Showing posts with label the. Show all posts
Showing posts with label the. Show all posts

Friday, 28 July 2017

Creating the Date Dimension using Kettle

Creating the Date Dimension using Kettle


Creating the Date dimension table is perhaps the most important common step to all dimensional modeling projects. According to Ralph Kimball � the author of The Data Warehousing Toolkit


�Data warehouses always need an explicit date dimension table. There are many date attributes not supported by the SQL Date function, including fiscal periods, seasons, holidays, and weekends. Rather than attempting to determine these nonstandard calendar calculations in a query, we should look them up in a date dimension table.�


The first step is to launch Kettle from the desktop. I have GeoKettle installed on my machine, which, for those who dont know, is simply a spatially enabled version of Pentahos Open source ETL platform (Kettle). If you dont have GeoKettle installed, my previous post shows the steps to download and install it on your local machine.


Using the sample Transformation as the starting point.

GeoKettle ships with some sample transformations that allow creation of Date dimensions. We can start with these and augment them based on our needs. The first two dimensions that are needed are Date and Time. According to best practices, Date and Time should be modeled as separate dimensions


Launching GeoKettle

If you have GeoKettle installed, launch it from the Applications menu on your machine.





Once GeoKettle is launched, go to the samples folder under GeoKettle/samples and open the file �General � Populate date dimension.ktr�



The following transformation is loaded on the screen.



Save the file to your local directory for review and possible modification. I saved the transformation with the GenerateDateDimension.ktr under my local work folder.


The default transformation generates dates from 1950 all the way to 2050. I only needed 50 odd years of dates for my purposes, so I needed to modify the start date. Right click and Edit the first step on the transformation to view dialog box for "Generate Rows."



In the dialog box that opens, we can see the default values as follows:



Now lets modify the default values as follows.

Step name: 20000 days: 50+ years
Limit: 20000
Fields > Value: 19900101


Next thing we need to do is to update the Table output parameters to our selected database schema. Right click on the "Table Output" step as shown in the screenshot below.



Define the database connection, by clicking on the "New" button next to the Connection field on the open dialog box.



Select the schema and table name. In my case, it was nydot and dim_date.



Click OK when done. 

The last step is to enable the hop, by right clicking on the arrow connecting to the last step and clicking on �Enable Hop� as shown in the picture below.



Next step is to run the transformation and test to make sure it works correctly. For this we click on the play button on the top menu, as shown in the picture below.



Clicking the button brings up the following dialog box.



Now, click on the Launch button to start the transformation. Once the transformation has executed, we can see the following metrics displayed on the screen.



Open pgAdmin tool to view the data by navigating to the schema and the date_dim table that was just created.



Also, now right clicking and viewing data


.... shows that the table is populated correctly.




We have just seen how to populate a basic Date Dimension table using Kettle open source ETL tool.

{ Read More }


Wednesday, 26 July 2017

cool old term This retro styled Terminal Emulator could be the coolest weve seen yet!

cool old term This retro styled Terminal Emulator could be the coolest weve seen yet!


cool-old-term for ubuntu

Weve seen Terminal Emulators of all sizes and shapes for Linux, but nothing like this yet. cool-old-term is one gorgeous looking Terminal emulator. 

How to install cool-old-term Terminal Emulator in Ubuntu 14.04, Linux Mint 17?


  • Developed by Swordfishs Labs,  cool-old-term is a terminal emulator which tries to mimic the look and feel of the old cathode tube screens. It has been designed to be eye-candy, customizable, and reasonably lightweight.
  • Uses the Konsole engine which guarantees a trouble-free experience. Heres what you need to do install and use cool-old-term in Ubuntu 14.04.
  • Copy-paste the following command into Terminal.
sudo apt-get install git build-essential qmlscene qt5-qmake qt5-default qtdeclarative5-dev qtdeclarative5-controls-plugin qtdeclarative5-qtquick2-plugin libqt5qml-graphicaleffects qtdeclarative5-dialogs-plugin qtdeclarative5-localstorage-plugin qtdeclarative5-window-plugin
  • All the important dependencies are now installed. Compile and install cool-old-term in Ubuntu 14.04 by using the following commands. 
git clone https://github.com/Swordifish90/cool-old-term.git
cd cool-old-term
cd konsole-qml-plugin
qmake && make && make install
cd ..
./cool-old-term
  • Execute the commands one by one. The final command will launch the cool-old-term for you. Heres a few more screenshots. Let us know how well it worked for you.
cool-old-term retro style terminal

cool-old-term retro style terminal for Ubuntu 14.04
{ Read More }


Monday, 24 July 2017

CRAFT THE WORLD español oficial

CRAFT THE WORLD español oficial






Sinopsis:

