Jump to content
  • Announcements

    • CyberGod

      Donate and Get VIP Premium Accounts Plus More!!!

      If you have ANY questions about donating, please PM ADMiN   ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••   CP NEEDS YOUR DONATIONS!!!   Cyberphoenix runs on high-end Intel Servers , Your donations help us keep the site running smoothly     Donating to CP not only provides you an opportunity to support the site but also get your name posted in the shoutbox, recognizing that you donated, and publicly thanking you.   Benefits of Donating ► Respect of all of our staff, mods, and members.   ► Access to our special VIP forums.   ►A Green name color.   ► A custom member title. (Instead of teacher you could be l337 Donator)   ►In depth tutorial on how to activate windows (including windows 7) / office & receive windows updates!   ► #1 Priority when you request in VIP Requests.   ► The latest HTTP (non rapidshare) links and Premium Downloads!!!   ► You get to have an email like yournamehere@cyberphoenix.info (PM for info!)   ► Max PM storage from 50 to 10,000.   ► Can DELETE your own posts.   ► Avoid all Flood Control Limits.   ► Can change your display name max of two times every 30 days. (PM for info!)   ► RapidLeech Services.   ► Can request, and get #1 priority, in the shoutbox.   ► There is so much that isn't listed here. Donate Today!   We also have a lifetime package available!
    • Mr Grumpy

      Post Requirement for requests

      Before a request can be made there is a requirement that a minimum of 5 other posts be made. This can include an introduction post and replies to other posts. Please do not try to bypass this requirement or the request may be deleted. That includes trying to use the shoutbox where requests are strictly forbidden.
    • Mr Grumpy

      Definition of anime

      Anime is not ordinary animated video it is Japanese movie and television animation, often having a science fiction theme and sometimes including violent or explicitly sexual material. Please do not post ordinary animated video in this section. It belongs in either type of movies or TV shows depending on what is being posted
    • CyberGod

      Rules of the CyberPhoenix Community : A Must Read   03/18/2018

      All Boards: 1.1 Cyberphoenix is a family forum open for all ages. Explicit, vulgar language, drug, religion, political talk, nudity, porn, hacking, money schemes, scams,advertisements and such others are not allowed. There will be a straight ban, no bargains. 1.2 No mini-modding. Use the report button but do not add your own criticisms.The forum language is strictly limited to English. This includes posts, titles, signatures, profiles and other forms of public display and also includes the main audio language of movies etc. 1.3 No advertisement of any website or forum in posts or signatures nor any live links to be posted. 1.4 All e-mail addresses, passwords and external links of any kind MUST be coded. 1.5 No bumping of threads. 1.6 No impersonating a staff member. 1.7 Respect one and all and No Flaming 1.8 Any member with multiple accounts will have all accounts permanently banned immediately, no bargains. 1.9 No Disrespecting CyberPhoenix Staff will be tolerated and can lead to a Permanent Banned.     Warning System: 2.1 Members breaking rules will be appropriately warned or banned. 2.2 Members with three warnings will be immediately banned.For serious offences or anti-forum activities and posts, members may be banned without warning. 2.3 Warnings may have an expiry date or may be permanent if more serious. 2.4 Do not argue about warnings or bans because they could escalate; pm senior staff if necessary.   Posting Rules: 3.1 a) All topics must contain a valid description. b) Topics must be posted in the relevant forums. Check before you post. c) All freeware posts must have the software homepage link in the post.   3.2 Topic titles must be appropriate. No adjectives such as new, latest, etc. or other such words are to be used in the title. 3.3 Absolutely no duplicate posts. Search before you post and update your links, by editing your post, if necessary. Add to the existing post on that topic. Non-compliance will get post deleted and member warned. No bargains and no clarification on this. 3.4 ALL externally hosted files MUST have a 'freely available' option without the need for Premium Accounts or Registering, completing surveys or assorted hoop-jumping. This also means ensuring file sizes are within the limits specified by any Hosting Site you upload to. Larger files requiring Premium or Registering access may only be shared providing a 'free' option has been given. Disabling the Add Blocker is considered Hoop-Jumping and isn't allowed. 3.5 . No Trading or selling allowed and promoting of Premium Accounts to enable faster/unlimited downloading is not allowed. Each site has advertising within it's own pages clearly showing benefits of Paid versus Free accounts. Please do not act as a salesperson or chase commission through referrals. 3.6 Posts should not contain explicit, offensive, shocking, nudity, and meaningless matter. All freeware posts must have the software homepage link in the post. 3.7 No megapost or multiple threads for a topic allowed. (Only Staff and VIPs with permission from admins can).No index page, every post is to be separate. 3.8 Do not excessively and unnecessarily 'pad out' your archives/files (rar,zip,etc..). For example, adding a 10MB .mp3 with a 50k .sis OR 3mb image file with a 3mb .apk just to earn an extra file host point is totally unacceptable. Maximum acceptable file size that can be added in rar/archive is 3mb. Staff reserve the right to edit any file & re-upload or simply remove/trash without notification. 3.9If the RaR file has a Password you must give the Password and/or the Post will be Deleted and further action can happen   Banned Filehost: 4.1 Filevelocity, linkcrypt, ryushare and 4shared are not allowed on CP. Any post/thread not adhering to this policy will be deleted. Further file hosts may be added in future. File Host Banned (CS), Hulkload, Filehost banned (NF), picofile.com and egofiles, banned filehost (UR) and Uploadgig,com now added to banned list as well as File Host Banned (KF).Fileshark.pl, Linkshrink.net Banned filehost (mu) and worldbytez.com and u4 banned file host 4.2 No Redirector, masked, protected or referral links otherwise your post may be edited or simply removed/trashed without notification. These sites include, but not limited to the following, subject to addition with immediate effect: 4shared adf ly adfoc.us anonym.to any.gs bit.ly File Host Banned (CS) Downloadsafe.org dyo.gs egofiles file.cloudns.org filehost.s7s7.org filemates.com Fileshark.pl. Filevelocity File Host Banned (KF) letitbit net linkcrypt linkcrypt.ws linksbucks com Linkshrink.net makeashorterlink com masl to Banned filehost (mu) Filehost banned (NF) paste2.org Peeplink.in picofile.com q.gs qqc.co ryushare ryushare com Filehost banned File Host Banned (SU) sharecash com sharecash org. banned redirect filehost (Ss) Short.go4down snipurl com tinylinks.co tinypaste.com tinyurl com u4 banned file host uploadbox com Banned file host (ug) banned filehost (UR) usercash com verified-download.com worldbytez.com   Spam Rules: 5.1 No promoting any website. For the Link Heaven section sites that are within the rules are allowed. 5.2 No webhosting discussion, introduction or advertisement unless it is a CyberPhoenix sponsor. Passwords with other site names are not allowed. 5.3 Unrequired passwords but posted or Posts requiring passwords with missing passwords will turn the post spam. Spam will be deleted and the member banned 5.4 Wrong content in files with dubious names or containing security threats will lead to bans.   Private Messaging: 6.1 All above rules apply to private messaging. Poaching any member or staff member is strictly forbidden. 6.2 PMs from staff and admins must be replied within 48 hours or the member will be restricted from using the forums.   Avatars and Signatures: 7.1 All above rules apply to avatars and signatures. 7.1 The total maximum dimensions for all images in a signature is 500px (width) by 200px (height) horizontally only.   Explicit Guidelines: 8.1 Sticky Requests: No request for a post to be made sticky. No polls for topics usefulness or stickiness. 8.2 Normally no username or password changed except staff or VIP. 8.3 Don’t ask for promotions, send applications in the designated forum only. No advertising sites or email addresses in images or text.   ShoutBox Rules: 9.1 No Spamming, flaming or vulgar words or discussions about banned subjects. 9.2 Strictly No Requests in Shoutbox or your Privilege will be Revoked. There is a separate forum for requests. 9.3 No answering requests or posting large images in shoutbox. 9.4 ShoutBox is for General Chat - Political Statements will be kept to a minimum (If CP Staff thinks it too much he/she will stop it).   Regards CyberGod       These rules may be subject to amendments at any time so please keep referring back from time to time.   Legend: Basic rules fundamental. Usually about all sections. Usually about Download Links sections. Usually about requests and general sections. Advanced rules specification.


Popular Content

Showing most liked content since 03/16/2018 in all areas

  1. 2 points
    They're back -- the wonderful church bulletins! Thank God for the church ladies with their typewriters or keyboards! These sentences (read carefully) actually appeared in church bulletins or were announced at the church services. Enjoy! ----- The Fasting and Prayer Conference includes meals. ----- Scouts are saving aluminum cans, bottles and other items to be recycled. Proceeds will be used to cripple children. ----- The sermon this morning: "Jesus Walks on the Water." The sermon tonight: "Searching For Jesus." ----- Ladies, don't forget the rummage sale. It's a chance to get rid of those things not worth keeping around the house. Bring your husbands. ----- Don't let worry kill you off -- let the Church help. ----- Miss Charlene Mason sang "I Will Not Pass This Way Again," giving obvious pleasure to the congregation. ----- For those of you who have children and don't know it, we have a nursery downstairs. ----- Next Thursday there will be try-outs for the choir. They need all the help they can get. ----- Irving Benson and Jessie Carter were married on October 24 in the church. So ends a friendship that began in their school days. ----- A bean supper will be held on Tuesday evening in the church hall. Music will follow. ----- At the evening service tonight, the sermon topic will be "What Is Hell?" Come early and listen to our choir practice. ----- Eight new choir robes are currently needed due to the addition of several new members and to the deterioration of some older ones. ----- Please place your donation in the envelope along with the deceased person you want remembered. ----- The church will host an evening of fine dining, super entertainment and gracious hostility. ----- Potluck supper Sunday at 5:00 PM. Prayer and medication to follow. ----- The ladies of the Church have cast off clothing of every kind. They may be seen in the basement on Friday afternoon. ----- This evening at 7 PM there will be a hymn singing in the park across from the Church. Bring a blanket and come prepared to sin. ----- The pastor would appreciate it if the ladies of the congregation would lend him their electric girdles for the pancake breakfast next Sunday. ----- Low Self-Esteem Support Group will meet Thursday at 7 PM Please use the back door. ----- The eighth-graders will be presenting Shakespeare's Hamlet in the church basement Friday at 7 PM. The congregation is invited to attend this tragedy. ----- Weight Watchers will meet at 7 PM at the First Presbyterian Church. Please use large double door at the side entrance. ----- The Associate Minister unveiled the church's new campaign slogan last Sunday: "I Upped My Pledge -– Up Yours." -----
  2. 2 points
  3. 2 points
  4. 1 point
    I have been trying to get any albums by Robyn, if anyone can help you will make me a happy man Thanks in advance wozza4
  5. 1 point
    Hello all, thank you for having me, Hope to find some good thing i am interested in and meet some new friends.
