Monday, August 23, 2010

Finally Play station 3 is HACKED now we can buy pirate games or download it



Is a play 3 of the most powerful handheld devices that can not be easily penetrated, and I have tried a lot of hacks and hackers to activate the ability to run pirated games on the device and all other attempts failed, and was one of the Geohot a person known to penetrate phone iPhone.

But it looks like the joy of Sony strongly apparatus and their inability to penetrate over, where the Group issued hackers piece USB install on a play Sechin 3 contains the application name backup manager, owners of the device to copy games on hard drive and run it without the use of DVD Albulurai

Way relied upon to break a play Sechin 3 way from the point of my strange, it allows for the device running the Debug Mode so that in the future install many applications on the device, and run the state Debug Mode was the only place for developers through the ad hoc organ to develop games.

Funny thing for me is to penetrate the device was way too easy and do not need to decode the machine and install any piece of interior, and I think that Sony will not tolerate and will be released an update that prevents the work program, and can request a piece USB from several sites, costing between 120 and 150 dollars








Here is video shows the modus operandi of usb and then run the backup manager


Saturday, August 21, 2010



Can love release our true self?

A wealthy Cuban coffee exporter, Luis Vargas, advertises for a US wife; Julia Russell, from Delaware, sends her photograph, but the woman who steps off the ship is much lovelier.

Luis marries her immediately and gives in to love. But Julia may not be who she claims: first a private eye shows up on behalf of Julia's sister, then the sister herself.

By now, Luis has given has wife access to bank accounts, and when she runs with his cash, he pursues her, with the help of Downs, the P.I., perhaps to kill her. Pursuit may be part of a con game as well, and Julia's past explains some, if not all, of what remains of the story.

In spite of this, This is a man who selects a mail order bride, he is surprised to see the beauty who appears before him. She alleges that she sent false photos to him to assure that he would love her for what she is and not for her beauty.

However, what she is a con artist, whore, and actress, who teams with a fellow actor to steal money from men. What she does not expect is that she falls in love with her new husband and ultimately must decide between him and her sadistic former lover.

Contains explicit sex including sadistic acts as Thomas Jane cuts Jolie's back with a knife as part of their lovemaking.



Friday, August 20, 2010

First Published of My Site

www.SHakur.co.cc

It's Personal site, representing my daily life, things i've seen or discovered.
Memo of what i had.
News. and contact form.

Tuesday, August 17, 2010

Types of Search Sources

Primary Sources

Definition:
Primary sources are original materials. They are from the time period involved and have not been filtered through interpretation or evaluation. Primary sources are original materials on which other research is based. They are usually the first formal appearance of results in physical, print or electronic format. They present original thinking, report a discovery, or share new information.
Note: The definition of a primary source may vary depending upon the discipline or context.

Examples include:

•Artifacts (e.g. coins, plant specimens, fossils, furniture, tools, clothing, all from the time under study);
•Audio recordings (e.g. radio programs)
•Diaries;
•Internet communications on email, listservs;
•Interviews (e.g., oral histories, telephone, e-mail);
•Journal articles published in peer-reviewed publications;
•Letters;
•Newspaper articles written at the time;
•Original Documents (i.e. birth certificate, will, marriage license, trial transcript);
•Patents;
•Photographs
•Proceedings of Meetings, conferences and symposia;
•Records of organizations, government agencies (e.g. annual report, treaty, constitution, government document);
•Speeches;
•Survey Research (e.g., market surveys, public opinion polls);
•Video recordings (e.g. television programs);
•Works of art, architecture, literature, and music (e.g., paintings, sculptures, musical scores, buildings, novels, poems).
•Web site.

Secondary Sources

Definition:
Secondary sources are less easily defined than primary sources. Generally, they are accounts written after the fact with the benefit of hindsight. They are interpretations and evaluations of primary sources. Secondary sources are not evidence, but rather commentary on and discussion of evidence. However, what some define as a secondary source, others define as a tertiary source. Context is everything.
Note: The definition of a secondary source may vary depending upon the discipline or context.

Examples include:

•Bibliographies (also considered tertiary);
•Biographical works;
•Commentaries, criticisms;
•Dictionaries, Encyclopedias (also considered tertiary);
•Histories;
•Journal articles (depending on the disciple can be primary);
•Magazine and newspaper articles (this distinction varies by discipline);
•Monographs, other than fiction and autobiography;
•Textbooks (also considered tertiary);
•Web site (also considered primary).

Tertiary Sources

Definition:
Tertiary sources consist of information which is a distillation and collection of primary and secondary sources.

