Friday, June 6, 2014

CNET News - Desktop threat, still a threat (December 20, 2012 5:28 PM PST) ...item 2.. The Andromeda Strain (1971) "Code 601" ...item 3.. Beware of online banking (22 May 2014) -- Payment request: £50 to A.Crook (ref: Thank you) ...

Best Games 4 U – A few nice online video games store images I found:


CNET News – Desktop threat, still a threat (December 20, 2012 5:28 PM PST) …item 2.. The Andromeda Strain (1971) “Code 601″ …item 3.. Beware of online banking (22 May 2014) — Payment request: £50 to A.Crook (ref: Thank you) …
online video games store

Image by marsmet546
One story that Hypponen says was underreported in 2012 was the rootkit known as ZeroAccess. "Zero Access is almost totally under the radar, yet it’s a massive, massive outbreak. It’s almost as big in size as Conficker, which was headline material for weeks. [Zero Access] is a commercial kit, being developed and sold by a Russian coder. [It] installs itself to the [master boot record] so it boots before Windows.

.


……..*****All images are copyrighted by their respective authors ……..

.


… marsmet546 photostream … marsmet546


m.flickr.com/#/photos/90585146@N08/


Thursday, Apri 3, 2014


.


m.flickr.com/#/photos/90585146@N08/8292944597/


2014 – Black text on white background


.


View photo size … Large


m.flickr.com/#/photos/90585146@N08/8292944597/sizes/l/


.


m.flickr.com/#/activity/


.

.


………………………………………………………………………………………………………………………………………………………………………

.

…..item 1)…. CNET.com … news.cnet.com


CNET News Security & Privacy Four security trends defined 2012, will impact 2013


Four security trends defined 2012, will impact 2013

Mobile and Mac malware burbles noxiously, data breaches and data mining will cause more havoc with your privacy, and the Web will continue to suffer the ignominy of poorly-written, Swiss-cheesed code as security experts predict lessons from 2012 go unlearned in 2013.


by Seth Rosenblatt December 20, 2012 5:28 PM PST


news.cnet.com/8301-1009_3-57560373-83/four-security-trend…


.

……………………….


img code photo … Stuxnet OT


asset2.cbsistatic.com/cnwk.1d/i/tim/2012/06/30/Stuxnet_OT…


……………………….

.


The Internet is slowly changing, and security experts say that today’s security issues will continue to be major players in driving that change. Here are four trends that dominated headlines in 2012, and will continue to play a major role in 2013.


—– The Internet as governmental tool


The collective realization by governments around the world that the Internet is an excellent network for conducting surveillance, monitoring, espionage, and war, says Finnish computer security firm F-Secure’s Chief Technical Officer Mikko Hypponen, may not come to full fruition in 2013. But the foundation for that change is already underway.


"There will be more operations along the lines of Olympic Games, also from other sources than US and Israel. Later on, we might look back at these first 20 years of the Web as the Golden Days, when the net was still free," he wrote in an e-mail to CNET. "Olympic Games" is the covert inter-govenrment project that birthed Stuxnet, Duqu, and Flame.


Related stories:


… Senate approves Netflix-backed amendment to video privacy law

… Facebook begins rolling out new privacy tools

… Facebook starts pushing out new privacy settings

… Don’t blame Instagram users — blame Instagram

… Children’s privacy law catches on to apps, social networks


Information security expert Chris Wysopal agreed that "cyber-warfare" is becoming commonplace. "When there’s a political or actual war event, we’re seeing cyber-attacks parallel that. It does seem to be more pronounced. It’s almost not newsworthy, as if we expect it to happen alongside a political event."


Take that in for a moment. Government-sponsored, computer-based attacks, as "almost not newsworthy," he said.


But just because these attacks are becoming more frequent doesn’t mean that they don’t stymie security researchers. Tomer Teller, a security evangelist and researcher at Check Point, said that he was surprised this year by the rise of "precision-targeted attacks."


"We saw that with Gauss this year, from the Stuxnet family. It had an encrypted payload, and researchers couldn’t decrypt it."


Tim Rains, the director of Microsoft’s Trustworthy Computing division, pointed out that these governmental actions have consequences beyond the nuclear reactors of Iran and other industrial targets.


"Eighty-five percent of the exploits against operating systems tried to take advantage of one of the vulnerabilities that Stuxnet used. A very small fraction of malware uses "zero-days," so we’re seeing commodity malware writers benefits from the research of professionals," he said. "It was a trend in 2012, and we’ll continue to see that in the next year."


.

…………………….


img code photo … Android Marching Malware


asset3.cbsistatic.com/cnwk.1d/i/tim/2012/10/15/android-ma…


…………………….

.


—– More mobile devices, bigger targets


Experts have been talking up mobile security for several years now, and as mobile device proliferation continues, so will the security problems associated with them. Because of their very mobile, always-connected nature, experts told me that the problems will become more complex in 2013.


Lookout Mobile Security’s senior product manager, Derek Halliday, noted two interesting trends that his company saw in 2012. Lookout predicted and saw in 2012, "only a few dominant kinds of mobile malware," he said.


Microsoft’s Rains agreed. "[The Looter exploit] is responsible for the second-most highest number of mobile threats we saw."


Halliday added, "The other thing was how geographic specific these threats were. We were surprised by the stark contrast between the U.S. and say Russia or China. If you try to run a toll fraud application at scale in the U.S., you’ll encounter some problems — a double-opt in message, government intervention," he said.


Another point Halliday made was that while Android 4.2 is the most secure yet, with numerous security improvements, operating system fragmentation will prevent it from reaching most people until late 2013.


.

……………………..


img code photo … Flashback


asset1.cbsistatic.com/cnwk.1d/i/tim/2011/09/26/Flashback_…


(Credit: Intego)


……………………..

.


