Thursday, November 3, 2011

Top 10 Free Software Download Sites

Today we are listing here Top 10 Free Software Download Sites. There are many other sites are available for software download, but I just tried to list down some very popular sites that I like most. I hope these sites can help you to find and download the software you want to have with you. All of them are huge sites and full of useful software collection that you might looking for.
You are welcome if you want to share more useful useful sites to download free software that we have missed here and you think our readers/viewers may like. Do you want to be the first one to know the latest happenings at SmashingApps.com just subscribe to our rss feed and you can follow us on twitter as well.
Download.com
Download.com
Soft32
Soft32
Open Source Mac
Open Source Mac
ZDNet Downloads
ZDNet Downloads
GearDownload
GearDownload
Open Source iPhone Software
Open Source iPhone Software
FreewareFiles
FreewareFiles
TucowsĂ‚ 
Tucows
Softpedia
Softpedia
FileCluster
FileCluster


Read more: http://www.smashingapps.com/2009/09/19/top-10-free-software-download-sites.html#ixzz1chFFs3Hd

10 Most Popular Korean Stars 2010

10 Most Popular Korean Stars 2010

Fans of Korean stars are just getting higher. Most fans are women, this is evidenced by the many actors more popular than Korean Actress. the following of the Korean Actors and artist based on their popularity is evident from the large number of people clicking like on facebook site, to see how popular Korean stars in the eyes of fans. Top 10 Most Popular Korean Stars 2010 are:

1.Lee Min Ho (1,631,290)


Lee Min Ho was born in Seoul, South Korea, June 22, 1987, aged 23. His name become popular after acting as Gu Jun-pyo in a drama series Boys Before Flowers. Apart from BOYS BEFORE FLOWER, this artist become a major player in the drama series PERSONAL TASTE. In 2006, Lee Min Ho had a car accident that made quite a serious leg injury. Her right leg should be included iron plate to sustain his body. But in June of 2009, these plates have been removed and now Lee Min Ho has recovered completely.

2.Kim Hyun Joong (1,046,144)


Together with Lee Min Ho, Kim Hyun Joong's name also become popular after starring in the BOYS BEFORE FLOWER drama. Born in Seoul, South Korea, on June 6, 1986, Kim Hyun Joong is the actor and leader of boyband SS501. In 2010, he starred in a drama series Playful KISS.

3.Kim Bum (813,692)


Kim Bum was born in South Korea, July 7, 1989 age 21. starring as So Yi Jeong in the television series Boys BEFORE Flowers. Besides playing movies guy with dazzling smile is also adept at playing the piano. Kim Bum personality is actually very different from the role he played in the BBF, the actor who also played in the drama "Marry ME STILL was admitted as a shy and not really able to hang out with beautiful women.

4.Kim Joon (531.999)


four of the top names scored the highest sticking out of the drama series, Boys Over Flowers. The fame of this drama was remarkable. This time kim joon shift which acts as Song Wo Bin, the most mysterious character in the BBF for not too much of life as revealed by other characters. Besides his profession as an actor, Kim Joon is also a singer. He joined the boy band T Max and plays as a rapper.

5.Rain (266.758)


In fourth position is a senior Korean actor, Rain who received 266.758 votes. Rain was born in Seoul on June 25, 1982, and is known as a singer, dancer and a talented actor. Rain name could penetrate hollywood as main actor in the movie Ninja Assassin. in 2010, Rain also starred in a drama that so awaited presence in Indonesia with the title Fugitive.

6.Jang Geun Seok (176.078)


Popularity Jang Geun Suk was taken up in Indonesia after starring in the film You're Beautiful. handsome and good acting that makes it so easy to get a place in the hearts of female fans. Actually, Jang Geun Suk who was born on March 4, 1987 has been in existence long enough in the Korean TV drama series. In 2002 he has starred in TV series show entitled ORANGE. Last drama in 2010 was MARY OUT ALL NIGHT.

7.Choi Siwon (163.061)


Choi Siwon has a handsome face. He is a member of Popular boy band, Super Junior.163,061 fans who was got probably because his great performance on Super Junior and also aggressively in acting during the year 2010. This year the man who was born 7 April 1986 was involved in two drama projects, OH MY Lady and also ATHENA.

8.Song Hye Gyo (110.436)


after dominated by actors ultimately an artist's name appears at the No. 8. Looks like Korean dramas is destined to attract women than men, that so many Korean actors who get the fans instead of than actresses. Song Hye Gyo was born on November 22, 1981 and has starred in many dramas like Autumn IN MY HEART, ALL IN, and the most famous is the Full House, where he played with Rain.

