SITES OF THE MONTH ! Earn money with Surveys & Viewing Adverts

Many of us have been duped into empty promises of online money making . these are the only legal and paying programs available today

These Programs are NOT Autosurf, Multi-Level Marketing, Pyramid, Ponzi, Matrix or "Get Rich Quick" scheme.

JOin for free, no obligation. Just get paid when u view other's advertisements just like what you do on your TV ! but this time you are paid some amount for your time ! How great is that ?

REGISTER PAYPAL FREE : if u don't have paypal just register with www.paypal.com

REGISTER ALERTPAY FREE: 

REFER A FRIEND WITH ALERTPAY AND GET PAID UP TO $10 PER REFERRAL

REGISTER EGOLD FREE: www.e-gold.com

MAKE FREE MONEY WITHOUT PAYING A CENT! It's True

MONEY MAKER # 1 :

 

 

I got my 5th  Payout in 3 minutes ( see attached image below )  

don't wait ,click here to Join

 

THE TOP 3 PAYING PTC in the WORLD

NeoBux has NOW PAID OUT OVER $12,000,000 INSTANTLY!!! Having already "INSTANTLY" Paid Out Over $12 Million Dollars to it's Members PayPal and AlertPay accounts, it's no wonder why some regard NeoBux as the best PTC of all time.

 

Watch this video made by one of our members for a brief overview and watch get paid instantly

Then click here to Join

Join Today!!!

*** Here's a little tip. Click your ads everyday!! Even if it's only four ads. Visit the Forum Religiously and talk to people who are earning thousands a month from NeoBux. Oh and make it a habit of sending some of your daily earnings to your "Rental Balance", this way you can Rent referrals every week and watch your earnings grow without spending any of your own money.**

 

MUST JOIN AND SEE THE BENEFITS :CLICK TO JOIN - it has paid me so well I upgraded and bought 60 referrals 2 days ago to help me earn more money ;) you should try :CLICK TO JOIN

 

 MONEY MAKER 2 :

click on banner to join FREE

no-minimum.com- get paid for clicking on advertisements

 

 

MONEY MAKER 3 :

click on banner to join FREE

WordLinx - Get Paid To Click - get paid for clicking on advertisements

payment proof US10 PAID  join now

 

 click on banner to join FREE

MONEY MAKER # 4 : PAID TO READ EMAILS ,

 

DonkeyMails.com: No Minimum Payout DonkeyMails.com: No Minimum Payout

Paid 7 times : USD 24.92

 

 MONEY MAKER # 5 :  PAID TO CLICK  ,

click on banner to join   for FREE

  Paid 2 times : USD4.92

  

 

 MONEY MAKER # 6 :  PAID TO CLICK  ,

click on banner to join   for FREE

 

  

 

Spend less than 5 mins while surfing to get to your extra cash for your enjoyment ;)

 

 

 

*************************************************************************************

Friday, June 29, 2007

World's first iPhone review - Video

World's first iPhone review - Video




Apple iPhone Commercial Ad - Never Been an iPod





iSmudginator Allows Defacement of Virtual iPhone

ismudge.jpg
The iSmudgeinator is a cute little Flash app that lets you wreak minor havoc upon an iPhone. Smudging doesn't seem to be as bad as this time-killer suggests, but some degree of the "answer phone" ear grease smudging is likely to occur. Some scratches are probably inevitable as well, although you'd have to deliberately etch your artwork into the screen to match the severity your e-finger can lay down on this unlucky model. The latest version even comes with an iCloth to clean up after yourself.
The iSmudginator [via Technabob]

Friday, June 8, 2007

One Of The Best Marketing Strategies Ever ! :)

Just had to share this with you...

One of the best marketing strategies ever:

Father: I want you to marry a girl of my choice.
Son: "I will choose my own bride!"
Father: "But the girl is Bill Gates' daughter."
Son: "Well, in that case - ok"

Next: Father approaches Bill Gates.
Father: "I have a husband for your daughter."
Bill Gates: "But my daughter is too young to marry!"
Father: "But this young man is a vice-president of the World Bank."
Bill Gates: "Ah, in that case - ok"

Finally Father goes to see the president of the World Bank.
Father: "I have a young man to be recommended as a vice-president."
President: "But I already have more vice- presidents than I need!"
Father: "But this young man is Bill Gates's son-in-law."
President: "Ah, in that case - ok"

Moral: Even if you have nothing, you can make things happen.
That is very true my friend...

