-
Posts
441 -
Joined
-
Days Won
15
Content Type
Profiles
Forums
Events
Blogs
Gallery
Posts posted by Henry
-
-
His Dad Oblique
-
Son: Mom, when I was on the bus with Dad this morning, he told me to give up
my seat to a lady.
Mom: Well, you have done the right thing.
Son: But mum, I was sitting on daddy's lap
-
This mystery written by Einstein
In the early twentieth century
Expected that 98% of the world can not be resolved
Puzzle as follows:
There are street
There are 5 houses in this street
Each house a different color
In each house lives a person of different nationality
The owner of each house drink a certain type of beverage
And smoking A particular type of cigarettes
And keeps a certain type of pet
No owners house drink the same drink Or smokes the same cigarette Or keeps the same pet
Details of the puzzle:
1: British lives in the red house
2: The Swede keeps dogs as pets
3:Irish drinks tea
4:The green house on the left of the White House
5: The green house owner drinks coffee
6: The owner who smokes Pall Mall rears birds
7: The owner of the yellow house smokes Dunhill
8: the owner, who lives in the house in the middle drinks milk
9: The Norwegian lives in the first house
10: The owner who smokes Pellndz Lives next to the man who keeps cats
11: The man who keeps horses Lives next to the man who smokes Dunhill
12: The man who smokes Blue Master drinks beer
13: The German smokes Prince
14: The Norwegian lives next to the Blue House
15:The man who smokes Pellndz Lives next to the man who drinks water
The Question: Who is the man who keeps the Fish?
NB:
This puzzle Does not solve just by looking But needs a paper and pencil.
Good luck
-
Happy Birthday, Nan
-
Happy Birthday TV_Tech
-
This girl decided to change their shape to the boa ... Where it has a flexibility that can be played Bends as if it were like a snake as she chose these clothes so that there is a revival of the snake-like twist ..
-
The legendary great white shark is far more fearsome in our imaginations than in reality. As scientific research on these elusive predators increases, their image as mindless killing machines is beginning to fade.
Of the 100-plus annual shark attacks worldwide, fully one-third to one-half are attributable to great whites. However, most of these are not fatal, and new research finds that great whites, who are naturally curious, are "sample biting" then releasing their victims rather than preying on humans. It's not a terribly comforting distinction, but it does indicate that humans are not actually on the great white's menu.
Great whites are the largest predatory fish on Earth. They grow to an average of 15 feet (4.6 meters) in length, though specimens exceeding 20 feet (6 meters) and weighing up to 5,000 pounds (2,268 kilograms) have been recorded.
They have slate-gray upper bodies to blend in with the rocky coastal sea floor, but get their name from their universally white underbellies. They are streamlined, torpedo-shaped swimmers with powerful tails that can propel them through the water at speeds of up to 15 miles (24 kilometers) per hour. They can even leave the water completely, breaching like whales when attacking prey from underneath.
Highly adapted predators, their mouths are lined with up to 300 serrated, triangular teeth arranged in several rows, and they have an exceptional sense of smell to detect prey. They even have organs that can sense the tiny electromagnetic fields generated by animals. Their main prey items include sea lions, seals, small toothed whales, and even sea turtles, and carrion.
Found in cool, coastal waters throughout the world, there is no reliable data on the great white's population. However, scientists agree that their number are decreasing precipitously due to overfishing and accidental catching in gill nets, among other factors, and they are listed as an endangered species.
-
Blue whales are the largest animals ever known to have lived on Earth. These magnificent marine mammals rule the oceans at up to 100 feet (30 meters) long and upwards of 200 tons (181 metric tons). Their tongues alone can weigh as much as an elephant. Their hearts, as much as an automobile.
Blue whales reach these mind-boggling dimensions on a diet composed nearly exclusively of tiny shrimplike animals called krill. During certain times of the year, a single adult blue whale consumes about 4 tons (3.6 metric tons) of krill a day.
