first u must have iso file of win7 on your pc then
1- open the ultraiso program
2- select ( make bootable disk ) from boot list
3- insert your usb flash in your pc
4- click write and yes
5- wait now ur windows burn on usb
6- eject usb flash and insert usb flash in any pc u want to install win
7- select boot from usb device from setup of motherborad and install
Friday, September 20, 2013
Wednesday, September 18, 2013
U.S. intelligence methods to spy on your phone
In pursuit continued toward information , put U.S. intelligence mobile phones and modern communications as one of the main objectives of the work, especially with the boom witnessed by the world in the use of smartphones « Smartphone » , and managed and the National Security Agency, the U.S. , according to confidential documents that leaked « Snowden » , the development of techniques and tools and mechanisms for granted the ability to penetrate these devices of various types , from « iPhone » hardware, operating system « Android » and even devices « BlackBerry » , which girl reputation on the security of the device and communications passing through its network is too impenetrable .
Magazine « Der Spiegel » German was able to see many of the confidential documents and reports, which have been leaked from the National Security Agency, the U.S. NSA monitored in this investigation how successful agency in penetrating devices modern mobile phones and what information you get from this breakthrough at large.
In a conference held in Washington recently , Cut « Michael Hayden » Chairman and the National Security Agency , former U.S. to attend a funny story about Bmobail « iPhone », where he and his wife in one of the shops « Apple » state of Virginia , approached them a vendor for the promotion of the device , saying that there are more than 400 thousand application to work on the device , listen ' Hayden ' and then turned around , saying to his wife in a low voice : ' this young man did not know who I am .. Is not it? 400 thousand application means 400 thousand chance of attack and penetration .
In fact, did not comment « Hayden » exaggerated greatly , According to the papers of Interior , told U.S. National Security , obtained by « Edward Snowden » and managed the magazine « Der Spiegel » access them , the United States Agency not only penetrate systems embassies and data , which are traded via submarine cables , but they are also very interested in new forms of communication , which exploded on a large scale in recent years via smartphones .
In Germany, for example , currently has more than 50 % of the users of mobile devices « smart » , and in the United Kingdom , the ratio of up to two-thirds of the total users, and possesses some 130 million people of these devices in the United States , as turning the computer minivan to the center communications and personal assistant, these devices also find out information about its users much more than what people think of the user.
For an institution like NSA , the data volumes are simply gold mines , which meets all the information you need intelligence , almost, in a single device : lists of social communication to information about the user's behavior and its geographical location and interests Personal ( through Keywords for example ), photos, and sometimes credit cards numbers and passwords.
Technology experts at the headquarters of the agency NSA in the « Fort Meade » state « Maryland » considered at the outset that the global success overwhelming for smartphones represents an enormous challenge and very difficult to get information , where to open this up many new channels of communication and that I think IAEA experts that they could not at all to explore their way through this maze .
According to an internal report issued in 2010 and titled « explore trends and objectives and current techniques » the spread of smartphones is happening « rapidly » and developments « complexity of the analysis of information targets traditional » , but the National Security Agency has dealt with this issue as quickly as it has changed user behavior with these devices .
According to the document of the Interior, has been the formation of a task force to deal with production companies and operating systems, the famous , and the teams started specializing in the study extensive for a « iPhone » and operating system iOS with the study of operating systems Android from « Google », and another team's work on ways to penetrate ' Blackberry ' , which appeared in front of them fortified castle until that time.
However , the information that was leaked from within the agency does not refer to operations of espionage and large-scale users of mobile devices smart, but at the same time, the documents clearly confirm that the agency if you select a smartphone as a target 'll find a way to access the information comprising the this device .
Exciting thing is that the agency NSA has targeted devices and systems manufactured by American companies such as « Apple and Google » , but the case « BlackBerry » , which is manufactured by a Canadian company not less sensitivity , because Canada is one of the countries of the Alliance « Eyes five » , which signed an agreement not to engaging in any espionage activities against one another .
The documents reveal , which was leaked that this agreement has been completely ignored , where there is no evidence on the cooperation of the company « Blackberry is on a voluntary basis with the intelligence agency .
