Zicutake USA Comment | Search Articles

#History (Education) #Satellite report #Arkansas #Tech #Poker #Language and Life #Critics Cinema #Scientific #Hollywood #Future #Conspiracy #Curiosity #Washington
 Smiley face

[Calculate SHA256 hash]
 Smiley face
Zicutake BROWSER
 Smiley face Encryption Text and HTML
Aspect Ratio Calculator
[HTML color codes]
 Smiley face Conversion to JavaScript
[download YouTube videos in MP4, FLV, 3GP, and many more formats]

 Smiley face Mining Satoshi | Payment speed

 Smiley face
Online BitTorrent Magnet Link Generator





要决定坐计程车还是搭KLIA Ekspres
决定坐我们都没有坐过的KLIA Ekspres
我们大概半小时就到KL Sentral了

6 Mens Style Instagram Account Required You Follow

Are you a user Instagram? Category and anything else that you follow? For most women, Instagram is one of the social media for selfie. In addition, women usually make Instagram to wash the eyes, look at the products sales in the accounts of Instagram.
Yes, especially in Indonesia, Instagram is very thick at all with the accounts of sales. It is legitimate in our opinion, as long as the practice in selling ethically and not a lot of spam in the comments field.
For men, traveling category, food, sport and humor or komikstrip may be the subject of much interest, how to fashion and style? According to our still somewhat lacking, if any, possibilities in follow instagram account selling again. :)
So, in order to style and fashion you can update and find out the latest #StyleInspiration only through images, some Instagram account is presenting information that we think is helpful.
fashion pria cowo instagram men style fashion instagram
fashion pria cowo instagram men style fashion instagram
fashion pria cowo instagram men style fashion instagram
4. @whatmyboyfriendwore
fashion pria cowo instagram men style fashion instagram
fashion pria cowo instagram men style fashion instagram
fashion pria cowo instagram men style fashion instagram
There are many more in fact some men's fashion style Instagram account with styleInspiration interesting content. Maybe we will write in other occasions, while looking more other accounts
If it is some of the above recommendations still missing, please you add in the comments field below. Local accounts, for example, or perhaps your own personal account.

Hawaiian Printed Shirt

Printed Shirt many started popping back and so the latest trends, a variety of patterns and colors also offered by many fashion designers / manufacturers of clothing outside and within the country. Hawaiian motif was brisk in the market printed shirt.
Usually hawaiian motif / beach is inclined with the motive of palm trees, flowers up things that stank beach. With bright colors and colorful printed hawaiian shirt makes it unique and interesting.
Do not have to go to the beach to wear Hawaiian shirts printed 


Breakdown of apparell
From top left to right:
- Printed Hawaiian Shirt
- Leather Biker Jacket
- Dark Brown Classic Watch
- Leather Rope Belt
- Tortoise Eyewear
- Brown Leather Brogues Boots

What are you waiting for? complete collection of your closet with Printed Hawaiian Shirt and Be STYLISH!

Guia para uma alimentação saudável e ecológica

O segundo fruto de muito trabalho e de um projecto de longa data em equipa:
Guia para uma alimentação saudável e ecológica.
Para além dos conteúdos em nutrição e alimentação saudável, o livro inclui ainda diversos jogos didáticos de grande utilidade em ambiente escolar e não só. 
Estará para breve o seu lançamento!

Grand illusion of "official" science.