On the other hand, said Wysopal, the impact of mobile malware is definitely growing. "In 2012, half a percent of all mobile users got hurt by mobile malware in the U.S. That’s a million people, not an insignificant number. It’s a trend that is happening slower than expected, but it’s not going to go away."

The malware problem is likely to remain isolated from Apple’s iOS, according to Hypponen. "There’s still no iPhone malware. Five years after shipping one of the most popular systems, they have no malware problem at all. That’s a major accomplishment by Apple. Job well done."


—– Desktop threat, still a threat


Mobile is booming, with Android devices outselling Windows computers in Q3 2012, but that doesn’t mean that we’ll see a downturn in desktop-focused attacks.


One story that Hypponen says was underreported in 2012 was the rootkit known as ZeroAccess. "Zero Access is almost totally under the radar, yet it’s a massive, massive outbreak. It’s almost as big in size as Conficker, which was headline material for weeks. [Zero Access] is a commercial kit, being developed and sold by a Russian coder. [It] installs itself to the [master boot record] so it boots before Windows.


While Hypponen noted that Windows 8 and Macs use UEFI to create secure boot procedures that prevent rootkits like Zero Access, Microsoft’s Rains cautioned that eventually, and possibly in the coming year, this will force rootkits to evolve.


.

………………………..


img code photo … stuxnet


asset2.cbsistatic.com/cnwk.1d/i/tim/2012/06/13/stuxnet_30…


………………………..

.


Mac malware got a lot of attention in the second half of 2011 and in 2012 with Flashback, and that’s expected to continue. Hypponen said, "The author of the Flashback Trojan is still at large and is rumored to be working on something else. And while there have been smart security changes to the Mac OS," likely alluding to Mountain Lion’s Gatekeeper, "there’s a segment of the Mac-using population who are basically oblivious to the threats facing Macs, making them vulnerable to a new malware outbreak."

And across platforms, browsers remain a broad surface to attack despite ongoing improvements.


Jeremiah Grossman of WhiteHat Security said that new exploits and vulnerabilities, such as CSS sniffing attacks, will continue to cause turmoil in the most popular kind of desktop program. "Let’s say you just downloaded Chrome or Firefox. If I can get you to click somewhere on the screen, I can get you. These browsers are not really secure, it’s death by 1,000 cuts." we have 15 years of broken, faulty web code, we have a lot of garbage websites out there that are protecting a lot of interesting data.


—– Privacy and data breaches


One of the big notables in information security over the past year was the rise of awareness in data mining. Brought on by numerous privacy policy changes to high-profile social networks like Facebook, Google, and Instagram, by fast and loose trendy mobile app policies, and by shockingly large data breaches at companies that just can’t be bothered investing in better database protection, privacy is becoming a key security topic.


.

…………………………..


img code photo … hackerstwo


asset1.cbsistatic.com/cnwk.1d/i/tim/2012/06/12/100206hack…


…………………………..

.


Lookout’s Halliday said that he expects privacy to be a hot topic in the coming year. Not only has the California attorney general been pushing for companies to take a stance more favorable to consumers before the government is forced to step in, he said, but consumers are more aware in general.


"Devices are collecting not just location information, but contacts and your historical record of talking to them. We’d be more than happy if there was significant progress towards [better privacy] as a goal," he said.


WhiteHat Security’s Grossman pointed out that it’s not just malware writers who are using exploits. Difficult to detect until recently, "CSS sniffing was being done data aggregators," he said.


—– Holistic security


One trend that’s impossible to deny is that these security problems may start in discretely different realms, but the nature of the Internet is making them more intertwined than ever before. Malware-writing techniques pioneered for Stuxnet inspire consumer-targeted malware writers, who in turn are forced to develop new social engineering techniques as app stores, browsers, and Web site owners play Whac-a-Mole with vulnerabilities.


And issues like the potential for exploiting devices connected directly to the Internet, like smart TVs and DVD players; more creative, harder to stop social engineering; the commercialized selling of all manner of exploits; and utility and medical device hacks are expected to grow in impact.


As much as we don’t want to admit it, security is becoming an issue of ongoing education. 2013 would be a good year to get going on that.


Topics:Security Tags:roundup, 2013, 2012, prediction, security


About Seth Rosenblatt


Seth Rosenblatt is a senior editor at CNET, and has written about nearly every category of software and app available. At CNET since 2006, he currently focuses on browsers, security, and operating systems, with occasional forays into tech and pop culture.


.

.


.

………………………………………………………………………………………………………………………………………………………………………

.

…..item 2)…. youtube video …


— The Andromeda Strain (1971) Part 01 … 9:45 minutes


www.youtube.com/watch?v=wajIliPFHk4


………….


— The Andromeda Strain (1971) Part 02 … 10:04 minutes


www.youtube.com/watch?v=6Rd7ejqZSrg


…………..


— The Andromeda Strain (1971) Part 03 … 10:04 minutes


www.youtube.com/watch?v=VqOwqXafjcg


……………


— The Andromeda Strain (1971) Part 04 … 10:04 minutes


www.youtube.com/watch?v=CHXbBSFBfO4


…………….


— The Andromeda Strain (1971) Part 05 … 10:04 minutes


www.youtube.com/watch?v=dhp63DIM30o


……………..


— The Andromeda Strain (1971) Part 06 … 10:04 minutes


www.youtube.com/watch?v=Ab0woEupW90


………………


— The Andromeda Strain (1971) Part 07 … 10:04 minutes


www.youtube.com/watch?v=anwcFo4fwqA


……………….


— The Andromeda Strain (1971) Part 08 … 10:04 minutes


www.youtube.com/watch?v=wn82Q2JeB_g


……………….


— The Andromeda Strain (1971) Part 09 … 10:04 minutes


www.youtube.com/watch?v=O8Yv7LjD7tY


………………..


— The Andromeda Strain (1971) Part 10 … 10:04 minutes


www.youtube.com/watch?v=xHC7reln_tw


…………………


— The Andromeda Strain (1971) Part 11 … 10:04 minutes


www.youtube.com/watch?v=mUvOfnIPV0E


………………….