Blue whales are baleen whales, which means they have fringed plates of fingernail-like material, called baleen, attached to their upper jaws. The giant animals feed by first gulping an enormous mouthful of water, expanding the pleated skin on their throat and belly to take it in. Then the whale's massive tongue forces the water out through the thin, overlapping baleen plates. Thousands of krill are left behind
-
Thanks all,I am happy to be with you on koach.com
-
Happy Birthday Star
Star
-
Wonders of the World
Pyramids Giza (Egypt), one of the oldest seven wonders, the tombs of the Pharaohs, built around 2690 BC. M three pyramids Shad first of which the pharaoh Khufu, height 147 meters and the second the pharaoh Khafre, and height 136 meters, third pharaoh Menkaure and height 62 meters, one of the Seven Wonders of the remaining were filled with pathways cemeteries and one day the property of kings, which are invaluable, and buried with them so use them in other life as far as they claim, have been looted treasures Pyramids thousands of years ago are still discoveries to the sequence now.
Helios of Rhodes was the most famous giant statues of the old, was held in Greece in 280 BC. M on the island of Rhodes and 32 meters above has been smashed by an earthquake in 227 BC. M, bringing in ruins and this was the statue made ??of bronze, iron-fortified
Established Ptolemy II Lighthouse of Alexandria in 280 BC. M, where is the first lighthouse in the world and reached the high lighthouse about 120 meters, and was on the island, about a little bit about the city of Alexandria, the Egyptians had set fire to every night on top of the lighthouse to warn passing ships, demolished an earthquake in 1375
The Hanging Gardens of Babylon series of rocky terraces the unit after the other, dating back to 600 BC. AD It is said that Nebuchadnezzar is built and above these gardens from the ground between 23 and 92 meters but today no longer have the effect has disappeared, has planted trees and plants and flowers in the layer thick from the soil on each runway of rocky terraces.
(( Most of these wonders is over or destroyed did not keep them only the pyramids of Giza ))
((Wonders of the other))
Taj Mahal, a wonder of modern and worthy of research and study, built by a man to his wife, and now is one of the most famous tourist attractions in India, nor can a visitor to visit India without crossing this Abkh.
(Taj Mahal) (this palace magnificent and impressive built in memory of love and is a symbol of love ... and was built in memory of (Erjomend Bannu Bacam) and known for Aosm (Mumtaz Mahal) and had built (Shah Jahan in memory her when she died) for this is the symbol for love
Temple of Abu Simbel, the temple the great Abu Simbel, which dates back to Ramses II, decorated and faced four giant statues of the Pharaoh, the Great himself, as well as the legend tells that this temple to Hawwars monk, where he was lead Tauivath and its links in it, with a height of statue is one of about 20 meters, while the interface it is a width of 35 meters and 30 meters in height, and in the image can be seen the king accompanied by some of his wives and his sons, as well as the oddity and wonders Simbel temple or the sun enters the beam twice per year, specifically on February 20 and October 20.
Great Wall of China, a time and the masterpieces of the world and the human, it's Great Wall of China, worth seeing.
Leaning Tower of Pisa, located in Italy, one wonders of the world, but not seven, but wonders of the modern, amounting to 50 teacher on the face of the globe, designed by Italian architect Bonano Pizzato, and a height of 550 meters has been laying the foundation stone to him in 1173 AD and remained with the Italian architect until the year 1185, and when the building to the third floor noted that the tower is slightly tilted, and fled for fear of its occurrence has been the tower on this case over 90 years, came up another engineer and worked on its completion, and make the floors fifth, sixth and seventh straight to compensate for the tilt, then came the engineer third He completed the eighth floor building, so construction of the tower took about two centuries, however, continued to trend, so is considered a modern wonders of the world.
New Seven Wonders of the World
Pyramid of Chichen Itza Worship, Knowledge Yucat
-
lol If sleep come don't resisted him
-
Thanks koach
-
-
Wireframe Car.They are metal mesh are made strictly from the artist Benedict Radcliffe and placed on the edge of the road.
This image taken from the Salar de Uyuni is located in Bolivia's largest salt flat in the world.
Impossible triangle
See this triangle in the picture fool sight drawn on paper but impossible to implement in reality
But in fact been carried out artist in the city of perth in Australia and in a special way.