  6. 1 point
  7. 1 point
    My last work in this App Showcase... just something i got on PC to show in CyberPhoenix Check app: https://therealfouz.co/wp-content/uploads/2018/03/Showcase-3.png
  8. 1 point
  9. 1 point
  10. 1 point
    Ok,dlding now,thanks 4 your Lightning Response...
  11. 1 point
  12. 1 point
    How I went dark in Australia's surveillance state for 2 years In the modern city, anything and everything is open to surveillance. August 1, 2016. The day I'd been dreading. Sydney had finally abolished paper train tickets and I was getting ready to erase my identity. The Australian state of New South Wales had been gradually transitioning away from paper tickets for more than two years. In the interests of entering the digital era, Transport NSW introduced the new 'tap-on, tap-off' Opal card. A contactless travel card, named after Australia's distinctive rainbow-hued Opal gemstone, it's similar to London's Oyster card and the San Francisco Clipper. Welcome to the future! No more paper tickets! Top up your Opal card online! Set up a direct debit, download the accompanying app and track your spending, you mouth-breathing luddite -- this is the 21st century! But if this was my ticket to the future, I was not on board. I'm not against going digital. I have an email account. I use internet banking. I have even foregone my family's tradition of using a cool, damp sack to store milk in favor of putting it in the "refrigerator." But in the context of an increasingly pervasive culture of state-sanctioned digital surveillance in Australia and across the world, this smart card smarted. Surveillance state In 2015, during the transition from paper to Opal, Australia passed sweeping new data retention laws. These laws required all Australian internet service providers and telecommunications carriers to retain customers' phone and internet metadata for two years -- details like the phone number a person calls, the timestamps on text messages or the cell tower a phone pings when it makes a call. Suddenly, Australians were fighting for the right to stay anonymous in a digital world. On one side of the fence: safety-conscious civilians. They argued that this metadata was a powerful tool and that the ability to track a person's movements through phone pings or call times was vital for law enforcement. On the other side of the fence: digital civil libertarians. They argued that the data retention scheme was invasive and that this metadata could be used to build up an incredibly detailed picture of someone's life. And sitting in a barn two paddocks away from that fence: me, switching out burner phones and researching VPNs. When it emerged that police had the power to search Opal card data , track people's movements and match this to individual users, it was the last straw. August 2016 rolled around, paperless tickets were phased out and I hatched my plan. The Black Opal. Here be monsters: A guide to the dark web Going off the grid The concept of the Black Opal is simple. Buy your transport card. Pay cash. Top up with cash (preferably in a new location each time). Never register it. Never link it to your credit or debit card. Live off the grid. Stay away from The Man. I went dark in early 2016, when I needed to catch a train through the city. It was simple enough. Most Opal cards are sold at newsagents or corner stores -- the card itself is free, and you fill it with credit in increments of AU$20 or AU$50. I bought a card, added credit and walked away into the night. I tapped on at Central Station, just another faceless commuter. But as I walked through the meatspace, jostling with peak-hour travellers and being thrust into the armpits of sweat-addled corporate lackies on my packed train, I knew I was safe. Deep in the Transport NSW matrix, I was unidentifiable. A few weeks later I needed to top up. No problem! I jumped off the train at [REDACTED] station and filled my card at the [REDACTED] across the road. I paid [REDACTED] for one Opal top-up, two [REDACTED] bars and a copy of the weekly [REDACTED] Times. Faceless, nameless bliss. Then the problems started. Always bet on black I'm all for escaping the Orwellian nightmare of the modern surveillance state. But when you rage against the machine, you still have to associate with the bulls on parade. All the top-up machines at train stations, light rail stops and ferry terminals were card-only affairs. One tap on that baby and you were back in the system. So, if I was busing downtown for a work meeting, I'd have to factor in extra time to get to an ATM, get cash out and then find somewhere to top up my card. Running for the train with friends, I was the one who had to divert three blocks, change jackets, burn off my fingerprints and find a nondescript corner store to top up. Here's what I learned. No one likes the paranoid one. I constantly harass my friends for signing up for rewards cards that track their spending. My email address (that is, my real email address, not my burner address) doesn't use my birth name. I am no fun at birthday parties, but you'd never know it... mostly because I won't reveal my actual birthday. But I'm not alone. For someone who was mostly educated through the received wisdom of Hollywood movies, I learned a lot about what The State could do to me. I watched "The Net" as if it were a documentary. I didn't brush my hair for weeks after watching "Gattaca." I spent months walking around my house, narrating my life after watching "The Truman Show," just to give Ed Harris more material to edit. I wish these stories weren't true. But in the grim near future of "Demolition Man" I know I would be the one hiding in the bathroom, away from the countless surveillance cameras, trying to stop people stealing my eyeballs. (At least I'll have plenty of time to work out how to use the three seashells.) End game I finally came undone last week. Racing for a flight, I forgot about my Black Opal. I'd had an unusually busy week on public transport, and my balance was low. On the train to the airport terminal, it hit me. Did I have enough money on my card to pay the AU$17.76 tap-off fee that they use to gouge tourists at the airport? As I rode up the escalators and the exit turnstiles came into view, my heart sank. No ATM. No cash in my wallet. Just a row of bright green Opal readers and a top-up machine. Card only. With one trip, my years of off-grid living were undone. (And yes, it was two years, not three. My how time flies when you're madly tweeting like a paranoid vagrant at the airport.) I slumped against the top-up machine and swiped my debit card. I was just 9 cents short, but it cost me so much more than that. My Black Opal was dead. $19.84 I bought a new Opal last Monday. Hidden in my wallet, it represents the freedom to traverse the city undetected. I'll use the last few dollars on my Tainted Opal, but even though you'll see my human suit on the train, that won't be the real me. The real me is already beneath the mainframe: stockpiling cash, buying a collection of cheap nylon wigs and mapping out a network of newsagents with red string so I put all my money on Black. I know my spending can be tracked on my debit card. I know virtually all my personal information is now in the system, thanks to driver's license records, electricity bills and that government-sponsored data sweep they call "the census." Hell, I even know my telco can hand over a map of every cell tower ping my phone makes as I cross the city on the train. But as long as I'm carrying my Black Opal, there's that little shred of liberty. If this the hill I die on, at least you'll never know how I got here.
  13. 1 point
  14. 1 point
  15. 1 point
  16. 1 point
    Microsoft Just Made a Terrible Decision to Force Edge on Users Microsoft looks set to skate into some serious negative feedback, with the decision to force its Edge browser as the only way to view links in email. The change was previewed in the most recent Windows 10 Insider Preview, with Microsoft saying that it's hoping to get feedback as to how well the system works. According to the software company, it has reasons other than just wanting people to actually open its Microsoft Edge browser beyond using it to download Chrome or Firefox. The new feature overrides what browser default is currently set on a Windows 10 PC. When you click a link in Windows Mail, if you're on the Skip Ahead ring of the new Windows 10 Windows Insider build, no matter what browser you commonly use, the link will open in Edge. Edge “provides the best, most secure and consistent experience on Windows 10 and across your devices,” Microsoft insists, as justification for its decision. It also points to the browser's power efficiency, not to mention its integration with Cortana and cloud storage services like OneDrive, and its note-taking support. Still, unsurprisingly, the initial feedback hasn't been great. Indeed the general consensus on Twitter and elsewhere so far is that Microsoft has made a big mistake. Happily, part of the reason for the Windows Insider process is to get feedback on new and potential changes to the regular version of Windows 10. With luck, enough negative comments will be filed to persuade the company that some forced Edge runtime isn't enough to offset user ire. Elsewhere in this new build, though, there are some improvements actually worth having. For example, there's now Windows 10 support for HEIF, or High Efficiency Image File Format, images. They're the default image type on the iPhone X and other 2017 iPhone line-up, and while Apple's smartphones are meant to automatically convert them if they're being shared to a device that lacks native HEIF support, that process doesn't always happen. Unfortunately Windows 10 still can't be used to natively edit HEIF, but opening them at least is a good start. There's also a new, safer way to remove external GPUs that are connected by Thunderbolt 3. Now, as has been the case for some years with USB drives and other accessories, there's now an entry for Thunderbolt 3 GPUs under the “Safely Remove Hardware and Eject Media” icon in the toolbar. Windows 10 will also now give a warning if, when that's selected, the GPU is still being used.
  17. 1 point
  18. 1 point
  19. 1 point
  20. 1 point
    Oh and let me know after you get it, So I can delete it off the download sever
  21. 1 point
  22. 1 point
    I'm after a series of movies The Submission of Emma Marx (2013) The Submission of Emma Marx: Boundaries (2015) The Submission of Emma Marx: Exposed (2016) The Submission of Emma Marx: Evolved (2017) The Submission of Emma Marx: IV (No pic available) The Sexual Liberation of Anna Lee (2014) The Temptation of Eve (2013) Would prefer links to be on any host other than Rapid please... TYVMIA
  23. 1 point
    I got boundaries and Evolved over night via torrent, getting harder to access torrents here...
  24. 1 point
  25. 1 point
    Have a fun weekend skiing after watching this Spring skiing in the Northeast is a particularly wonderful time of year. There's enough snow accumulation by this point to cover the worst of the rocks, temperatures are slowly creeping above freezing, and it doesn't get dark at 3.30. But I doubt anyone will want to hit the slopes this weekend after watching this video of an uncontrolled rollback accident on a ski lift in Gudauri, Georgia. According to two videos of the incident and a news report, ten people were injured and two are in critical condition after a ski lift failed in the most catastrophic way possible. What you can see happening in the video is called a “weighted rollback,” and it's about the worst thing that could possibly happen to a ski lift. It occurs when passengers are loaded onto the uphill side of the lift, creating a weight imbalance. Normally, the lift's engine and braking systems prevent the chairs from rolling back, but it appears that in this case, all the safety mechanisms failed. The result is that the chairs speed back towards the bottom at increasingly high speeds. When the chairs try and go around the wheel at the bottom, the high speeds create such a force that the chairs and occupants are flung off to the side, creating the chaos you can see. Luckily, most of the passengers had the right idea and bailed off the chair before reaching the bottom, trading a grisly encounter with a pile of twisted metal for a small fall into a pile of snow.