— The Andromeda Strain (1971) Part 12 … 10:04 minutes


www.youtube.com/watch?v=aqGztEExN4Y


………………….


— The Andromeda Strain (1971) Part 13 … 10:04 minutes


www.youtube.com/watch?v=OfsJ074Ccp4


…………………..


AStrainMov


Uploaded on Jul 31, 2008


The best-selling novel by Michael Crichton was faithfully adapted for this taut 1971 thriller, about a team of scientists(Arthur Hill, David Wayne, James Olson, Kate Reid and Paula Kelly) racing against time to destroy a deadly alien virus that threatens to wipe out life on Earth. As usual with any Crichton-based movie, the emphasis is on an exciting clash between nature and science, beginning when virologists discover the outer-space virus in a tiny town full of corpses. Projecting total contamination, the scientists isolate the deadly strain in a massive, high-tech underground lab facility, which is rigged for nuclear destruction if the virus is not successfully controlled.


The movie spends a great deal of time covering the scientific procedures of the high-pressure investigation, and the rising tensions between scientists who have been forced to work in claustrophobic conditions. It’s all very fascinating if you’re interested in scientific method and technological advances but it’s more effective as a thriller in which tension is derived not only from the deadly threat of the virus, but from the escalating fear and anxiety among the small group of people who’ve been assigned to save the human race.


The basic premise is still captivating; it’s easy to see how this became the foundation of Crichton’s science-thriller empire.


Category

Film & Animation


License

Standard YouTube License


.

.


.

……………………………………………………………………………………………………………………………………………………………………..

.

…..item 3)…. Beware of online banking: Security expert reveals that ANYONE can hack a bank’s app using free internet tools


… Mail Online – Daily Mail … www.dailymail.co.uk/sciencetech/


… Mobile security expert has demonstrated how a banking app can be hacked

… He built a dummy app and used reverse engineering to connect to a server

… When sending money, the server was able to obtain the user’s password

… It was then programmed to piggyback onto the payment and transfer money to the hacker’s account

… Arxan’s Winston Bond said reverse engineering can be used on any app

… There are also tools and online tutorials to teach hackers the process


By VICTORIA WOOLLASTON


PUBLISHED: 07:27 EST, 22 May 2014 | UPDATED: 08:58 EST, 22 May 2014


www.dailymail.co.uk/sciencetech/article-2636160/Beware-on…

.


More than two thirds of us now use smartphones to make payments and check bank balances online.


Many banking apps have a number of security measures in place – from two-step authentication to passwords and PINs – but they may not be as secure as first thought.

.

……………………


img code photo … SEND PAYMENT – dummy banking app


i.dailymail.co.uk/i/pix/2014/05/22/article-2636160-1E19D3…


Mobile security experts set up a dummy banking app, pictured, to demonstrate how the technology can be hacked using reverse engineering


Arxan


……………………

.


A mobile security expert has revealed to MailOnline how these apps can be hijacked using free tools available online – and the hackers don’t need any of the user’s login details.


Winston Bond is technical manager at mobile security firm Arxan Technologies.


To highlight the risks, he developed a dummy banking app before engineering it to connect it to an external server that could be run by a hacker.


During a demonstration, as he signed into the app, the password was automatically revealed on the hacker’s server.


During another demo, he sent money via the app.


The server was able to piggyback onto the payment and even transfer money to the hacker’s account at the same time.


Although this was a dummy demonstration, Bond explained it is the same process hackers are using to access official banking apps on mobile devices.


The hacking technique used is called reverse engineering.

.


More…


… Google’s 9 smart smoke sensor Nest Protect set to go back on sale after flaw that causes it to turn off if someone WAVES at it fixed

… The tricycle that could replace the cop car: Segway reveals ,000 three wheeler designed for police patrols


The process involves taking an object apart to see how it works, either to replicate or improve it.

.

………………………


img code photo … connected the app to an external server


— bin – Hacker’s Server

.


finnmcmissile% ./hackistan_server


########################################


Ready to capture mobile banking details


########################################


Password: arxan

Balance: 415


i.dailymail.co.uk/i/pix/2014/05/22/article-2636160-1E19D3…


As part of the engineering, expert Winston Bond connected the app to an external server that could be run by a hacker, pictured. During one demonstration, as he signed into the app on his iPad, the password was automatically revealed on this pretend hacker’s server on a laptop, pictured


Arxan


………………………

.

………………………


img code photo … The server was able to piggyback


— bin – Bank Of Arxan

.


finnmcmissile% ./BankOfArxan_server

BankOfArxan_Servier: using default port

New client: Winston’s iPad connect


Payment request: £10 to Wilf (ref: pocket money)


News client: Winston’s IPad connected


Payment request: £25 to Mark (ref: lunch)


Payment request: £50 to A.Crook (ref: Thank you)


i.dailymail.co.uk/i/pix/2014/05/22/article-2636160-1E19D2…


During another demonstration, Bond sent money to a person called Mark, via the app. The server was able to piggyback onto the payment and send money to the hacker’s account, pictured here as A.Crook. Although this was a dummy demonstration, Bond said it is the same process hackers use to access official banking apps


Arxan – Protecting the App Economy


………………………

.


Reverse engineering is not just used for hacking purposes, and is often a technique programmers use to find mistakes or errors in code in order to fix them.


In the case of apps, software reverse engineering involves translating the program’s binary code back into the source code it was originally written in.

.

….


— WHAT IS REVERSE ENGINEERING?


… Reverse engineering is the process of taking an object apart to see how it works, either to replicate or improve the object.


… It is not just used for hacking purposes, and is often used by programmers to find mistakes or errors in code in order to fix them.


… In the case of apps, software reverse engineering involves translating a program’s binary code back into the source code that it was written in.


… This source code reveals to the hackers how the app works, the steps it takes to complete certain tasks and details about the app’s structure.


