Saturday, April 28, 2012

How to teach the horse to make love






At first acquaintance with a friend - horse.













Then with this.











All bodies must be clean.









So what are you my friend.









Jump up on the horse.









No comments.










Truncated - a friend is ready to.







Wednesday, April 25, 2012

Chevrolet Avalanche is another popular pick-up



After the release of. review of the pickup. Last week I hinted in Canada, it was wrong to forget the product GM and sent photos.



more ».

Tuesday, April 24, 2012

Wednesday, April 18, 2012

Who's Who in the world of IT.


Educational program about the color of wages.



For, as it says ' cultural ', optimize tax payments, many companies use various schemes to hide the full amount of the state salary. This is a very extensive practice. Various schemes. For example, direct payments of cash, is not carried out officially by the documents. Or, create a separate company, called the Human Resources Agency, in which all employees are registered. The parent company enters into a contract with this ' pocket ' recruitment agency to which employees perform certain work. Accordingly, the staffing agency listed the money for the work performed. There are already cashing them in certain schemes and pay wages. It turns out that the parent company does not ' soil oneself ' no ' gray ' schemes of payments, remaining ' white and fluffy ' to the state. In this official document of the staff are paid the minimum allowed in our country wages, the rest -' in the envelope '. As a result, it is necessary to take care of their retirement savings, because there comes a paltry sum of. The bank will loan at higher interest rates, r. to. or in general any evidence you can not pay the full amount of the factory, or it is possible, but only to help the bank. In addition, in the event of termination you may pay only the official part of the money, and any court you can prove that they had received more.



White wages, t. e. those salaries for which the full amount is paid officially, according to the documents, pays a very small percentage of companies. These are mainly banks, state. agencies, branches of foreign firms. Accordingly, with the salary deductions are more in retirement savings, the bank can take credit for the PIT - 2, which gives it a smaller percentage. In employment on the ' white ' salary even consider such a fact that sometimes the default you will be referred to the amount before tax. For example, if you have agreed on the amount of 50,000 rubles, the hands get 43,500 rubles ( t. e. 13% tax).



With the passage of the probationary period may be paid salaries lower than that for which you have agreed to. However, the law can not be paid less than two thirds of the agreed salary, and a probationary period can not be more than 3 months (6 months for managers ).



So, aim, of course, to get a job with the ' white ' salaries, but given the realities, do not worry if you find such a suitable job can not.



to be continued.

Tuesday, April 17, 2012

Found serious vulnerabilities in the protocol of WPA


Researchers Tyuz Eric (Erik Tews) and Martin Beck (Martin Beck) have found serious vulnerabilities in the protocol of WPA (Wireless Protected Access), which is still considered a reliable alternative to the other, has long been compromised security protocol WEP (Wireless Encryption Protocol).
It should be noted that while Tyuzu and Beck managed to crack the encryption keys used for data that comes from the point of access to a PC. Those keys are used to protect data transmitted from the PC to the access point, were not compromised. The results of his study and the detailed methods of hacking the authors promise to present at the conference PacSec, to be held next week in Tokyo.
To crack WPA security protocol Tyuz and Beck used the tool Aircrack-ng, as well as some mathematical developments that have not yet been made public. The main target for attack were the keys TKIP (Temporal Key Integrity Protocol) - they can crack just 12-15 minutes, and without the use of ...
WPA protocol is widely used in modern networks, Wi-Fi, and more recently its successor, WPA2 is gradually. Nevertheless, most access points, offering protection protocol WPA2, maintain a normal version of the WPA, which could potentially become a loophole for criminals. In particular, it is now a major retail chain T. J. Maxx spends transition from WEP, WPA protocol to normal after a major leak fixed - for two years through a vulnerable wireless network criminals have stolen hundreds of millions of credit card numbers.
All users of wireless Wi-Fi networks are necessary to reflect the mandatory use of virtual private networks and encryption mechanism WPA2 - all other methods have been compromised, although to varying degrees. Well, the wait for the results of the conference PacSec - perhaps born before our eyes a whole new family of serious threats to many quite modern Wi-Fi networks.
Source:. Security Lab.