  26. 1 point
    iOS might have a backdoor that can be used to hack into any iPhone, even the iPhone X Apple has been advertising its focus on user data security and privacy for years now. Encryption ensures data security as long as you protect your devices with a password, pin, fingerprint, or face. Nobody should be able to access the contents of your iPhone without access to your password, and that's why the FBI tried to force Apple in early 2016 to create a backdoor into an iPhone belonging to the San Bernardino shooters. Ultimately, the FBI backed down because it discovered it could use a third-party's services to access the password-protected iPhone. In other words, someone found a backdoor into Apple's 2016 software and was able to use it to access the contents of encrypted iPhones. Fast forward to 2018, and it looks like a similar backdoor still exists and can unlock encrypted any device, including the iPhone X. The device in the following image looks like an Apple TV, but it is, in fact, a gadget that can decrypt iPhones. It's called GrayKey, first detailed in a blog post on Malwarebytes, and features two Lightning cables. Two phones can be connected for about two minutes. After that, they're disconnected, and the cracking begins. It all happens on the phone, as some sort of software is loaded on it using the GrayKey box. The software, which seems to jailbreak the phone, brute-forces its way into the password. After a period of time, the iPhone will show a black screen that contains the password needed to decrypt the phone. The company that makes these boxes is called Grayshift and claims that even disabled phones can be unlocked. Once the password is obtained, the full contents of the phone are downloaded to the GrayKey device. That includes the entire unencrypted contents of the keychain. The following image shows that no iPhone is safe. An iPhone X running iOS 11.2.5 was hacked using the same hardware. Malwarebytes explains that GrayKey comes in two flavors, including a $15,000 option that requires an internet connection and is geofenced to a single location. The $30,000 model will let you use the GrayKey without an internet connection, and you can move the device anywhere you want. It's unclear whether the iOS vulnerabilities used to crack the San Bernardino iPhone are what make possible these GrayKey hacks. Grayshift was founded in 2016, and it sells the device to law enforcement agencies. But if this report is accurate and the gadget can break into Apple's latest iOS release, it doesn't even matter. The fact remains that someone out there found a way to bypass Apple's encryption, a backdoor that can be exploited for as long as it takes for Apple to patch it. As long as only law enforcement uses these devices, you should not worry too much about it. But if obtained by malicious individuals, GrayKey may be used to spy on people — physical access to the device is still needed. And you can imagine how happy totalitarian regimes out there would be to find out they can spy on encrypted iPhones. What's worse, the device could help iPhone thieves reset stolen iPhones that are locked with a password and then sell them. It goes without saying that it's very unlikely that Apple built this backdoor into iOS. And if it did, we'd never know that such a backdoor officially exists. That's the point of backdoors. But the fact that someone not connected to Apple was able to unearth this vulnerability proves, once again, why backdoors should not be built into encrypted devices. Eventually, someone out there will dig them up.
  27. 1 point
    One week and counting folks, and then it’ll be time to break out the beer and bangers! St. Patrick’s Day wouldn’t be complete without Bangers & Mash with Guinness Onion Gravy. It’s a tradition. Ingredients: 6 large banger sausages 2 Tbsp. olive oil Guinness Onion Gravy: 2 Tbsp. butter 1 Tbsp. olive oil 2 medium yellow onions thinly sliced 2 Tbsp. all-purpose flour 2 cups Blonde Guinness Beer 1 Tbsp. Dijon Mustard 1 Tbsp. Worcestershire sauce 2 tsp. granulated sugar 1/2 tsp. kosher salt 1/4 tsp. freshly ground black pepper Mashed Potatoes: 2 lb. russet potatoes 4 Tbs. 1/2 stick butter 1/2 cup whole milk 2 tsp. kosher salt 1 tsp. freshly ground black pepper Instructions: Guinness Onion Gravy: Melt the butter in a large skillet over medium-high heat. Add the olive oil and the onions and saute, stirring often, until caramelized, about 30 minutes. Add the flour and cook until golden brown, 2-3 minutes. Add the Guinness, Dijon, worcestershire, sugar, salt and pepper. Reduce heat to low and simmer until thickened, about 8-10 minutes. Bangers: Heat oil in a large cast-iron skillet over medium heat. Add bangers and cook until evenly browned on both sides and cooked through, about 12-15 minutes. Mashed potatoes: Peel potatoes and cut into large chunks. Place in a saucepan with water to cover, salt the water and bring to a boil over medium heat. Cook until the potatoes are tender when pierced with a fork, about 15 minutes. Drain and mash with a potato masher. Add the butter and milk and continue to mash until smooth. Season with salt and pepper. To assemble: Place mashed potatoes on plate, top with a sausage and gravy. Prep Time: 30 mins Cook Time: 1 hr Total Time: 1 hr 30 mins Servings: 4
  28. 1 point
    Ingredients: 2 cups All-Purpose Flour 2 tablespoons brown or granulated sugar 1 teaspoon baking soda 1/2 teaspoon salt 3 tablespoons butter, cold and cut into 1/4-inch cubes 1 egg 3/4 cup buttermilk 1/2 cup raisins (optional) Steps: 1. Preheat oven to 375°F. In the bowl of a stand mixer, combine flour, brown sugar, baking soda and salt. Gradually add in butter and mix with paddle attachment until crumbly. 2. In a small, separate bowl, whisk together buttermilk and egg. Pour into flour mixture and mix until just combined. The dough should be shaggy and a little wet, but not too much. If it's so wet that you can't hold it in your hands, add 1 tbsp flour at a time until it comes together. Do not knead. 3. Fold in raisins, if desired. 4. Shape dough into a round loaf and place in the center of a lightly greased cast-iron pan or a parchment paper-lined baking sheet. Cut a 1/4-inch deep cross on the top of the loaf. Bake 30-35 minutes or until golden brown (you may need to tent aluminum foil over the top of the loaf in the oven if it's browning too fast). 5. Serve warm.
  29. 1 point
  30. 1 point
    Scrabble Keyboard is Truly Real The folks at Massdrop announced that they'd be coming correct, officially, with a Hasbro collaboration to make a Scrabble Keyboard. This keyboard is mechanical, which is neat, but it's mostly made because the keys look slick. This Scrabble-themed keyboard doesn't just make its user appear smart, it makes its user feel like they know all sorts of words and such, too. In addition to the full standard keycap set, users have the option to roll with several alternate keys. One is the Enter/Return key which can be replaced with a Scrabble brand keycap. Also in the mix are Double Word Score and Triple Word Score keycaps. The standard Escape key is replaced by the star graphic from the Scrabble game board. The keyboard they're using is a standard “entry-level tenkeyless keyboard from WASD with Cherry MX Brown switches. There's a keycap puller in the box, as well as a detachable USB cable – And other bits and pieces listed below. Included: • WASD Code tenkeyless keyboard • Massdrop x Hasbro XDA Scrabble Custom Keycaps (Base Alphas, Modifiers, and Novelty kits) • USB cable • Keycap puller • PS/2 adapter Specs: • WASD Keyboards • Case material: ABS • Keycaps: Scrabble XDA keycaps • Keycap material: dye-sublimated PBT • Switches: Cherry MX Brown switches • Rubber feet • 5-way cable routing • Onboard support for multiple keyboard layouts including QWERTY, Dvorak, and Colemak • LED indicators • Interface: USB / PS/2 • Compatibility: Windows, Mac, Linux • Cable: 70.8 in (180 cm) micro USB to USB with cable tie • Dimensions: 14.3 x 5.6 x 1.2 in (36.3 x 14.2 x 3 cm) Weight: 2 lbs (907 g) “I'm a huge board-game fan, and I've been playing Scrabble with my family for as long as I can remember. Because my dreams are very literal, I once woke up from a dream where I had a keyboard that looked like a game of Scrabble, and I quickly mocked it up at like 2 in the morning,” said community designer Cassidy Williams. “When I woke up again and realized that it wasn't just a sleepy experience, but a potentially good idea, I started cold-calling as many people I could over at Hasbro to see if I could get it licensed. And here we are!” The keyboard will be available on March 15th at 6AM PT (so this morning.) It's released through Massdrop, which isn't like your average for-sale sort of place – so you'll have to take a peek and see if you want to take the time to sign up. There's a variety of custom keycap set options, and they're all out there right this minute. Estimated ship date for this piece of hardware is September 4th, 2018. https://www.massdrop.com/buy/massdrop-x-hasbro-scrabble-mechanical-keyboard
  31. 1 point
    cannibal corpse owns.. bought there first album when i was 14..
  32. 1 point
  33. 1 point
  34. 1 point
    It's just a good place when you're runnin'
  35. 1 point
    From War Of Words album, a great record from Rob's band Fight.
  36. 1 point
  37. 1 point
    6 ways to delete yourself from the internet 1. Get off the grid If you're reading this, it's highly likely your personal information is available to the public. And by "public" I mean everyone everywhere. And while you can never remove yourself completely from the internet, there are ways to minimize your online footprint. Here are five ways to do it. Be warned however: removing your information from the internet as I've laid it out below, may adversely affect your ability to communicate with potential employers. 2. Delete or deactivate your shopping, social network and Web service accounts Think about which social networks you have profiles on. Aside from the big ones, such as Facebook, Twitter, LinkedIn and Instagram, do you still have public accounts on sites like Tumblr, Google+ or even MySpace? What about your Reddit account? Which shopping sites have you registered on? Common ones might include information stored on Amazon, Gap.com, Macys.com and others. To get rid of these accounts, go to your account settings and just look for an option to either deactivate, remove or close your account. Depending on the account, you may find it under Security or Privacy, or something similar. If you're having trouble with a particular account, try searching online for "How to delete," followed by the name of the account you wish to delete. You should be able to find some instruction on how to delete that particular account. If for some reason you can't delete an account, change the info in the account to something other than your actual info. Something fake or completely random. Using a service like DeleteMe can make removing yourself from the internet less of a headache. There are companies out there that collect your information. They're called data brokers and they have names like Spokeo, Whitepages.com, PeopleFinder, as well as plenty of others. They collect data from everything you do online and then sell that data to interested parties, mostly in order to more specifically advertise to you and sell you more stuff. Now you could search for yourself on these sites and then deal with each site individually to get your name removed. Problem is, the procedure for opting out from each site is different and sometimes involves sending faxes and filling out actual physical paperwork. Physical. Paperwork. What year is this, again? Anyway, an easier way to do it is to use a service like DeleteMe at Abine.com. For about $130 for a one-year membership, the service will jump through all those monotonous hoops for you. It'll even check back every few months to make sure your name hasn't been re-added to these sites. https://www.abine.com/deleteme/ 3. Remove your info directly from websites First, check with your phone company or cell provider to make sure you aren't listed online and have them remove your name if you are. If you want to remove an old forum post or an old embarrassing blog you wrote back in the day, you'll have to contact the webmaster of those sites individually. You can either look at the About us or Contacts section of the site to find the right person to contact or go to www.whois.com and search for the domain name you wish to contact. There you should find information on who exactly to contact. Unfortunately, private website operators are under no obligation to remove your posts. So, when contacting these sites be polite and clearly state why you want the post removed. Hopefully they'll actually follow through and remove it. If they don't, tip number four is a less effective, but still viable option. 3. Remove personal info from websites If someone's posted sensitive information of yours such as a Social Security number or a bank account number and the webmaster of the site where it was posted won't remove it, you can send a legal request to Google to have it removed. https://support.google.com/legal/troubleshooter/1114905 You may have to exercise Google's legal powers to get your personal information removed from a stubborn site. The removal process could take some time and there's no guarantee it'll be successful, but it's also your best recourse if you find yourself in such a vulnerable situation. 4. Remove outdated search results Google's URL removal tool is handy for erasing evidence of past mistakes from the internet. https://support.google.com/webmasters/answer/63756 Let's say there's a webpage with information about you on it you'd like to get rid of. Like your former employer's staff page, months after you've changed jobs. You reach out to get them to update the page. They do but when you Google your name, the page still shows up in your search results -- even though your name isn't anywhere to be found when you click the link. This means the old version of the page is cached on Google's servers. Here's where this tool comes in. Submit the URL to Google in hopes it'll update its servers deleting the cached search result so you're no longer associated with the page. There's no guarantee Google will remove the cached info for reasons, but it's worth a try to exorcise as much of your presence as possible from the internet. 5. And finally, the last step you'll want to take is to remove your email accounts Depending on the type of email account you have, the amount of steps this will take will vary. You'll have to sign into your account and then find the option to delete or close the account. Some accounts will stay open for a certain amount of time, so if you want to reactivate them you can. An email address is necessary to complete the previous steps, so make sure this one is your last. 6. One last thing... Remember to be patient when going through this process, and don't expect to complete it in one day. You may also have to accept that there are some things you won't be able permanently delete from the internet.