… A reverse engineer can use a various tools to disassemble a program.


… One example is called a hexadecimal dumper, which prints or displays the binary numbers of a program in hexadecimal format, making it easier to read than binary.


… Another tool is a disassembler. This reads the binary code and displays each instruction in text form.


….

.


This source code reveals to the hackers how the app works, the steps it takes to complete certain tasks, and details about the app’s structure.


Hackers are able to manipulate this source code by adding in lines that connect the app to an external server, for example, or code that tells the app to reveal the password each time it’s entered.


More complicated code is used to create a rule, for example, that means every time a payment is sent, the same amount is sent to the hackers account.


Accomplished hackers can also edit the code to hide these changes from the program, so the software assumes everything is working as it should.


Once the changes are made, the edited code is uploaded back onto the company’s server.


And, as Winston Bond explained, all of these steps can be carried out using tools freely available online.


There are even online video tutorials that show programmers, as well as a hackers, how to access the source code of software.


He did point out that iOS apps and software are more secure and closely monitored than Android, for example – except on jailbroken devices.


‘Jailbreaking’ is the process of removing certain restrictions Apple places on apps and downloads, for example, and makes it easier for developers to adjust settings.

.

……………………..


img code photo … Reverse engineering


i.dailymail.co.uk/i/pix/2014/05/22/article-2636160-1E1A67…


Reverse engineering is the process of taking an object apart to see how it works. It is not just used for hacking purposes, and is often used by programmers to find mistakes or errors in code. Software reverse engineering involves translating a program’s binary code, stock image, back into the source code it was written in


……………………..

.


In many of the cases where banking apps are hacked, Bond continued the attack only works when a user downloads a separate, malicious app.


The demonstration was created after an Arxan study found hackers attacked 78 per cent of the top 100 paid Android and iOS apps last year.

.

…..


— HOW TO PROTECT YOURSELF?


… Many apps are now using additional software, including those developed by Arxan Technologies to prevent hackers from reverse engineering their products.


… However, firms do not reveal if they are protected by such services so users are advised to only download apps from official app stores.


… People should keep an eye on bank statements and report any irregularities.


… They should also check in the phone’s settings for any unusual looking processes running in the background.


… If any look suspicious, users can search online for the names of processes to see what they do.


… Experts also suggest installing antivirus apps on mobile devices.


…..

.


It revealed there were hacked versions of 100 per cent of the top 100 paid apps for Android, and 56 per cent of the top 100 paid apps for iOS.


Last year, Arxan found attackers modified 80 per cent of free Android apps, and this year, this was down to 73 per cent in the same category.


On iOS devices, 40 per cent were hacked last year, compared to 53 per cent this year.


The research unveiled cracked versions of popular financial apps to be at 53 per cent for Android, and 23 per cent were Apple iOS hacked variants.

.


— Share or comment on this article


.


Comments …

Share what you think


.


The comments below have not been moderated.


.


— Sid, Australia, Australia

And after all these wonderful foolproof actions and downloads, chuck the whole lot in the rubbish bin and walk to your banking institution JUST LIKE WE USED TO before we got lazy.


.

.


.

………………………………………………………………………………………………………………………………………..

.

.

.


The Black Crowes’ Amorica …item 2.. Miami New Times – Ten Best NSFW Album Covers (Feb. 8 2013 at 8:00 AM) …item 3.. Jen and Gene Simmons – Battle of the Tongues — OMG, a three sixty !! …
online video games store

Image by marsmet551
What’s a little pubic hair? Apparently, a whole lot when you let it lie over some patriotic bikini bottoms and release it as the art for your major-label album. These rock ‘n’ rollers found themselves in the hot seat over this gaffe, and had to release a store-friendly version with everything but the flag bikini blacked out.

.


……..*****All images are copyrighted by their respective authors ……..

.


……………………………………………………………………………………………………………………………………………………………………..

.

…..item 1a)…. youtube video … The Black Crowes – By Your Side (Studio Version) … 4:29 minutes …


www.youtube.com/watch?v=uvnf2Z0-qyE


SecondHelping74


Uploaded on Dec 8, 2010


The Black Crowes – By Your Side


Lyrics:

When your lost

I am found

When you slip

I hold my ground

When I fall

Please take a bow

And when you’re up

Just remember I am down


People looking for

Fortune and fame

They don’t know

That it’s all the same

It’s like any other game

You know there’s a loser

But it’s alright


When you feel your heart is breaking

When all your friends are faking

When its giving and no taking

I will be by your side


I’ve been over the hill and back

Survived every kind of attack

It’s been a few years at that

As a matter of fact


Good luck is just good luck

You don’t go hungry if you got pot luck

I’ve been down

But never on my knees

I see the forest for the trees

.

.

……………………………………………………………………………………………………………………………………………………………………….

.

…..item 1b)…. youtube video … The Black Crowes – Greatest Hits ’90-’99 A Tribute to a Work in Progress (Full Album) … 72:49 minutes …


www.youtube.com/watch?v=deQeKuvXdqs


Sanctu5


Published on Jul 24, 2012


1. Jealous Again

2. Twice As Hard

3. Hard To Handle

4. She Talks To Angels

5. Remedy

6. Sting Me

7. Thorn In My Pride

8. Bad Luck Blue Eyes Goodbye

9. A Conspiracy

10. Wiser Time

11. Good Friday

12. Blackberry

13. Kickin’ My Heart Around

14. Go Faster

15. Only A Fool

16. By Your Side


Category

Music


License

Standard YouTube License

.

.

………………………………………………………………………………………………………………………………………………………………………

.

…..item 2)…. Ten Best NSFW Album Covers … Miami New Times …


blogs.miaminewtimes.com/crossfade … Crossfade – The Music Blog


By Kat Bein Fri., Feb. 8 2013 at 8:00 AM …

Categories: Lists, Useless Lists


blogs.miaminewtimes.com/crossfade/2013/02/ten_best_nsfw_a…


Remember when people used to buy music?