Monday, April 16, 2012

A red face is a








Yesterday returned. On the face burns, burns on his hands. I am also a foot from the rear of the burned, because walking barefoot on the sand. And no one is planning to sunbathe. Just podryhat near the sea, fresh air.

As a result, in the morning it began to rain, which soaked for two hours absolutely everything from tents to food. In the morning almost cleared up, the beginning of the sun scald and scald until his departure in such a way that burns to the evening went even earlier tanned somewhere else people. For some reason, nobody had the idea to take sunscreen, and maybe hoped for bad weather, the forecast promised.

But I cooked pilaf in cauldron. It was a fascinating experience, but it turned out decently. Ate it in two parts cleaned. But, of course, different from cooking on the stove abound, at some point I even thought that I was waiting for the collapse of the cooking when the rice was proved on the one hand, and burnt to stick to the wall, but the cost - water and sunflower oil have done their job, . Shame retailers! .

In the photo the Baltic Sea by the Vistula Spit - there are no tourists, the sea is warmer, sandy beach and a large, constantly emits a fine amber - walked along the beach fishermen with nets. One terrible disadvantage - very bad and hard to get close mosquitoes to the sea - the dirt roads are broken completely.

Satellite-X ToDo

Sunday, April 15, 2012

Put SAPE XAP ( for beginners )



1) to signup. SAPE. and. XAP. , Then the text of glanders and ksapa. Why do we signup through my refferal link? . But those who, through me regnulsya respect and consultation on ICQ at any time of day and night. I repeat - referral reward system pays me, not you.

2) Download the latest version of scripts. Make a folder, as mentioned in the instructions to fill them and place systems, scripts.

3) Start picking your scripts. Open the header template. All of it is called differently, but this is part of a pattern that appears first, and then the body. That's why the header.

4) Poke in the header code of both systems.

if (! defined ('_SAPE_USER')) {.
define ('_SAPE_USER', ' vasha_papka_s_sapoy ');.
}.
require_once ($ _SERVER ['DOCUMENT_ROOT']. '/'. _SAPE_USER. '/ sape. php ');.
$ sape_context = new SAPE_context ();.
if (! defined ('_SAPE_USER')) {.
define ('_SAPE_USER', ' vasha_papka_s_sapoy ');.
}.
require_once ($ _SERVER ['DOCUMENT_ROOT']. '/'. _SAPE_USER. '/ sape. php ');.
$ sape = new SAPE_client ();.

$ cache_dir = '/ vasha_papka_s_ksapoy /' / / here MUST include your name for the folder instead of the cache, at least 12 characters!.

include_once ($ _SERVER ['DOCUMENT_ROOT']. $ cache_dir. 'tnx. php ');.
$ tnx = new TNX_n (' your username ', $ cache_dir); / / your username in the system.

5) carry on the body site links. I prefer the recent placement of a single, but in the header or the footer to cover more pages.

>echo $ sape-return_links ( 1);. - Is sapossylka.
>echo $ tnx-show_link ( 1);. - Is ksapossylka.

(1) - meaning ' to display a next link'. t. e. every time this function is called, it will display the next link of the purchased.

() - Means ... With such an argument to the thread where we put in the basement. Remember, however, that ksapa not sell more than four links on the page, but the sap from the limit a little more, but more than 10 I do not recommend to put. Even better, put a limit to 5 links per page.

Total we have a place in the five links. I think you can find them. Now let's look at the first part of the code sap. There lies the conclusion contextual links. Here's to sell them, we will have to change the output of articles on the site.

5) Change the output of articles on the site.

Assume that the text of the article is transferred to the variable $ text.

Then, the output will have to precede the processing of this variable:.

>$ text = $ sape_context-replace_in_text_segment ($ text);.

And only then concluded:.

echo $ text;.

6) ufff.

Well that's all. Now Swift Salvage and enjoy life.

Friday, April 6, 2012

Again, I heard ' record'



But interestingly, a guru from time to time gave examples of life, including his own related to such a solution to the problems with insurance and litigation. In this particular uttered - ' Record ', ' record'.
And the guru himself - he left the Soviet Union twenty years ago, it often happens in Russia. T. e. spoke in Russian.

I asked him then, and why ' you have used the term '? . '.

Funny pictures of children