  38. 1 point
    How to install Windows 10 on a Mac Even Apple fans occasionally long for live tiles and the ability to play Minesweeper. To help, we've put together this simple walkthrough on how to install Windows 10 on a Mac. Sometimes, you just need Windows. It's not something that Apple would like to admit, and for the most part MacOS has done an admirable job of keeping up with its less stylish and more utilitarian cousin, but sometimes you just need access to a computer that runs Windows 10. Thankfully, as Apple used to say, “there's an app for that.” Apple's custom-tailored solution is called Boot Camp, and it's the easiest way to get Windows on your Mac without resorting to dark rituals and eldritch sorcery. So here's how to install Windows 10 on a Mac with minimal fuss and danger! Apple Boot Camp Support: https://support.apple.com/en-us/HT204990 Step 1: Confirm your Mac's requirements Before getting started, make sure your Mac has the available disk space and hardware necessary to handle the Windows install via Boot Camp. Make sure all the latest updates are completed before you begin! First, the install requires an Intel-based Mac computer and an empty external USB drive capable of holding up to 16GB of data. You can connect the hard drive when preparing if it is not already connected. Second, the Mac you intend to use for the install needs to have at least 55GB of free disk space on the startup drive. Most Mac devices from 2012 and later will work, but you will need much more recent versions of devices like the MacBook (2015). Apple provides a handy system requirements list for various Mac models which details the version of Boot Camp your system requires to complete a Windows install. Apple's System Requirements List: http://support.apple.com/en-us/HT204048 Step 2: Acquire a copy of Windows Luckily, acquiring Windows 10 has never been easier. Just head over to the Windows Store. You'll have options here, first you can choose to purchase a digital copy, which you'll need to download (and then download this tool to create a Windows 10 disk image), or you can purchase a Windows 10 flash drive which Microsoft will ship to you. If given an option, always choose the ISO file, which should be available for download even if you bought a physical version of Windows 10: The flash drive option tends to be time-consuming and unnecessary, and should only be used if you have compatibility issues with a download. [CP Upload] Windows 10 & Windows 7 OEM (ISO) http://www.cyberphoenix.org/forum/topic/575655-cp-upload-windows-10-windows-7-oem-iso/ MS ISO Download Tool Step 3: Open Boot Camp https://s18.postimg.org/sl88yxfzd/image.jpg Now that you've got an install drive of your desired Windows operating system, it's time to open the MacOS Boot Camp Assistant. To do this, simply select the Utilities folder from your Mac's application list and open Boot Camp Assistant. Once the program opens, an introductory screen offers information on the application and also suggests creating a backup of your data before continuing with the Windows install — we highly recommend doing this. Click Continue to advance to the next screen. Make sure both installation options are checked as seen above. At this point, Boot Camp Assistant copies your desired Windows operating system installation files from either an .ISO file, or a physical disc, onto the plugged in USB drive. Here, depending on your setup you will probably need that connected external hard drive we mentioned. Simply choose the location of the .ISO file and its intended destination (the USB drive) and click Continue. The next screen should say Copying Windows files… and may take a while to complete; be patient even if it looks like the progress bar freezes. Once the next window opens, Boot Camp Assistant gives you the option to choose where to save the Windows drivers and installs support software files. Follow the on-screen instructions and make sure you have an Internet connection, selecting Continue when prompted. You may need to connect empty external USB storage, depending on how the downloads progress and where you choose to download the Windows files. The process of downloading the drivers could take quite a while to complete, so stay patient! Step 4: Create a partition for Windows After the drivers complete installing, the next step is to create a partition for the new Windows installation. By default, Boot Camp Assistant assigns just 55GB of space for the Windows partition, which is enough to complete the installation but hardly anything else. To increase the GB limit for the Windows partition, simply slide the bar between the MacOS partition and the Windows partition until it assigns the desired amount of space. Once you finish this, click Install to complete the partition process. Step 5: Install Windows With the partition completed, Boot Camp Assistant now asks you to begin installing the Windows operating system. After following a few on-screen prompts the installer asks which partition you wish to install the Windows operating system on. Simply select the partition labeled BOOTCAMP and choose Format. Continue to follow the install wizard's commands and Windows should complete installing in around 30 minutes. When ready, head over to Startup Disk preferences (you can search for it using Spotlight or find it in System Preferences). Choose the startup disk housing Windows 10 so that from now on your Mac will start in Windows. Restart your computer entirely, and it should open onto the Windows screen. Touch Bar Support on Windows If you're installing Windows on a brand-new MacBook Pro with Touch Bar, worry not, you'll still be able to get some functionality out of your OLED touch pad when running Windows. Once you boot into Windows your Touch Bar will retain some functionality, but not exactly the full range available in MacOS. The Touch Bar will still have support for all of your MacBook's basic controls – brightness, volume, play and pause – and at the touch of a button it can switch over to a standard row of F keys. It's also worth noting many features may not work correctly while using the Windows partition. Apple supports Windows 10 but you'll still notice a difference in performance. MacBook hardware is made for MacOS, so it doesn't always get along with Windows 10, in particular your trackpad might be a little less responsive, and some Apple-specific hardware will cease to function entirely – like the TouchID sensor on the power button.
  39. 1 point
    The other way which costs more but does allow you to access both Windows and Mac at the same time is to use Parallels. Install parallels and then use that to install Windows. Parallels creates a virtual drive which means access is instant just like a flash drive. If you don't need to swap backwards and forwards like I do (I do work for a charity and not all programs that we use are available in Mac format which is what I prefer) then Tech 425's way is a superb way of running both.
  40. 1 point
    Ok here you go - These are all the files repacked by me https://1fichier.com/?xtzipuj8p9 https://1fichier.com/?nsj3pewztx https://1fichier.com/?ow20ktfu93 https://1fichier.com/?m06b1zc62r https://1fichier.com/?4o1y2qq7nr https://1fichier.com/?698jtugydq https://1fichier.com/?7wnu12dnxt https://1fichier.com/?ycrz090v7p https://1fichier.com/?cqnqeav7xk https://1fichier.com/?0mdxz4fk9p https://1fichier.com/?gl82s8rfkw https://1fichier.com/?wmrnv5m7cj https://1fichier.com/?zqq8i77vbw https://1fichier.com/?essqopaft8 https://1fichier.com/?g6ylyzx9og https://1fichier.com/?vwucuuhqek https://1fichier.com/?dpyagcgw2z https://1fichier.com/?7bhkhtjxjs https://1fichier.com/?w3pwx49129 https://1fichier.com/?fpuyx7ewcz https://1fichier.com/?zncskri52u https://1fichier.com/?6iqlv22x10 https://1fichier.com/?99qvlvkgdx https://1fichier.com/?ocb17lncqh https://1fichier.com/?mtv6cbqv1g https://1fichier.com/?eso6tyh5kw https://1fichier.com/?9jojktv6me https://1fichier.com/?dojgwcqsdj https://1fichier.com/?fwmfrjc0g4 https://1fichier.com/?rg3bz6pnhg https://1fichier.com/?a70ghp7vxh https://1fichier.com/?o9qhgzh36x https://1fichier.com/?4cwbbj35co https://1fichier.com/?ie4eg1sl5i https://1fichier.com/?hffgsr9pc4 https://1fichier.com/?zutck7iu8g https://1fichier.com/?01tnguuvi5 https://1fichier.com/?mwluxyj7wv https://1fichier.com/?5l0ukmeqze https://1fichier.com/?4ekxenw6la
  41. 1 point
    I'm getting ready to download it and I will re-upload it to 1filcher
  42. 1 point
    Spiral aka Engrenages S 1-5 http://www.imdb.com/title/tt0477507/ http://safelinking.net/QAUAxZQ Password UploadedByLikelyLad
  43. 1 point
    How to have infinite Gmail addresses with only one account Did you know that you can write the same Gmail address in different ways? This trick, which very few people know about, helps you have several accounts for online services (Facebook, Instagram, Twitter…) without having to create a new email account every time, and without all that hassle. How many ways can you get “new” email addresses that are actually the same one? We'll tell you below! Trick 1: add periods to your username Gmail doesn't count periods (.) as characters in usernames. So, if your email is softonicguy@gmail.com, you can add one or more periods and Google will continue to identify it as the same address. softonic.guy@gmail.com softonic.g.u.y@gmail.com guy.sof.tonic@gmail.com g.u.y.s.o.f.t.o.n.i.c@gmail.com They look different, right? Nope, Gmail recognizes all these addresses as the same and all mail sent to these addresses will arrive in the same inbox. Trick 2: Add extra words to your username Gmail doesn't just turn a blind eye to periods but also lets you add words to your normal email address. The only thing you have to do is add a plus symbol (+) after your normal username and then add the word you want. For example: softonicguy+news@gmail.com softonicguy+articles@gmail.com softonicguy+family@gmail.com softonicguy+handsome@gmail.com It's that simple. Make as many nicknames as you want! Trick 3: combine both tricks Want an even weirder email address? Gmail lets you combine trick 1 and trick 2 with no limits. softonic.guy+handsome@gmail.com g.u.y.s.o.f.t.o.n.i.c+handsome@gmail.com etc, etc, etc… It's time to get creative! Use this trick to avoid creating excess email accounts Admit it, you've created several email accounts in order to use a service under different names… or create trial accounts for certain paid services. Take it easy, we all do it when we're broke, and this trick is perfect for this.