We all convinced ourselves the packaging was actually part of the experience. Especially when someone made an album cover so titillating, stores couldn’t even put a record on the shelf without special censors.


Well, even in today’s digital music age, some clever artists are finding ways to push the good-taste envelope. Luckily, we here at Crossfade don’t have time for good taste. So we’ve compiled this totally sexy, totally fucked-up list of the most NSFW album covers ever.

.

……………………


img code photo … Crossfade … Amorica


blogs.miaminewtimes.com/crossfade/amorica%20album%20cover…


……………………

.


Enjoy, you filthy animals.


See also:

-Twelve Songs About Blowjobs! (NSFW)

-Top Songs for F#$ %ing, According to 2,000 Horny Music Nerds

-Ten Best Songs About Masturbation

-Top Ten Songs About Sex in Public

.

………………………….


img code photo … Nirvana Nevermind


blogs.miaminewtimes.com/crossfade/nirvana%20nevermind%20a…


………………………….

.

Nirvana Nevermind

This mega classic probably doesn’t even come to mind, but it was a huge deal back in its day. That is a baby’s penis, you know. Originally, stores refused to carry the thing unless the itty bit was photoshopped off, or whatever they used to photoshop things in the early ’90s. These days, the kid is like 21 years old and everyone who’s anyone has his baby picture in their iTunes.

.

……………………………


img code photo … Black Crowes’ Amorica


blogs.miaminewtimes.com/crossfade/black%20crowes%20amoric…


……………………………

.


Black Crowes’ Amorica

What’s a little pubic hair? Apparently, a whole lot when you let it lie over some patriotic bikini bottoms and release it as the art for your major-label album. These rock ‘n’ rollers found themselves in the hot seat over this gaffe, and had to release a store-friendly version with everything but the flag bikini blacked out.

1 | 2 | 3 | 4 | 5 | Next Page >>


GET THE MUSIC NEWSLETTER

Keep your thumb on the local music scene with music features, additional online music listings and show picks. We’ll also send special ticket offers and music promotions available only to our Music Newsletter subscribers.


Tags: Black Crowes, D-Styles, Dead Kennedys, Death Grips, Goon & Koyote, John Lennon, Nirvana, Pansy Division, Roxy Music, Team Jaguar, Yoko Ono

.

.

………………………………………………………………………………………………………………………………………………………………………

.

…..item 3)…. youtube video … Jen and Gene Simmons – Battle of the Tongues … 1:57 minutes


www.youtube.com/watch?v=guWOJGKym2I


untamedc


Published on Oct 12, 2012

No description available.


Category

Film & Animation


License

Standard YouTube License

.

.

………………………………………………………………………………………………………………………………………………………………………

.

.


Folks from Iowa (1958) …item 1c.. No Country for Old Men (November 2007) …item 2.. TV chef Anthony Bourdain upsets entire state of New Mexico (30 September 2013) — with a dash of geopolitical insight. …
online video games store

Image by marsmet53
Bourdain had described the dish as tasting as if it were made with canned Hormel Chili and a ‘day-glow orange cheese-like substance.’


Mike Collins said Bourdain is ‘completely wrong’ about the store’s Frito pie, which he says is homemade from chile grown in New Mexico and remains extremely popular with his customers.

.


…….*****All images are copyrighted by their respective authors ……

.


… message header for item 1. No Country for Old Men (film)


No Country for Old Men is a 2007 American thriller written and directed by Joel and Ethan Coen, based on the Cormac McCarthy novel of the same name.


The film stars Tommy Lee Jones, Javier Bardem and Josh Brolin, and tells the story of an ordinary man to whom chance delivers a fortune that is not his, and the ensuing cat-and-mouse drama, as three men crisscross each other’s paths in the desert landscape of 1980 West Texas.


Themes of fate, conscience and circumstance re-emerge that the Coen brothers have previously explored in Blood Simple and Fargo.

.

.


………………………………………………………………………………………………………………………………………………………………………

.

…..item 1a)…. From Wikipedia, the free encyclopedia … No Country for Old Men (film) …


en.wikipedia.org/wiki/No_Country_for_Old_Men_(film)


Plot


West Texas in June 1980 is desolate, wide open country, and Ed Tom Bell (Tommy Lee Jones) laments the increasing violence in a region where he, like his father and grandfather before him, has risen to the office of sheriff.


Llewelyn Moss (Josh Brolin), hunting pronghorn, comes across the aftermath of a drug deal gone awry: several dead men and dogs, a wounded Mexican begging for water, and two million dollars in a satchel that he takes to his trailer home. Late that night, he returns with water for the dying man, but is chased away by two men in a truck and loses his vehicle. When he gets back home he grabs the cash, sends his wife Carla Jean (Kelly Macdonald) to her mother’s, and makes his way to a motel in the next county[22] where he hides the satchel in the air vent of his room.


Anton Chigurh (Javier Bardem) is a hitman who has been hired to recover the money. He has already strangled a sheriff’s deputy to escape custody and stolen a car by using a captive bolt pistol to kill the driver. Now he carries a receiver that traces the money via a tracking device concealed inside the satchel. Bursting into Moss’ hideout at night, Chigurh surprises a group of Mexicans set to ambush Moss, and murders them all. Moss, who has rented the connecting room on the other side, is one step ahead. By the time Chigurh removes the vent cover with a dime, Moss is already back on the road with the cash.


In a border town hotel, Moss finally finds the electronic bug, but not before Chigurh is upon him. A firefight between them spills onto the streets, leaving both men wounded. Moss flees across the border, collapsing from his injuries before he is taken to a Mexican hospital. There, Carson Wells (Woody Harrelson), another hired operative, offers protection in return for the money.


After Chigurh cleans and stitches his own wounds with stolen supplies, he gets the drop on Wells back at his hotel and kills him just as Moss calls the room. Picking up the call and casually raising his feet to avoid the spreading blood, Chigurh promises Moss that Carla Jean will go untouched if he gives up the money. Moss remains defiant.