Now take a few seconds to see what you can do for yourself today to make things better ....

Don't Be Scammed On E Bay ^@-@ ^

1) Don’t be scammed on eBay.

Everything on E-bay seemed perfect: nice shopping portal, almost complete buyer's list, and a convenient place to do shopping online. In fact, it's too good to be true.

If this is the case, then it's time for the buyer's warning signal to go red alert because if things on E-bay seemed to good to be true, it probably is and may not even be worth the buyer's time and money.

There are lots of frauds and scams’ going on in the Internet today and E-bay is not excused. So, it's important for buyers to detect early signs of fraudulent activities before it gets them. Here's how to do it:

1. Buyers should look for the seller's feedback section. If a seller has many feedbacks and many recent comments are negative, chances are transaction with this seller will turn out a hoax, even if the seller has provided positive replies.

2. Online shoppers should be aware of emails contending it's from E-bay and certifying some seller as a good one. It's already anomalous in the first place because E-bay does not send emails. Plus, E-bay would definitely not certify a seller even if he or she has a remarkable selling history. NEVER LOGIN TO YOUR EBAY ACCOUNT FROM A LINK IN AN EMAIL. EVEN IF IT LOOKS GENUINE.

3. Buyer should be aware of sellers that insist on wire transfers like Western Union as mode of payment. In fact, E-bay does not recommend their buyers to use wire transfer services. If the seller insists on it, then, no doubt it's a scam.

4. Buyer should also be aware of "too-good-to-be-true" prices. Chances are items that are priced way below their real prices are signs of imminent fraudulent activities.

5. Online shoppers should take note of phishing emails. These are emails that require subscribers to fill out forms provided in the email with warning statements saying the subscriber's account will be closed if the person concerned will not provide the required pertinent information. Once given, anomalous activities are on their way like identity theft. NEVER LOGIN TO YOUR EBAY ACCOUNT FROM A LINK IN AN EMAIL. EVEN IF IT LOOKS GENUINE.

6. Buyers should also be aware of sellers that let them pay the bid amount to wire transfers directly from the buyer's checking account. Worst, the seller contends that the given bank account is Escrow's.

7. Online shoppers should be weary of institutions claiming they are escrow but ask payments be made to a person instead of a corporation. This is a clear case of scam.

So, to shun away from probable scam attacks, it's a must for every E-bay buyer to keep these tips in mind. It's better to be safe than dumb.
My advice is to always use PayPal for payments and never click on links found in emails. Stick to these 2 simple rules and you should be fine.

2 ) How to Avoid Failure In Ebay Auctions :

Many first time sellers have one thing in common –
they fail. Many of them fail time and time again,
never understanding what is going wrong. They do
hours of research looking for the perfect item to sell,
get the auction set up, and wait for the bidding to
begin. Hours go by and no bids are placed. Days go
by, and there are still no bids – or there are very low
bids. Finally the auction ends, and it turns out to be
a total failure. Considering the huge number of sellers
who run eBay auctions, there are specific things you
must do, and specific things you must not do if you
are to be successful.

There are many reasons why auctions fail. The most
common reason is that the item is not in high
demand. This problem can be avoided by doing the
necessary research to determine which items sell
well, and which items should be avoided. This
research takes a great deal of time – but in the end,
you will find that it is time well spent.

Another reason for eBay failure is pricing. No matter
what your reserve price is, your opening bid price
should never be more than £50 or so. This is how you
will attract potential bidders to your auction. If you
set that opening bid too high, most people won’t
even click the link to read the description for your
item. Another pricing problem is lack of research.
Before you set your reserve price, you must
determine what the item is really worth, and the price
similar items have sold for in past eBay auctions.