  44. 1 point
    Kodi on Raspberry Pi 3- Latest Version 17.3 Krypton Download and Install Kodi on Raspberry Pi 3: Hi Guys, How are you? This time we have come up with an interesting article on How to Download and Install Kodi on Raspberry Pi 3 latest Version on your Raspberry Pi. Kodi is such a famous player that is capable of doing many things. Because of its increased Functionalities, the Search for Kodi is increasing day by day. This article will give you the complete information to download and install Kodi on raspberry Pi 3. The Version of Kodi showed here is its Latest Version and it is Kodi 17.3 Krypton. Kindly Scroll Friends. Kodi(XBMC) player on Raspberry Pi 3: Kodi on Raspberry Pi Raspberry Pi has its origination from United Kingdom and it is a single board computer capable of performing basic computer operations. But the device has become so profitable and beneficial. These type of devices are generally used in Schools for basic Computer operation. As the device is successful, Kodi released its Official Version for Raspberry. Kodi is also on wonderful player that allows users to stream Multimedia contents on the web. The Combination of Kodi and Raspberry is going great and we are going to see how to download and install Kodi on Raspberry Pi 3. Kodi on Raspberry Pi 3- Things needed before installation: As Raspberry is a single board Hardware, we need few devices before installing Kodi in Raspberry. These things are cheap and you will easily get it in the Market. The Following are the things that we require before we get into the installation steps. Things Needed: The Picture shows a Wireless adapter, But I use the built in network card (Wired) HDMI CABLE: This Device helps us to give the Output of Raspberry Pi 3 to Output Devices such as TV, Monitor, HD TV and more. KEYBOARD OR MOUSE (CONTROLLER): We all know that Keyboard and Mouse are Input Devices that is used to give input to a Computer. in our case, we use the above device to give input to Raspberry Pi. MICRO SD CARD ( STORAGE UNIT): We need a storage device to store the information. For that we use Micro SD card. The card capacity should be minimum 8 GB and maximum of 32 GB. Once we have the above things then we can proceed for the installation steps because the above three are the mandatory devices used to access Raspberry Pi. Install Kodi on Raspberry Pi 3 using OSMC: The steps are simple and easy. Kindly follow. Step 1: Firstly, we need OSMC software. The OSMC software can be downloaded either as a Image file(iso) or as a Installer program. Step 2: OSMC software is available for different platforms such as Windows, Mac and Linux. Choose the Platform that you wish and then download OSMC. Step 3: Once the download is complete then kindly Run the Program. The Installer will prompt you where the OSMC has to be installed. Now kindly plug in the Memory Card(SD Card) to your system and choose the installation location as the SD card. https://osmc.tv/download/ Configure OSMC: Step 4: At the above step itself choose the Language of OSMC. Then Click on Next. Step 5: Now select the Version of OSMC that has to be installed. Select the New Build of OSMC and Click Next. Select Latest Version: Step 6: Now select the Media to Write as SD card as we use SD card. In case you use different device then kindly select accordingly. Choose SD Card: Step 7: Next step is to Configure how OSMC will get access to Web that is weather by Wired or Wireless Connection. Choose according to your criteria and click on Next. Configure Internet Connection: Step 8: Finally check the Drive package and then Accept Terms and Condition and Click Next. Now the OSMC software will be installed on your SD card. It will take some time. Hence Kindly be patient. Step 9: Once OSMC is installed on your SD card. Then that is it Friends. It is the time to rock. Step 10: Unplug the SD card and insert it into the Raspberry Pi 3. Connect other devices such as HDMI cable to Raspberry Pi and TV, Ethernet, Mouse or Keyboard. Turn the Power on. Step 11: Now OSMC will open and it will ask you to configure the basic thing such as themes and more. Configure Kodi on Raspberry Pi 3 and OSMC: Now the OSMC is ready to use which give a Graphical User Interface to access the Raspberry Pi 3. Our Aim is to Download and install Kodi on Raspberry Pi 3. Now we have to add the Kodi Disk Image file to the same SD card where we have installed OSMC. Kindly follow the below Steps. Step 1: Go to Kodi and Click on Download. http://mirrors.kodi.tv/releases/win32/kodi-17.3-Krypton.exe Step 2: Choose your Platform as Raspberry Pi. A window will pop up. There is only one version available for Raspberry and it is the Latest Version Kodi 17.3 Krypton. Click on that Version. Choose Version: Step 3: The Download will start automatically. Once the download is finished then we has to convert it into a Disk Image File. You can use any of the Disk Image File Creator applications to achieve this. We are doing the above step because the disk image file only can be accessed using OSMC software. Step 4: The Kodi file that we have converted into to a Disk Image file and copied to the SD card is now a Back Drop. Now plug the SD card again into your Raspberry Pi 3. Step 5: Now OSMC will ask you to configure your Internet Connection so that it can download The Back Drops. Once your configure your Internet connection then Kodi will get downloaded automatically as it is kept as a Back Drop. Step 6: That is it Friends. Now you Kodi on Raspberry Pi 3 will be installed on your OSMC. Ultimately you can use Kodi on raspberry Pi 3 now Officially. Kodi on Raspberry Pi: If the above method doesn’t work for you then Don’t worry Friends. We have an Alternate way. Scroll down to check How to install Kodi on Raspberry Pi 3 using NOOBS Installer method. Install Kodi for raspberry Pi 3 using NOOBS Installer: The following are the steps that you have to follow to download and install Kodi on Raspberry Pi 3. NOOBS is the acronym of New Out Of Box Software. Download Kodi by NOOBS: Step 1: The steps are bit similar to the above method. Plug your SD card to the System. Step 2: Install NOOBS. Step 3: Now add Kodi file as a Image file to NOOBS so that it will be kept as a Back drop. Step 4: Once you configure the Ethernet then Kodi will get automatically added to your NOOBS. Now you can rock with Kodi Player. We have skipped few of the steps as those steps will be repeating in both methods. Install NOOBS in and add the Kodi Disk Image File to the SD card and Connect all the devices to the Raspberry Pi 3 and kodi will get automatically installed as it was kept in Back Drop. That’s it Friends. Kodi on Raspberry Pi 3 and Kodi Addons: Kodi Addons: Kodi Player provides several Application Programming Interface to allow third parties to create Addons for Kodi Player which is one of the major advantages of Kodi Player. There are lot of addons exist for Streaming Multi media contents such as Audio, Video, Online movies, online TV channels, Weather forecasts and more. Kodi Comes with an Addon Manager through which you can search for the addons There are lot of addons available for Kodi and it reaches nearly one thousand. The most famous category of addons include Game addons, Album information, Artist information, Movie information, music and video information, TV information, GUI sounds, Images collection, Languages, Screen savers, Skins, Lyrics, Music addons, Picture addons, Program addons, Video addons, Weather addons and more. Kodi for Mac is really a must software. As we said in the above paragraph, you can manage these addons by opening your Kodi Player in Windows and then Go to Settings and then go to Addons. There you can able to configure and manage your Kodi Addons. Kodi on Raspberry Pi 3- Article Conclusion: We hope you are satisfied with our article friends. We have provided all the possible ways to install Kodi on Raspberry Pi 3 and also we have added other information such as Kodi addons for your reference. If you have any Query or if you face any problem in the above methods then kindly comment us and we will revert with a solution. Have a Good Day Friends.
  45. 1 point
    How to find Windows product key using Windows Open Notepad and save its as productkey.vbs by choosing the “All Files” option in “Save as type”. After saving this file, just click on it and a new popup window will show your Windows product key. You can copy or note this down somewhere to use it later.
  46. 1 point
    Run Check Disk from a Command Line to Check for and fix Disk Errors You should periodically use the Check Disk tool to check the integrity of disks. Check Disk examines disks and can correct many types of common errors on FAT16, FAT32, and NTFS drives. One of the ways Check Disk locates errors is by comparing the vol¬ume bitmap with the disk sectors assigned to files in the file system. Check Disk can’t repair corrupted data within files that appear to be structurally intact, however. You can run Check Disk from the command line or through a graphical interface.