Moss arranges to rendezvous with his wife at a motel in El Paso to give her the money and send her out of harm’s way. She reluctantly accepts Bell’s offer to save her husband, but he arrives only in time to see a pickup carrying several men speeding away from the motel and Moss lying dead in his room. That night, Bell returns to the crime scene and finds the lock blown out in his suspect’s familiar style. Chigurh hides behind the door of a motel room, observing the shifting light through an empty lock hole. His gun drawn, Bell enters Moss’ room and notices that the vent cover has been removed with a dime and the vent is empty.


Bell visits his Uncle Ellis (Barry Corbin), an ex-lawman. Bell plans to retire because he feels "overmatched," but Ellis points out that the region has always been violent. For Ellis, thinking it is "all waiting on you, that’s vanity."


Carla Jean returns from her mother’s funeral to find Chigurh waiting in the bedroom. When she tells him she does not have the money, he recalls the pledge he made to her husband that could have spared her. The best he will offer is a coin toss for her life, but she says that the choice is his. Chigurh leaves the house alone and carefully checks the soles of his boots. As he drives away, he is injured in a car accident and abandons the damaged vehicle.


Now retired, Bell shares two dreams with his wife (Tess Harper), both involving his deceased father. In the first dream he lost "some money" that his father had given him; in the second, he and his father were riding horses through a snowy mountain pass. His father, who was carrying fire in a horn, quietly passed by with his head down, "going on ahead, and fixin’ to make a fire" in the surrounding dark and cold. Bell knew that when he got there his father would be waiting.

.

.


.

……………………………………………………………………………………………………………………………………………………………………..

.

…..item 1b)…. youtube video … NO COUNTRY FOR OLD MEN – TRAILER … 2:37 minutes …


www.youtube.com/watch?v=YOohAwZOSGo


Uploaded by BVHEMiramax on Feb 8, 2008


Acclaimed filmmakers Joel and Ethan Coen deliver their most gripping and ambitious film yet in this sizzling and supercharged action-thriller. When a man stumbles on a bloody crime scene, a pickup truck loaded with heroin, and two million dollars in irresistible cash, his decision to take the money sets off an unstoppable chain reaction of violence. Not even west Texas law can contain it. Based on the novel by Pulitzer Prize-winning author Cormac McCarthy, and featuring an acclaimed cast led by Tommy Lee Jones, this gritty game of cat and mouse will take you to the edge of your seat and beyond – right up to its heart-stopping final act.


No Country For Old Men — Available on DVD and Blu-rayTM Hi-Def March 11, 2008


Category:

Film & Animation


License:

Standard YouTube License

.

.


.

………………………………………………………………………………………………………………………………………………………………………

.

…..item 1c)…. youtube video … No Country for Old Men (9/11) Movie CLIP – You Don’t Have to Do This (2007) HD … 2:43 minutes


www.youtube.com/watch?v=C-iQldPiH64


Uploaded by movieclips on Sep 27, 2011


No Country for Old Men Movie Clip – watch all clips j.mp/w7Mcvt

click to subscribe j.mp/sNDUs5


Carla Jean (Kelly Macdonald) is visited by Chigurh (Javier Bardem) and tries to dissuade him from killing her.


TM & © Miramax Films (2012)


Cast: Javier Bardem, Kelly Macdonald

Director: Ethan Coen, Joel Coen


MOVIECLIPS YouTube Channel: j.mp/vqieFG

Join our Facebook page: j.mp/tb8OMH

Follow us on Twitter: j.mp/rZzGsm

Buy Movie: amzn.to/tm8eC2

Producer: Ethan Coen, Joel Coen, David Diliberto, Robert Graf, Mark Roybal, Scott Rudin

Screenwriter: Joel Coen, Ethan Coen, Cormac McCarthy


Film Description: When a Vietnam veteran discovers two million dollars while wandering through the aftermath of a Texas drug deal gone horribly awry, his decision to abscond with the cash sets off a violent chain reaction in a stripped-down crime drama from Joel and Ethan Coen. Llewelyn Moss (Josh Brolin) has just stumbled into the find of a lifetime.


Upon discovering a bullet-strewn pickup truck surrounded by the corpses of dead bodyguards, Moss uncovers two million dollars in cash and a substantial load of heroin stashed in the back of the vehicle.


Later, as an enigmatic killer who determines the fate of his victims with the flip of a coin sets out in pursuit of Moss, the disillusioned Sheriff Bell (Tommy Lee Jones) struggles to contain the rapidly escalating violence that seems to be consuming his once-peaceful Lone Star State town. Woody Harrelson, Javier Bardem, and Kelly MacDonald co-star in a distinctly American crime story that explores timeless biblical themes in a contemporary Southwestern setting.


"no country for old men","no country for old men clip","kelly macdonald","javier bardem","coin videos","crime thrillers",thriller,"scott rudin","ethan coen","joel coen","robert graf","mark roybal","david diliberto","choice videos","despair videos","destiny videos","fate videos","innocence videos","justice videos","life and death videos","morality videos","violence videos","house videos","anton chigurh","carla jean moss","movie clips",movieclipsdotcom,#AMG:V+++348834,/m/01713c,/m/02tr7d


Category:

Film & Animation


License:

Standard YouTube License

.

.


.

……………………………………………………………………………………………………………………………………………………………………….

.