Si has llegado a jugar terraria y te gusto, pues Craft The World PC Full te encantara, ya que son juegos muy similares pero esta nueva versi�n cuenta con un excelente aparto gr�fico ademas de estar en 3D.
Debes dirigir a un grupo de enanos para que construyan tu base, mientras recolectas recursos y combates contra bestias hostiles.
A diferencia de la mayor�a de los juegos de este tipo, no es necesario que les des �rdenes directas a los enanos, sino que s�lo les indicas sobre qu� parte del mapa deben trabajar y la inteligencia artificial se encarga de repartir (ca�ticamente) las tareas.

Un sistema de tecnolog�as y de fabricaci�n (crafting) muy desarrollado
Contruye todo lo que quieras!
Juego muy entretenido y adictivo!

Gracias por el juego Jose!
Gracias por compartir!

Requisitos del sistema:

Sistema Operativo: Windows XP / Vista / 7
Procesador: 2.0 GHz Dual Core CPU
Memoria RAM: 1 GB
Gr�ficos: Intel Graphics
DirectX: Version 8.1
Espacio Libre en el Disco duro: 200 MB



Descargar: Espa�ol... Links intercambiables!!!

DepositFiles:

http://dfiles.eu/files/y7v00m5bb










Rapidgator:

http://rg.to/file/fd0054260db1889c92dd9e368e0d23b0/crftworldes.rar.html















   Acceso a enlaces VIP  
(click en la imagen)

























??????????????????????????????????????
{ Read More }


Sunday, 23 July 2017

Cool The Simpson Theme

Cool The Simpson Theme



Very cool PSP Theme made by dracula82, thx bro thats really great simpson theme, if you want it too here click link below

Download The simpson theme

Related The simpson theme
{ Read More }


Friday, 21 July 2017

Cracking Android Passwords The Need for Speed

Cracking Android Passwords The Need for Speed



Impossibly Large Numbers Revisited

In October, 2012 I posted about a article about cracking Android passwords. I spoke primarily on the difficulty in cracking the passwords based on the sheer number of possibilities (a whopping 37,556,971,331,618,802,349,234,821,094,576!)
Don�t believe me? Let�s to a little rehashing: The key space (range of possible ASCII characters) for each position in the password is 94 (upper and lower case letters, digits, and extended characters), or hexadecimal range x21-x7F. The password can be a minimum length of 4 and a maximum of 16 characters long.
A little Python 3 math
>>> total = 0
>>> for i in range(4,17):
... total = total + 94**i
...
>>> print(total)
37556971331618802349234821094576
>>> #python will even put in the commas!
>>> print({:,}.format(total))
37,556,971,331,618,802,349,234,821,094,576
And voil�, we have 37.6 trillion-quadrillion possibilities! (Just rolls off the tongue, doesn�t it?) I spoke then that while the CCL Forensics python script was a great tool, python was not the best choice for password cracking because its relatively slow for that purpose. I introduced hashcat, a cross-platform password recovery application, as a better way to do business.

Hashcat-lite: Harness Feline Speed

Hashcat is coded with performance in mind and can use multi-core CPUs and GPUs (Nvidia and AMD) to perform the calculations. The CPU version, hashcat is remarkably faster than the CCL python script, and the GPU verson,oclHashcat-plus leaves the CPU version in the dust!
Using hashcat for cracking Android passwords can be a bit confusing, however, and I hope to deobfuscate the process here.

Spicy Passwords

Android uses a salted password and stores the password as a hash in the /data/system/password.key file. Well, two hashes, actually. A SHA-1 hash is calculated followed by an MD5 hash, and the values are concatenated into a single 72 byte string.
The salt, in this case a randomly generated signed, 64-bit integer, randomizes the hash and makes dictionary and brute force attacks ineffective. The integer is stored in the settings.db located in the /data/data/com.android.providers.settings/databases directory. The integer is converted a hexadecimal string (8 bytes in length) and is appended to the password. The password + salt string is then hashed and stored.
The CrackStation website has an excellent treatise on salted password hashing if you are looking for a more in-depth explanation. The Android salted password formate is not the only salted password hashing method in practice.

