Monday, July 6, 2015

Quotes by ~AMx ReBorN~ (List of Quotes by AMx ReBorN(





This page is mainly to assert and confirm that the below are mouthed originally and exclusively by me; AMx ReBorN.





 "In order to succeed, or even to be satisfied in Life, one must understand that being naturally fearless is not an advantage, but rather, dismissing fears by means of logic and Insight ; this is the tone of a powerful character."


"I am not at war with a particular group, or organization , I am at war against ignorance"

"I am not going to linger numbly, I will return more equipped than before; to complete the mission I've set out for and - I will succeed."

"Weird things happen when I roll the dice"

"There's a fine line between action based on superstition, and Prudent Spiritual Action."

"The most difficult challenge; is to go above and beyond when we fear losing everything..it is to go further when we feel the reality of harsh setbacks closing in and when we are vastly disadvantaged"

"It is important to understand, in a time of upheaval and world wide dissatisfaction , that Vigilance and fairness be not relinquished, it is necessary that we set aside our differences, to come together and finalize the resolution of this pressing matter"



"Only then can we see through the trials thrown at us, only then can we surpass our predecessors - I am living proof of that will - the same will with each of you today - I believe in all of you."

"Faith is more than a trait; it's a serious project. An oath. A way of life."

"Despite my dismay and perpetual degradation of my day - I will move forward anyway."

"Fear creates delusion, understanding that people fear hastens and allows for additional delusions, and knowing people's fears reinforces the potency and significance of that paradigm "

"Many people strive to understand, claim they understand fear, but fear persists as an entity far more sophisticated than those who have proceeded from the debut of it's vindication."

 Fear largely takes on two forms.

1.) A vessel of reflection.

2.) As a relay of imperfections.



Fear is also a currency of communication - one that often partakes in the ostracism of invalidities and unfit entities.


"The overt nature of some people who suffer from depression is likely an overtone that was previously less unacceptable, or less frequently condemned, or scrutinized - while the adaptable nature of human beings to proliferate the covert variant of multiple mental struggles , in recent years, seems to parallel the discard of empathy for these types, or create multiple phonies and mimics in the process.Where one sees victims, another sees an "attitude problem", I simply see selective discrimination."





                                Quotes about Youth and Relationships

"It's much easier at ages 13-17 to feel this way; the desire for new experiences and thy raging emotions sort of , lead the way."

"My past contains a fragment, the euphoria of a child is hard to recreate, we have the ability to do so, but we will never truly re-engage."

"The powers of will and redemption run strong in our youth, even so that at 18 we form the collage that will speak the truth."

"If I had the chance to go back in time, would I still do everything that I did?"  Yes, because time doesn't lie, I had my reasons for doing things then - and what they have taught me and brought me to become further justify the present. Without those moments I would be desecrated by my thoughts, I would never be appeased knowing so much is missing. I wouldn't change a single thing I did., I do not regret it - I speak boldly and straightforward. My reasoning for my actions then is also a reflection of clarity for the now."

"I do not regret the past, my actions remain justified - they are the partitions of my current wisdom - and have led me to become an inch closer to perfection than ever before".

"I have come forth to determine the attack on our youth, and to identify ignorance as not being rooted in youth - but in blindness. 

" Let us understand that the youth Are our Future, they are the key to expansion and understanding - without the youthful mind - our greatest achievements would be short-lived , and innovation would be void of all of it's splendor. Thus the youth must rise to our forefront, they must take lead in the new era of humanity - and must succeed."


                         PROTO-POLITICAL-POINTS


" What we have now is Anarchy at it's finest - but this is just for now, I see a time where this fades away - and peace and prosperity return to our land."


"Make no mistake my brothers - just as many of you have attested to being
 {
********** }  by my knowledge - I assure you, my abilities are to reveal the potential in all of you..to remove the barricades and so you can all see what you are capable of, this is just the beginning."

"They say they will obtain our country by conquest if not by consent - but I say to you we will obtain our country BACK by conquest and take theirs for Free!!"