Official science: the grand illusion for all robots
by Jon Rappoport
July 30, 2015
(To read about Jon’s mega-collection, Power Outside The Matrixclick here.)
“Government science exists because it is a fine weapon to use, in order to force an agenda of control over the population. We aren’t talking about knowledge here. Knowledge is irrelevant. What counts is: ‘How can we fabricate something that looks like the truth?’ I keep pointing this out: we’re dealing with reality builders. In this case, they make their roads and fences out of data, and they massage and invent the data out of thin air to suit their purposes. After all, they also invent money out of thin air.” (The Underground, Jon Rappoport)
Totalitarian science lets you know you’re living in a totalitarian society.
The government, the press, the mega-corporations, the prestigious foundations, the academic institutions, the “humanitarian” organizations say:
“This is the disease. This is its name. This is what causes it. This is the drug that treats it. This is the vaccine that prevents it.
“This is how accurate diagnosis is done. These are the tests. These are the possible results and what they mean.
“Here are the genes. This is what they do. This is how they can be changed and substituted and manipulated. These are the outcomes.
“These are the data and the statistics. They are correct. There can be no argument about them.
“This is life. These are the components of life. All change and improvement result from our management of the components.
“This is the path. It is governed by truth which science reveals. Walk the path. We will inform you when you stray. We will report new improvements.
“This is the end. You can go no farther. You must give up the ghost. We will remember you.”
We are now witnessing the acceleration of Official Science. Of course, that term is an internal contradiction. But the State shrugs and moves forward.
The notion that the State can put its seal on favored science, enforce it, and punish its competitors, is anathema to a free society.
For example: declaring that psychiatrists can appear in court as expert witnesses, when none of the so-called mental disorders listed in the psychiatric literature are diagnosed by laboratory tests.
For example: stating that vaccination is mandatory, in order to protect the vaccinated (who are supposed to be immune) from the unvaccinated. An absurdity on its face.
For example: announcing that the science of climate change is “settled,” when there are, in fact, huge numbers of researchers who disagree. —And then, drafting legislation and issuing executive orders based on the decidedly unsettled science.
For example: officially approving the release and sale of medical drugs (“safe and effective”) which go on to kill, at a conservative estimate, 100,000 Americans every year. And then refusing to investigate or punish the purveyors of these drug approvals (the FDA).
For example: permitting the widespread use of genetically modified food crops, based on no long-term studies of their impact on human health. And then, arbitrarily announcing that the herbicide, Roundup, for which many of these crops are specifically designed, is non-toxic.
For example: declaring and promoting the existence of various epidemics, when the viruses purportedly causing them are not proven to exist and/or not proven to cause human illness (EbolaSARSWest NileSwine Fluetc.)
A few of you reading this have been with me since 1988, when I published my first book, AIDS INC., Scandal of the Century. Among other conclusions, I pointed out that HIV had never been shown to cause human illness; the front-line drug given to AIDS patients, AZT, was overwhelmingly toxic; and what was being called AIDS was actually a diverse number immune-suppressing conditions.
Others of you have found my work more recently. I always return to the subject of false science, because it is the most powerful long-term instrument for repression, political control, and destruction of human life.
As I’ve stated on many occasions, medical science is ideal for mounting and launching covert ops aimed at populations—because it appears to be politically neutral, without any allegiance to State interests.
Unfortunately, medical science, on many fronts, has been hijacked and taken over. The profit motive is one objective, but beyond that, there is a more embracing goal:
Totalitarian control.

power outside the matrix

On the issue of vaccines, I’ve written much about their dangers and ineffectiveness. But also consider this: the push for mandatory vaccination goes a long way toward creating a herd effect—which is really a social construction.
In other words, parents are propagandized to think of themselves a kind of synthetic artificial “community.”
“Here we are. We are the fathers and mothers. We must all protect our children against the outliers, the rebels, the defectors, the crazy ones who refuse to vaccinate their own children. We are all in this together. They are the threat. The enemy. We are good. We know the truth. They are evil.”
This “community of the willing” are dedicated to what the government tells them. They are crusaders imbued with group-think. They run around promoting “safety and protection.” This group consciousness is entirely an artifact, propelled by “official science.”
The crusaders are, in effect, agents of the State.
They are created by the State.
They live in an absurd Twilight Zone where fear of germs (the tiny invisible terrorists) demands coercive action against the individuals who see through the whole illusion.
This is what official science can achieve. This is how it can enlist obedient foot soldiers and spies who don’t have the faintest idea about how they’re being used.
This is a variant on Orwell’s 1984. The citizens are owned by the all-embracing State, but they aren’t even aware of it.
That’s quite a trick.
Jon Rappoport
The author of three explosive collections, THE MATRIX REVEALEDEXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emailshere or his free OutsideTheRealityMachine emails here.