Poorly written descriptions are another cause of
failed auctions. Poor grammar and misspelled words
drive people away. Failing to post a picture of the
item will also keep people from visiting your auction
page. Make sure that your description is well written.
This is essentially your ‘sales copy.’

Shipping prices scare people away from auctions if
they are too high. Find the lowest shipping prices
that you can find, and consider paying for the
shipping yourself if it won’t cut into your profits too
much. Do not charge handling fees.

Offer great ‘customer service’ for all of your auctions,
and ask your buyers to give you feedback. If the
items that you sell are everything that you said they
would be, and you offer great customer service, you
can expect wonderful feedback – and this
feedback will help a great deal in your future auctions.




Wednesday, June 6, 2007

FANTASTIC 4 RISE OF THE SILVER SURFER 2007 Trailers ,ENJOY :)

Fantastic Four: Rise of the Silver Surfer



Fantastic Four: Rise of the Silver Surfer Trailer 2



Fantastic Four: Rise of the Silver Surfer - Final Trailer



On Set - "Fantastic 4: Rise of the Silver Surfer"




LIFE QUOTE





Something to think about....


There was a one hour interview on CNBC with Warren Buffet, the second

richest man who has donated $31 billion to charity. Here are some very

interesting aspects of his life:


1. He bought his first share at age 11 and he now regrets that he
started

too late!

2. He bought a small farm at age 14 with savings from delivering

newspapers.

3. He still lives in the same small 3-bedroom house in mid-town Omaha,

that he bought after he got married 50 years ago. He says that he has

everything he needs in that house. His house does not have a wall or a

fence.

4. He drives his own car everywhere and does not have a driver or
security

people around him.

5. He never travels by private jet, although he owns the world's largest

private jet company.

6. His company, Berkshire Hathaway, owns 63 companies.

He writes only one letter each year to the CEOs of these companies,

giving them goals

for the year. He never holds meetings or calls them on a regular basis.

He has given his CEO's only two rules. Rule number 1: do not lose any

of your share holder's money. Rule number 2: Do not forget rule number
1.

7. He does not socialize with the high society crowd. His past time

after he gets home is to make himself some pop corn and watch
Television.



8. Bill Gates, the world's richest man met him for the first time only

5 years ago. Bill Gates did not think he had anything in common with

Warren Buffet. So he had scheduled his meeting only for half hour. But

when Gates met him, the meeting lasted for ten hours and Bill Gates

became a devotee of Warren Buffet.

9. Warren Buffet does not carry a cell phone, nor has a computer on his

desk.



His advice to young people: "Stay away from credit cards and invest in

yourself and

Remember:

A. Money doesn't create man but it is the man who created money.

B. Live your life as simple as you are.

C. Don't do what others say, just listen them, but do what you feel

good.

D. Don't go on brand name; just wear those things in which u feel

comfortable.

E. Don't waste your money on unnecessary things; just spend on them
who

really in need rather.

F. After all it's your life then why give chance to others to rule our

life."


Saturday, June 2, 2007

Transformers trailers

Teaser Trailer 1 :






Transformers : The Movie 2007 - Teaser and Featurette






Transformers Movie Trailer (3rd Teaser)








Michael Bay Directs A Scene From Transformers





TRANSFORMERS MOVIE AIRFORCE FOOTAGE ( the making )





Transformers Movie Trailer -- Decepticons version!



Have You Seen A Robot Running ? NEW version amazing robot asimo

NEW version amazing robot asimo





Other Robots :

AKIBA ROBOT FESTIVAL 2006: Actroid Female Robot




Chinese Female Robot - Dion



Boston Dynamics BigDog Robot - the Army mule ( Scary MAn ! ) Gulp !




Robo-One 9: Robot Competition - OMNIZERO.2



Self Replicating Robots

Self-Replicating Repairing Robots (http://www.forofriki.com)

ROBOT DANCE , Is This Guy Half Animatronic ??

:: ROBOT DANCE ::




WILD CHRONICLES :: ATTACKED :: PART 2

Jaguar vs Anaconda..



Tiger vs Crocodile. Tiger kills Croc .(Tiger is the winner).