…..item 2)…. TV chef Anthony Bourdain upsets entire state of New Mexico after describing ‘signature’ Frito pie as ‘colostomy pie’ and claiming it’s really a Texan dish …


… Mail Online – Daily Mail … www.dailymail.co.uk/news/


… A Frito pie consists of a bag of Fritos which has chili and cheese mixed in

… Bourdain upset locals after describing it as ‘feeling like holding a warm crap in a bag’

… He then upset locals by claiming that it wasn’t even a New Mexico meal, but rather a Texas creation

… But the sharp-tongued chef and writer also admitted that it tasted delicious


By DAVID MCCORMACK and ASSOCIATED PRESS REPORTER

PUBLISHED: 17:25 EST, 30 September 2013 | UPDATED: 17:37 EST, 30 September 2013


www.dailymail.co.uk/news/article-2439651/TV-chef-Anthony-…


Outspoken food critic Anthony Bourdain has stirred up outrage in New Mexico after insulting one of the state’s signature dishes.


The sharp-tongued chef and writer lashed into the ‘World Famous’ Frito pies sold at Santa Fe’s well-known Five & Dime General Store’s snack bar on a recent episode of his CNN show ‘Parts Unknown.’


A Frito pie consists of a bag of Fritos which then has chili and cheese mixed in with it.


Scroll down for video

.

………………….


img code photo … ‘Colostomy pie’


i.dailymail.co.uk/i/pix/2013/09/30/article-2439651-1869D3…


‘Colostomy pie’: Outspoken food critic Anthony Bourdain has stirred up outrage in New Mexico after insulting Frito pie, one of the state’s signature dishes


CNN


………………….

.

………………….


img code photo … A Frito pie


i.dailymail.co.uk/i/pix/2013/09/30/article-2439651-1869D3…


A Frito pie consists of a bag of Fritos which then has chili and cheese mixed in with it


CNN


………………….

.


Bourdain described the southern delicacy as ‘feeling like holding a warm crap in a bag’ and ‘colostomy pie.’


The store manager of the Five & Dime where Bourdain ate isn’t happy after the celebrity chef was so quick to dismiss his food.


More…


… From the sports bar to the boardroom: How one former Hooters waitress worked her way up to become president of Cinnabon

… The average student gains two STONE in the first year of university – with the main reason for ‘freshers’ flab’ being stress

… Teenage girls who eat peanut butter twice a week ‘reduce their risk of breast cancer by 39%’


Bourdain had described the dish as tasting as if it were made with canned Hormel Chili and a ‘day-glow orange cheese-like substance.’


Mike Collins said Bourdain is ‘completely wrong’ about the store’s Frito pie, which he says is homemade from chile grown in New Mexico and remains extremely popular with his customers.

.

…………………..


img code photo … Bourdain had described the dish


i.dailymail.co.uk/i/pix/2013/09/30/article-2439651-1869D3…


Bourdain had described the dish as tasting as if it were made with canned Hormel Chili and a ‘day-glow orange cheese-like substance’


CNN


…………………..

.

…………………..


img code photo … A satisfied customer enjoys a ‘World Famous’ Frito pie


i.dailymail.co.uk/i/pix/2013/09/30/article-2439651-1869DB…


A satisfied customer enjoys a ‘World Famous’ Frito pie sold at Santa Fe’s Five & Dime General Store’s snack bar in Santa Fe, New Mexico


AP


…………………..

.


Bourdain also upset locals by claiming that the local dish wasn’t even a New Mexico meal, but rather a Texas creation.


He said the New Mexicans should have left the recipe to the Texans, although he also admitted that it was delicious.


In the CNN documentary series ‘Anthony Bourdain: Parts Unknown’ the chef travels the world on a mission to discover regional flavors, with a dash of geopolitical insight.


The show gave CNN its first Primetime Emmys when it won for outstanding informational series and outstanding cinematography for a nonfiction series at the Creative Arts Emmy Awards on Sept. 15.


In the episode on New Mexico, Bourdain took a close look at the mash-up of cultures that comprise the state’s food – a combination of Spanish, Mediterranean, Mexican, Pueblo and even chuck-wagon influences.


Video: Bourdain tries Frito pie

.

…………………..


CNN … Click to play


video: 74 seconds


Anthony Bourdain tries Frito pie

Anthony Bourdain visits a New Mexico five and dime store to sample its world famous Frito pie.


…………………..

.


Read more:

Guns and green chile

.


Share or comment on this article

.

.


.

…………………………………………………………………………………………………………………………………………………….

.

.

.










Back Massager (2 pc. Deluxe Set) - Foot Massager - Massage Therapy, Tools, Supplies, Roller Ball - Personal Massager for Women, Men, Kids - 2 Massage Hand Rollers - Enjoy a Relaxing Massage At-Home, 60 Day Money Back Guarantee

Back Massager (2 pc. Deluxe Set) - Foot Massager - Massage Therapy, Tools, Supplies, Roller Ball - Personal Massager for Women, Men, Kids - 2 Massage Hand Rollers - Enjoy a Relaxing Massage At-Home, 60 Day Money Back Guarantee By Nayoya Wellness
Buy new: $21.84





PlayStation 2 Console Slim - Black (Video Game)

PlayStation 2 Console Slim - Black (Video Game) By Sony
Buy new: $127.95 240 used and new from $46.95





Fisher-Price Laugh and Learn Apptivity Monkey (Toy)

Fisher-Price Laugh and Learn Apptivity Monkey (Toy) By Fisher-Price
Buy new: $18.25 81 used and new from $7.99





Nintendo DSi XL Bronze (Video Game)

Nintendo DSi XL Bronze (Video Game) By Nintendo
75 used and new from $51.00





Sega Dreamcast Console (Electronics)

Sega Dreamcast Console (Electronics) By Sega of America, Inc.
125 used and new from $23.99





Wii Black Console with New Super Mario Brothers Wii and Music CD (Video Game)

Wii Black Console with New Super Mario Brothers Wii and Music CD (Video Game) By Nintendo
40 used and new from $74.78





Sony PlayStation 2 Combo Pack (Electronics)

Sony PlayStation 2 Combo Pack (Electronics) By Sony
31 used and new from $70.00





My PlayStation Vita (Paperback)

My PlayStation Vita (Paperback) By Bill Loguidice
Buy new: $17.03 51 used and new from $13.02