Creating Test Data

We can use python to create some salted hashes after the manner of Android. This is useful for testing hashcat or other tools you might use. After all, if you don�t first test, a failed crack attempt leaves you wondering if the tool failed or if you failed to use the tool properly. To create an Android style password hash, we need a 4-16 character length ASCII character
First, let�s pick a password. We�ll keep it fairly short to allow it to be cracked in a reasonable amount of time: "secret". Keeping it lower case allows us to attack it with a 26 character key space�after all, we�re about cracking the password here, not generating secure passwords!
BASH
$ password="secret"
$
Next, we need to generate a random salt integer (we could just make something up here, but we�ll use python to randomly generate a salt to keep the exercise more realistic). The maximum size of a 64-bit integer is 9,223,372,036,854,775,807. It is signed, meaning it can be positive or negative. Yes, mathematicians, that�s the definition of an integer: a positive or negative whole number including zero. But knowing its signed is important for the hexadecimal conversion in Python or other programming languages. To keep the exercise simple, however, we�ll stay in bash and generate a random number (we�re fudging a bit in generating the random number, but it works for our purposes)/
BASH
$ password="secret"
$ salt=$(($RANDOM**4))
$ echo $salt
15606337825758241
$
Note
Extracting the salt from settings.db
Recall that in an Android device, the salt would be stored in the /data/data/com.android.providers.settings/databases/settings.db in the "secure" table. The table salt can be obtained as follows:
BASH
$ sqlite3 settings.db SELECT value FROM secure WHERE 
name = "lockscreen.password_salt";
15606337825758241
$
On the BASH command line, we can convert the salt to a 8-byte hex string with the built-in function printf. The function formats and prints the a string, in this case we�ll be using the salt, according to a format string. Below, we tell print f to convert the string held in the variable $salt to hexadecimal, padding it with leading zeros if necessary until the output string is 16 characters long.
BASH
$ password="secret"
$ salt=$(($RANDOM**4))
$ echo $salt
15606337825758241
$
Now, we generate a hash by concatenating the password and hexadecimal salt into a string and hashing it. We�ll use the MD5 algorithm because it is faster to crack than SHA-1 (recall the password.key file contains both hashes). We pass the -n option to echo to prevent it from appending the output with a line feed as this would change our MD5 hash.
BASH
$ password="secret"
$ salt=$(($RANDOM**4))
$ echo $salt
15606337825758241
$ echo -n $password$salt | md5sum
b6b97079899c5f22d94f27027549cd7d -
Now we have the salted MD5 hash of the password secret using the salt 15606337825758241!
Note
Extracting the MD5 from password.key
We have been generating a salted hash for testing. You�ll need to extract the MD5 from the password.key when working with real data. The following command makes short work of it.
BASH
$ tail -c32 password.key
b6b97079899c5f22d94f27027549cd7d
$

Using Hashcat

I�ll be demonstrating the Nvidia version of hashcat. You�ll want to check the help for your version of hashcat, but you�ll find the following demonstration informative.
The basic command for hashcat follows this form: --- hashcat [options] hash [mask] ---
The chief options we are interested in are the hash type (-m) and minimum/maximum password lengths (--pw-min/--pw-max). Reading the help (-h/--help) tells us that for salted MD5 passwords, we us the -m10 option. And since we are using the -m10 option, we need to append the salt to the hash using a colon (:) separator.
Our command and ouput look as follows:
BASH
$ ./cudaHashcat-lite64.bin -m10 --pw-min=4 --pw-max=16 
b6b97079899c5f22d94f27027549cd7d:15606337825758241
cudaHashcat-lite v0.13 by atom starting...

Password lengths: 4 - 16
Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger set to 80c
Device #1: GeForce 9500 GT, 1023MB, 1375Mhz, 4MCU


b6b97079899c5f22d94f27027549cd7d:15606337825758241:secret

Session.Name...: cudaHashcat-lite
Status.........: Cracked
Hash.Target....: b6b97079899c5f22d94f27027549cd7d:15606337825758241
Hash.Type......: md5($pass.$salt)
Time.Started...: Sat Jan 19 16:49:59 2013 (10 secs)
Time.Estimated.: Sat Jan 19 16:50:39 2013 (26 secs)
Plain.Mask.....: ?1?2?2?2?2?2
Plain.Text.....: ***yd3
Plain.Length...: 6
Progress.......: 1051066368/3748902912 (28.04%)
Speed.GPU.#1...: 102.8M/s
HWMon.GPU.#1...: -1% Util, 45c Temp, 100% Fan

Started: Sat Jan 19 16:49:59 2013
Stopped: Sat Jan 19 16:50:13 2013
$
Wait. Was that 14 seconds? Yes, it was!