These shrubs are not industrial, but a real and these shapes are formed by linking them to each other during growth.
A rare clouds formed above the clouds in cases where the air speed is very high.
Giant rabbits are found in Germany, a very rare species.
This tap is a water fountain in the garden designed by MC Escher
The trick is the presence of a column in the tap water which does not appear because of the heavy flow of water.
strange court Tennis.
-
You can drink a cup of tea or coffee in the Netherlands, NL
Belgium and B at the same time.
This man in Spain and only needs to pass this part
In the rock to be in Portugal.
Half of a farm in Scotland and the other half in England.
Red flags of the building (Morocco) and building flags
Green and white (Algeria).
-
Girl: Do I ever cross ur mind ?
Boy: No.
Girl: Do you like me?
Boy: Not really.
Girl: Do you want me?
Boy: No.
Girl: Would you cry if I left?
Boy: No.
Girl: Would you live for me?
Boy: No.
Girl: Would you do anything for me?
Boy: No.
Girl: Choose--me or ur life?
Boy: my life.
The girl runs away in shock and pain and the boy runs after her and says...
Boy :The reason you never cross my mind is because you're always on my mind
-
lol, she is actually greedy
-
nope crysta its on there :http://www.hawkee.com/snippet/5648/
-
lol koach
-
on *:KICK:#: {
window @kickers
if ($knick == $me) {
echo @kickers 7( $time(hh:nn/TT) ) 4 U have Been Kicked By 14 $nick 4Reason $1- 14 From $chan }
else {
echo @kickers 7( $time(hh:nn/TT) ) 14 $knick 4 Kicked by 14 $nick 4Reason $1- 14 From $chan }
}
#kickerz end
on *:JOIN:* {
window @Gatekeepers
echo @Gatekeepers 12( $+ $time $+ ) 4 -=[ $nick ]=- 9 $+ 15 $+ $address 12 ( $+ # $+ )
}
and close your mirc and open it
-
menu * {
COLOR FONT
.on/off: {
if (!%cf.font) {
set %cf.font 1
}
if (!%cf.bkgrd) {
set %cf.bkgrd 0
}
if (!%colorfont) {
set %colorfont 1
echo -a 4 Color Font Now Active.
halt
}
unset %colorfont
echo -a 4 Color Font Now Inactive.
halt
}
.underline: {
if (!%cf.und) {
set %cf.und 1
halt
}
unset %cf.und
}
.bold: {
if (!%cf.bld) {
set %cf.bld 1
halt
}
unset %cf.bld
}
.text color
..0 white: set %cf.font 0
..1 black: set %cf.font 1
..2 blue: set %cf.font 2
..3 green: set %cf.font 3
..4 lightred: set %cf.font 4
..5 brown: set %cf.font 5
..6 purple: set %cf.font 6
..7 orange: set %cf.font 7
..8 yellow: set %cf.font 8
..9 lightgreen: set %cf.font 9
..10 cyan: set %cf.font 10
..11 light-cyan: set %cf.font 11
..12 lightblue: set %cf.font 12
..13 pink: set %cf.font 13
..14 grey: set %cf.font 14
..15 lightgrey: set %cf.font 15
.background color
..0 white: set %cf.bkgrd 0
..1 black: set %cf.bkgrd 1
..2 blue: set %cf.bkgrd 2
..3 green: set %cf.bkgrd 3
..4 lightred: set %cf.bkgrd 4
..5 brown: set %cf.bkgrd 5
..6 purple: set %cf.bkgrd 6
..7 orange: set %cf.bkgrd 7
..8 yellow: set %cf.bkgrd 8
..9 lightgreen: set %cf.bkgrd 9
..10 cyan: set %cf.bkgrd 10
..11 light-cyan: set %cf.bkgrd 11
..12 lightblue: set %cf.bkgrd 12
..13 pink: set %cf.bkgrd 13
..14 grey: set %cf.bkgrd 14
..15 lightgrey: set %cf.bkgrd 15
}
on *:input:#: {
if ((/ !isin $left($1,1)) && (%colorfont)) {
set %color.font $+ %cf.font $+ , $+ %cf.bkgrd
if (%cf.bld) {
set %color.font $+ %color.font
}
if (%cf.und) {
set %color.font $+ %color.font
}
msg $chan %color.font $+ $strip($1-)
halt
}
}
-
alias clones {
var %i,%address,%chan = #$1,%t0 = $ticks
if (%chan == $null) %chan = $active
if (%chan !ischan) { echo $colour(info) -at *** Syntax: /clones [chan] | return }
if ($chan(%chan).ial != $true) {
if ($show) echo $colour(info) -at 12-(1313clonescan12)-11 scanning... %chan $+ .