Xbox 360 250GB Holiday Value Bundle (Amazon exclusive Bonus Value) (Video Game)

Xbox 360 250GB Holiday Value Bundle (Amazon exclusive Bonus Value) (Video Game) By Microsoft
1 used and new from $261.62





LeapFrog Leapster Explorer Learning Game System, Purple (Toy)

LeapFrog Leapster Explorer Learning Game System, Purple (Toy) By LeapFrog Enterprises
Buy new: $38.00 51 used and new from $20.00




by






Xbox Live 3 Month Gold Membership [Online Game Code]



by Microsoft Platform:  Xbox Live 3 Month Gold Membership [Online Game Code] Xbox One, Xbox 360 Xbox Live 3 Month Gold Membership [Online Game Code](5126) Buy new: $24.99 $24.90




HORI Mario Kart 8 Racing Wheel (Mario) - Nintendo Wii U



by HORI Platform:  HORI Mario Kart 8 Racing Wheel (Mario) - Nintendo Wii U Nintendo Wii Release Date: May 30, 2014 Buy new: $11.99




Generic Headset with Microphone - Xbox 360



by Generic Platform:  Generic Headset with Microphone - Xbox 360 Xbox 360 Generic Headset with Microphone - Xbox 360(703) Release Date: May 7, 2014 Buy new: $7.45 $7.33 30 used & new from $0.99




Xbox One Wireless Controller



by Microsoft Software Platform: Xbox One Xbox One Wireless Controller(388) Buy new: $59.99 $49.87 156 used & new from $31.90




HORI Mario Kart 8 Racing Wheel (Luigi) - Nintendo Wii U



by HORI Platform:  HORI Mario Kart 8 Racing Wheel (Luigi) - Nintendo Wii U Nintendo Wii Release Date: June 30, 2014 Buy new: $11.99




Amazon Fire TV



by Amazon Amazon Fire TV(5351) Buy new: $99.00




Nintendo 3DS XL - Yoshi Edition



by Nintendo Platform: Nintendo 3DS Nintendo 3DS XL - Yoshi Edition(9) Buy new: $199.99 $189.89 93 used & new from $169.48




Xbox One



by Microsoft Platform: Xbox One Release Date: June 9, 2014 Buy new: $399.00




Nintendo Wii U Pro Controller - Black



by Nintendo Platform: Nintendo Wii U Nintendo Wii U Pro Controller - Black(206) Buy new: $49.99 $39.99 53 used & new from $35.10




Xbox One Console - Titanfall Bundle + Kinect



by Microsoft Platform: Xbox One Xbox One Console - Titanfall Bundle + Kinect(349) Release Date: March 11, 2014 Buy new: $499.99 $499.00 71 used & new from $429.00



by






Watch Dogs - Xbox 360



by UBI Soft Platform:  Watch Dogs - Xbox 360 Xbox 360 Watch Dogs - Xbox 360(15) Release Date: May 27, 2014 Buy new: $59.99 $59.95 46 used & new from $50.00




Watch Dogs - PlayStation 4



by UBI Soft Platform: PlayStation 4 Watch Dogs - PlayStation 4(157) Release Date: May 27, 2014 Buy new: $59.99 $59.92 74 used & new from $44.00




Watch Dogs - Playstation 3



by UBI Soft Platform:  Watch Dogs - Playstation 3 PlayStation 3 Watch Dogs - Playstation 3(20) Release Date: May 27, 2014 Buy new: $59.99 $57.98 53 used & new from $46.00




PlayStation 4 Console



by Sony PlayStation 4 Console 222 days in the top 100 Platform: PlayStation 4 PlayStation 4 Console(7323) Buy new: $399.99 $399.00 372 used & new from $328.99




Minecraft Playstation 3 Edition - PlayStation 3



by Sony Computer Entertainment Platform:  Minecraft Playstation 3 Edition - PlayStation 3 PlayStation 3 Minecraft Playstation 3 Edition - PlayStation 3(25) Release Date: May 16, 2014 Buy new: $19.99 $19.96 40 used & new from $16.37




Tomodachi Life - Nintendo 3DS



by Nintendo Platform: Nintendo 3DS Release Date: June 6, 2014 Buy new: $34.99 $34.96 8 used & new from $34.69




$50 PlayStation Store Gift Card - PS3/ PS4/ PS Vita [Digital Code]



by SCEA 641 days in the top 100 Platform:  $50 PlayStation Store Gift Card - PS3/ PS4/ PS Vita [Digital Code] PlayStation Vita, PlayStation 4, PlayStation 3 $50 PlayStation Store Gift Card - PS3/ PS4/ PS Vita [Digital Code](4750) Buy new: $49.99




$20 PlayStation Store Gift Card - PS3/ PS4/ PS Vita [Digital Code]



by SCEA $20 PlayStation Store Gift Card - PS3/ PS4/ PS Vita [Digital Code] 650 days in the top 100 Platform:  $20 PlayStation Store Gift Card - PS3/ PS4/ PS Vita [Digital Code] PlayStation Vita, PlayStation 4, PlayStation 3 $20 PlayStation Store Gift Card - PS3/ PS4/ PS Vita [Digital Code](4750) Buy new: $19.99




Xbox One Wireless Controller



by Microsoft Software Xbox One Wireless Controller 289 days in the top 100 Platform: Xbox One Xbox One Wireless Controller(388) Buy new: $59.99 $49.87 150 used & new from $32.99




Watch Dogs - Xbox One



by UBI Soft Platform: Xbox One Watch Dogs - Xbox One(78) Release Date: May 27, 2014 Buy new: $59.99 $58.81 66 used & new from $45.99



by
CNET News - Desktop threat, still a threat (December 20, 2012 5:28 PM PST) ...item 2.. The Andromeda Strain (1971) "Code 601" ...item 3.. Beware of online banking (22 May 2014) -- Payment request: £50 to A.Crook (ref: Thank you) ...

No comments:

Post a Comment