•Almanacs;
•Bibliographies (also considered secondary);
•Chronologies;
•Dictionaries and Encyclopedias (also considered secondary);
•Directories;
•Fact books;
•Guidebooks;
•Indexes, abstracts, bibliographies used to locate primary and secondary sources;
•Manuals;
•Textbooks (also be secondary).

Information from UM Libraries
http://www.lib.umd.edu

Residential Hall In UUM

1. BACKGROUND

Students are the direct recipients of the service provided by the university, Students’
Satisfaction has become an extremely important issue for universities and the management itself direct or indirectly. Hence, student satisfaction is an important issue in terms of quality of service provided in the marketing to be addressed by the university.
University should focus the services to students because as a direct customer they receive the service directly from the university program. The objective of any university is to maximize student satisfaction, minimize dissatisfaction and therefore this in turn to improve the institutions performance.
The improvement of the services provided by university can be achieved by getting
feedbacks, comments, complaints or objections from the students as a customer. From the positive or negative feedback, the universities have a better view of the strengths and weaknesses of its services so that improvement can be made wherever necessary. This can be carried out continuously to gain better relationship to the students as a whole. This study is carried out to determine the level of satisfaction among the UUM students on the facilities provided such as internet service provided in the student residential halls in UUM and the quality of the service.


1.2 FACILITY& SERVICE AT THE UNIVERSITY (UUM)

1.2.1 Residential Hall

As a fully residential university, the University Utara Malaysia provides accommodation for almost 22,000 of its students in 15 residential hall including a hostel for married students. Many of these residential halls are named after multinational companies.
They are MAS, TENAGA NASIONAL, TRADEWINDS, PROTON,
PETRONAS, EON, GUTHRIE, MISC, TM, PERWAJA, MAYBANK,
BANK MUAMALAT, YAYASAN AL-BUKHARY, BANK RAKYAT
and SME BANK.
Each residential hall has its own facilities for students. There are common rooms, computer lab, cafeteria, laundry facilities (coin operated), shops, recreation and sports facilities. What our group will focus on this matter it'll be the internet service provide it.

2. PROBLEM STATEMENT
. Generally in UUM, Students Residential Hall (SRH). And to the knowledge of the school management, there are good and adequate wireless connections in the respective residential halls. But there have been several complaints and rumors from students from respective residential halls about the lack of the wireless connection or the weakness in wireless strength.

2.1. Objective/ Scope

Referring to the topic of our research, student satisfaction and the quality of the internet services provided in the student residential halls in UUM.
This research proposal would find solution for the problem given above in terms of its objective which is:
. To measure the internet strength in the respective student residential halls.
. Observe the student satisfaction on the already existing internet strength provided.
. Measure the effectiveness of the positioning of the access points on several locations.
. Propose measures on how to improve the strength of the wireless connections.

Cyber bullying

1.0 PURPOSE


Holding an event for Anti-bullying, University Utara Malaysia take the step to have the honor of organizing this issue, jointly host a one-day seminar on cyber bullying.


2.0 BACKGROUND


Cyber bullying is a form of bullying that is on the increase, as new technologies (mobile phones, camera phones, internet facilities) both become more sophisticated and spread to a wider proportion of the population, including many children and young people. Whether bullying in general is more prevalent is debatable, but it is almost certainly the case (despite a lack of proper longitudinal statistics) that cyber bullying is increasing. For example, ‘happy-slapping’ or bullying by disseminating pictures via mobile phone, could not exist until mobile phones had this facility.

Several surveys of cyber bullying, by NCH and others (including a recent small-scale but in-depth survey for the Anti-bullying Alliance) show that currently cyber bullying affects a small percentage of pupils (c.2-5%) regularly, and up to 25% on an occasional basis. Some of this cyber bullying is in school, but quite a lot is outside school. As with other forms of bullying, adults are often not told. Some forms of cyber bullying, such as those using mobile phones, are thought (by pupils) to be more distressing than the more usual forms (physical, verbal, social exclusion, telling rumors), although some (e.g. email and chat room bullying) are thought to be less distressing.


3.0 OBJECTIVE


(a) Identify and share current knowledge on the topic cyber bullying in overseas and in Malaysia.

(b) Introduce the policy and the guidelines which need to be followed by every Internet user to guarantee their safety in cyber world.

(c) Facilitating networking of researchers, professionals, IT manufacturers and young people.

(d) Identifying needs for further research and practical action.

(e) Planning a proposal for a larger-scale project to research and provide help in tackling cyber bullying.


4.0 IMPLEMENTATION


4.1 Forum Date:


This forum will be held during one (1) day namely on Sunday, 10th of October 2010.