"Despite all of this that has happened - our Country and our People have never been stronger - and we will make that a permanent reminder to our enemies"

"It would seem The functional integrity of my new being is challenged by those who have misperceived what I stand for - but Make no mistake, If at all possible I will avoid war. If it be necessary, I will not back down - I am relentless - and this surge of conflict will be resolved promptly."





IN : Quotes about faith, faith quotes, good faith quotes, prosperity quotes, does God want prosperity, does he want faith , how to be faithful 101, faith quotes of spirituality, spiritual monotheistic, single God, forsaken quotes, uplifting quotes

Friday, September 19, 2014

Best Picture Editing Web Apps (No Download Required and Loads Fast on Most Browsers)

Need no lag pic edits? Tired of having to download shit just to get a pic edit - and a complex one at that? 

Well I was too.

So without any advertising agenda or anything - I am just going to list the ones that are simple, load on most browsers and do not take forever to load (generally). You do not need a download - and they are as easy as pie to use. There are TONS of techniques, including but not limited to (depending on the site) negative, free skin smoothing, free skin tanning pic edits, multiple borders, blending images including with transparency and with shaping the blend of two desired images.

The best site for all of this above.

Free & No Download.


  • Can edit all pics and will automatically change file extension to GIF.
  • Files are then uploadable to facebook or other sites.
  • Does not give errors.
  • It is a free blending and transition tool with great effectiveness and no lag.
  • It has many border options, drawing options, skin modifications and more.
  • It has options to change exposure, sharpening, darkness, fire, lightining and many more effects.
  • Animations are FREE and you can do pretty much anything your mind desires.
  • All tools in this web app are free and does not require a download.
  • There are other tools as well, including Free 3D Cube effects and the ability to use other designs.
  • They also allow for multiple transitions and animations and you are not limited by it.
  • It has very fast upload rates.
  • Servers very rarely, if ever get lagged, excellent uptime.
  • Faster than any other site I've seen - much faster than PicMonkey.
  • Free tools to paint or draw on pic and edit text as well.


Now for those who are looking for a FREE pic resizer and shaper..with effects as well, and fast load times.



Monday, January 30, 2012

MegaUpload User Data Soon to be Destroyed

MegaUpload has received a letter from the US Attorney informing the company that data uploaded by its users may be destroyed before the end of the week. The looming wipe-out is the result of MegaUpload’s lack of funds to pay for the servers. Behind the scenes, MegaUpload is hoping to convince the US Government that it’s in the best interest of everyone involved to allow users to access their data, at least temporarily.

megauploadIn the wake of the MegaUpload shutdown many of the site’s users have complained about the personal files that were lost as collateral damage.

From work-related data to personal photos, the raid disabled access to hundreds of thousands, perhaps millions, of files that are clearly not infringing. A recent announcement by the US Attorney now suggests that these files may soon be lost forever.

“We received a letter very late Friday from the US Attorney that declared there could be an imminent destruction of Megaupload consumer data files on this coming Thursday,” MegaUpload lawyer Ira Rothken told TorrentFreak.

Rothken explains that MegaUpload is determined to protect the interests of its users, but that its hands are tied without help from the authorities. The looming data loss is linked to unpaid bills at Cogent Communications and Carpathia Hosting where MegaUpload leased some of its servers.

“We of course would like to think the United States and Megaupload would both be united in trying to avoid such a consumer protection calamity whereby innocent consumers could permanently lose access to everything from word processing files to family photos and many other things that could never practically be considered infringing,” the lawyer told TorrentFreak.

“Megaupload’s assets were frozen by the United States. Mega needs funds unfrozen to pay for bandwidth, hosting, and systems administration in order to allow consumers to get access to their data stored in the Mega cloud and to back up the same for safekeeping.”

MegaUpload has contacted the US Attorney’s office with a request to unfreeze assets including money and domains so users can get access to their personal data. If this doesn’t happen, the consequences for many MegaUpload users and the future of other cloud hosting services will be disastrous.

“If the United States fails at helping protect and restore Megaupload consumer data in an expedient fashion, it will have a chilling effect on cloud computing in the United States and worldwide. It is one thing to bring a claim for copyright infringement it is another thing to take down an entire cloud storage service in Megaupload that has substantial non infringing uses as a matter of law,” Rothken told us.