9.Taecyeon (55.103)


Name Taecyeon popular as rappers in the Korean boyband, 2PM. Taecyeon was born December 27, 1988. he is also starring in one of the famous Korean drama, Cinderella STEP SISTER and act as a baseball player named Jungwoo. In his childhood Taecyeon had moved to Massachusetts,America and in fact initially in New York he auditioned held by JYP Entertainment to become a model.

10.Yong Jung Hwa (50.508)


Name Yong Jung Hwa become popular after starring in You're Beautiful Korean drama that aired on SBS in 2009 and aired in Indonesia with the title HE IS BEAUTIFUL began July 26, 2010. In this drama he plays as Kang Shin Woo. Apart from being an actor, Yong Jung Hwa is the leader of the famous indie korea band, CN Blue, with their hits, entitled I'm a Loner.

10 Most Wanted New Year Gifts for Online Students

Are you looking for a gift idea? Not sure what gift is appropriate to give to an online student? Well, look no further because listed below is the ten most wanted gifts for that special online student for the New Year.

Apples iPhone 3G or 3GS

Apples iPhone 3G or 3GS
The Apple iPhone is an excellent choice for any online college student. It costs around $99 – $199 and offers three products in one: An iPod, a multi-dimensional phone and an internet device. It has over 72,000 applications, you can download, record, keep organized and much more.

New Year Gift Basket

New Year Gift Basket
Gift baskets are a wonderful New Year gift idea for online college students. Gift baskets can be trendy and innovative and can include a wide range of gift items like electronics, perfumes, apparel, accessories, lotions or whatever you like.

Laptop Essential Kit

Laptop Essential Kit
The Laptop Essential Kit is an excellent New Year’s gift idea for any online student (http://www.onlineedublog.com/online-student/). This kit comes with seven laptop tools that will make your online experience a productive one. You can set up in a hotel room, on a plane or anywhere – Costs around $49.95.

Roll Em Up Keyboard

Roll Em Up Keyboard
For only around $24.77, this Roll Em Up Keyboard can be a great gift idea for online students. You can Twist it, roll it, fold it or soak it. The Flexible Compact Keyboard is water-resistant, dust-proof and contaminant proof. It is ideal for on the go busy online students and very easy to use.

Kindle Wireless Reading Device

Kindle Wireless Reading
This is a wireless reading device where you can download thousands of books from anywhere; in the car, in class or wherever! The kindle wireless reading device offers college students the ability to manage a vast amount of books and saves you a trip to the bookstore.

Laptop Bag

Laptop Bag
Set your computer free from its boring black case with a contemporary laptop bag. The laptop case has many features like padded zippered section for laptop, pockets for papers, pens, cords and accessories and adjustable shoulder strap.

Chocolates

New Year Chocolates
Everybody loves chocolates, so you can’t go wrong with this New Year’s treat. Chocolates are always in style, they convey a strong message of friendship, love and wonderful memories to loved ones.

The Everything College Survival Book

Everything College Survival Book
The Everything College Survival Book by Michael Malone is a book about everything and anything a college student will every need to know. For only around $4.84 – $10.52, the Everything College Survival Book is a wonderful gift idea for online students and on-campus students.

Multi-Gadgeting Charging Station

This Multi-Gadgeting Sanctuary Charging Tray charges more than 1,500 electronic, handheld devices while organizing unsightly wires. This sleek charging station eliminates the need for bulky and unsightly wall adapters, and provides plenty of space for wallet, watch, and keys.

Noise-Canceling Headphone

Noise-Canceling Headphone
Too noisy at home or at work? Can’t find a quiet spot to study online? Well, this Noise-Canceling Headphone features exclusive Bose advancements in noise reduction technology. You hear less noise than ever before, and even more of your music and movies. With the quality sound you expect from Bose, and a lightweight fit that stays comfortable for hours

PASSWORD HACKER'S

Most people are clueless as to how accounts are hacked and their passwords reflect that. If you find anything in common with the most common passwords below you have a weak password. This is to help people choose a strong password and possibly help site admins understand the risks.

Most Common Passwords

  1. 123456, 123, 123123, 01234, 2468, 987654, etc
  2. 123abc, abc123, 246abc
  3. First Name
  4. Favorite Band
  5. Favorite Song
  6. first letter of given name then surname
  7. qwerty, asdf, and other keyboard rolls
  8. Favorite cartoon or movie character
  9. Favorite sport, or sports star
  10. Country of origin
  11. City of origin
  12. All numbers
  13. Some word in the dictionary
  14. Combining 2 dictionary words
  15. any of the above spelled backwards
  16. aaa, eee, llll, 999999, and other repeat combinations

Common Extensions

Some sites force you to have passwords with both numbers and letters. For example bob's password is football, and the site asks him to add some numbers to it to make it valid. Here's what people usually add.
  1. Their year of birth / marriage / graduation (or expected grad) from HS or college
  2. 007
  3. 0 - 9
  4. 69
  5. 000, 111, 4444 or other long combinations
  6. 123456, 123, 123123, 01234 and other retarded combinations
Years are usually added in different ways: football85, football1985, football04 instead of football4. There's also the possibility of sub-connections like football_04 and football-84. Many sites require both numbers and letters so these are a more likely occurance since people tend to want to have the same pass for everything.