4.2 Place of Event


Forum location will be held fully in Dewan Seminar TM, University Utara Malaysia, Sintok, Kedah.


4.3 Participation


· SMK Dato' Sheikh Ahmad + 10 teachers.

· SK Sena + 10 teachers.

· Researchers who have worked in bullying, and cyber bullying.

· Representatives of mobile phone companies & internet service providers or IT expert.

· A legal expert.

· Representatives from school.

· Representative from police.

· Student from UUM.

With a likely total of about 100 participants or more to attend this event.


4.4 Fee

No fees that imposed to participants in this proposal yet.



5.0 JUSTIFICATION


Generally, cyber bullying fairly new in Malaysia and still many that do not realize that, it could be available among us. There’s a danger and people should work to put the lines on this issue. Cyber bullying cost innocent people to be victim.

This Forum which held in UUM, the aim of it to create awareness and introduce Students about what cyber bulling policy. We hope to get limit of it and work further to tackle it in future.

Due to this, identify issues, challenges and solution in this problem. Categorized this matter as important agenda that needs to be thoughtful by all parties to put a limit line and too tackled with more effective especially for future generations.


6.0 THE ROLE OF COMMITTEE MEMBER


PROJECT MANAGER

Yusuf


ASSISTANT PROJECT MANAGER / MC

Shakur Idris


SECRETARY

Nor Azlina


FINANCIAL MANAGER

Aisha


SECRETSRIAT

Shahuda

Abdulsalam

Mohd fazri


LOGISTICS
Ahmed

Mohamed Jamc


PROTOCOL

Azlan

Abdullahi


FOOD / PUBLICITY

Noorul suhada

Noor azwaida



7.0 FINANCIAL IMPLICATIONS


Forum budget expenditure our group still study the matter of it.


8.0 THE EVENT FORMAT


Example of the format:

Introductions

Some experiences of cyber bullying

Summary of research on cyber bullying

Legal and child safety issues

[Tea/coffee]

Recent and possible future technological developments

What schools are doing currently

[Lunch]

What needs to be done practically to help children, young people, parents, schools -working groups and plenary

[Tea/coffee]

What further research is needed - working groups and plenary

Summary and future plans

Saturday, August 7, 2010

كاسترو يشارك في جلسة برلمانية عن الوضع الدولي


يعود الزعيم الكوبي فيدل كاسترو الى الاضواء ليلقي خطاباً امام البرلمان هو الاول له منذ تنحى عن الرئاسة قبل اربعة اعوام.

وكاسترو هو من دعا الى عقد الجلسة البرلمانية الاستثنائية هذه لبحث "الوضع الدولي".

وسينقل التلفزيون الكوبي وقائع الجلسة مباشرة اعتبارا من الساعة 11,00 بالتوقيت المحلي (15,00 ت غ).

وستكون اول مشاركة لفيدل كاسترو الذي سيحتفل في 13 اغسطس/ أغسطس بعيد ميلاده الرابع والثمانين، في جلسة برلمانية منذ مرضه الخطير الذي اضطره في 31 تموز/يوليو 2006 للتنحي عن الحكم لشقيقه راوول. كما ستكون المرة الاولى التي سيتحدث فيها مباشرة عبر التلفزيون منذ ذلك التاريخ.

وفي 26 يوليو/ تموز، اعلن اب الثورة الكوبية انه سيطلب عقد مثل هذه الجلسة ليحذر من احتمال اندلاع نزاع نووي في الشرق الاوسط في وقت وشيك بايعاز من الولايات المتحدة على حد قوله.

وفي الاسابيع الاخيرة ظهر فيدل كاسترو الذي كرس فترة نقاهته لكتابة "خواطره" حول احداث الساعة في الصحف وكذلك مذكراته، علنا مرات عدة لبحث الازمة الايرانية مع مفكرين وفنانين او دبلوماسيين كوبيين.

وفي رسالة نشرت الاربعاء الماضي في الصحافة المحلية وجه نداء الى الرئيس الامريكي باراك اوباما ليحذره فيها من مغبة اي تدخل عسكري ضد ايران.

yummi puppy playing around



HISTORY


Its thought that the Poodle originally derived from the German name 'Pudel', meaning water dog. Despite the 'clown like' stigma attached to poodles due to their variety of unusual haircuts, traditionally the Standard Poodle was used for retrieving fowl from water. A working dog renowned for it's intelligence, speed and agility. Its French name 'Caniche' also refers to its water dog origins.