End of capitalism

The End-State of Western Capitalism—People as Cash Cows

anti-capitalism1America is proud of capitalism. Proud of the competition which has produced a dazzling array of inventions and consumer products. Any incursion resulting in government control of the “free market” is generally met with outcries of that old bugaboo: “Communist infiltration!”

The activities of the United States abroad have become  redolent of resource grabs. Under the banner of “Making the world safe for democracy,” her aggression has resulted in an amalgamation of other countries’ resources. Oil and minerals top the list.

Far from protecting her own citizens’ property and economic interests, however, the domestic activities of the US increasingly reveal  finely honed mechanisms resulting in asset seizure and transfer of wealth.In order to accomplish these aims, certain established checks and balances have been nullified or bought off.
Government regulatory agencies are thus high on capitalism’s “Enemies List.” Many of these regulatory agencies were rendered largely ineffective under former President George W. Bush. The EPA, the FTC and other agencies pledged to protect the public went under administrative chiefs who were unfriendly to regulation and believed that their best governance would be to subvert the regulatory agencies they they were appointed to oversee.
As detailed by Thomas Frank, in his 2008 book, The Wrecking Crew, “… Fantastic misgovernment of the kind we saw during the Bush era was not an accident….It was made possible by the triumph of a particular philosophy of government, of a movement that understands the liberal state as a perversion and considers the market the ideal nexus of human society.”
There is a quasi- religious aspect to the worship of the free market. The free market, we are told, will inherently provide for the crème de la crème to rise to its proper altitude. The invisible hand of the free market will enable only the best products to succeed. And the devotees will tell you that this is in everyone’s best interest.
However, consumerism has a dark side. Where everything is commodified, everything becomes gaged by its monetary value alone. Other considerations—truth, beauty and emotional attachment come to mind—may suffer under a bottom line valuation system.
And this brings us to a recent manifestation of trading people for money—selling Granny to the nursing home. Cash for Granny is exactly what Sunrise Senior Living  is offering. The verbiage is slightly spun in an effort to obscure its crassly predatory intent, but the facts are in evidence: Sunrise will pay you $2000 for a successful recommendation of a vulnerable and elderly individual to its nursing facility.
The commodification of human beings is sometimes termed “human trafficking.” Americans were shocked and dismayed back in 2008 when the judicial scandal known now as “Kids for Cash” unfolded in the news. Two Pennsylvania judges were charged and subsequently found guilty for accepting kickbacks when they ordered juvenile offenders into private detention facilities. As it turned out, the judges had struck a backroom deal with Robert Merckle, the builder of two Pennsylvania detention facilities and were being handsomely remunerated in remanding children, including first time offenders with such minimal violations as mocking a principal on Myspace or trespassing in a vacant building, into extended detention in Merckle’s facilities.
The scandal rocked the nation. After an investigation determined that the two judges received over $2.6 million from PA Child Care and its sister facility, Western PA Child Care, and after an initial plea agreement did not produce what a federal judge determined to be satisfactory conduct on the part of the two judges, a criminal trial ensued.
Presiding Judge Mark Ciavarella was subsequently convicted of racketeering and sentenced to 28 years in federal prison. Senior Judge Michael Conahan was convicted of racketeering conspiracy and sentenced to seventeen and a half years in prison.
However, the business of judges adjudicating cases in gross self interest and contrary to statutory code continues. It is not only kickbacks from detention centers that constitute the pay off for judges fracturing the law and trafficking in the futures of those who trust in their impartiality.
According to sources within the legal system, the mechanism exists to pay off amenable legal professionals with the income from nursing home beds. A judge or an attorney who throws a case can be rewarded with the income from an assigned bed. According to sources, this is fairly widespread.
Retired attorney Ken Ditkowsky recalls when he was offered such a sweetheart deal, several years back. Ditkowsky, states that he was approached at one juncture and offered payment for his legal services with a nursing home bed. He states that he declined the offer.
Ditkowsky explains how this works:
“The nursing home industry generates very substantial profits.   To maintain those profits I’ve found that United States currency is not the only currency used.   In the course of my practice I had occasion to represent a lawyer who had interests in a number of nursing home ventures.   Part of the fee he earned was paid in cash, but, a substantial portion was paid in nursing home beds.   In the industry the beds had a fixed price and were traded very much like stock – except the nursing home operators participating in the industry created the market for the trading of the beds.   The ownership of a bed entitled the owner to a limited partnership interest equal to a certain portion of income of the nursing home bed.