.ial on
%clones.who = $addtok(%clones.who,%chan,32)
if ($chan(%chan).ial == $false) .who #
return
}
window -c @~clones
window -lhs @~clones
linesep $active
echo $colour(info) -at 12-(1313clonescan12)-11 scanning in process on %chan
%i = $nick(%chan,0)
while (%i) {
aline @~clones $address($nick(%chan,$ifmatch),2) $nick(%chan,$ifmatch) $ifmatch
dec %i
}
%i = 2
%clones.total = 0
%address = $gettok($line(@~clones,1),1,32)
unset %clones.nicks
while ($line(@~clones,%i)) {
if ($gettok($line(@~clones,%i),1,32) == %address) clones.addclone %chan %i
else {
if (%clones.nicks) { echo $colour(info) -at 12-(1313clonescan12)-11 $gettok(%clones.nicks,0,32) from %address $+ : %clones.nicks | unset %clones.nicks }
set %address $gettok($line(@~clones,%i),1,32)
}
inc %i
}
if (%clones.nicks) { if ($show) echo $colour(info) -at 12-(1313clonescan12)-11 $gettok(%clones.nicks,0,32) from %address $+ : %clones.nicks }
echo $colour(info) -at 12-(1313clonescan12)-11 $iif(%clones.total,%clones.total,No) clones found on %chan in $calc(($ticks - %t0) / 1000) second(s)
unset %clones.nicks %clones.total
window -c @~clones
linesep $active
}
alias -l clones.addclone {
if (%clones.nicks == $null) {
set %clones.nicks $gettok($line(@~clones,$calc($2 - 1)),2,32)
if (%clones.total) sline -a $1 $gettok($line(@~clones,$calc($2 - 1)),3,32)
else sline -s $1 $gettok($line(@~clones,$calc($2 - 1)),3,32)
inc %clones.total
}
%clones.nicks = %clones.nicks $+ , $gettok($line(@~clones,$2),2,32)
sline -a $1 $gettok($line(@~clones,$2),3,32)
inc %clones.total
}
raw 352:* {
if ($istok(%clones.who,$2,32)) halt
}
raw 315:* {
if ($istok(%clones.who,$2,32)) {
%clones.who = $remtok(%clones.who,$2,1,32)
if (%clones.who == $null) unset %clones.who
if ($2 ischan) .clones $2
halt
}
}
on *:connect {
unset %clones.who
}
-
Will be smaller Who gets License Drive lol
Kevin Mitnick
in General Discussion
Posted
Who is Kevin Mitnick? The picture that emerged after his arrest in Raleigh, N.C. last February was of a 31-year old computer programmer, who had been given a number of chances to get his life together but each time was seduced back to the dark side of the computer world. Kevin David Mitnick reached adolescence in suburban Los Angeles in the late 1970s, the same time the personal computer industry was exploding beyond its hobbyist roots. His parents were divorced, and in a lower-middle-class environment that lacked adventure and in which he was largely a loner and an underachiever, he was seduced by the power he could gain over the telephone network. The underground culture of phone phreaks had already flourished for more than a decade, but it was now in the middle of a transition from the analog to the digital world. Using a personal computer and modem it became possible to commandeer a phone company's digital central office switch by dialing in remotely, and Kevin became adept at doing so. Mastery of a local telephone company switch offered more than just free calls: It opened a window into the lives of other people to eavesdrop on the rich and powerful, or on his own enemies.