And reveal the leaked documents , the agency relies primarily on « negligence » , which handles its user with the phone, where the user does not deal seriously with any concerns about the use of the phone, and the biggest concerns user is mostly lost contact with the company to provide the service , and review a detailed report carries title « Does the target have a smart phone ? » intensive espionage operations , carried out by the agency against a users ' iPhone ' His great popularity and proliferation .
In this report, the review by comparison with the novel « 1984» classic of the writer George Orwell , which revolves around the state practiced espionage wide , revealing at the same time for the current view , adopted by the National Security Agency, the U.S. on smart phones and users , and wondering author of the report : « Who knew in 1984 that this person will be the older brother .... it refers to images of ' Steve Jobs ' founder ' Apple ' .
The results reviewed by the National Security Agency examples of penetrating successful it is surprising , since the training image to the son of defense minister a former U.S. He put his arm around the waist woman , an image taken Abjahazh « iPhone » , and a host other images reviewed by younger and girls in disaster areas, and include men militants in the mountains of Afghanistan , and an Afghan man suspected with his friends in Thailand.
Magazine « Der Spiegel » German was able to see many of the confidential documents and reports, which have been leaked from the National Security Agency, the U.S. NSA monitored in this investigation how successful agency in penetrating devices modern mobile phones and what information you get from this breakthrough at large.
In a conference held in Washington recently , Cut « Michael Hayden » Chairman and the National Security Agency , former U.S. to attend a funny story about Bmobail « iPhone », where he and his wife in one of the shops « Apple » state of Virginia , approached them a vendor for the promotion of the device , saying that there are more than 400 thousand application to work on the device , listen ' Hayden ' and then turned around , saying to his wife in a low voice : ' this young man did not know who I am .. Is not it? 400 thousand application means 400 thousand chance of attack and penetration .
In fact, did not comment « Hayden » exaggerated greatly , According to the papers of Interior , told U.S. National Security , obtained by « Edward Snowden » and managed the magazine « Der Spiegel » access them , the United States Agency not only penetrate systems embassies and data , which are traded via submarine cables , but they are also very interested in new forms of communication , which exploded on a large scale in recent years via smartphones .
In Germany, for example , currently has more than 50 % of the users of mobile devices « smart » , and in the United Kingdom , the ratio of up to two-thirds of the total users, and possesses some 130 million people of these devices in the United States , as turning the computer minivan to the center communications and personal assistant, these devices also find out information about its users much more than what people think of the user.
For an institution like NSA , the data volumes are simply gold mines , which meets all the information you need intelligence , almost, in a single device : lists of social communication to information about the user's behavior and its geographical location and interests Personal ( through Keywords for example ), photos, and sometimes credit cards numbers and passwords.
Technology experts at the headquarters of the agency NSA in the « Fort Meade » state « Maryland » considered at the outset that the global success overwhelming for smartphones represents an enormous challenge and very difficult to get information , where to open this up many new channels of communication and that I think IAEA experts that they could not at all to explore their way through this maze .
According to an internal report issued in 2010 and titled « explore trends and objectives and current techniques » the spread of smartphones is happening « rapidly » and developments « complexity of the analysis of information targets traditional » , but the National Security Agency has dealt with this issue as quickly as it has changed user behavior with these devices .
According to the document of the Interior, has been the formation of a task force to deal with production companies and operating systems, the famous , and the teams started specializing in the study extensive for a « iPhone » and operating system iOS with the study of operating systems Android from « Google », and another team's work on ways to penetrate ' Blackberry ' , which appeared in front of them fortified castle until that time.
However , the information that was leaked from within the agency does not refer to operations of espionage and large-scale users of mobile devices smart, but at the same time, the documents clearly confirm that the agency if you select a smartphone as a target 'll find a way to access the information comprising the this device .
Exciting thing is that the agency NSA has targeted devices and systems manufactured by American companies such as « Apple and Google » , but the case « BlackBerry » , which is manufactured by a Canadian company not less sensitivity , because Canada is one of the countries of the Alliance « Eyes five » , which signed an agreement not to engaging in any espionage activities against one another .
