Huge proxy dump! 17th Oct.

17 10 2009

17th October 2009.
19:50 GMT London.
# 17761

Preview:
148.233.239.24:80
148.233.239.23:80
130.92.70.252:3127
130.92.70.252:3128
193.174.155.27:3124
211.138.124.233:80
123.125.156.132:80
123.125.156.131:80
123.125.156.133:80
220.181.53.233:80
211.138.124.211:80

Download:
http://ugotfile.com/file/498190/Proxies%2017th%20Oct.txt





Huge porn password dump!

17 10 2009

Saturday 17th October.
Time: 18:54 GMT London!

Preview:
http://kissing:awake1@geogiaholly.com/members/index.html
http://candyfire:sashieph@alphababes.com/potd/
http://vinobien1:carrera1@daily-desktops.com/members/
http://debeers:ohiostat@partymature.com/members/
http://larkin63:vincent@camteases.com/members/

Downloads..
2u73j8p.png

or click here





ISP in file-sharing wi-fi theft

17 10 2009

UK ISP TalkTalk has staged a wireless stunt, aimed at illustrating why it thinks Lord Mandelson’s plans to disconnect filesharers is “naive”.

TalkTalk has long been an outspoken critic of government plans to cut off persistent file-sharers.

The stunt demonstrates how innocent people could be disconnected from the network if the plans become law.

The British Phonographic Industry stressed that any new system would educate before disconnecting users.

The music industry has been lobbying government on the issue of internet piracy. According to its figures, there are around 6 million active file-sharers in the UK.

The government is mulling whether to give regulator Ofcom the power to disconnect pirates who repeatedly download illegal content.

It follows intervention from Business Secretary Lord Mandelson to beef up the file-sharing policy originally outlined in the Digital Britain report.

Presumed guilt

But ISPs have argued that it is not their job to police the network. In previous court cases it has been ruled that ISPs are “mere conduits” of content.

Furthermore, they argue that under current plans anyone with unsecured home wi-fi could potentially be stolen by those intent to download music illegally.

They would face the penalties even though they might be unaware their network had been used for nefarious purposes.

The fact that the music industry would presume guilt rather than innocence is a step away from the due process of law in the UK, they say.

“The Mandelson scheme is every bit as wrong-headed as it is naive,” said Andrew Heaney, director of strategy and regulation at TalkTalk.

“The lack of presumption of innocence and the absence of judicial process combined with the prevalence of wi-fi hacking will result in innocent people being disconnected,” he said. Read the rest of this entry »





HOWTO: Gain traffic to your blog!

16 10 2009

How to get traffic for your blog

My friend Fred, a talented blogger, asked me for advice the other day. Here’s a partial answer, with a few apologies to Swift: (and when you’re done with this list, feel free to read my post about shark attacks).

  1. Use lists.
  2. Be topical… write posts that need to be read right now.
  3. Learn enough to become the expert in your field.
  4. Break news.
  5. Be timeless… write posts that will be readable in a year.
  6. Be among the first with a great blog on your topic, then encourage others to blog on the same topic.
  7. Share your expertise generously so people recognize it and depend on you.
  8. Announce news.
  9. Write short, pithy posts.
  10. Encourage your readers to help you manipulate the technorati top blog list.
  11. Don’t write about your cat, your boyfriend or your kids.
  12. Write long, definitive posts.
  13. Write about your kids.
  14. Be snarky. Write nearly libelous things about fellow bloggers, daring them to respond (with links back to you) on their blog.
  15. Be sycophantic. Share linklove and expect some back.
  16. Include polls, meters and other eye candy.
  17. Tag your posts. Use del.ico.us.
  18. Coin a term or two.
  19. Do email interviews with the well-known.
  20. Answer your email.
  21. Use photos. Salacious ones are best.
  22. Be anonymous.
  23. Encourage your readers to digg your posts. (and to use furl and reddit). Do it with every post.
  24. Post your photos on flickr.
  25. Encourage your readers to subscribe by RSS.
  26. Start at the beginning and take your readers through a months-long education.
  27. Include comments so your blog becomes a virtual water cooler that feeds itself.
  28. Assume that every day is the beginning, because you always have new readers.
  29. Highlight your best posts on your Squidoo lens.
  30. Point to useful but little-known resources.
  31. Write about stuff that appeals to the majority of current blog readers–like gadgets and web 2.0.
  32. Write about Google.
  33. Have relevant ads that are even better than your content.
  34. Don’t include comments, people will cross post their responses.
  35. Write posts that each include dozens of trackbacks to dozens of blog posts so that people will notice you.
  36. Run no ads.
  37. Keep tweaking your template to make it include every conceivable bell or whistle.
  38. Write about blogging.
  39. Digest the good ideas of other people, all day, every day.
  40. Invent a whole new kind of art or interaction.
  41. Post on weekdays, because there are more readers.
  42. Write about a never-ending parade of different topics so you don’t bore your readers.
  43. Post on weekends, because there are fewer new posts.
  44. Don’t interrupt your writing with a lot of links.
  45. Dress your blog (fonts and design) as well as you would dress yourself for a meeting with a stranger.
  46. Edit yourself. Ruthlessly.
  47. Don’t promote yourself and your business or your books or your projects at the expense of the reader’s attention.
  48. Be patient.
  49. Give credit to those that inspired, it makes your writing more useful.
  50. Ping technorati. Or have someone smarter than me tell you how to do it automatically.
  51. Write about only one thing, in ever-deepening detail, so you become definitive.
  52. Write in English.
  53. Better, write in Chinese.
  54. Write about obscure stuff that appeals to an obsessed minority.
  55. Don’t be boring.
  56. Write stuff that people want to read and share.