Animal Face-Off - Leopard vs Gorilla

WILD CHRONICLES : : ATTACKED : :

Black Bear vs Wolf Pack



Tiger vs Bear



Tiger vs Lion.



Python Vs Crocodile. Python is the Winner (Come look)

National Geographic: Polar Bear vs. Walrus

BUFFALO VS LIONS VS CROCODILE , Who wins ?

Friday, June 1, 2007

Tips to help you stay safe online

Tips to help you stay safe online
By Mark Ward
Technology Correspondent, BBC News website

Windows XP on a laptop, Getty
Windows needs help to keep you safe online
There are now thought to be more than 200,000 malicious programs in existence - the vast majority of which are aimed at subverting Windows PCs.

These problem programs can arrive via e-mail, instant messenger, through your internet connection or even your web browser if you visit the wrong website. The threats are so numerous and appear so fast that Windows users must feel under siege.

While there is no doubt that attacks on PC users are getting more sophisticated, it is possible to avoid the vast majority of problems by taking some straight-forward steps and exercising some common sense.

If you are worried about your computer it is possible to scan it via the web to see if it is infected. Companies such as Trend Micro, Kaspersky and Microsoft all offer free scanning services.

Organisations such as the Computer Emergency Response Team (Cert) also offer advice on how to set up a safe net connection.

ANTI-VIRUS

The first piece of security software every PC user needs is some anti-virus software. It must also be regularly updated to ensure it protects you against the latest threats.

One of the ways that virus writers try to catch out anti-virus software is by pumping out enormous numbers of variations of their malicious creations. Good anti-virus programs use heuristic techniques to spot viruses that have not been formally identified but have all the characteristics.

STAYING SAFE ONLINE
Use anti-spyware and anti-virus programs
On at least a weekly basis update anti-virus and spyware products
Install a firewall and make sure it is switched on
Make sure updates to your operating system are installed
Take time to educate yourself and family about the risks
Monitor your computer and stay alert to threats

Many PCs now come with anti-virus installed and though an annual subscription can seem expensive, it might be cheap when you consider how much it could save you if it stops your bank details being stolen.

As well as retail versions of anti-virus there are now some free programs that do a good job of protecting you. Avira, Avast and AVG all produce free anti-virus software.

Microsoft now sells a package of security programs but, so far, they are only available to US users.

FIREWALL

A firewall is also an essential piece of security software for PC users. Newer versions of Windows XP have a firewall built in and this will give you protection against nuisance attacks and many of the more serious ones.

HI-TECH CRIME PLANS
The BBC News website is running a series of features throughout the week
Tuesday: What did we catch in our honeypot?
Wednesday: Anatomy of a spam e-mail and hackers face to face
Thursday: How to spot a phishing scam

However some people feel that the Windows XP firewall is a bit limited in its features. Many anti-virus programs have a firewall bundled with them.

There are free firewalls available too from firms such as Comodo and Zone Alarm.

To block some of the attacks it can also be useful to connect to the net via a hub or router. Often these have a firewall built in and, even if not, will do a good job of blocking a lot of the low level attacks.

SPYWARE

Increasingly simply browsing the web can subject you to all kinds of dangers. Specially crafted websites can initiate so-called "drive-by downloads" that exploit weaknesses in Microsoft's Internet Explorer browser to install programs you never asked for.

Google logo, AP
Google has started warning people if they hit an unsafe site
At best these will annoy you with pop-up ads, at worst they will let someone else take control of your PC. Anti-spyware software will help stop these taking hold and help you clean up your PC if you do get hit.

There are add-ons for browsers, such as McAfee's Site Advisor that warn you about potentially harmful sites. Also Google has now started warning when you are about to visit a potentially unsafe site. Search sites such as Scandoo will also flag sites loaded with malware.

These days adware tends to be very aggressive and it is far better to avoid an infection than try to clean up afterwards.

Security experts recommend migrating away from Internet Explorer to a browser such as Firefox or Opera. At the very least they say to keep Microsoft's browser up to date with patches.