Put on a Mask and Speed Your Results

Now, if the password gets very much longer, the exponential increase in the number of password possibilities gets quite large. Hashcat has one more trick up its sleeve (actually, there�s at least one more, but we�ll cover than another time). Hashcat makes use of masks that allow you to narrow the key space. Simply put, you can choose limited character sets to be used in the search, either from a predefined list, or lists your own creation.
The predefined character sets are:
  • ?l = abcdefghijklmnopqrstuvwxyz
  • ?u = ABCDEFGHIJKLMNOPQRSTUVWXYZ
  • ?d = 0123456789
  • ?s = !"#$%&()*+,-./:;<??@[]^_`{|}~
  • ?a = ?l?u?d?s
  • ?h = 8 bit characters from 0xc0 - 0xff
  • ?D = 8 bit characters from German alphabet
  • ?F = 8 bit characters from French alphabet
  • ?R = 8 bit characters from Russian alphabet
To limit the password search to passwords containing only lowercase letters, for example, you would pass the command:
$ ./cudaHashcat-lite64.bin -m10 --pw-min=4 --pw-max=16 
b6b97079899c5f22d94f27027549cd7d:15606337825758241
?l?l?l?l?l?l?l?l?l?l?l?l?l?l?l?l
I hope this gets you started using hashcat. It is a very effective tool, and it keeps on improving!
{ Read More }


Wednesday, 19 July 2017

Copy and paste from the system clipboard with vim

Copy and paste from the system clipboard with vim


Often, when using vim, highlighting text in the terminal to copy-and-paste it around is plausible.  This is definitely true when on a true terminal.  I use the rnu option so that I have relative line numbers on each line.  So copying multiple lines with the mouse grabs the line number with unwanted indentation.  When I need to move code around it is annoying to have to manually remove the numbers.

To understand how to get vims clipboard to match your systems you need to understand vim registers.  On a computer we usually only get one clipboard.  Every time we ctrl-c, the contents of the clipboard are discarded and replaced with whatever is highlighted.  We dont have any option to copy multiple objects and then paste them around.  However vim has multiple "registers" where text can be copied and pasted from.  To see the registers type :reg in command mode.

The register that we are interested in is register +.  To test it out, copy some text from another application then run :reg and see the contents displayed in register +.

So now we just need to know how to access the contents of register +.  Register access is done with ".  To paste from they keyboard we type "+p  To copy, for example an entire line, into the system clipboard we type "+yy  To delete the current line and store it in the system clipboard we type "+dd

We can also use registers with visual mode.  If we wanted to copy the line underneath the cursor we would type V"+y  We could copy the next three lines into the system clipboard by typing Vjj"+y

To sum it up, to use the system clipboard to copy and paste in vim simply do what you would usually do in vim, then prepend "+ to your y (yank) or p (paste) command.

Update:
Depending on the version of vim you are using, the register for the clipboard may work differently. In some cases the * and + registers are the same register. If you want to find out which register is for your system clipboard, simply copy some text from anywhere into your clipboard, then run :reg. Whichever register has the text you copied is the register that holds the contents of your clipboard.
{ Read More }


Tuesday, 18 July 2017

Could This Be The End For Bitcoin Unlimited

Could This Be The End For Bitcoin Unlimited


20 Bitcoin Exchanges have agreed to list Bitcoin Unlimited (BTU/XBU) as an altcoin, if a hard fork should occur.


BTC & BTU

In the midst of a heated discussion on the scalability and future of Bitcoin, a group of 20 Bitcoin exchanges, including major eastern and western ones, have announced that should a hard fork occur, they will list BTC (Bitcoin Core) and BTU (Bitcoin Unlimited) as two separate currencies.

This decision, backed by BitFinex, BitStamp, Kraken, BTCC, BTCChina, ShapeShift, BitSquare, QuadrigaCX, and other exchanges, was announced in a joint statement.

This announcement reads:

Since it appears likely we may see a hardfork initiated by the Bitcoin Unlimited project, we have decided to designate the Bitcoin Unlimited fork as BTU (or XBU). The Bitcoin Core implementation will continue to trade as BTC (or XBT) and all exchanges will process deposits and withdrawals in BTC even if the BTU chain has more hashing power.

These exchanges have pledged to only add Bitcoin Unlimited (BTU) as an altcoin only if both chains can be run without any conflicts, something that currently is a concern due to the risk of transaction replays.

bitcoin-unlimited

A few hours after this announcement, Poloniex and BitMEX joined in as well, both supporting the plan released by the other exchanges. BitMEX in particular stated:

BU will not be listed or used as a deposit/withdrawal currency until replay protection is implemented and BU is not at risk of a blockchain reorganization if the Core chain becomes longer.