“To clarify, if there were 350 beds in the facility the ownership conveyed was 1/350th of the net operation.   The 1/350th was determined after deductions for all expenses including sinking funds, contingent costs, etc.    One of the facilities that I examined the books of during litigation had the following breakdown:   set price for a bed $3500.   This price was a set price that could be ascertained by any of the participating operators.   The bed paid a yearly dividend of 15%.    This dividend was declared by the managing partners each year and was in some manner based upon profit or loss.   The bed could be redeemed by the liquidation of the facility which usually occurred after a fixed number of years of operation.”
Bribery is not as easy as you may think. Sudden and suspiciously large deposits into a public official’s bank account may raise red flags. Accordingly, dirty politicos and hungry public servants look for new and innovative ways to launder their bribes. The big, fat envelope stuffed with about $300,000 in cash turned out to be an embarrassment for former Canadian Prime Minister Brian Mulroney. Mulroney, who was nailed for receiving the bundle, remained unrepentant. “I shouldn’t have taken it,” he declared. But he wouldn’t return the money.
Riverside County Presiding Judge Harold Hopp in Southern California seems to have hit on a pretty good deal. His wife, Sherry Lyn West, runs a “wealth management” advisory office in Palm Desert, which is a satellite for one of the largest financial management companies in the US, LPL.
According to the dictates of mandated financial disclosure law, Hopp should realistically cough up some evidence that West’s business is not servicing the attorneys and other officers of the court who appear in Riverside County Courthouse.
Has he? Nope.
West has facilitated her hubby in hiding some of his financial transactions. Previous reports detailed the issue of the use of home loans to launder bribes and payoffs. It’s a stunningly simple scam: Mr. X takes out a loan and Mr. Y pays it back.
Hopp’s name dropped off his loan history back in 2006, following his appointment to the bench in 2005. According to the records, he still owns his personal residence along with West. But since 2006, all the loans appear in her name only.
And quite a loan history it is! In the last ten years, over fifteen transactional documents show up on their loan history. In the time that Hopp has been on the bench, he has reconveyed six loans.
In response to concerns raised about West and their home loan history, in a fax sent to this reporter on September 24 Judge Hopp replied:
“I have no obligation to provide any personal financial information that you request, nor any inclination to do so.”

Hopp has been caught repeatedly covering for unconstitutional decisions by judges in his courthouse, as well refusing to investigate judicial decisions which violate the California statutory code. Through these actions, Hopp’s judges have been sending vulnerable and dependent adults off to early graves and also have participated in sacking their estates.
But for we mere mortals, who do not have access to such high tech ways of grabbing some extra dough, rest assured. You can always sell Granny to Sunrise.
Sunrise operates nursing homes in 29 states and the District of Columbia, as well as in Canada and the UK.
The home office of LPL Financial did not return this reporter’s calls.
Janet C. Phelan, investigative journalist and human rights defender that has traveled pretty extensively over the Asian region, an author of a tell-all book EXILE, exclusively for the online magazine “New Eastern Outlook.

Fracking. You need to know about this.