Mitnick soon fell in with an informal phone phreak gang that met irregularly in a pizza parlor in Hollywood. Much of what they did fell into the category of pranks, like taking over directory assistance and answering operator calls by saying, "Yes, that number is eight-seven-five-zero and a half. Do you know how to dial the half, ma'am?" or changing the class of service on someone's home phone to payphone status, so that whenever they picked up the receiver a recorded voice asked them to deposit twenty cents. But the group seemed to have a mean streak as well. One of its members destroyed files of a San Francisco-based computer time-sharing company, a crime that went unsolved for more than a year -- until a break-in at a Los Angeles telephone company switching center led police to the gang.
That break-in occurred over Memorial Day weekend in 1981, when Kevin and two friends decided to physically enter Pacific Bell's COSMOS phone center in downtown Los Angeles. COSMOS, or Computer System for Mainframe Operations, was a database used by many of the nation's phone companies for controlling the phone system's basic recordkeeping functions. The group talked their way past a security guard and ultimately found the room where the COSMOS system was located. Once inside they took lists of computer passwords, including the combinations to the door locks at nine Pacific Bell central offices and a series of operating manuals for the COSMOS system.. To facilitate later social engineering they planted their pseudonyms and phone numbers in a rolodex sitting on one of the desks in the room. With a flourish one of the fake names they used was "John Draper," who was an actual computer programmer also known as the legendary phone phreak, Captain Crunch, the phone numbers were actually misrouted numbers that would ring at a coffee shop pay phone in Van Nuys.
The crime was far from perfect, however. A telephone company manager soon discovered the phony numbers and reported them to the local police, who started an investigation. The case was actually solved when a jilted girlfriend of one of the gang went to the police, and Kevin and his friends were soon arrested. The group was charged with destroying data over a computer network and with stealing operator's manuals from the telephone company. Kevin, 17 years old at the time, was relatively lucky, and was sentenced to spend only three months in the Los Angeles Juvenile Detention Center, followed by a year's probation.
A run-in with the police might have persuaded most bright kids to explore the many legal ways to have computer adventures, but Mitnick appeared to be obsessed by some twisted vision. Rather than developing his computer skills in creative and productive ways, he seemed interested only in learning enough short-cuts for computer break-ins and dirty tricks to continue to play out a fantasy that led to collision after collision with the police throughout the 1980s. He obviously loved the attention and the mystique his growing notoriety was bringing. Early on, after seeing the 1975 Robert Redford movie Three Days of the Condor, he had adopted Condor as his nom de guerre. In the film Redford plays the role of a hunted CIA researcher who uses his experience as an Army signal corpsman to manipulate the phone system and avoid capture. Mitnick seemed to view himself as the same kind of daring man on the run from the law.
His next arrest was in 1983 by campus police at the University of Southern California, where he had gotten into minor trouble a few years earlier, when he was caught using a university computer to gain illegal access to the ARPAnet. This time he was discovered sitting at a computer in a campus terminal room, breaking into a Pentagon computer over the ARPAnet, and was sentenced to six months at the California Youth Authority's Karl Holton Training School, a juvenile prison in Stockton, California. After he was released, he obtained the license plate "X HACKER" for his Nissan, but he was still very much in the computer break-in business. Several years later he went underground for more than a year after being accused of tampering with a TRW credit reference computer; an arrest warrant was issued, but it later vanished from police records without explanation.
By 1987, Mitnick seemed to be making an effort to pull his life together, and he began living with a woman who was taking a computer class with him at a local vocational school. After a while, however, his obsession drew him back, and this time his use of illegal telephone credit card numbers led police investigators to the apartment he was sharing with his girlfriend in Thousand Oaks, California. He was convicted of stealing software from the Santa Cruz Operation, a California software company, and in December 1987, he was sentenced to 36 months probation. That brush with the police, and the resultant wrist slap, seemed only increase his sense of omnipotence.