Transaction Replays & Hard Forks

This isn�t the first time a major cryptocurrency has come under danger of hard forking; in fact, Ethereum experienced a similar situation last year. However, this wasn�t without mishaps; Ethereum experienced a number of replay attacks after the fork.

A replay attack is where a transaction carried out on one chain is broadcasted on the other chain. For example, Bob may want to send BTU to Alice. However, this transaction could be rebroadcast on the BTC chain, meaning that Bob would lose both his BTU and BTC.

The announcement states that the exchanges will only list Bitcoin Unlimited if the replay attack vector is eliminated, such as by changing address formats or moving coins to new addresses.

�[N]one of the undersigned can list BTU unless we can run both [blockchains] independently without incident. Consequently, we insist that the Bitcoin Unlimited community (or any other consensus breaking implementation) build in strong two-way replay protection,� the group said. �Failure to do so will impede our ability to preserve BTU for customers and will either delay or outright preclude the listing of BTU.�

The End of the Road for Bitcoin Unlimited?

This new decision could be a devastating blow to Bitcoin Unlimited�s (BU) approach in what has been a tough week for BU. Earlier this week, a critical bug was discovered and later patched, but not before taking half the network�s nodes offline and leading many in the community, including Andreas Antonopoulos, to question BU�s code QA (quality assurance) process.

BU has shipped an exploitable bug on a code base that is 0.001 of the size of Cores. Thats several orders of magnitude worse QA process

� Andreas (@aantonop) March 15, 2017

Additionally, according to coin.dance, a large majority of the companies and services in the Bitcoin Space prefer SegWit over Bitcoin Unlimited by a wide margin.

SegWit Bitcoin Unlimited Support

Furthermore, a majority of miners also support Bitcoin Core. However, if Bitcoin were to fork off into Bitcoin and Bitcoin Unlimited, the loss of a large amount of hashpower could still be detrimental to Bitcoin.

Bitcoin Core Bitcoin Unlimited Pie Chart

Many users and prominent community members have also voiced out against Bitcoin Unlimited, believing that it is a rash and unprofessional attempt to scale bitcoin or even an �attempted robbery.� Some have even gone as far as to suggest a User Activated Soft Fork (UASF), a type of fork where nodes actively reject blocks that don�t signal for SegWit activation.

However, this might not even be necessary, seeing that many exchanges will now only see Bitcoin Unlimited�s approach as an attempt to create an altcoin.

Do you think that Bitcoin Unlimited will try to hard fork the network? If so, do you think that their chain will survive? Let us know your thoughts in the comments below!


Images courtesy of Coin Dance, AdobeStock, Shutterstock

The post Could This Be The End For Bitcoin Unlimited? appeared first on Bitcoinist.com.

Original article:http://dlvr.it/Nfjns8

{ Read More }


Friday, 14 July 2017

Cool Holiday Greeting from The Witcher Team

Cool Holiday Greeting from The Witcher Team








{ Read More }


Friday, 7 July 2017

Cracking Password Dengan John The Ripper

Cracking Password Dengan John The Ripper


: Table OF contENTS :
   ---------------------
   :: [1]. PREFACE                        
   :: [2]. Mencari Target                     
   :: [3]. Password Cracking                   
   :: [4]. Penutup                        
   ::   [+] Shoutz                      



   ::---||-[1]. PREFACE
   ---------------------

     John The Ripper?? Siapa sich yang nggak kenal dengan tools Cracking yang kaya fitur ini.. ;) Walaupun usianya sudah uzur, tapi kemampuannya  tetap bisa diandalkan. Mungkin tutorialnya dah lama yach.. sorry  nich,  kebetulan lagi banyak yang request, so bagi yang udah bosan dengan tutorial yang berbau John The Ripper.. ngapain juga masih baca sampai baris ini!! ;P


 
   ::---||-[2]. Mencari Target
   ----------------------------


 
     Sekarang kita akan mencari target. Biasa.. kita mampir ke rumahnya paman
   Google (google.com). Ketik keyword berikut lalu klik tombol search:
  
                 Inurl:/etc/passwd/
 
     Eits.. tunggu dulu.. maksudnya apaan nich?? Okay, gue jelasin yach....   Untuk melakukan password cracking, kita khan harus tau dimana file password yang mau di-crack. Naah, target kita kali ini adalah sistem operasi Linux.
  
