Sunday, July 24, 2011

Ferrari fetches £66,500

Posted On 11:13 PM by TutoR HACK

The yellow Maranello was bought new by Mr Clapton, who signed its service book, and was later sold to Mr Evans.

Mr Loveridge said the Ferrari - which was described by Silverstone Auctions as a desirable car in its own right - was in lovely condition.

The rare 2003 Ferrari 575 Maranello, which has 10,000 miles on the clock, was snapped up by a private buyer at a sale in Silverstone on Saturday.

Auction manager Guy Loveridge said the vehicle exceeded its guide price.
"Famous name provenance is always a help," he said.

"It's a great car and we are not surprised that it fetched such a large amount of money."

The car had been expected to go for between £58,000 and £66,000 at the Classic Sale at Silverstone, Northamptonshire - the home of the British Grand Prix.

Norway gunman faces court hearing

Posted On 11:08 PM by TutoR HACK

The man blamed for Friday's twin terror attacks in Norway is due to make his first appearance in court.

Anders Behring Breivik, 32, admits carrying out a massacre on an island youth camp and a bombing in the capital Oslo in which at least 93 people died.

He is said to be linked to far right, anti-Islamic organisations, and to have spent years planning the operation.

Norway will observe a minute's silence for the victims at 1200 local time (1000 GMT).

Mr Breivik is set to appear at the hearing an hour later. He has said he will explain his actions to the court. Earlier he described the attacks as "gruesome but necessary".

But it is not clear if the court session will be open or closed to the public. A judge is set to rule on a police request for the hearing be held behind closed doors.

There have been calls for a media blackout of the trial so as not to give Mr Breivik a platform for his views.

Under Norwegian law he faces a maximum of 21 years in jail if convicted, although that sentence can be extended if a prisoner is deemed a threat to the public.

Police said that while the suspect has admitted to the killings, he has not accepted criminal responsibility for them.

His lawyer Geir Lippestad told Norwegian media on Sunday: "He thought it was gruesome having to commit these acts, but in his head they were necessary.

"He wished to attack society and the structure of society."

Still pictures of the suspect, wearing a wetsuit and carrying an automatic weapon, appeared in a 12-minute anti-Muslim video called Knights Templar 2083, which appeared briefly on YouTube.

A 1,500-page document written in English and said to be by Mr Breivik - posted under the pseudonym of Andrew Berwick - was also put online hours before the attacks.

The bomb in Oslo targeted buildings connected to Norway's governing Labour Party, and the youth camp on Utoeya island was also run by the party.

Saturday, July 23, 2011

Amy Winehouse found dead

Posted On 7:29 PM by TutoR HACK

Amy Winehouse
Chanter 'Back To Black', Amy Winehouse found dead on Saturday, July 23, 2011, at his residence in Camden Square, London. Police have confirmed news of the death of five Grammy Award winner in 2008 who were aged 27 years.

"Police were called by the ambulance service to the Camden Square London NW1 today at 16:05 local time, Saturday, July 23, 2011, following a report about a woman who was found dead," said an officer told the Daily Mail page.

Police still did not give details cause of death artist owner's full name is Amy Jade Winehouse. This eccentric singer was looking very pretty. He has a very characteristic voice and praised by many music critics.

But the hobby of smoking, drinking alcohol and using illegal drugs often get him involved in a variety of problems. Winehouse's death allegedly due to bad habits that influence can not be left behind, ie, taking drugs and alcohol.

Winehouse now it is struggling to break away from dependence on drugs and alcohol. Currently, menggungnya activity has been reduced, because he was concentrating escape from the acute dependence.

Blobfish, grim-faced rare fish

Posted On 11:18 AM by TutoR HACK

The team of researchers from the University of New York, England found a fish called Blobfish. Fish species became famous because of his reputation that has long face, like someone was dogged by sadness.

Blobfish found in southeast Australian waters seem to have a reason to show the face of melancholy. Because based on the testimony professor Callum Roberts, Blobfish endangered Due to the action of fishing on a large scale.

"Highly vulnerable Blobfish entangled fishing trawler and we know that Blobfish can only live in these waters," Roberts said as quoted by the Daily Mail.

The inhabitants of the waters in the form of fat that can grow to a size of 12 inches. Although not edible, Blobfish live in water depths similar to other marine organisms that can be consumed, such as crabs and lobsters. Average Blobfish live at depths of up to 800 meters away from the water surface. That is why the existence of Blowfish is rarely seen by humans.

Thanks to fishing techniques that do not jeopardize endangered species, the scientists succeeded in capturing Blobfish for later investigation.