The documents reveal , which was leaked that this agreement has been completely ignored , where there is no evidence on the cooperation of the company « Blackberry is on a voluntary basis with the intelligence agency .
And reveal the leaked documents , the agency relies primarily on « negligence » , which handles its user with the phone, where the user does not deal seriously with any concerns about the use of the phone, and the biggest concerns user is mostly lost contact with the company to provide the service , and review a detailed report carries title « Does the target have a smart phone ? » intensive espionage operations , carried out by the agency against a users ' iPhone ' His great popularity and proliferation .
In this report, the review by comparison with the novel « 1984» classic of the writer George Orwell , which revolves around the state practiced espionage wide , revealing at the same time for the current view , adopted by the National Security Agency, the U.S. on smart phones and users , and wondering author of the report : « Who knew in 1984 that this person will be the older brother .... it refers to images of ' Steve Jobs ' founder ' Apple ' .
The results reviewed by the National Security Agency examples of penetrating successful it is surprising , since the training image to the son of defense minister a former U.S. He put his arm around the waist woman , an image taken Abjahazh « iPhone » , and a host other images reviewed by younger and girls in disaster areas, and include men militants in the mountains of Afghanistan , and an Afghan man suspected with his friends in Thailand.
Study: codeine material associated with increased pain sensitivity
A study medical unveiled doses repeated "codeine" may increase the sensitivity of pain at a time fail it to provide the same effect and effect of the "morphine," and according to the latest results obtained in the "Conference of headaches International", which was held recently in the United States.
A team of researchers in pharmacology at the University of "Adelaide" Australian study on a comparison between the effect of "codeine" and "morphine" in order to determine which is best in relieving pain.
And "Codeine" is a medical material, which is used to treat pain, which is part of the drugs that belong to the category of material "opioid" is usually used to relieve moderate to severe pain such as headaches, sharpness.
The follow-up indicated that people who are accustomed to taking codeine for pain relief have increased sensitivity to pain compared with their peers who were not taking sedating this article.
A team of researchers in pharmacology at the University of "Adelaide" Australian study on a comparison between the effect of "codeine" and "morphine" in order to determine which is best in relieving pain.
And "Codeine" is a medical material, which is used to treat pain, which is part of the drugs that belong to the category of material "opioid" is usually used to relieve moderate to severe pain such as headaches, sharpness.
The follow-up indicated that people who are accustomed to taking codeine for pain relief have increased sensitivity to pain compared with their peers who were not taking sedating this article.
Tuesday, September 17, 2013
من كثر عشقه لحبيبته اخذها فوق البركان
بطريقة لا يتوقعها ولا يتخيلها احد على الاطلاق
عندما فكر فى الارتباط بها رسميا وتقديم خاتم الزواج لها
فاخذها لرحله الى جمهورية الكونغو الديموقراطيه
وذهب بها الى اعلى فوهة بركان هناك وجلس على ركبتيه
وفجأه اخرج علبة خاتم الزواج وقدمه لها وبعد ما وافقت
اخذوا اكثر من صوره لتوثيق هذا اليوم الذى يعتبرونه اهم يوم فى حياتهم
وصدقت المقوله الحب جنون
This is true love
true friendship
When you see the friendship, loyalty and love together? Us. Us to know it's true friendship free from any interests
Show true friendship
Show true friendship
Photographer «Babartis» Sunshine and Nicole Kidman his bicycle and shoot it down to the ground
Hit Australian star Nicole Kidman accident were not expecting it bumped photographer «Babartza» his bicycle and drop to the ground in New York what angered. Summoned the police and publicly expressed interest in pursuing it legally.
According to the site «KTM costume is that no sooner had the U.S. 'Kidman' graduated from the Fashion Show in New York on her way to a hotel photographer even went so on« babrtis »named Carl Wu and bumped his bicycle led to the fall on the ground.
Witnesses said that «Kidman» A_i_att the furious and wanted to charge for a photographer, and summoned the police.
The site confirmed that no injuries appeared on 'Kidman' after the incident, while the frequency that the police fined the photographer decided he was riding his bicycle on the sidewalk, but had not been arrested on criminal charges.
And a police description of what happened that 'an accident
Subscribe to:
Comments (Atom)