     Pada OS Linux, file passwordnya berada di lokasi /etc/passwd. Sedangkan   shadow passwordnya berada di /etc/shadow (baca arsip lama mengenai Shadow   Password). Dengan bantuan paman google, kita berusaha mencari file password   dengan cara mengetikkan keyword diatas.
  
     Well.. gimana nich hasil pencariannya? pasti muncul banyak khan.. ;) Klik   salah satu link, dan isi file /etc/passwd akan ditampilkan. oleh browser. Copy- pastekan isi file tersebut pada notepad dan simpan dengan nama password.txt.

     Sekarang, kita akan melihat isi file shadow passwordnya.Misalkan url situs   korban yang anda buka tadi adalah:
 
          http://www.spyrozone.net/spyrokid/config/etc/passwd-

     Ubahlah alamat itu pada address bar menjadi:

       http://www.spyrozone.net/spyrokid/config/etc/shadow-

     Naah, kini isi dari file etc/shadow akan ditampilkan oleh browser. Copy-   paste isi file tersebut pada notepad, lalu simpan dengan nama shadow.txt.
  
  
  
   ::--||-[3]. Password Cracking
   -----------------------------
  
     Eh, udah punya John The Ripper belum?? Kalau belum, kamu bisa download John The Ripper di member area www.spyrozone.net. Kalau sudah, saatnya kita melakukan password craCKING!
 
     Extract file hasil downloadnya ke suatu folder lalu buka lewat MSDOS. Biar   gampang,copy juga file password.txt dan shadow.txt tadi ke directory yang sama   dengan John The Ripper. Setelah itu, gabungkan file password.txt dan file   shadow.txt dengan menggunakan program unshadow.exe milik John The Ripper.   Perintahnya ialah:
 
            unshadow password.txt shadow.txt >> crack.txt
  
     Setelah itu, kita gunakan john-mmx.exe untuk mengCRACK file crack.txt   dengan menggunakan perintah:
           
                   john-mmx crack.txt

     Tunggu dech.. lamanya hasil crack yang keluar tergantung dari  seberapa  panjang password korban dan seberapa rumit karakter (special characters) yang  digunakan dalam password. Jika proses cracking berhasil, akan muncul:

  username      (password)
      
 
 
  ::--||-[4]. Penutup
  ------------
     Sekian dulu dech, sebagai antisipasi agar anda tidak menjadi korban, baca  ajah tulisan-tulisan saya yang terdahulu seputar keamanan account.
  


COPY FROM SPYROZONE.NET
{ Read More }


Saturday, 1 July 2017

Crash of the Titans PSP ISO

Crash of the Titans PSP ISO


CRASH OF THE TITANS PSP ISO DOWNLOAD



Game Description:

Crash Of The Titans Is An Action Game Developed By Super Villain Studios Published By Sierra And Released On October 16, 2007 For Sony Play Station Portable. This Game Is One Of The Most Played Game On Sony Handheld Gaming Console. Of-course There Are Many Factors Behind It. We Can Not Define Each And Every One But You Would Be Able To Know After You Play This Game Yourself. We Hope You Would Like The Game.


Game Images:

http://pspbirths.blogspot.com



Download Info:
Version: 1.0
Developer: Super Villain Studios
Publisher: Sierra
Genre: Action
Release Date: October 16, 2007
Region: USA, Europe
Language: English, European

|DownloadUSA

|DownloadEurope

{ Read More }


Tuesday, 27 June 2017

Could this be the new more beautiful Moto 360

Could this be the new more beautiful Moto 360



As the first circular Android Wear watch the Moto 360 certainly impressed in terms of style, but a better successor was always inevitable. It looks like that successor might be here sooner rather than later, as an image of it has apparently been spied.
The photo was posted to Weibo by none other than Lenovos own CEO Yang Yuanqing, so it seems likely that its the real deal.
Its since been removed, but not before it was spotted by MyDrivers, alongside a quote which translates roughly to "Moto 360, matching the arrival of the era of freedom, in the future we want to increase the store features a watch shop."
Well take answers on a postcard as to what that means, perhaps its hinting at more customisation options? Thats certainly what the image itself seems to show, with a watch that looks a lot like the Moto 360 but seemingly with two different sizes available.