My opinion on an Ideal password

Mixed numbers and letters over 8 characters long. Memorize it once, use it forever.

How long it takes to hack a password

If they have hacked and downloaded the entire database it's 10000 times faster than if they send requests guessing your passwords on certain websites. Most decent comps can check easily thousands possibilities per second. Most decent sites have captchas now which prevent brute force guesses.

Words in the Dictionary

If they steal a sites database you can get hacked fast, even if you use foreign words. The open office english spellcheck has around 70,000 words. Apps like passwordspro on my 2 Ghz cpu can check around 4,000,000 md5 possibilities a second, allowing to to breeze through several dictionaries, including possible variations like all uppercase/lowercase and backwards words. The latest nvidia cards with a coda gpu brute forcer can easily exceed 200 million md5s a second.

Numbers

If you have an all numbers password it's much faster to crack than if it were mixed. Instead of having a massive array of words in memory and selecting an index from it, or even worse reading from disk every few seconds in a buffer, having a number just requires the computer to do what computers do fastest, count. At 2 Ghz my comp can check every number up to 14 million in 2 minute for salted md5s, making it possible to have a weak 8 character password. Adding 0s to the front of the number can help, but not really. A second pass with any number of 0s can be done afterwards. Maybe if you made it your zipcode+your best friends number or something VERY long it would be strong enough.

All Random letters

Every possible combination of 3 letter words is only around 17000 while every possible 4 letter word combination is 456976. It grows exponentially every time you increase just one letter. Most sites recommend 8 characters or more for a strong password. Adding just 1 character to your password helps expontentially. No dictionary words!

Why hackers usually don't care about your Computer

Contrary to popular belief most malicious hackers do not give a damn about giving you trojans or making your stupid windows computer crash. Then why are there so many trojans in p2p networks? Because of retarted script kiddy teenagers and nigerians that fancy themselves hackers using prebuilt trojan software. Hackers target servers. Why?
  1. Massive bandwidth.
  2. Mail servers with proper mmx records that validate spam checks
  3. The possibility for phising.
  4. Most servers are unattended meaning it can be months before the person finds out there's a malicious script bombing emails or phising people.
  5. Exploitation of social networks.
They can get a lot of credit card numbers or bank account information email bombing thousands of emails on a hijacked server rather than waiting to find a credit card number amongst all the instant messages and random typing you / your kids type throughout the month.
Sure there's been a lot of home PCs infected, but usually this is the result of very efficient viruses that replicate and spread in-mass. Most people have decent antivirus software for hackers to want to waste their time flooding trojans. Some hackers use hijacked home PCs as DDoS zombies, but other than that you're more likely just to get spyware that floods you with ads.

How hackers usually obtain your password

Most malicious hackers just wait for security update news. Whenever some forum or cms software like drupal, vbulletin, phpbb or invision board releases a security update, they try and find what the discovered exploit was. They google search for forums that may have the affected system and use the exploit. Forums can give tons of emails / passwords.
The ones who are skilled enough and actively attempt to discover the exploits are more rare.
Even worse is when the skilled programmers make simple automated exploit programs for script kiddies to use without even understanding the code. This is where the majority of the attacks come from, losers that use programs made by hacker and call themselves hackers.
It's super rare that you would be targeted or your password has been hacked from large sites like google, hotmail or myspace. Most of the big sites have capchas and DDoS protection, which cripples speed, It's more likely they hacked some other site that you long forgot about and found you conveniently use the same password for all your accounts including your email. From there they find even more passwords.. Most people get hacked from phising attempts or other forms of social engineering rather than real hackers, although they can use XSS vulnerabilities to help trick people. People also get trojans from opening email extensions and downloading pirate stuff off p2p without a decent antivirus. Hackers with skills enough to find open ports / exploit them and get shell access are much more rare than people claim.

