2012 has passed, and the legend of the End of World 2012.12.21 did not come. The new year has arrived, 2013 is quite a new year.
Happy 2013 New Year is around the corner from us, you have chance to send best New Year wishes to each other with this remarkable and inspiring wallpaper message to everyone. This year i will show you my collection of best New Year photos for upcoming New year in 2013.
Monday, December 31, 2012
Saturday, December 29, 2012
Healthy Food for Weight Loss
It seems natural: You want to lose weight fast, so you do a diet slash-and-burn, eating less and thinking about food more. The usual result also seems pretty natural: You feel denied, so you give up. Repeat as diet fads come and go.
Enough already! Why not eat more for weight loss and weight maintenance, instead of less?
How to Eat More and Still Lose Weight
The trick to eating healthy food for weight loss isn't really so tricky: It's as simple as eating more colorful, good-for-you fruits and vegetables.
Now we all know we're supposed to eat fruits and veggies for their vitamins and minerals, their roughage, and powerful disease-fighting benefits. But apparently good nutrition just isn't alluring enough for most of us. Only 20% of Americans eat as many as five pieces of fruits and veggies a day.
So maybe it's time we turn the tables and instead look at fruits and veggies as a delicious way to "cheat" on a healthy food for weight loss of diet. From fire-engine red bell peppers, and buttery-yellow zucchini, to juicy grapes as purple as wine, "eating enough produce seems to be one of the key elements in weight loss and weight maintenance," says Dave Grotto, RD, LDN, dietitian and author of 101 Foods That Could Save Your Life.
So how does eating more food actually help you weigh less?
Saturday, December 22, 2012
How the World will look like in the next 50 years
How the World will look like in the next 50 years
People have always been intrigued of what the future will look like. The answers are quite simple and here you have them for the next 50 years.
How can we know what the future will look like?
To be able to understand the future, you must know the past. What has taken us to where we are today and what has changed along the way.
To be able to understand the future, you must know the past. What has taken us to where we are today and what has changed along the way.
The world has changed a lot in the last 150 years, but we humans are driven by the same basic needs as we were 150 years ago, food, sleep, sex, the feeling of being appreciated and loved or even healthy food for weight loss. Will this change in the next 150 years? No.
Thursday, December 20, 2012
End of the World
Did the Mayans get it right are we all going to die tomorrow? If we are then what’s on your to do list..
A list that was made by the journal.ie revealed that… turn of the immersion was at the top. So we decided to compile our own list! a few were very naughty and others we just so darn sweet. Here is our top five…
Wednesday, December 19, 2012
Future Snow(1)
I update nothing in my blog for several days, and this because I really feel too tired, and do not want to sleep at night and do not want to get up in the morning. My life was very decadent, feel very annoying. How to change it, and what should I do. My Future won't look as cold as the snow.
And I need healthy food for weight loss.
Tuesday, December 11, 2012
XSS Filter Evasion Cheat Sheet
Future Snow
Monday, December 10, 2012
Sunday, December 9, 2012
Address Resolution Protocol (ARP)
Future Snow
Hackers lie. Skillful hackers lie well. And well-rounded hackers can lie both to people and to machines.
Lying to people, known as "social engineering," involves tactics (detailed at length by convicted hacker Kevin Mitnick) such as posing as a company's employee so the company's real employees will blab secrets freely. Lying to machines involves lots of different techniques, and a commonly used one -- ARP Cache Poisoning -- is the focus of this article. ARP poisoning enables local hackers to cause general networking mayhem. Because it's mostly "incurable," every administrator should be aware of how this attack works.
ARP, a very simple protocol, consists of merely four basic message types:
Lying to people, known as "social engineering," involves tactics (detailed at length by convicted hacker Kevin Mitnick) such as posing as a company's employee so the company's real employees will blab secrets freely. Lying to machines involves lots of different techniques, and a commonly used one -- ARP Cache Poisoning -- is the focus of this article. ARP poisoning enables local hackers to cause general networking mayhem. Because it's mostly "incurable," every administrator should be aware of how this attack works.
ARP Refresher
In Foundations: What Are NIC, MAC, and ARP?, we explained that Address Resolution Protocol (ARP) is how network devices associate MAC addresses with IP Addresses so that devices on the local network can find each other. ARP is basically a form of networking roll call.ARP, a very simple protocol, consists of merely four basic message types:
- An ARP Request. Computer A asks the network, "Who has this IP address?"
- An ARP Reply. Computer B tells Computer A, "I have that IP. My MAC address is [whatever it is]."
- A Reverse ARP Request (RARP). Same concept as ARP Request, but Computer A asks, "Who has this MAC address?"
- A RARP Reply. Computer B tells Computer A, "I have that MAC. My IP address is [whatever it is]"
Saturday, December 8, 2012
SYN Flood Attack and SYN Cookies
SYN flood attacks can be used to take down servers by overwhelming their capacity for open connections.
Let’s suppose that there was a radio call-in show that you wanted to take off the air, and you know that they have a phone system capable of holding 7 callers on hold at the same time. So you go to the store and buy 7 cell phones. When the lines open up, you call the switchboard with all 7 phones simultaneously so that the show can’t accept any legitimate callers.
SYN floods work in a very similar manner.
When you contact a web server (or any other system), there is a standard “handshake” which takes place.
- First, you send a packet which contains a SYN or “Synchronize” flag. This signals the start of a conversation.
- If the server wants to start a conversation, it will issue a packet with an ACK or Acknowledgement flag. This flag indicates that the server has opened a connection for your conversation. This connection will remain open until you close the connection or the connection times out.
- If the connection is refused, the server SHOULD send you a packet with a RST or Reset flag. But many systems and firewalls don’t reply at all to rejected connections for security reasons.
- Once the conversation has ended, you send a packet with a FIN or Finish flag to close the connection and free up these resources for others to use.
Friday, December 7, 2012
Huizhou Culture
The Huizhou Culture refers to a civilization that originated in southern Anhui and centered on the ancient Huizhou Prefecture. It later spread to other parts of China. the Hui Culture combines the local ethos, clanism, Confucian school of idealistic philosphy, and commercialism. It is a precious source for the study of chinese culture.
The Rising and Thriving of the Huizhou Culture
The rise of the Hui Culture can be attributed to an influx of migrants. These immigrants are of two categories: the first were people who fled the Central Plains during perennial wars at the end of the Western Jin Dynasty and Tang Dynasty. They found refuge in Huizhou in the recess of the mountains where they settled down. The second were officials who remained in the region after their tenure expired. Many of these are the ancestors of eminent families in Huizhou.
These immigtants brought with them Confucianism and a better civilization, which was gradually incorporated into the local mountainous culture. At last a new regional culture came into being that was based on Confucianism.
In contrast to the clashes and blending between different cultures and thoughts in the plains areas, Confucianism in mountain-encircled Huizhou remained intact for long periods. With the proliferation of immigrats in the region, clanism was strengthened. Based on blood ties, clanism was a product of Confucianism and consolidated Confucian rule.
Subscribe to:
Posts (Atom)