Poodles are very playful, active dogs that love exercise and companionship with other dogs or people and thrive on attention. Highly intelligent and easy to train this athletic breed is eager to please and keen to learn.
It's non molting, dense curly coat traditionally helped keep it warm in the cold waters but became heavy when wet, so to assist its swimming technique the coat was clipped from where it wasn't needed but grown on its chest, joints and vital organs to protect it from the cold. A colored ribbon was placed in the poodles hair to identify it in the water from a distance. Distinctive adaptations of these traditional methods can still be seen today. Poodles are now more commonly seen on the show circuit with stylish haircuts cut to precision or speeding around the agility ring. Their gracious style, speed and enthusiasm makes them successful at both.

The Little Apricot Poodle from a Puppy Mill


By Ashley Schlyer, Assistant Shelter Manager


The little apricot poodle never had a name, but I will call her Halley. Halley was one of 70 dogs rescued from a puppy mill. She and three other dogs were brought to our shelter by one of the Kansas Animal Health Department inspectors.

Most of the dogs that came into our care would need dental work, but otherwise would be healthy enough to be adopted into a forever home.

Halley never knew what it was like to have a warm bed to sleep on or a space all her own. It was the least I could do but to give her fresh food, water and a soft blanket to lay on that night. Halley didn’t know what treats or toys were, and even though she had never known what it was like to be loved, she would look up lovingly hoping to be noticed.

The conditions Halley was living in were so poor that she had no use of her back legs. She struggled to pull herself around on her two front paws while dragging her whole backside behind her. It was a pitiful and saddening site to witness.

When she was taken to the vet the next morning, it was evident she had been forced to breed over and over even without the use of her back legs. This would have been extremely difficult and painful for an animal in this condition.

The next time you think about buying a cute little poodle puppy from a pet store or a breeder, think of Halley. She, too, was once a cute little puppy that was given a death sentence by the puppy mill that bought her and used her to make profit until she was seemingly worthless to them.
Even in the short time we got to know Halley, we could see they may have broken her body, but her loving spirit lived on. The job we do isn't always easy and often times is thankless, but giving Halley one day of knowing what it's like to be loved was truly worth it.

Apricot Poodles

Apricot poodles are among the most beautiful of the breed. Their coats are a sunny, gleaming color, as implied by the name. Apricot poodles may have some variation in their color, such as a slightly darker feathering on their ears and/or tipping on their ruff. This variation is not considered a fault under the breed standards.

Apricots most often have black noses, eye-rims and lips, black-or self-colored toenails and very dark eyes. They may, however, have dark amber eyes, liver nose leather, eye-rims and lips. This, too, is permissible, but not the preferred coloration.


caring for your poodle's coat

No matter what the color, your poodle will have a beautiful, curly coat. Poodles do not shed, which makes them perfect for people with allergies. However, they do need regular grooming to keep them looking their best.

You should brush your puppy at least every other day to keep the coat from becoming tangled and matted. Here at Homestead Poodles, we raise our puppies in our home. They are handled, groomed and lavished with affection, so when they come to you they are well-groomed and completely socialized. Because of their initial upbringing, grooming them will be a much easier process for you.

It is important to note that your puppy should be bathed regularly, ideally twice a month. The toenails must be clipped, ears cleaned, and coat clipped in one of several different patterns. It's generally best to let a groomer take care of the clipping at first, though many owners enjoy learning to do it themselves. Don't expose your puppy to the grooming shop until after 16 weeks, when he/she will have had his/her shots for distemper.


Photo highlight of the day

U.S. Ambassador to Tajikistan Kenneth Gross, right, and British Ambassador to Tajikistan Trevor Moore stand fully clothed in a swimming pool in Dushanbe in July 2010. The men dived into the swimming pool fully clothed as payment for a bet struck on the World Cup. (AFP)

Naked Rugby In New Zealand


You know it's a slow news day when the Daily News decides to run a nine-page photo gallery of a naked rugby match on a beach in New Zealand. In the "News" section, no less. Or maybe an intern just got confused. "Oh you said you wanted a NEWS gallery? Uh, actually, nevermind, that's not gone live yet." NSFW, obviously. [Daily News]

Send an email to Ryan Tate, the author of this post, at ryan@gawker.com.

Wednesday, June 30, 2010

Missconceptions about Islam.

MISCONCEPTION #1:
Muslims are violent, terrorists and/or extremists.