Small and colourful

The larger one looks like its probably around the size of the current Moto 360 and then theres another slightly smaller option, a promising sign for anyone who finds the current model too chunktastic.
As well as two size choices theres a wider variety of colours on show, with straps and watch faces in various gold, silver, black, brown and grey shades.
The design of the watch appears slightly different to the current Moto 360 too, with lugs on either side of the face to connect the strap to, rather than attaching it underneath the body. That may also mean that it supports normal watch straps.
There are enough changes here that it looks likely that this is an entirely new smartwatch, rather than just a variant on the existing Moto 360, but sadly one thing seems to have stayed the same: the black bar beneath the screen, leaving it as not quite a full circle.
Hopefully the final version ditches that, as well as packing in a better processor and a bigger battery. With an image already in the wild we might know more soon.
{ Read More }


Friday, 23 June 2017

created the sql user but able to login without password

created the sql user but able to login without password


mysql_secure_installation




answer the following yes and next time you login with sql user, it wont allow empty password.


Reload privilege tables now? [Y/n] Y
 ... Success!
{ Read More }


Thursday, 22 June 2017

Crisis in the Kremlin Gennady Free Download

Crisis in the Kremlin Gennady Free Download





Don�t get the Soviet Union to collapse, and the socialist system to fall in the darkness of history or lead the Soviet Union by a new path � democracy and free market! But before you decide something, think � wouldn�t it cause more harm than good?
Title: Crisis in the Kremlin
Genre: Indie, Simulation, Strategy
Developer: Kremlingames
Publisher: Kremlingames
Release Date: 20 Mar, 2017

Comrades! Brothers and sisters!

In this significant day I want to tell all workers of the world, that our expectations have come true and as The Great Revolution was a perfect Party�s creation so a proletarian game Crisis in Kremlin is an outstanding achievement of this great organization! Because now completely every person, even a cook, can rule the state! And this is our merit, comrades, because only we bring protection and prosperity and we must overtake the rotting West. And so every person must as soon as possible master this skill by opening Crisis in Kremlin and bring the started to an end � to the 5-year plan of new millennium!
In the game every comrade will have to solve important political and economic, but historically accurate, interesting and exciting questions and tasks. On your decisions it will depend, what the USSR will be by the end of the year 1991 (and even a bit further) � empty words, which everybody interpret in dark colors, a superpower or the new pillar of democracy, though you can try any other political mechanic, you like.
However,don�t forget that we are watching you closely and honestly hope that you will not betray your labor Motherland!

Crisis in the Kremlin

- is the game about Perestroyka time, where you should reign the Soviet Union at such hard period and lead it to the Bright Future by way like you want!
Do you think democracy and free market are salvation? Do you want democracy socialism? Or christian conservatism? Utopian communism?.. Or, perhaps, do you like dictatorship and your deification? All ways are open!
Here you can:
- Start Perestroyka and survival through it
- Demolish Soviet Union or build full-automatisation state
- Rule the Council of Ministers
- Controll the State Planning Comittee
- Commit diplomacy actions
- Intervene in international events
- Repress, reform, proclaim, interfere, declare, destroy and build...
Will you influence on dark future?
All world is waiting for you, comrade!
    Minimum:
    • OS: Windows XP SP2+ (64-bit), Windows 7 SP1+
    • Processor: SSE2 instruction set support
    • Memory: 2 GB RAM
    • Graphics: DX9 (shader model 3.0) or DX11 with feature level 9.3 capabilities
    • DirectX: Version 9.0c
    • Storage: 2 GB available space
    Recommended:
    • OS: Windows 7 SP1+, Windows 8, 8.1, Windows 10, etc
    • Processor: SSE2 instruction set support
    • Memory: 3 GB RAM
    • Graphics: DX9 (shader model 3.0) or DX11 with feature level 9.3 capabilities
    • DirectX: Version 9.0c
    • Storage: 2 GB available space
Release : Crisis in the Kremlin Gennady
Size : 4453 MB
         Languages: 

How To Install :

 1. Install
2. Launch The Game
3. Play!


MIRROR LINKS :
 ( 1fichier Filesupload Uploaded Filerio Uptobox Uplea Turbobit Userscloud Openload Mega Bigfile Dl.free Filecloud )




OPENLOAD
Crisis in the Kremlin Gennady.rar
MIRROR MULTIUP
Crisis in the Kremlin Gennady.rar

TORRENT
Crisis in the Kremlin Gennady.Torrent





------------------------------------------------------------------

 If download links are broken, you should request Re-upload GAME REQUEST

----------------------------------------------------------------------------------

ENJOY :)

-------------------------------------------------------------------------------------------------