Meanwhile, MegaUpload users are also taking action themselves. Last week Pirate parties worldwide began making a list of all the people affected by the raids, and they are planning to file a complaint against authorities in the US. The EFF has also taken an interest in the issue, and is sharing data with the international Pirate parties.

For now, however, the more urgent matter is to ensure that the data doesn’t get destroyed.

Sunday, January 22, 2012

Rise of Rapidshare !

King Rapidshare
 

Rapidshare once the inventor and innovator of free file hosting and sharing may default to becoming the next king . Why ? you may ask .. Remember the Rapidshare era , when anything and everything you wanted was hosted on rapidshare, simply because saw the service as an amazing fast simple soution. In 2010 the Rapidshare era cam to a close after the company lost a lawsuit against them after fighting so hard. Uploaders could not benefit by any means and so points system was completely eradicated which got rid of the mass greedy uploaders ( pirate money ) . However this has had a significant impact on Rapidshare as many users could not find files they were searching for and many turned to alternative hosts . Uploaders turned or lured to filehosts such as File Sonic, FileServe, Hotfile and Megaupload ( recently closed by FBI ) for black pieces ( pirate money ......... illegal ) and started the File host War  . After the recent scare amongst users and uploaders due to the SOPA bill  (2012 ) and MegaUpload raid on US server and owners being arrested in Auckland,  people are turning back to using more legitimate businesses such as Rapidshare now the King of Filehosts . 

So the story is complete .... Or is it ? 

Monday, January 2, 2012

Preventing Unwanted Remote Access to your Windows 7 Computer

Although many realize the importance of safety & security online; not many know how to actually achieve it.  At least from a software perspective, people can be pretty close-minded. For example, a firewall shouldn't be simply installed and left on "auto-pilot", without any further configuration.  Anti-Virus programs also do not catch spyware.  Knowing all this, I have written yet another article on computer security. This write-up contains information that you probably won't find else where.






Unwanted Remote Access when an attacker gains control of your computer from any given location, via the internet. Usually, these 'hackers' will find a way to implant a certain virus onto your computer (known as a Remote Access Trojan). The hard truth is, AntiVirus programs will not stop these types of "cyber-attacks"; and a firewall will only prevent attacks if configured properly.

One commonly misunderstood idea of remote attacks; is the notion that you have to download and run a program in order to be infected by a remote access trojan. While it is true you have to download the virus, the definition of download in this context can be quite vague. You also don't have to necessarily "run a program".
Especially for newbie's, this is confusing. By download, it can mean something as simple as opening an image infected with a trojan, or even opening a web page that has a video embedded in it. That video most likely contains java script needed to stream it's contents, and java script is a programming language that can be easily exploited to run trojans. That means, even something as simple as playing a youtube video *could* get your computer infected.

So how do you stop it ? Well. One way is to configure your windows firewall very thoroughly to block ALL incoming ports. Ports serve as the key to unlocking remote access.


To do this, go to your start menu and click Control Panel. Next click system and security, then windows
firewall. On the left hand side, click 'Advanced Settings'. A window saying "Windows Firewall with Advanced Security" should pop-up. In the left tab, hit 'Inbound Rules'. Now you will see a list of programs and services associated with your machine, and (probably) a green check next to most of them. This process will take a while, as all of those green check marks need to become red (crossed-out) - indicating they are blocked. Right click on each and every rule listed, click properties, then select 'block connection', hit apply and then O.K. After you are done with that. You need to add services to the block list.
  1. On the right tab; with inbound rules selected, click 'New Rule'.
  2. Then select 'Port' in the next window.
  3. Keep 'TCP' selected, now in the 'specific local ports' selection box, enter in the list of port numbers from this web page.
This is a long process, so you can repeat steps 1-3 and input only, say, 20 numbers per time. Then in that case you are creating separate rules for each set of trojans you block. What this is doing, is disallowing the trojans to gain access to your computer's services, which will block a hacker from doing the same.
Another security precaution you can take, is by blocking remote assistance capabilities from your computer; this is a function designed to allow microsoft and other support groups to remotely assist and fix your computer - but it can also be used to the advantage of hackers. Only modify this option if you do not want remote assistance from any one.