Anti-spyware activists Suzi Turner and Eric Howes run a website that lists the bogus security products to help you avoid falling victim. Microsoft makes free anti-spyware but there are many other products from firms such as Lavasoft and Spybot.

UPDATE

With Windows it is also important to keep your system up to date. Windows XP now regularly nags people about upgrades and Microsoft produces security patches on a monthly basis.

Online banking screen, BBC
Phishing gangs try to steal confidential details
Microsoft recommends automatic updating so patches are downloaded and applied as soon as they become available. As the time between the announcement of a vulnerability and it being exploited is shrinking, it pays to act quickly.

The other things you can do to stay safe fall into the realm of common sense. To begin with never open an attachment on an e-mail you were not expecting - even if it appears to come from someone you know.

Never reply to spam e-mail messages as that just confirms your address is live and makes it more valuable. Be wary of any e-mailed message about online financial accounts you own. Learn to spot the signs of phishing e-mails.

APPLE

Apple users who feel confident that they are invulnerable to attacks should also take steps to protect themselves.

While virus attacks are virtually unheard of, the platform can be subject to malware and adware.

The firewall on an Apple computer should be switched on and common sense regarding potential phishing attacks should be applied.




Google searches web's dark side

Google searches web's dark side
Men look at laptop
Malicious programs are installed by visits to a booby-trapped site
One in 10 web pages scrutinised by search giant Google contained malicious code that could infect a user's PC.

Researchers from the firm surveyed billions of sites, subjecting 4.5 million pages to "in-depth analysis".

About 450,000 were capable of launching so-called "drive-by downloads", sites that install malicious code, such as spyware, without a user's knowledge.

A further 700,000 pages were thought to contain code that could compromise a user's computer, the team report.

To address the problem, the researchers say the company has "started an effort to identify all web pages on the internet that could be malicious".

Phantom sites

Drive-by downloads are an increasingly common way to infect a computer or steal sensitive information.

They usually consist of malicious programs that automatically install when a potential victim visits a booby-trapped website.

"To entice users to install malware, adversaries employ social engineering," wrote Google researcher Niels Provos and his colleagues in a paper titled The Ghost In The Browser.

Finding all the web-based infection vectors is a significant challenge and requires almost complete knowledge of the web
Google researchers

"The user is presented with links that promise access to 'interesting' pages with explicit pornographic content, copyrighted software or media. A common example are sites that display thumbnails to adult videos."

The vast majority exploit vulnerabilities in Microsoft's Internet Explorer browser to install themselves.

Some downloads, such as those that alter bookmarks, install unwanted toolbars or change the start page of a browser, are an annoyance. But increasingly, criminals are using drive-bys to install keyloggers that steal login and password information.

Other pieces of malicious code hijack a computer turning it into a "bot", a remotely controlled PC.

Drive-by downloads represent a shift away from traditional methods of infecting a computer, such as spam and email attachments.

Attack plan

As well as characterising the scale of the problem on the net, the Google study analysed the main methods by which criminals inject malicious code on to innocent web pages.

Spam email
Spam e-mails are a common way to infect a computer

It found that the code was often contained in those parts of the website not designed or controlled by the website owner, such as banner adverts and widgets.

Widgets are small programs that may, for example, display a calendar on a webpage or a web traffic counter. These are often downloaded from third-party sites.

The rise of web 2.0 and user-generated content gave criminals other channels, or vectors, of attack, it found.

For example, postings in blogs and forums that contain links to images or other content could unwittingly infect a user.

The study also found that gangs were able to hijack web servers, effectively taking over and infecting all of the web pages hosted on the computer.

In a test, the researchers' computer was infected with 50 different pieces of malware by visiting a web page hosted on a hijacked server.

The firm is now in the process of mapping the malware threat.

Google, part of the StopBadware coalition, already warns users if they are about to visit a potentially harmful website, displaying a message that reads "this site may harm your computer" next to the search results.

"Marking pages with a label allows users to avoid exposure to such sites and results in fewer users being infected," the researchers wrote.

However, the task will not be easy, they say.

"Finding all the web-based infection vectors is a significant challenge and requires almost complete knowledge of the web as a whole," they wrote.