BIG proxy list: 16th October.

16 10 2009

16th October 2009. 16:49 GMT London.

Working: 369

72.240.34.10:80
72.240.34.23:80
204.8.155.226:3124
129.137.253.252:3124
198.7.242.42:3128
146.57.249.98:3128
64.28.37.22:80
67.23.0.113:3128
137.165.1.111:3128
208.117.131.116:3124
208.117.131.115:3127
35.9.27.27:3124
208.117.131.115:3128
208.117.131.116:3128
65.111.184.222:80 Read the rest of this entry »





Proxy List: 16th October.

16 10 2009

16th October 2009. 16:47 GMT London.

Working: 131

200.43.223.226
202.162.215.234
212.166.64.12
187.16.242.246
60.12.227.209
69.62.141.46
84.255.246.20
195.14.33.55
194.44.249.7
119.62.128.38
60.250.139.213
124.40.121.3
202.162.216.218
66.160.141.29
207.47.9.170
118.220.175.207
75.101.178.208
189.44.232.22
41.154.7.44 Read the rest of this entry »





Adobe Illustrator CS4

16 10 2009

Well, uploaded the .torrent file for adobe illustrator cs4 by me. Just download the .torrent file and you are all set to open it with your most favourite torrent client. BitTorrent, uTorrent etc.

http://sharecash.org/download.php?id=107707
That is the link, alternatively, click HERE

Enjoy!





Proxy Checker V1

12 10 2009

Well, you may all be wondering what i have been using to get these proxies. The thing is, you have to do the hard and awkward work yourself. By going to loads of different places to find elite http proxies. To then ismply let this perl script run.

Make a txt file called proxies.txt and place your (hopefully) working elite http proxies into it. Then run the perl script below and wait. It will then show you the working proxies and none working proxies. Run through cmd else it will close as soon as finished and you won’t get chance to see which ones worked.

#!C:\Perl\bin\perl.exe

# Coded: oToom
# Check proxy list!

use LWP::UserAgent;
use strict;
use warnings;

my $ua = LWP::UserAgent->new;
$ua->timeout(15);

open FILE, “<list.txt” or die $!;

while (my $line = ) {
my $proxy = “http://”.$line;
$ua->proxy(‘http’, $proxy);
my $response = $ua->get(‘http://google.com’);
if ($response->is_success) {
print $line;
} else {
}
}

print “\n[] Complete list!”;

close(FILE);

Or go to HERE to see it highlighted.

Don’t forget to Visit http://www.pro9ramming.com for great sources!





Hugeee proxy list. Done by ME.

12 10 2009

211.138.124.235:80
216.82.160.156:80
69.39.231.193:3128
201.225.226.68:8080
190.102.206.48:8080
110.8.253.100:80
195.229.177.28:80
208.59.37.68:8080
69.39.231.195:3128
129.82.12.188:3124
147.83.30.167:3124
146.57.249.98:3124
211.138.124.230:80
218.202.1.177:80
218.202.1.178:80
123.125.156.135:80
218.202.1.186:80
218.202.1.189:80
218.202.1.184:80
220.181.53.238:80
174.142.104.57:3128
174.142.24.201:3128
218.202.1.185:80
218.202.1.188:80
218.202.1.183:80
218.202.1.179:80
218.202.1.187:80
220.181.53.241:80
194.36.10.154:3128
12.147.63.234:3128
220.181.53.231:80
91.121.135.73:80
203.165.237.231:8080
211.138.124.235:80
69.39.231.193:3128
201.225.226.68:8080
208.96.213.149:80
195.229.177.28:80
208.59.37.68:8080
69.39.231.195:3128
123.125.156.132:80
220.181.53.227:80
220.181.53.244:80
220.181.53.240:80
124.207.168.48:808
59.36.98.154:80
174.142.24.201:3128
201.87.214.81:6588
195.229.177.28:80
211.144.106.58:80
174.142.104.57:3128
202.54.61.99:8080
89.96.169.141:80
80.193.72.145:80
211.138.124.232:80
80.73.4.9:808
124.172.110.158:80
123.125.156.137:80
123.125.156.130:80
115.31.137.133:80
122.205.95.14:80

Read the rest of this entry »





Privacy,

27 03 2009

Well, at school today we were watching a video on privacy.
It was something along the lines of a chap wanted to go out for something to eat / drink with a girl, but she wouldn’t give him her number.
He went through different ways to get the number etc.

Well, it struck me with some of the things he said.
Police ask you many questions, do they really need to know? How are you sir, where are you going, is this your car?

Also, you give your details to people such as supermarkets, who’s to know they even get those little things with your address and email on! Well, they sure get your email to send you a load of shit!

Another thing was, he got her number through the library, phone book, birth date things off the internet. The lot,

Soo.. privacy isn’t all what you think to be honest!