CMD The Powerful Hacking Tool

CMD The Powerful Hacking Tool
Introduction:  Command Prompt, also known as cmd.exe or cmd (after its executable file name), is the command-line interpreter on Windows NTWindows CEOS/2 and eComStation operating systems. It is the counterpart of COMMAND.COM in DOS and Windows 9x systems (where it is also called "MS-DOS Prompt"), and analogous to the Unix shells used on Unix-like systems. 
Before you try to commit a crime please read our Disclaimer  In this tutorial you will learn some basic codes and tricks in cmd ( command prompt ) so let's begin the tutorial.

Step 1: Opening The CMD

First open start menu > run then type cmd and open it

 Opening The CMD

Step 2: Starting Commands Ping And Tracert

Commands Ping And Tracert

Now lets start with it. Our first command is ping command

What Does This Command Do?
The ping command helps to verify IP-level connectivity. When troubleshooting, you can use ping to send an ICMP echo request to a target host name or IP address. Use ping whenever you need to verify that a host computer can connect to the TCP/IP network and network resources.
To apply the ping command just type the command like ping www.thewebsite.com
ex- ping www.google.com

Now our second command is tracert

What Does This Command Do?
The TRACERT (Trace Route) command is a route-tracing utility used to determine the path that an IP packet has taken to reach a destination. Note You can run this utitily by typing tracert IPAddress or tracert HostName at the command prompt.

What is Tracert And What Does This Command Do?
The TRACERT (Trace Route) command is a route-tracing utility used to determine the path that an IP packet has taken to reach a destination. Note You can run this utitily by typing tracert IPAddress or tracert HostName at the command prompt. To apply the tracert command just type the command like tracert www.thewebsite.com
ex- tracert www.google.com

Step 3: ipconfig

This command is easy to understand. Ipconfig displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. Used without parameters, ipconfig displays the IP address, subnet mask, and default gateway for all adapters. Just type " ipconfig " and hit enter it will show you all the details

Step 4: Matrix

Matrix is a code which is one of tricks done. In this trick their are different codes come and to do this tricks just type this code

Title Matrix
color a
mode 1000
Echo %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random%
Goto start

save it as .bat if you want to do it in notepad

Step 5: How To Shutdown Your School/College Computer

To perform this operation, just type net view then it will appear all the ip address that are connected to that network when the command finish finding all the ip address then type shutdow-i then a window will appear their are a tab name add just type the ip address of the pc which you want to shut down then their is a scroll box where their are option of shutdown restart or log out chose what you want to do then their is a check box which is check this check box will sent the message of shut down to have fun just uncheck it and press the shutdown button

Step 6: How to create an admin account in windows

Step 1. 
  • Open CMD Prompt. On Windows XP, click the Start button, then open up Run..., and type in "cmd" and click OK.

  • On Windows Vista or Windows 7, click Start, search for "cmd" and press Enter.

Step 2. 
Add username and password. Now, in the command prompt window, type: net user /add [username] [password] and press Enter. Here's an example of what it should look like:

Step 3. 
Add as admin. Now type: new localgroup administrators [username] /add and press Enter. Here's the example:

 Opening The CMD

Now you have a new Admin Account on your targeted PC. Enjoy!!!!





他非常怀念这个叫Manga Dua的地方

一个叫Kelapa Gading的地方





Download 45+ Best Hacking EBooks PDF, RAR, Zip 2016

Download 45+ Best Hacking  EBooks PDF, RAR, Zip 2016
Best Hacking Books PDF, RAR, Zip 2016  Edition: There is no tough job in the world than hacking. It requires a lot of hard work and determination to become a successful hacker. Before i proceed to further, i would like you 1st should know what is hacking. To learn more about the term hacking and hacker, simply click the link  Here .  As you all know that many of teenagers want to become a HACKER. But hacking is not an easy task. Learning Ethical hacking is not an easy task you have to read many hacking books and then implement those ideas or methods. Then invent new methods to become a ethical hacker. Remember first step of hacking is programming. First of all learn some programming languages then read these Best Hacking Books PDF. One must have these books either he/she is an expert in hacking, or a beginner. These books are for both beginners and trained as well. 
If you are among those who want to become Ethical Hacker then here is good collection for you! Yes, here is handpicked collection of best hacking books pdf 2016 edition with thousands of latest hacking tutorials. If you want to learn ethical hacking then just download hacking books from below and start exploring the Hacking World.