Common Types of Webhacks

SQL Injection
By far the most common serious error web programmers have is not validating user input well. Usually SQL injections are used to get username / passwords or other information in the database by adding a UNION statement to a select query. Despite it's name its more rare to get an exploit where you can actually inject or insert data into the database since most programmers aren't stupid enough to use GET requests for insert, most hackers are more lazy when it comes to spoofing post requests, and it's a lot more tricky or impossible to add insert, create or drop queries to injected strings.
Local File Inclusion
Many web apps load modules or plugins through get or post variables. Lets say I use ?loadplz=file.php if I wanted to load /home/jimmy/htdocs/file.php a malicious person could say ?loadplz=../../../../../../../../../etc/passwd to try his luck for some unshadowed password goodness. Many times the NULL byte exploit is used to trick input validation. It is often used to include any CMS or Forum configuration files to get MySQL access.
Remote File Inclusion
Yikes, a lot of web apps have forms where you can upload pictures, texts or files Some have admin control panels that only the admin of the site can access but then there's no input validation on the upload forms. Some just don't validate the type of file you upload, meaning you can upload malicious code that does anything within the limits of the JIT compiler privileges.
Logged in User Exploits
Many sites often don't validate the data you want to modify or delete is yours. They only check if you're logged in. Sites that use Ajax are especially prone to overlook possible input validation problems.

How are passwords stored in a website

Most are stored as md5 hashes. If your password is stored without encryption you are screwed if the site gets hacked. It doesn't matter how long your password is. Sites like thepiratebay and stage6 have gotten their passwords stolen, don't think it can't happen to big sites. You can tell if a site encrypts your password by using their password recovery form. If it gives you your password your password is not encrypted. If it asks you to enter a new one or it generates a password for you, it has your password encrypted. You should never purchase anything from sites that don't encrypt your password, they may keep your credit card information or other sensitive data without encryption following their php for dummies guide

Dangers of md5

Sites like milw0rm and plain-text have millions, maybe billions of precomputed hash values in what are called rainbow tables. People can enter hashes in limited quantities to put on queue for cracking. md5 is a one-way hash, meaning it can't be decrypted. Instead, they try every possible combination in a limited range. Encrypting many possibilities and comparing them to the original hash is extremely slow. Rainbow tables make it so that the possibilities are encrypted only once and the resulting hashes are saved into massive files called a Rainbow table. From there the real hashes are compared to all the possibility hashes in the rainbow table. This avoids recalculating the hashes for every possibility for every user but in exchange costs a lot of overhead loading the file into memory and comparing from memory. The time-memory trade off is worth it. Other sites are just searchable databases of hashes. You still should be ok if your pass is over 8 characters long. Some sites do double md5s or concatenate md5 encrypted passwords with an encrypted "salted" value, then encrypt the whole thing again. Because the salted value is different for each user, precalculating millions of hashes in rainbow tables would have to be done one user at a time, making it a worse option that brute forcing it. Brute force attacks use word lists separated by line breaks which are widely available around the net and can be easily created, they can also check all possible combinations for certain ranges and character sets.
Making your password case sensitive helps exponentially, specifically ^+26 lol, but it makes typing a pass a bit more inconvenient and not all sites support it. I'm sure my prog isn't the most efficient possible and there are way faster comps out there so be careful.

Web Exploiters vs Program Crackers

People who exploit website vulnerabilities are not always the same as those who crack and keygen commercial software and games. The two require a few different skill sets. Web hacking requires mastery knowledge of the http protocol, cookies, php, asp, SQL, and the methods user input is usually validated. The skill is gained from a lot of practice writing safe web-apps and observing the exploits found often in others. Program crackers on the other hand usually have very intimate knowledge of assembly and non-JIT compilers. They use a debuggers to find exactly where in the program a certain procedure is executed in order to modify it. They are also apt in modifying and exploiting unvalidated user input in the memory with buffer overflows. Browser plugins are often the target to buffer overflow exploits. I'm not saying some people don't have both skill sets.

What is hacking

Contrary to popular belief and the Hollywood culture, hackers are just people that can manipulate things on a bits and bytes level. They're excellent programmers and the majority do not engage in illegal activity. Making something do what it wasn't intended to is exploiting, not hacking.



Tags: most common passwords, md5 rainbow tables, crack md5 list, reverse engineer md5, spanish dictionary word list, english word list, all possible 4 letter words, brute force md5 attack, invisionboard attack salted, lm, hack myspace passwords, capcha cracker, captcha hack, hacking

Ultralight

Ultralight Airplanes:Affordable Flying






 
Who would't like to fly high in the sky like the bird's and plane's see the world from up above. it's a dream of many but mostly doesn't come true.it's either because of the cost or or ya it's mostly because of the cost the answer to this question is simple an ultralight.cheap and easy to build. if you search the net you will atleast come up with a thousnd articles on this i a really good long tearm project and also a good and also a good way to spend time. and if your are  intrested in building one of these visit some of these sites
                   
               http://half.freehomepage.com/Welcome.html

                
                                 http://ultralight-airplanes.info/Build-Ultralight-Airplane.html