"Australia and New Zealand waters are the most active regions in the world in conducting large-scale fishing. So if you become Blobfish, the region is not a good place to be a place to live," he said.

Monday, July 18, 2011

Bust Avoidance For Dipshits

Posted On 10:14 AM by TutoR HACK

Notice how the feds and other appendages of law enforcement pop up every so
often and take down people. Ever wonder if your going to be next. if you have
wondered then your obviously doing something that increases your chances of
becoming a cellmate to a six foot 200lb guy named bubba. lots of idiots get
busted but if they took some care and were careful they would probably still
be out and not married to big bubba.

Here are 10 things that get the attention of the law if your doing any of
them then your a dipshit and are in possible danger of visiting bubba in the
state home for stupid hackers.

1. never brag about your exploits on public boards
2. never brag to people who ask you questions about your favorite passtimes
3. never use codes found on boards
4. never use cards found on boards
5. never call boards where you dont know anybody
6. never talk to people when they ask if you know how
7. never use an unsecure line when talking to people for the first time
8. never use a po box registered to you
9. never go to swapmeets or bbs get togethers
10. dont trust anybody

Now for any retards reading this ill explain a few things.

First about bragging, dont do it. it makes you look like an idiot and you
never know if the person listening is a fed or some other lowlife like phone
security or an informant. second cards and codes found on boards are off
limits for the obvious reasons,

1. You dont know if its been planted by the happy feds.
2. You dont know why it was placed there.

A simple rule,

'If its there it maybe a trap so dont touch it.'

Remember, phone companies can entrap you if they want and they often will use
a known code to trace asmany people as they can and then bust everybody all
at once. This can happen as long as a year later. boards where you dont know
anybody are also bad. anybody could be an informant or a fed. Yes they do
call boards just like we do. if somebody asks you how to do something, dont
tell them. why are they asking you instead of finding out on their own?

If they know what theyre doing they shouldnt have to ask you unless they are
trying to find out if your a good target for a set up or unless they are too
stupid to find it out on their own. Either way they aren't worth your trouble
or the risk. if they get busted do you think they will go quietly to jail or
will they try and give them other people so the law will go easy on them.

When somebody you dont know wants to talkvoice to you dont give them your
number, call them from a payphone or break into a car and use a carphone.
They might be trying a trace or trying to find out who you are. remember even
if it isn't a cop it may be someone out to hurt you. if you use a po box for
communicating to others dont use one registered to yourself, this is stupid.
You can be busted the moment that you take something illegal out of it.

Also for the paranoid, get a kid to get your mail for you. pay him a couple
bucks to do it and hide somewhere and watch him go to where you want your
mail put. On any board if a few users want to go meet to swap files or do
something, dont go. It could be a set up or you might end up being photographed
by some agengy looking for a bust.

Finally never ever trust anybody.
Do you know them well enough to entrust your freedom to. What happens if
they are cops. are they not going to bust you just because you trusted them?
Fuck no. Here's a few simple rules to follow if you would like to have a
better chance of staying away from the feds.

1. First use more than one handle it makes it a little harder to keep track
of you that way. Also dont call boards that let just anybody on them.
If the board isn't secure then you arent either.

The feds set up a board a while back and let the users do whatever they
wanted. They busted quite a few bozos for shit like codes, pirated software
and credit cards. If they did it once they will do it again. The enemy isn't
stupid and if something works, they stick with it.

2. Don't teach anybody things they dont know how t odo. Let them pratice on
thier own without your help. If they get busted the feds will want to know
who they know and you dont want to be one of them.

3. If a stupid shit runs a board requiring a code for access dont call it.
If it goes down so will all the users. Remember the phone companies aren't
prohibited from entrapment like the cops and they can and will trap you.

There are a few retards out there who like to post codes all over the place
to show that they can get them. These people should be shot. They bring more
attention to the area than would otherwise exist. Think about it, if a phone
company sees more and more stolen codes being used to originate calls from
one area, are they going to ignore it?

If you put a code on a board then people who dont know what the fuck they are
doing will use it and that can fuck up everybody. remember when mci and sprint
were using short codes and then they went to the long bitches. Makes things
more difficult to hack out and notice how there are fewer busts recently
compared to the old short codes. The assholes who dont know how to find them
can't call anymore.

Keep it that way.

If you are one of the people who finds cards and codes in trashcans and
dumpsters then dont be stupid and go to the same place more than once.

Don't laugh, some people do it at the same place, same time, all the time.
Then they wonder why they got busted! The enemy isn't stupid and they can
find the source of the problem pretty quickly.