Tag: Crisis in the Kremlin Gennady ,Crisis in the Kremlin Gennady Steam,Crisis in the Kremlin Gennady Full Game free download, Crisis in the Kremlin Gennady Full Game crack, Crisis in the Kremlin Gennady Full Game unlocker, Crisis in the Kremlin Gennady-Full Game, Crisis in the Kremlin Gennady Full Game, Crisis in the Kremlin Gennady-Full Game, Crisis in the Kremlin Gennady Full Game torrent, Crisis in the Kremlin Gennady pc download, Crisis in the Kremlin Gennady pc torrent, Crisis in the Kremlin Gennady full game pc, download Crisis in the Kremlin Gennady pc, download Crisis in the Kremlin Gennady torrent, Crisis in the Kremlin Gennady pc links, Crisis in the Kremlin Gennady free pc game, Crisis in the Kremlin Gennady free download, Crisis in the Kremlin Gennady pc game download, Crisis in the Kremlin Gennady pc game torrent, Crisis in the Kremlin Gennady pc crack, Crisis in the Kremlin Gennady game crack, download Crisis in the Kremlin Gennady pc,Crisis in the Kremlin Gennady cracked,Crisis in the Kremlin Gennady crack,Download Crisis in the Kremlin Gennady cracked,descargar Crisis in the Kremlin Gennady FULL ESPA�OL,descargar Crisis in the Kremlin Gennady Portugues ,??????? Crisis in the Kremlin Gennady
{ Read More }


Friday, 16 June 2017

Copy Paste Text but Strip the Formatting and HTML Tags

Copy Paste Text but Strip the Formatting and HTML Tags


Its a common problem. What you get from the clipboard is not what you want.

When you copy some text from a web page or a Word document to the clipboard and then paste that text inside an email message or another rich text editor, the formatting (font sizes, colors, images) stays intact.

For Microsoft Word and other Office programs, you can use the "Paste Special" command that will auto-convert the pasted content from rich text as plain text format.

See: Copy Command Line Output to Clipboard

Alternatively, you can copy the text to the clipboard and paste everything into Notepad. Select the content in Notepad and copy to clipboard again. In this process, all the document formatting and HTML tags will be remove the clipboard content will be in plain text.

You can also (optionally) remove all HTML tags from the clipboard text, which is excellent for copying and pasting things from the web, without getting all the extra markup.

Then theres Clipboard Fusion which automatically strips the text of all formatting as soon as you copy it to the clipboard. Everything that gets to clipboard after you hit Ctrl+C is converted to plain text.
{ Read More }


Croc the legend of gobbos

Croc the legend of gobbos











Fox Interactives Croc: Legend of Gobbos sees its player as a genuinely cute platform hero - something I never thought Id ever say about a video game character - who must explore a 3D Super Mario 64-like world, in search of his kidnapped gerbil-esque friends, the Gobbos.
Yep, thats right, the evil Baron Dante and his Dantini followers have stolen away Crocs pals and spread them out equally all over the world, so as to always have one around to harass if the need arises. Now its up to you to run, jump, climb, and swim your way through 45 levels made up of forest, desert, ice, and Dante Castle stages, freeing the Gobbos from their PETA-unfriendly cages all the while. If youre really good and can make it to the secret island, theres a secret boss on a hidden island to beat, as well - making it, all in all, a handsomely sized game. Its just some of the gameplay that takes place over those levels that makes the whole thing a little questionable.
Croc can easily be seen as the sum of many previous video game parts. The character possesses the butt-stomp of Mario from Super Mario 64, the tail-spin and climbing ability of the same-named lead of Crystal Dynamics Gex, and bits of Segas Sonic the Hedgehog, as well. A few other games can be noticed at times, too. But thats all right if the games fun, right? Sure, and it almost is.
Without a doubt, its an impressive achievement that Argonaut was able to nearly emulate a Super Mario 64-style 3D environment on the Sony PlayStation, though its less impressive that it wasnt able to imitate the games perspective and control. The creators of SM64 knew that to be able to functionally jump from platform to platform, the default view would have to be directly above and behind the main character, and it is, or can be configured to be, about 95 percent of the time. In Croc however, the player is locked into a behind-and-to-the-side view during about half of the games crucial moments, making jumps or even general movement far harder than they should be. In the beginning, this is far less of an issue and Croc shows off how much of an enjoyable title it could have been. But soon, moving platforms, dissolving platforms, and other such devices are added to the mix and the fun factor of the game falls off a cliff. Yes, this perspective/control problem makes it that horribly frustrating to play - even the use of Sonys Dual Analog Controller cant save it.
In the end, Croc: Legend of Gobbos is a charmingly-enough-themed platformer that just didnt live up to its potential. It ended up a Christmas holiday must-rent, when it could have been a Christmas holiday must-have.
{ Read More }