  47. 1 point
    In This Topic , i will give you some information about Viruses , trojans , worms , spyware & other threats & how to stay clean;) Copyright © CyberWarez - Kouros so WHAT IS MALWARE ? Malware, short for malicious software, is programming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior.The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code. Having Safe Digital Life : [First Step] always update your Os & use Latest Release For latest Os Release From microsoft : http://www.microsoft.com/Windows You can Use this to Update your Windows : windowsupdate.microsoft.com Windows Update is a service provided by Microsoft that provides updates for the Microsoft Windows operating system and its installed components, including Internet Explorer. An optional feature disables access to Windows Update, enabling instead access to Microsoft Update, an expanded version of the service which provides updates not just for the operating system and Internet Explorer, but also for other Microsoft software running under Windows, such as Microsoft Office, Windows Live applications, and Microsoft Expression Studio. Updates are normally provided over an Internet connection, although there is provision for updates to be installed on computers without an Internet connection. Security updates or critical updates eliminate vulnerability to known malware and security exploits. Other updates correct errors and enhance functionality. Security updates are routinely provided on the second Tuesday of each month, Patch Tuesday, but can be provided whenever a new update is urgently required to prevent a newly discovered or prevalent exploit targeting Windows users. Windows Update can be configured to install critical updates automatically so long as the computer is connected to the Internet, without the user needing to install them manually, or even be aware that an update is required [second Step] Use Trusted Firewall - Antivirus Always use Alternate Firewall/Antivirus instead of windows Firewall or Defender ( Disable Both of them – Windows Firewall & Defender ) Here Is a Small list Antivirus/Firewall that u can use : Ad-Aware Pro avast! Free Antivirus AVG Anti-Virus Free Edition Avira AntiVir Personal BitDefender Antivirus BitDefender Antivirus Pro BullGuard Internet Security CA Anti-Virus Plus Anti-Spyware Comodo Antivirus Coranti Dr.Web anti-virus for Windows Emsisoft Anti-Malware ESET NOD32 Antivirus F-Secure Anti-Virus G Data AntiVirus IKARUS virus.utilities Immunet Protect Plus Kaspersky Anti-Virus Kaspersky Internet Security Kaspersky PURE Malwarebytes' Anti-Malware McAfee AntiVirus Plus McAfee Internet Security Microsoft Security Essentials Norman Antivirus & Antispyware Norton 360 Norton Antivirus Outpost Antivirus Pro Panda Antivirus Pro Panda Cloud Antivirus Pro Preventon Antivirus Free Prevx Quick Heal AntiVirus Rising Antivirus Sophos Endpoint Security and Control (Anti-Virus) Trend Micro Internet Security Trend Micro Titanium Antivirus+ VIPRE Antivirus Webroot Antivirus with Spy Sweeper ZoneAlarm Anti-virus [second Step-Tips] -Always Use Latest Version of Security Apps -Update your virus definitions regularly -Don't run more than one real time Antivirus together. -Don’t use illegal keys/cracks/serials for antivirus , try to purchase legal version from manufactured sites -Get immediate protection. Configure your antivirus software to boot automatically on start-up and run at all times. This will provide you back-up protection in case you forget to scan an attachment, or decide not to. And in case you forget to boot up your antivirus software, configuring it to start by itself will ensure you get immediate protection anyway. -Run a Virus Scan ( quick scan ) once in a week & Run FULL Scan once in a month [third Step] Use Secure Browser Chrome : http://www.google.com/chrome Mozilla Firefox : http://www.mozilla.com/en-US/firefox/ Safari : http://www.apple.com/safari/ Opera: http://www.opera.com/ IE9-Internet Explorer 9 ( Not Old Versions ! Only Latest ) : http://www.microsoft.com/IE9 [step 4] Have One of Anti-viruses Rescue Disk , it’s a live cd which help you when u need them ! Here is a small list of Rescue Disks , I will complete this list later : Kaspersky Rescue Disk http://support.kaspersky.com/viruses/rescuedisk?level=2 Avira AntiVir Rescue System http://www.free-av.com/en/products/12/avira_antivir_rescue_system.html AVG Rescue CD http://www.avg.com/us-en/avg-rescue-cd-download F-Secure Rescue CD http://www.f-secure.com/en_EMEA/security/tools/rescue-cd/ Panda SafeCD http://safecd.pl.pandasecurity.com/ BitDefender Rescue CD http://download.bitdefender.com/rescue_cd/ norton rescue disk http://security.symantec.com/nbrt/nbrt.asp?lcid=1033&origin=default avast rescue disk http://www.avast.com/eng/avast_bart_cd.html [step 5] -Start running under a limited user account (XP) or keep UAC enabled (Vista/Win 7) -Use Your windows in virtual environment to avoid writing data to the hard drive so it prevents malwares from making permanent changes to other programs and data in your computer. You can use Sandbox security software - Some Antivirus/firewalls have this option like “Safe Run” in Kaspersky CP Moderator Message: Mr Grumpy - Coded links
  48. 1 point
    Hello this video is for cyberphoenix community first create a shurtcut and paste this code : %windir%\system32\rundll32.exe dwmapi #105 and rename it to: 3D windows http://www.youtube.com/watch?v=OgmR6wHKvRo Enjoy
  49. 1 point
    ParkCollege v1.5.2 - Education Responsive WP Theme | 5.93 MB ParkCollege is a WP theme designed with learning institutions/educational websites in mind. ParkCollege Wordpress Theme Main Features: -Course Manager: add, edit and remove detailed course listings. Courses can be searched for via name, ID, program or length -Easy to configure home page: drag and drop homepage blocks into any order you want -Video Support: easily add Vimeo or Youtube videos to content and widgets Unlimited colour schemes: key colours and images are easily editable in the theme options, no coding required -Fully responsive: compatible with iPad, iPhone etc -Google font integration: easily use any Google font, adding it in the theme options takes a matter of seconds, pick a font to use now -Translation Ready: .mo/.po files are included -13 PSDs included: fully layered, containing the entire page not just certain elements Product page: http://themeforest.net/item/parkcollege-education-responsive-wp-theme/4857701 Download Links: http://ul.to/6g9euaos
  50. 1 point
    0sec: As in 0sec access to a release. Means someone has access to a release immediately after its pred. 0hour: As in 0hour access to a release. Means someone has access to a release within an hour after it was pred. 0day [1]: As in 0day access to a release. Means someone has access to a release within a day after it was pred. 0day [2]: As in 0day which refers to software, videos, music, or information released or obtained on the day of public release. 1080i: The number 1080 stands for 1080 lines of vertical resolution, while the letter i stands for interlaced or non-progressive scan. 1080i is considered to be an HDTV video mode. The term usually assumes a widescreen aspect ratio of 16:9, implying a horizontal resolution of 1920 pixels and a frame resolution of 1920 x 1080 or about 2.07 million pixels, and a field resolution of 1920 x 1080 / 2 (because its interlaced) or about 1.04 million pixels. The field rate (not the frame rate) in hertz can be either implied by the context or specified after the letter i. 1080p: The number 1080 stands for 1080 lines of vertical resolution, while the letter p stands for progressive scan or non-interlaced. 1080p is considered to be an HDTV video mode. The term usually assumes a widescreen aspect ratio of 16:9, implying a horizontal resolution of 1920 dots across and a frame resolution of 1920 x 1080 or about 2.07 million pixels. The frame rate in hertz can be either implied by the context or specified after the letter p (such as 1080p30, meaning 30 frames per second). 1337: Leetspeak (1337) is a digital language used by gamers but its also in the scene. 256MS, 512MS, 1GB and 2GB: These tags only apply to PSP releases, and they show the required size of an UMD disc. UMD discs can contain up to 2 gigabytes. When a game is 100mb it fits on every UMD disc, but when a game is 900mb it will only fit on 1GB and higher UMD discs. 480i: The number 480 stands for 480 lines of vertical resolution, while the letter i stands for interlaced or non-progressive scan. 480i is considered to be an HDTV video mode. The term usually assumes a widescreen aspect ratio of 16:9, implying a horizontal resolution of 640 pixels and a frame resolution of 640 x 480 or about 30.700 pixels, and a field resolution of 640 x 480 / 2 (because its interlaced) or about 15.400 million pixels. The field rate (not the frame rate) in hertz can be either implied by the context or specified after the letter i. 480p: The number 480 stands for 480 lines of vertical resolution, while the letter p stands for progressive scan or non-interlaced. 480p is considered to be an HDTV video mode. The term usually assumes a widescreen aspect ratio of 16:9, implying a horizontal resolution of 720 dots across and a frame resolution of 720 x 480 or about 345600 pixels. The frame rate in hertz can be either implied by the context or specified after the letter p (such as 480p30, meaning 30 frames per second). 576i: The number 576 stands for 576 lines of vertical resolution, while the letter i stands for interlaced or non-progressive scan. 576i is considered to be an HDTV video mode. The term usually assumes a widescreen aspect ratio of 16:9, implying a horizontal resolution of 720 pixels and a frame resolution of 720 x 576 or about 414720 pixels, and a field resolution of 720 x 576 / 2 (because its interlaced) or about 20.000 million pixels. The field rate (not the frame rate) in hertz can be either implied by the context or specified after the letter i. 576p: The number 576 stands for 576 lines of vertical resolution, while the letter p stands for progressive scan or non-interlaced. 576p is considered to be an HDTV video mode. The term usually assumes a widescreen aspect ratio of 16:9, implying a horizontal resolution of 720 dots across and a frame resolution of 720 x 576 or about 414720 pixels. The frame rate in hertz can be either implied by the context or specified after the letter p (such as 576p25, meaning 25 frames per second). 720p: The number 720 stands for 720 lines of vertical resolution, while the letter p stands for progressive scan or non-interlaced. 720p is considered to be an HDTV video mode. The term usually assumes a widescreen aspect ratio of 16:9, implying a horizontal resolution of 1280 dots across and a frame resolution of 1280 x 720 or about 0.92 million pixels. The frame rate in hertz can be either implied by the context or specified after the letter p (such as 720p30, meaning 30 frames per second). Dictionary A-D Abandonware: Software that is no longer marketed or distributed by the company that created it. Its free from copyright. AC3: Audio Codec 3. This was the original and more technical name for Dolby Digital. Replaced by marketing mavens when they realized that Dolbys name was not in the title. Addline: A textline containing registration information which is used for adding someone to a site. Most common addline format is: site gadduser <group> <username> <pass> <ident>@<host>. Affiliate: A releasegroup can be an affiliate at a site. This means that they will pre their releases at that site. AIO: AIO stands for All-In-One, means an all-in-one software pack. For example: Microsoft Office, which contains Word, Frontpage, Publisher, Access etc. Anamorphic Widescreen: Anamorphic filming technique was developed to make widescreen movies using the original 4:3 film. If one didnt adjust this, the screen would look misshaped. For example very wide (or fat) people. Click here to read more about anamorphic widescreen. ANSI art: Similar to ASCII art, but constructed from a larger set of 256 letters, numbers, and symbols. ASCII art: ASCII art is an artistic medium that are graphics pieced together from the 95 printable characters defined by ASCII. Asian Silver: Put out by eastern bootleggers, they are usually bought by groups to release as their own. These are usually VCD copies of movies which usually are pre-release or some movies that have never been released. There are a lot around in the scene at the moment because silvers are very cheap and easily available in a lot of countries. Mainly smaller groups who dont last more than a few releases go about it this way. Audio_ts: Audio_ts stands for Audio Title Set. Most DVDs have both a VIDEO_TS and AUDIO_TS folder. Ussually the content is located in VIDEO_TS. The AUDIO_TS folder is usually empty. DVD-Audio would be stored in an AUDIO_TS folder when it is a separate format to DVD-Video. Practically this never occurs. Though most DVDs still contain an empty AUDIO_TS folder since some older dvd-player require this to play the DVD. Backdoor: A hidden piece of software that allows it��s creator to access the computer. It bypasses normal authentication to the computer system. Using the backdoor, the hacker can get remote access to the computer. The backdoor may take the form of an installed, legimate program. BDRip: A rip of the final released Blu-Ray, encoded & stripped to fit on a dvd-disc. BDrips are released in the x264 format. Bitrate: Bitrate or Bit Rate is the average number of bits that one second of video or audio data will consume. Higher bitrate means bigger file size and generally better video or audio quality while lower bitrate means lower file size but worse video or audio quality. BitTorrent: A special kind of p2p system. It uses a central location which coodinates the downloads but