
The tutor proposes different exercises and drills for the students to practice what they have learnt in the previous sections.
The complete English-teaching video course

Researchers bypass Google Bouncer Android Security

Researchers+bypass+Google+Bouncer+Android+Security

Google's Android platform has become the most popular mobile operating system both among consumers and malware writers, and the company earlier this year introduced the Bouncer system to look for malicious apps in the Google Play market.
Bouncer, which checks for malicious apps and known malware, is a good first step, but as new work from researchers Jon Oberheide and Charlie Miller shows, it can be bypassed quite easily and in ways that will be difficult for Google to address in the long term.

Bouncer is an automated process that scans apps for known malware, spyware, and Trojans, and looks for suspicious behaviors and compares them against previously analyzed apps. If malicious code or behavior is detected, the app is flagged for manual confirmation that it is malware.



This screencast shows our submitted app handing us a connect-back shell on the Bouncer infrastructure so that we can explore and fingerprint its environment,” Oberheide wrote in a blog post this morning.
While Bouncer may be unable to catch sophisticated malware from knowledgeable adversaries currently, we’re confident that Google will continue to improve and evolve its capabilities. We’ve been in touch with the Android security team and will be working with them to address some of the problems we’ve discovered.

Flame Malware Spread Via Rogue Microsoft Security Certificates

Flame+Malware+Spread+Via+Rogue+Microsoft+Security+Certificates

Microsoft released an emergency Windows update on Sunday after revealing that one of its trusted digital signatures was being abused to certify the validity of the Flame malware that has infected computers in

UGNazi hackers attack on CloudFlare via a flaw in Google

UGNazi+hackers+attack+on+CloudFlare+via+a+flaw+in+Google

After the FBI arrested Cosmo, the alleged leader of the UGNazi hacking group, the hackers attacked CloudFlare via a flaw in Google's

Jun 1, 2012

Ex MI5 chief gets her laptop stolen at airport

The former Director-General of UK's internal security service MI5 has had her laptop stolen at London's Heathrow airport on Tuesday.

Dame Stella Rimington, who headed the agency from 1992 to 1996, has since then become a well-known spy thriller author. According to

Flame Malware - 21st Century Massive cyber attack on Iran


A massive, highly sophisticated piece of malware has been newly found infecting systems in Iran and elsewhere and is believed to be part of a well-coordinated, ongoing, state-run cyber-espionage operation.

The Flame computer virus not only stole large quantities of information from various Iranian government agencies, but apparently even disrupted its oil exports by

Hackers took control of two satellites for few minutesHackers+took+control+of+two+satellites+for+few+minutes According to a US report recently claimed that hackers had managed to interfere with two military satellites, but one expert argues the amount of energy required would be too great for ordinary hackers. The hackers took control of the Landsat-7 and Terra AM-1 satellites for a grand total of 12 minutes and two minutes respectively. One might hope that the communications satellites suspended in orbit above the earth might be one component of the planet’s technology infrastructure that is safely out of harm’s way.

Hackers+took+control+of+two+satellites+for+few+minutes

According to a US report recently claimed that hackers had managed to interfere with two military satellites, but one expert argues the amount of energy required would be too great for ordinary hackers.

The hackers took control of the Landsat-7 and Terra AM-1 satellites for a grand total of 12 minutes and two minutes respectively.

One might hope that the communications satellites suspended in orbit above the earth might be one component of the planet’s technology infrastructure that is safely out of harm’s way.
But as satellite communications enthusiast Paul Marsh explained at the London Security B-Sides event in April, there are reasons to doubt the reports. He spoke about a similar story, reported in the late 1990s, about hackers supposedly accessing UK military satellite communications network SkyNet and ‘nudging’ one satellite out of synch.

Whether Chinese hackers have that capability now is just one more matter of speculation to add to the opaque field of cyber warfare.

 

NSA intercepting 1.7 billion American electronic communications daily


Since 9/11, the Agency has been able to "spy" on electronic communications without the need for court-approved warrants. The group has a large complex in Utah that cost $2 billion and holds the data. In 2006 the New York Times revealed that the Bush administration was