  1. Black Belt Hacking & Complete Hacking Book
  2. Hackers High School 13 Complete Hacking E-books
  3. Penentration Testing With Backtrack 5
  4. A Beginners Guide To Hacking Computer Systems
  5. Black Book of Viruses and Hacking
  6. Secrets of Super and Professional Hackers
  7. Dangerours Google Hacking Database and Attacks
  8. Internet Advanced Denial of Service (DDOS) Attack
  9. Computer Hacking & Malware Attacks for Dummies
  10. G-mail Advance Hacking Guides and Tutorials
  11. Vulnerability Exploit & website Hacking for Dummies
  12. Web App Hacking (Hackers Handbook)
  13. Security Crypting Networks and Hacking
  14. Botnets The Killer Web Applications Hacking
  15. Hacking attacks and Examples Test
  16. Network Hacking and Shadows Hacking Attacks
  17. Gray Hat Hacking and Complete Guide to Hacking
  18. Advance Hacking Exposed Tutorials
  19. 501 Website Hacking Secrets
  20. Internet Security Technology and Hacking
  21. CEH Certified Ethical Hacker Study Guide
  22. Advanced SQL Injection Hacking and Guide
  23. Web Hacking & Penetration testing
  24. OWASP Hacking Tutorials and Web App Protection
  25. CEH – Hacking Database Secrets and Exploit
  26. Ethical Hacking Value and Penetration testing
  27. Hack any Website, Complete Web App Hacking
  28. Beginners Hackers and tutorials 
  29. Ethical Hacking Complete E-book for Beginners
  30. Backtrack : Advance Hacking tutorials
  31. SQL Injection attacks and tutorials by Exploit DB
  32. XSS + Vulnerability Exploitation & Website Hacking
  33. Ultimate Guide to Social Enginnering attacks
  34. White Hat Hacking complete guide to XSS Attacks
  35. Cross Site Scripting and Hacking Websites 
  36. The Hackers Underground Handbook ( hack the system)
  37. Blind SQL Injection tutorials and Hacking
  38. Hacking Secrets Revealed
  39. Hacking Website Database and owning systems
  40. Reverse Engineering for Beginners 
  41. Reverse Enginnering (The Real Hacking)
  42. Computer Hacking
  43. Hack your Friend using Backtrack
  44. Reverse Enginnering Hacking and Cracking
  45. Hack the System for beginners
  46. Hacking into Computer Systems
  47. Blind SQL Injection Discovery & Exploitation

Note: Before downloading these books you must read our Disclaimer

Files download information

After 7 years of Contagio existence, Google Safe Browsing services notified Mediafire (hoster of Contagio and Contagiominidump files) that "harmful" content is hosted on my Mediafire account.

It is harmful only if you harm your own pc and but not suitable for distribution or infecting unsuspecting users but I have not been able to resolve this with Google and Mediafire.

Mediafire suspended public access to Contagio account.

The file hosting will be moved.

If you need any files now, email me the posted Mediafire links (address in profile) and I will pull out the files and share via other methods.

P.S. I have not been able to resolve "yet" because it just happened today, not because they refuse to help.  I don't want to affect Mediafire safety reputation and most likely will have to move out this time.

The main challenge is not to find hosting, it is not difficult and I can pay for it, but the effort move all files and fix the existing links on the Blogpost, and there are many. I planned to move out long time ago but did not have time for it. If anyone can suggest how to change all Blogspot links in bulk, I will be happy.

P.P.S. Feb. 24 - The files will be moved to a Dropbox Business account and shared from there (Dropbox team confirmed they can host it )  

The transition will take some time, so email me links to what you need. 

Thank you all