To change this setting; open the start menu, type in "remote access" (without the quotes), and then hit enter on the first result. Now un-check the box that sais "Allow Remote Assistance Connections to this computer". Click apply and OK.

That's it ! Your computer should now be 99% impervious to hack attacks. As a final precaution you can also secure your computer/s internet connection by investing in a VPN Service such as nVPN, this will also prevent governments and other nosy organizations from spying on your internet activities. 


**Sources**
http://www.irchelp.org/irchelp/security/fwfaq.html
http://technet.microsoft.com/en-us/library/cc730951%28WS.10%29.aspx

http://reviews.cnet.com/4520-3513_7-5053016-1.html

Sunday, December 18, 2011

23 Ways To Speed WinXP, Not only Defrag

Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.
1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.

2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.

3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.

4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system.

The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.

Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.

Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.

5.) Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.

6.) Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch" portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That's fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.

7.) Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.

8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.

9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.

10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.

11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.

12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.

13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here's how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer -- only its responsiveness.

14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.

15.) Visit Microsoft's Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.

16.) Update the customer's anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.

17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.

18.) Do not partition the hard drive. Windows XP's NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called "D drive." You'll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won't be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won't need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.

19.) Check the system's RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC's memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.

20.) If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed. Best of all, it's free.

21.) Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.

22.) If you're sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option. You'll have to reboot your machine for this option to take effect.

23.) At least once a year, open the computer's cases and blow out all the dust and debris. While you're in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site.


Following any of these suggestions should result in noticeable improvements to the performance and reliability of your customers' computers. If you still want to defrag a disk, remember that the main benefit will be to make your data more retrievable in the event of a crashed drive.

Monday, December 12, 2011

Manage Cookies

What can I do to manage cookies stored on my computer?
Differing browsers offer differing ways to configure your browser's cookie settings. Due to the wide range of differences among differing websites' privacy policies, many browsers allow for universal privacy settings which users can choose from. Users choose differing privacy settings based on their differing privacy concerns. Most commercial and/or professionally-created websites like Yahoo and Google have privacy policy pages that disclose how the sites handle, gather, and/or pass on user information to third parties. These are known as “P3P” features (Privacy Preferences Platform).

If the commercial website you are visiting lacks a privacy policy, be very careful with any information you enter into any forms within the site.
You can easily remove any cookies that have been created in the cookie folder of your browser. For example, if you are on Windows machine, here are the steps on how to use Windows Explorer to erase cookie files:
* Click on 'Windows Explorer'
* Select the 'Search' button on the tool bar
* Enter “cookie” into the search box field for 'Folders and Files'
* Choose 'My Computer' in the 'Look In' drop down menu
* Click on 'Search Now'
* Select and open the folders that are retrieved
* Click to highlight any cookie file
* Click the 'Delete' key to erase the cookie file
If you don't have Windows Explorer, click the “Help” function on your “Start” button and enter “cookies” to search for information on how to locate the folder.
There are a number of ways to manage cookies. If you use different computers in different locations you will need to ensure that each browser is adjusted to suit your cookie preferences.

If the commercial website you are visiting lacks a privacy policy, be very careful with any information you enter into any forms within the site.
You can easily remove any cookies that have been created in the cookie folder of your browser. For example, if you are on Windows machine, here are the steps on how to use Windows Explorer to erase cookie files:
* Click on 'Windows Explorer'
* Select the 'Search' button on the tool bar
* Enter “cookie” into the search box field for 'Folders and Files'
* Choose 'My Computer' in the 'Look In' drop down menu
* Click on 'Search Now'
* Select and open the folders that are retrieved
* Click to highlight any cookie file
* Click the 'Delete' key to erase the cookie file
If you don't have Windows Explorer, click the “Help” function on your “Start” button and enter “cookies” to search for information on how to locate the folder.
There are a number of ways to manage cookies. If you use different computers in different locations you will need to ensure that each browser is adjusted to suit your cookie preferences.