This is the biggest misconception in Islam, no doubt resulting from
the constant stereotyping and bashing the media gives Islam. When a
gunman attacks a mosque in the name of Judaism, a Catholic IRA
guerrilla sets off a bomb in an urban area, or Serbian Orthodox
militiamen rape and kill innocent Muslim civilians, these acts are not
used to stereotype an entire faith. Never are these acts attributed
to the religion of the perpetrators. Yet how many times have we heard
the words 'Islamic, Muslim fundamentalist. etc.' linked with violence.

Politics in so called "Muslim countries"
may or may not have any
Islamic basis. Often dictators and politicians will use the name of
Islam for their own purposes. One should remember to go to the source
of Islam and separate what the true religion of Islam says from what
is portrayed in the media. Islam literally means 'submission to God'
and is derived from a root word meaning 'peace'.

Islam may seem exotic or even extreme in the modern world. Perhaps
this is because religion doesn't dominate everyday life in the West,
whereas Islam is considered a 'way of life' for Muslims and they make
no division between secular and sacred in their lives. Like
Christianity, Islam permits fighting in self-defense, in defense of
religion, or on the part of those who have been expelled forcibly
from their homes. It lays down strict rules of combat which include
prohibitions against harming civilians and against destroying crops,
trees and livestock.

NOWHERE DOES ISLAM ENJOIN THE KILLING OF INNOCENTS.. The Quran says:
"Fight in the cause of God against those who fight you, but do not
transgress limits. God does not love transgressors." (Quran 2:190)
"If they seek peace, then seek you peace. And trust in God for He is
the One that heareth and knoweth all things." (Quran 8:61) War,
therefore, is the last resort, and is subject to the rigorous
conditions laid down by the sacred law. The term 'jihad' literally
means 'struggle'. Muslims believe that there are two kinds of jihad.
The other 'jihad' is the inner struggle of the soul which everyone
wages against egotistic desires for the sake of attaining inner
peace.

by Riyaz on June 28, 2010

A MISTAKEN IDENTITY

by Guillerma Tabio on June 27, 2010......


Every people have their own story of life.. It can be good or sometime i can be bad..

One story I can share was about mistaken identity that happened to me

I was at the age of 19 when it was happened unexpectedly when some military force grab me and put me like a prison on their dettachment for about 12 hour

I was on my study at that time. Walking for about a kilometer back and fort everyday. It was enjoy cause I know I will gain a good future after that sacrifices.

Every Saturday we have our CAT or Citizen Army Training , that I'm one f an officer cadet . We have to wear Jean and white t-shirt with black cap on our ordenary saturday demonstation. as I'm belong on the 5ft battalion.

One Saturday I'm walking along the way to school .I think that I need to fine a short cut way to school so that I will not be late for the formation.or else I will be punnish. On my way to school some military forces block on my way. They grab and accuse that I'm a wanted rebel, pretending as a civilian. I try to explain to them so much but they don't believe and listened and take me like a prisoner on the detachment.They Dont believe that I"m a dauther of the personThat will known on our place.

By the way they really not recognize me because at the age of 13 i am already living in Manila the capital city of Philippines.I'm only back at the age of 19 So they look at me defferent and not familiar,and they did not see me everytime they took to patrol and stay in our home for a while to relax, My famy was one helping them and giving them snack during their duty so how they see me? It just a month from time I arrive and yet Im not always staying at home..

The sun was about to fall and the day is over,I'm still on the detachment convencing them to let me go until I got thier approval.Three men scorted me tell we come to our home. My parent wonder alot on what happened.Why three men are there guarding me with their riple. Mother tell them the story about me, and they ask forgiveness to my family as will as on me too for their mistaken identity. From that time they are always guarding me and be my good friends...




Tuesday, March 23, 2010

Plastic Dick vs The Real Dick




I was watching a reality show where a couple was having sex problems. Even though the guy was having regular sex with his partner she was not being satisfied. At the end of the show it was revealed that she was using sex toys to pleasure herself. The couple did not break up but if I was that guy I would of thought about breaking up because to me she is technically nonverbally telling him he has a small penis and sucks in bed . I mean she isn't satisfied with his penis but is satisfied with plastic. It's obvious that he does not size up to it.

These days you hear a lot about guys being dumped because of size and I think the main reason for it is because of sex toys. Women can now get whatever size they want so not only do us guys have to compete with other men but we now have to compete with plastic lol. The funny thing about it is that it's kind of our fault considering most likely men made the sex toys.

Question for guys: What would you do if you were in this guy's shoes where your girlfriend or wife is so unsatisfied she has to resort to getting off with plastic?

Question for girls: If a guy had a 6 inch wang and you had a 10 inch sex toy would the toy be more pleasurable and satisfying than the guy? Would you lie to the guy and tell him he is satisfying you and then in secret use the toy?