That's about it for this one. Remember don't be careless and don't
underestimate your enemy, they can bust you if you are stupid.
Keep your information out of the hands of lamers and you should have no
trouble so the wise better not plan to sit down after bubba welcomes you
to jail.

Friday, April 1, 2011

Bit Torrent Tutorials

Posted On 1:12 AM by TutoR HACK

The first things you need to know about using Bit Torrent:
  • -- Bit Torrent is aimed at broadband users (or any connection better than dialup).
  • -- Sharing is highly appreciated, and sharing is what keeps bit torrent alive.
  • -- A bit torrent file (*.torrent) contains information about the piece structure of the download (more on this later)
  • -- The method of downloading is not your conventional type of download. Since downloads do not come in as onebig chunk, you are able to download from many people at once, increasing your download speeds. There may be
    100 "pieces" to a file, or 20,000+ pieces, all depending on what you're downloading. Pieces are usually small (under 200kb)
  • -- The speeds are based upon people sharing as they download, and seeders. Seeders are people who constantlyshare in order to keep torrents alive. Usually seeders are on fast connections (10mb or higher).

In this tutorial, I will be describing it all using a bit torrent client called Azureus. This client is used to decode the .torrent files into a useable format to download from other peers. From here on out, I will refer to Bit Torrent as BT.

Which BT client you use, is purely up to you. I have tried them all, and my personal favorite is Azureus for many reasons. A big problem with most BT clients out there, is that they are extremely CPU intensive, usually using 100% of your cpu power during the whole process. This is the number one reason I use Azureus. Another, is a recently released plug-in that enables you to browse all current files listed on (the #1 source for torrent downloads).

Before you use the plug-in, take a look at /, and browse the files. Hold your mouse over the links, and you'll notice every file ends in .torrent. This is the BT file extension. Usually, .torrent files are very small, under 200kb. They contain a wealth of information about the file you want to download. A .torrent file can contain just 1 single file, or a a directory full of files and more directories. But regardless, every download is split up into hundreds or thousands of pieces. The pieces make it much easier to download at higher speeds. Back to Look at the columns:

Added | Name | Filesize | Seeds | DLs (and a few more which aren't very useful.)

I'll break this down.
Added: Self explanitory, its the date the torrent was added.
Name: Also self explanitory.
Filesize: Duh
Seeds: This is how many people are strictly UPLOADING, or sharing. These people are the ones that keep .torrent files alive. By "alive", I mean, if there's no one sharing the .torrent file, no one can download.
DLs: This is how many people currently downloading that particular torrent. They also help keep the torrent alive as they share while they download.

It's always best to download using a torrent that has a decent amount of seeders and downloaders, this way you can be assured there's a good chance your download will finish. The more the better.

Now that you should understand how torrent files work, and how to use them, on to Azureus!
First, get JAVA! You need this to run Azureus, as java is what powers it. Get Java here: /
Next, get Azureus at: /
Next, get the Suprnovalister plugin from /

Install Java JRE before you do ANYTHING.

Install Azureus, and then in the installation folder, create 2 more folders. ./Plugins/suprnovalister (For example, if you installed Azureus to C:\PROGRAM FILES\AZUREUS, create C:\PROGRAM FILES\AZUREUS\PLUGINS\SUPRNOVALISTER). Next, put the suprnovalister.jar file that you downloaded, in that folder.

Load up Azureus, and if you want, go through the settings and personalize it.

The tab labeled "My Torrents" is the section of Azureus you need the most often. That lists all your transfers, uploads and downloads. It shows every bit of information you could possibly want to know about torrents you download.

In the menu bar, go to View > Plugins > Suprnova Lister. This will open up a new tab in Azureus. Click on "Update Mirror". This will get a mirror site of containing all current torrent files available. Once a mirror is grabbed, choose a category from the drop-down box to the left and click "Update". Wah-lah, all the available downloads appear in the main chart above. Just double click a download you want, and bang its starting to download. Open the "My Torrents" tab again to view and make sure your download started.

After your download has finished, be nice, and leave the torrent transferring. So people can get pieces of the file from you, just as you got pieces from other people.

Alternatively, if you don't want to use the plugin... you can just head to and download files to any folder. Then go to File > Open > .torrent File in Azureus.

This should about wrap it up for the Bit Torrent Tutorial. If you guys think of anything I should add, or whatnot, just let me know and I'll check into it.

My Visitor


Enter your email address:

Delivered by FeedBurner



Tutorial Blog Copyright © 2010 ZaL_yUn GaLuh VitaLoka RizaL The MoLex