Monday, August 24, 2009

true blood season 2 episode 11 preview

True Blood Season 2 Episode 11 Preview. Just to remind you that True Blood Season 2 Episode 11 will be hitting our television screen next week August 30, 2009. This television series continuously gaining fans not only in the United States but around the world. “Frenzy” is the title of True Blood Season 2 Episode 11. Absolutely, thousands will be waiting for this already.

True Blood Season 2 Episode 11 Preview Synopsis

In this True Blood Season 2 Episode 11 Episode, Bill seeks the advice of the Louisiana Queen of Vampire whose name is Sophie-Anne in order to alleviate or solve the crisis in Bon Temps. Furthermore, Sookie and Lafayette figure out that protecting Tara from herself is pricier than expected. Also, Sam desperately goes for unexpected assistance and Jessica tests Hoyt’s loyalty to Maxine.

An interesting True Blood Season 2 Episode 11. Make sure marking it in your calendar so that you won’t forget.

Tuesday, August 11, 2009

tagine

Tagine/Tajine

A Tagine or Tajine is a traditional way of cooking in a special type of pot or dish, the cooking style and the type of dishes though differs according to time and place but the basics are more or less same.Tagine type of dish found in the North African cuisines of Algeria, Morocco, and Tunisia, which is named after the special pot in which it is cooked. A similar dish, known as Tavvas, is found in the cuisine of Cyprus.

Usually the traditional Tagine pot is formed entirely of a heavy clay which is sometimes painted or glazed. It consists of two parts; a base unit which is flat and circular with low sides, and a large cone or dome-shaped cover that rests inside the base during cooking. The cover is so designed to promote the return of all condensation to the bottom. With the cover removed, the base can be taken to the table for serving.

The most well known tagineand claimed to be original is Moroccan tajine cuisine which are slow-cooked stews braised at low temperatures, resulting in tender meat with aromatic vegetables and sauce. They are traditionally cooked in the tajine pot, whose cover has a knob-like handle at its top to facilitate removal. While simmering, the cover can be lifted off without the aid of a mitten, enabling the cook to inspect the main ingredients, add vegetables, move things around, or add additional braising liquid.

Due to fulfill the increasing demand of customers, very recently European manufacturers also have created tajines with heavy cast iron bottoms that can be fired on a stovetop at high heat. This permits browning meat and vegetables before cooking. While the similar Dutch oven help braises most efficiently in the oven, the tajine braises best on the stovetop.



Friday, August 7, 2009

How Did Hackers Cripple Twitter?

Hackers slowed Twitter to a standstill early on Aug. 6, frustrating millions of users. For the culprits, all it took to snarl the popular social-networking site was one of the oldest tools in the Internet hacker handbook: the distributed denial-of-service attack (commonly shortened to DDoS), a method that has been used to crash some of the Web's largest sites, including Yahoo! and CNN.

DDoS attacks are surprisingly low tech. Using a network of computers (dubbed zombies) controlled by a single master machine, the hacker tries to overwhelm a website's servers. It's a brute-force approach — the network of hacker-controlled computers floods the server with requests for data until the server overloads and comes crashing down. Graham Cluley, a computer security expert, likened the attack to "15 fat men trying to get through a revolving door at the same time." The attacks do no lasting damage — user data aren't compromised, and the site isn't down for long. Once the fat men stop rushing the doors, everything returns to normal.

Adding to the chaos is the fact that the zombie computers often show no signs of being infected. Hackers look for computers with security vulnerabilities and infect them in advance of an attack. When the hackers are ready to launch the assault, the master computer awakens its zombie army, and the attack begins. Because DDoS utilizes multiple computers from multiple locations — and because hackers may use their network for only a single attack — there's no way to protect against a seemingly random array of computers suddenly going rogue. Once the attack begins, websites can try to trace the sudden flood of traffic back to the source computer and filter it out, but even that's a complex process. Internet service providers say they're rarely able to identify the master computer behind a DDoS attack.

This method of causing computer chaos has been used at least as far back as 1998, when the first software tools were developed to assist in DDoS assaults. But the attacks didn't garner much attention until 2000, when Amazon, eBay, Yahoo! and CNN were brought down in a single week by a Canadian teenager. They've been a scourge ever since and have even been employed in cyberwarfare. During the war between Russia and Georgia last year, hackers brought down several Georgian websites using a DDoS attack. And in the aftermath of Iran's tumultuous election in June, several international computer networks were trained to take down sites belonging to President Mahmoud Ahmadinejad.

While some Facebook services were unavailable early Aug. 6, Facebook officials said it wasn't immediately clear if it was related to the Twitter attack


Monday, August 3, 2009

ERIN ANDREWS PEEPHOLE VIDEO RAPIDSHARE FINALLY UPLOADED

THE MUCH AWAITED ERIN ANDREWS PEEPHOLE VIDEO HAS FINALLY BEEN UPLOADED ON RAPIDSHARE , HERE IS THE LINK