In 1987 and 1988, Kevin and a friend, Lenny DiCicco, fought a pitched electronic battle against scientists at Digital Equipment's Palo Alto research laboratory. Mitnick had become obsessed with obtaining a copy of Digital's VMS minicomputer operating system, and was trying to do so by gaining entry to the company's corporate computer network, known as Easynet. The computers at Digital's Palo Alto laboratory looked easiest, so every night with remarkable persistence Mitnick and DiCicco would launch their modem attacks from a small Calabasas, California company where DiCicco had a computer support job. Although Reid discovered the attacks almost immediately, he didn't know where they were coming from, nor did the local police or FBI, because Mitnick was manipulating the telephone network's switches to disguise the source of the modem calls.
The FBI can easily serve warrants and get trap-and-trace information from telephone companies, but few of its agents know how to interpret the data they provide. If the bad guy is actually holed up at the address that corresponds to the telephone number, they're set. But if the criminal has electronically broken into to the telephone company's local switch and scrambled the routing tables, they're clueless. Kevin had easily frustrated their best attempts at tracking him through the telephone network using wiretaps and traces. He would routinely use two computer terminals each night -- one for his forays into Digital's computers, the other as a lookout that scanned the telephone company computers to see if his trackers were getting close. At one point, a team of law enforcement and telephone security agents thought they had tracked him down, only to find that Mitnick had diverted the telephone lines so as to lead his pursuers not to his hideout in Calabasas, but to an apartment in Malibu. Mitnick, it seemed, was a tough accomplice, for even as they had been working together he had been harassing DiCicco by making fake calls to DiCicco's employer, claiming to be a Government agent and saying that DiCicco was in trouble with the Internal Revenue Service. The frustrated DiCicco confessed to his boss, who notified DEC and the FBI, and Mitnick soon wound up in federal court in Los Angeles. Although DEC claimed that he had stolen software worth several million dollars, and had cost DEC almost $200,000 in time spent trying to keep him out of their computers, Kevin pleaded guilty to one count of computer fraud and one count of possessing illegal long-distance access codes.
It was the fifth time that Mitnick had been apprehended for a computer crime, and the case attracted nationwide attention because, in an unusual plea bargain, he agreed to one year in prison and six months in a counseling program for his computer "addiction." It was a strange defense tactic, but a federal judge, after initially balking, bought the idea that there was some sort of psychological parallel between the obsession Mitnick had for breaking in to computer systems and an addict's craving for drugs. After he finished his jail time and his halfway-house counseling sentence for the 1989 Digital Equipment conviction Mitnick moved to Las Vegas and took a low-level computer programming position for a mailing list company. His mother had moved there, as had a woman who called herself Susan Thunder who had been part of Mitnick's phone phreak gang in the early 1980s, and with whom he now became reacquainted. It was during this period that he tried to "social engineer" me over the phone. In early 1992 Mitnick moved back to the San Fernando Valley area after his half-brother died of an apparent heroin overdose. He briefly worked for his father in construction, but then took a job he found through a friend of his father's at the Tel Tec Detective Agency . Soon after he began, someone was discovered illegally using a commercial database system on the agency's behalf, and Kevin was once again the subject of an FBI investigation. In September the Bureau searched his apartment, as well as the home and workplace of another member of the original phone phreak gang. Two months later a federal judge issued a warrant for Mitnick's arrest for having violated the terms of his 1989 probation. There were two charges: illegally accessing a phone company computer, and associating with one of the people with whom he'd originally been arrested in 1981. His friends claimed Mitnick had been set up by the detective firm; whatever the truth, when the FBI came to arrest him, Kevin Mitnick had vanished.
In late 1992 someone called the California Department of Motor Vehicles office in Sacramento, and using a valid law enforcement requester code, attempted to have driver's license photographs of a police informer faxed to a number in Studio City, near Los Angeles. Smelling fraud, D.M.V. security officers checked the number and discovered that it was assigned to a Kinko's copy shop, which they staked out before faxing the photographs. But somehow the spotters didn't see their quarry until he was going out the door of the copy shop. They started after him, but he outran them across the parking lot and disappeared around the corner, dropping the documents as he fled. The agents later determined that they were covered with Kevin Mitnick's fingerprints. His escape, subsequently reported in the Southern California newspapers, made the authorities look like bumblers who were no match for a brilliant and elusive cyberthief.
http://www.takedown.com/bio/mitnick.html