it doesnt host any downloads. The download itself consists of several pieces offered by various users. Such a coordinated group is called a torrent. Blu-Ray: Blu-ray Disc is a next-generation optical disc format meant for high definition video (HD) and high density data storage, and is one of two competing standards for HD optical media. Its competitor is HD-DVD. A Blu-ray Disc can store substantially more data than a DVD, because of the blue laser. A Blu-ray dvd can hold up to 50 GB. BWCLONE / BWCLONEDVD : A complete image of an original cd/dvd, same as CLONECD/DVD. Only difference is that this image was created with BlindWrite. BNC: BNC stands for bouncer. A bouncer is server through which an user can connect to an irc server. This way other users on the irc server cant see his/her real ip. Bootleg: Illegally recorded and pressed record. Buffer Overflow: An error caused when a program or exploit tries to store too much data into a buffer, than the buffer can handle. This can be exploited by hackers to create and execute a backdoor, leading to system access. CAM: A cam is a theater rip usually done with a digital video camera. C-Band: A type of satellite transmission with less path loss than other satellite standards such as Ku-band. CD: CD stands for CompactDisc. A CD is an one-sided disk which can hold up to 650-700Mb of data. CDS: CD Single, an audio compact disc which contains 1-2 tracks. CDM: CD Maxi-single, an audio compact disc which contains 2-5 tracks. CDR: A recordable compact disc. Chanserv: This is a service provided by many IRC Networks to allow you register a channel. CLONECD / CLONEDVD: A complete image of an original cd/dvd. These images do not contain any crack, its just a copy of an original cd/dvd. Therefore it still contains all copyright information. Crack: Software cracking is the modification of software to remove encoded copy prevention. Cracktro: A small introduction sequence added to cracked software, designed to inform the user which releasegroup was responsible for removing the softwares copy prevention and distributing the crack. CVD: CVD is a combination of VCD and SVCD formats. DC: DC stands for Directors Cut. A directors cut is a specially edited version of a movie that is supposed to represent the directors own approved edit of the movie. It is often released some time after the original release of the film, where the original release was released in a version different from the directors approved edit. Cut is synonymous with edit in this context. DDoS Attack: A distributed denial of service attack (DDoS) occurs when multiple compromised systems flood the bandwidth or resources of a targeted system, usually web server(s). These systems are compromised by attackers using a variety of methods. Demuxing (or demultiplexing): Demuxing (or demultiplexing) basically means, when speaking of video formats, splitting the file that contains both audio and video data (and possible other data streams as well, like subtitles), into separate files, each containing one element of the original file. Opposite of demuxing is muxing, which basically joins the datastreams back together. Dir Locking: The act of locking a directory so people who are not allowed to get into a directory, wont be able to get in. DirecTiVo: DirecTiVo is an informal term for the implemented combination of DIRECTV satellite television programming service and the TiVo digital video recorder service. DiVX: DivX is a digital video compression format based on the MPEG-4 technology. DivX files can be downloaded over high-speed lines in a relatively short time without sacrificing the quality of the digital video. Used a lot in the scene. Nowadays the XviD codec is more popular. Dolby Digital: Digital Surround Sound is a DVD audio encoding format similar that digitally compresses up to 5.1 discrete channels of audio into a single bitstream. DoS Attack: A denial-of-service attack is an attempt to make a computer resource unavailable to its intended users. Typically the targets are high-profile web servers, and the attack attempts to make the hosted web pages unavailable on the Internet. Dox: Dox are single keygens/cracks/fixes etc. DL: DL stands for Dual-Language, meaning the movie contains more than one language. Synonym: ML (Multi Language). DSR: Digital stream rip is a rip that is captured from a digital source stream, such as a HDTV or DVB transmission. Quality is similar to PDTV. Synonym: DSRip. DTS: Digital Theater Systems Digital Surround is a DVD audio encoding format similar to Dolby Digital. The quality is better than Dolby Digital and its used in the cinema. Dubbed: If a film is dubbed, it is a special version where the actors voices are in another language. Dump: A dump is a ftp server where releases are stored. Dumps are often faster than regular ftp servers and have a larger harddisk. Releasegroups may have a groupdump, where the groups releases are stored. Such a groupdump serves as an archive, internal exchange of releases and for spreading the groups releases. DVB: DVB stands for Digital Video Broadcast. The standard for direct broadcast television in Europe and the US based on MPEG2 compression. DVD: Stands for Digital Versatile Disk (Formerly Digital Video Disk). An optic disc with the same physical size as a CD but with significantly greater storage capacity, anywhere from 4.5 Gb (single layer, single-sided) to 17 Gb storage capacity (double-layer, double sided). It uses MPEG2 compression to encode 720:480p resolution, full-motion video and Dolby Digital to encode 5.1 channels of discrete audio. The disc can also contain PCM, DTS, and MPEG audio soundtracks. DVD5: DVD5 is an one-sided single-layer dvd disc and can contain upto 4.38 gigabytes of data on it. DVD disc manufacturers love to use marketing terms and sell their discs as 4.7GB discs, but this is not true the 4.7GB is calculated by using so-called Japanese gigabytes, where the power of calculations is 1,000 instead of 1,024 (and 1.024 is the correct way to calculate everything in computer world so, 1024 megabytes = 1 gigabyte). DVD9: DVD9 is an single-sided dual-layer dvd disc and can hold approximately 7.95 gigabytes of data. See DVD5 for an explanation about the dvd size. DVDA: Audio tracks which comes on a DVD as a bonus. DVDrip: A rip of the final released DVD, encoded to fit on a CD. DVDrips are released in SVCD and DivX/XviD. DVD Screener: Same premise as a screener, but transferred off a DVD. Dictionary E-J Eggdrop Bots: These bots can execute scripts like site annoucements, rss output and more. EMUDVD: Stands for EMUlation DVD. Its quite similar to CLONEDVD. You can burn the release, but in order to run it you need an emulation program running in the background such as DT4s RMPS. You can also mount the release, but its still an emulation. The scene considers any release that requires a helper program that runs in the background to bypass the protection as emulation, and thus should be named properly as emulation. The only possible exception to this rule is ATIP hiders. Encode: Encoding is the process of converting one digital format to another, applying known algorithms to either obscure the content of the file, or to compress or convert it to another format. EP: Vinyl Maxi-single, containing 2-5 tracks. Exploit: An exploit is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch or vulnerability in software in order to get access to this computer. When the exploit is succesfull, the computer hacker can gain control of the computer system to use it for a DoS attack, or running a ftp-server. Filler: People who put releases on to a FTP-server. FS: FS stands for FullScreen, which is a screen size ratio of 4:3 (width:heigth). Fserve: Trading system for irc which uses the mIRC clients File Server function and some scripts so users can share their warez directly from their hard drives with eachother. FTP: File Transfer Protocol. This is the protocol used for file transfers from client to server and from server to client. With a FTP application you can move/transfer files to another computer connected to the internet independent of machine type or operating systems. The FTP protocol is used in the scene for the warez servers. FXP: FXP is the File eXchange Protocol. It isnt an actual protocol, just a method of transfer making use of a vulnerability in FTP. It allows the transfer of files between two FTP servers. FXP Boards: People who scan/hack/fill vulnerable computers with warez. Hacker: Someone who breaks into computers (which is acutally a Cracker, most of the time the term is wrongfully used). Hammer: The act of retrying to connect to a FTP, (almost) without a timeout between the retries, when the server is full. Hammering will slow down the server and will usually result in an ip-ban. HDDVD: [1] Stands for High Density DVD. HD-DVD is a digital optical media format which is being developed as one standard for high-definition DVD. HD-DVD is similar to the competing Blu-ray Disc, which also uses the same CD sized (120 mm diameter) optical data storage media and 405 nm wavelength blue laser. HD-DVD is promoted by Toshiba, NEC, and Sanyo, and backed by four major film studios. The Blu-ray Disc is proposed by Sony. [2] A full copy of a HD-DVD movie. HDDVDRip: A rip of the final released HD-DVD, encoded & stripped to fit on a DVD5. HDDVDRips are released in the x264 format. HDTV: Stands for High Definition Television. HDTV rips are digital recordings from a source stream at either 1080i or 720p at a bitrate from 19,39mbps or higher. HL: HL stands for Hit List. MP3 releases like the weekly top 40 / dance trends etc. are tagged with HL. A lot of sites dont allowed HL releases because they are considered as custom releases. HR: Stands for High Resolution and refers to 480i / 480p formats. IMG-file: An .img file is an image of a CD/DVD. An .img file can be burned directly on a cd/dvd using Alcohol 120% for example. Not supported by all burn programs. iND: iND stands for Independent. iND is not a real group, just term to categorize users who arent members of a releasegroup. Occasionally there are releases done by -iND. Interlaced: As in a nuke reason. A movie release is interlaced when the video doesnt refresh properly. iNTERNAL: A release is done internal when its released for a limited amount of people. Nowadays its mostly used when a release is already done by another group. By adding the internal tag, the release wont be nuked. IP: Each machine connected to the Internet has an unique address known as an Internet Protocol address (IP address). The IP address takes the form of four numbers separated by dots, for example: IRC: IRC stands for Internet Relay Chat. IRC is a massive network of text-based chat channels and users from all across the world. IRC Trading: Users of IRC who download from XDCC Bots or Fserves. ISO-image: An .iso file is an image of a CD/DVD. An .iso file can directly be burned to a cd/dvd using Alcohol 120% for example. Dictionary K-R Keygen: Keygen is a program which randomly generates software keys. LAME: LAME is an open source MP3 (that is, MPEG-1 audio layer 3) audio compression. Its the standard codec in the scene. Leaking: The act of leaking ftp login info to other people. Leeching: Downloading a lot without uploading. Leetspeak: Leetspeak (1337) is a digital language used by gamers but its also in the scene. Letterboxed: Almost all new movies are created in widescreen format. When widescreen movie needs to be displayed on a screen with different aspect ratio from the original film (such as 4:3), the picture frame needs to be letterboxed. Letterboxing means adding black borders above and below the original frame. Liveset: A record of a DJ mixing live. Loader: See cracktro LP: Vinyl full-length album MDVDr: A music dvd, such as concerts, livesets, videoclips etc. Mount: To create a virtual cd/dvd drive with the content of an image file. MP3: Stands for MPEG Audio Layer-3. MP3 is a widely used technology for the compression and decompression of music. MP3 is the standard music compression format in the scene. Multi-Angle View : When a movie is being shot, it may be recorded from more than one viewpoint. An angle block can contain up to 9 different angles, all equal in time length. That way the viewer will be able to view a movie or concert from different angles and and switch angles instantly. MViD: A music video. Nickserv: This is a service provided by many IRC networks that will allow you to register a nickname to make sure no-one else steals it on you. NFO (.nfo file): A nfo file is a textfile with information about the release. NTSC: The American video format standard. OS: Operating system of a computer, such as Windows or Mac. OST: OST stands for Original SoundTrack. An OST is a collection of music found in a particular video game, movie, TV serie, etc. Overscan: Most television sets magnify the image a little too much, cutting off a little from all four sides. Some cut off as much as 20% of the total image. Trained television technicians can usually fix overscan. PAL: The European video format standard. Pan & Scan: Pan & Scan is a method used a lot by movie studios to create 4:3 versions of movies recorded in widescreen format by cropping out areas of the frames so that they have a perfect fit block for a 4:3 TV. The areas of the video that are cropped depend on where the action is currently. Most common, these parts are the movies borders. Pan & Scan has a bad reputation among movie enthusiasts who claim that the movies are shot in widescreen format and should be viewed the way the director intended. PAR-files: These files are able to reconstruct files that are missing from the archive when downloading via newsgroups. For example, if you have downloaded an archive that was split into 47 RAR files but one of them is missing, you could simply download a PAR file for that archive. Once you have the PAR file, you can use a tool such as SmartPAR to reconstruct the missing file. PDTV: Other resolution digital tv recordings from source streams at a bitrate of 10+mbps or higher. It is a label given to files that were ripped directly from a purely digital source, having less resolution than HDTV. PDVD: A PDVD is usually an asian silver or, telesync copy of a movie, that has been encoded to DVD. PDVDs are usually sold by movie bootleggers. Quality varies of course. PDVDs are widely availible throughout some countries at an extremely low price. Peer-To-Peer: Sharing and delivery system where users who are logged are able to download files from each other. PGC: PGC stands for ProGram Chain, containing instructions in a DVD-Video title for controlling interactivity and the presentation of AV sequences and menus. Piracy: The unauthorised duplication and/or use and distribution of a software program, music, movies etc. PPF: A .ppf file is a patch file, used to fix bad cd/dvds. PPV: Pay-Per-View. Pay television programming for which viewers pay a separate fee for each program ordered. Pre: When a releasegroup pres a release, it will be available for other people and the distribution will start. Also the releasename will be registered in the pre database. Pre-database: A database with all releasetitles. These releasetitles are not for download, they are just records. Apart from the releasetitle, a record often also contains the releasesize, releasedate, and sometimes also NFOs. With commands one is able to check a release. Pre-spam: When a release is pred, it will be seen by millions of people in pre-announce channels and sites. These are channels which echo every release when its pred. Some people (pre-spammers) abuse the fact that so many people read this and they fake releases with a message as the releasename. That way the release name will be seen by all these people, this is why they do it. For example, when Germany lost against Italy in the semi finals of the FIFA World Cup 2006, there were pre spam messages like: Schade.Deutschland.Alles.Ist.Vobei-2006-uSuCK. Pre-spam is certainly not tolerated and pre-spammers will be punished or scenebanned. Pre-tool: A tool releasegroups use to pre a release simultaneously at multiple sites. Thanks to the pre-tool, the releasegroup doesnt have to pre it manually on every site, this saves them time, and the release is pred at the same time at all sites. Proxy: A gateway through which users can connect to the Internet. Advantage of proxy is that servers and other www-users wont be able to view the users real ip. Proper: Due to scene rules, whoever releases a certain release the first, has won that race. For example, when a group releases the CAM version of Titanic the first. If there is something wrong with the release (poor quality, out-of-sync, audio errors etc.) and another group has a better/correct version, it can release it and add PROPER to the release title to avoid being nuked. However, the source must be the same as the original release. For example: A poor quality CAM release by group A and group B releases their CAM release PROPER. A Telesync release doesnt PROPER a CAM release, because the source is different. PROPER is the most subjective tag in the scene, and a lot of people will generally argue whether the PROPER is better than the original release. The reason for the PROPER should always be mentioned in the NFO. When a group propers a PROPER it is tagged as REAL.PROPER. PS2: A Playstation 2 game released to CD. PS2DVD: A Playstation 2 game released to DVD. PSXPSP: This is a PSX (Playstation 1) game playable on a PSP (Playstation Portable) using custom PSP firmware. Pubstro: This is a computer that has been compromised and has a FTP-server running on it. It will be used to share warez, mainly to the FXP Community. Racer: People who try to fill a release the quickest. Raping: A FTP-server is getting raped when many people download from a FTP-server at the same time at high speeds. Rated: Rated means a movie is censored. Recode: A recode is a previously released movie, usually filtered through TMPGenc to remove subtitles, fix color etc. Rehacking: The act of hacking a computer/pubstro which someone else has already hacked, and replacing his FTP-server with his own. Rehacking will often result in a ban from all FXP boards. Release: Original releases are rips of movies, programs, games and music, all released by groups specialized in creating these kinds of releases. Releasegroups: Groups of people who pirate and release software, music and movies. Remastered: (Digitally) remastered means that an older not-digital movie has been re-editted, remastered and is released on DVD. Repack: If a group releases a bad rip, they can release a Repack. A Repack is a fixed version of the original release. Its similar to PROPER but then done by the same group. Note that a Repack is different from a fix. A Fix will repair the original release whilst a repack is a new release. Rerip: A previous rip was bad, now its ripped again properly. Similar to repack. Resolution: Refers to the sharpness and the size of a video, usually measured in pixels/dots per inch (dpi).The higher the resolution of a video, the greater the sharpness and the larger the file size will be. 640 (width) by 320 (height) pixels for example is sharper on a big screen than a 320 x 160 video. Rip: To extract or copy data from a cd/dvd to another, more useful (and smaller) format. Rom: ROM images is used in the context of emulation for software which only runs on different hardware. These ROM images can be run on an emulator. For example, GBA rom images which are started on a GBA Emulator. Using a GBA emulator on a PC will enable the user to play GBA games on his PC. RTM: RTM means Release To Manufacturing. This release is leaked before its available in stores. A RTM version of a software title is the final retail version, the one that you will be seeing in stores. Dictionary S-Z Scanner: People who can fast IP ranges for vulnerable computers. Scanstro: Similar to a pubstro, but it is used to scan for other vulnerable computers. Sceneban: An individual or a group of people can be banned from the scene, because they did something seriously wrong. For example when someone appears to be a fed or leaking files to torrent sites. Screener: A pre VHS tape, sent to rental stores, and various other places for promotional use. SDTV: Digital tv recording or capture from a source stream at any resolution with bitrate under 10mbps. SE: SE stands for Special Edition. Like the name says, its a special dvd edition of a movie. Often special editions contain extra material like deleted scenes, interviews, or a making-of. SECAM: SECAM stands for Sequential Couleur Avec Memoire or Sequential Colour with Memory. SECAM is the broadcast television standard for France and in some countries in Eastern Europe. Because of its similiarity with PAL (same resolution, same framerate), all of the modern video systems use PAL internally (for storing the data in the storage media, etc) and just change the color encoding to SECAM when outputting the signal back to SECAM TV. SECAM is rapidly dissappearing, all new hardware supports PAL or NTSC. Serial: A serial is a key for software. This unique key works as an extra security. SFCLONECD / SFCLONEDVD: Same as CLONECD/DVD, but the discs protection is Star Force. StarForce blocks the use of SCSI optical drives when IDE optical drives are present in the system, since most optical drive emulators currently work by simulating SCSI drives. StarForce, however, will authenticate discs from a SCSI optical disc drive if there are no IDE optical disc drives installed in the system; meaning that if you want to run this disc youll have to unplug your harddisks in order to run the mounted cd or dvd image. SFV-file (.sfv): SFV stands for Simple File Validator and is used to check files if they became corrupt after transfer. It does this by doing a CRC (cyclic redundancy check). After the check it displays which files contain CRC-errors and therefore are corrupt. Its also used on FTP servers / sites to check the progress of downloads or uploads. Site Ops: Site Operators are people who are the administrator of a site. Site Trading: The act of trading releases between sites. Sites: Very fast FTP servers with people who trade the releases by releasegroups to other (top)sites. SQL Injection: A type of exploit whereby hackers are able to execute SQL statements via an Internet browser. SSL: SSL stands for Secure Socket Layer. SSL is an application layer protocol created by Netscape for managing the security of message transmissions in a network. SSL uses the public-and-private key encryption system from RSA, which also includes the use of a digital certificate. Sites require SSL to connect to them, this is more safe since the transmissions are encrypted. Stro: See pubstro. STV: STV stands for Straight To Video. These movies were never released in theaters, instead, they were immediately released on video/dvd. Therefore, a lot of sites do not allow these movies. Subbed: If a release is subbed, it usually means it has hard encoded subtitles burned throughout the movie. These are generally in malaysian/chinese/thai etc, and sometimes there are two different languages, which can take up quite a large amount of the screen. SVCD and DVD support switchable subtitles, so some DVDRips and most DVDs are released with switchable subs. Superbit: These DVDs do not include special features. The extra room on the DVD is used to provide the best-possible picture and sound. Superbit Deluxe DVDs include special features on a second disc. Syncfix: A fix which will resynchronize the audio and video layer so they play in unison. SVCD: SVCD is a mpeg2 based (same as DVD) video format which allows variable bit-rates of up to 2500kbits at a resolution of 480 x 480 (NTSC) which is then decompressed into a 4:3 aspect ratio when played back SVHS: Super Video Home System, same as VHS but it has increased picture quality and resolution capability. TC (TeleCine): A telecine machine copies the film digitally from the reels. TC (TimeCode): A visible counter on screen throughout the film. Topsites: Very fast FTP servers with people who trade the releases by releasegroups to other (top)sites. Torrent: A special kind of p2p system. It uses a central location which coodinates the downloads but it doesnt host any downloads. The download itself consists of several pieces offered by various users. Such a coordinated group is called a torrent. Trainer: Trainers are programs made to modify behaviour of a computer game in order to allow cheating. Usually trainers contain such features as god mode, unlimited ammo and others that sometimes arent pre-programmed into the game by its designers. Applying the trailer is similar to applying a regular patch. TS (TeleSync): TS stands for TeleSync. A telesync is the same spec as a CAM except it uses an external audio source (most likely an audio jack in the chair for hard of hearing people). TVRip: TV episode that is either capped from Network (capped using digital cable/satellite boxes are preferable) or PRE-AIR from satellite feeds sending the program around to networks a few days earlier. PDTV is capped from a digital TV PCI card, generally giving the best results. VCD/SVCD/DivX/XviD rips are all supported by the TV scene. UE: UE stands for Ultra Edition, its just another commercial name for a special dvd release similar to SE. UMDRip: This applies only to Playstation Portable (PSP) games, and it means that some stuff was ripped from the original game because it was not required or was ripped to save space. For example languages or movie files. UMDMovie: The Playstation Portable (PSP) is also capable of playing movies. Though a PSP cant playback DVDs or CDs, only UMD discs. So movies for the PSP get released on UMD discs. Unrated: Unrated means a movie is uncensored. USA, JAP, EUR: Especially PSP releases, but also other console releases, are sometimes tagged as USA, JAP and EUR. These are alternative regions, and they replace PAL and NTSC. USA are off course the United States of America, JAP is Japan and EUR is Europe. VCD: VCD stands for VideoCD and is a mpeg1 based video format, with a constant bitrate of 1150kbit at a resolution of 352 x 240 (NTSC). VHS: VHS stands for Video Home System, and is a dominant domestic videotape format. VHSRip: A movie transferred off a retail VHS, mainly skating/sports videos and XXX releases. Video_ts: See audio_ts. VLM: VLM stands for Volume License Key. This means that the cracked application is already licensed, and therefore doesnt require an activation after installation. Synonym: VL. VLS: Vinyl Single, containing 1-2 tracks. Warez: Illegally pirated software, movies or music. Watermark: A watermark is a small tag generally in one of the corners of a movie. A lot of Asian Silvers / PDVDs and are tagged by the people responsible. Workprint: A workprint is a copy of a film that has not been finished yet. WS: WS stands for WideScreen, which is a screen size ratio of 16:9 (width:heigth). x264: A relatively new codec, but the quality is really good. The codec is still in development, and therefore its not yet used that much. There are already some scene groups who do x264 releases though. XDCC: Hacked computer which serves as a file server for irc so people can download from it. XVCD/XSVCD: These are basically VCD/SVCD that dont obey the rules. They are both capable of much higher resolutions and bit-rates, but it all depends on the player to whether the disc can be played. XViD: XviD is an open source MPEG-4 video codec. Originally based on OpenDivX, XviD was started by a group of volunteer programmers. A very efficient and high-quality video codec and is seen as the standard in the scene.