This || That SHiT

Mr.Normal Guy writing things that seems abnormal. In street words 'Oh Shit' things

July 28, 2006

How to make French Toast for two

Prep time: about 15 minutes

Ingredients:

* 1 egg
* 1/4 c. milk
* dash of vanilla extract
* 1 tbsp. margarine
* 2 pieces of bread

Utensils:

* medium-size bowl
* mixing spoon
* frying pan
* stove (You'll need help from your adult assistant.)
* spatula
* serving plate
* measuring cups and spoons

Directions:

1. Crack the egg into a medium-size bowl and beat well. Then mix in the milk and vanilla extract.
2. Put the margarine in a frying pan. Heat the pan on the stovetop on medium heat. It's hot enough when the margarine starts to bubble.
3. Dunk each piece of bread in the egg mixture. Make sure the bread is totally covered.
4. Cook the bread in the frying pan on low heat until the underside is light brown (about 5 minutes).
5. Use a spatula to flip the bread over, and cook again for another 5 minutes.
6. Use the spatula to transfer the French toast to a plate.

Serves: 2
Serving size: 1 slice
Nutritional analysis (per serving):

162 calories

[Like it? Digg it!]

Peace, Propaganda & The Promised Land Documentary into MiddleEast

Peace, Propaganda & the Promised Land provides a striking comparison of U.S. and international media coverage of the crisis in the Middle East, zeroing in on how structural distortions in U.S. coverage have reinforced false perceptions of the Israeli-Palestinian conflict. This pivotal documentary exposes how the foreign policy interests of American political elites--oil, and a need to have a secure military base in the region, among others--work in combination with Israeli public relations strategies to exercise a powerful influence over how news from the region is reported.
Through the voices of scholars, media critics, peace activists, religious figures, and Middle East experts, Peace, Propaganda & the Promised Land carefully analyzes and explains how--through the use of language, framing and context--the Israeli occupation of the West Bank and Gaza remains hidden in the news media, and Israeli colonization of the occupied terrorities appears to be a defensive move rather than an offensive one. The documentary also explores the ways that U.S. journalists, for reasons ranging from intimidation to a lack of thorough investigation, have become complicit in carrying out Israel's PR campaign. At its core, the documentary raises questions about the ethics and role of journalism, and the relationship between media and politics.

July 27, 2006

Mariah Carey - It's Like That Live

She got me shaking alright!


Mariah Carey - It's Like That - video powered by Metacafe

July 25, 2006

Jim Carrey's Funny Videos

Never hurts to laugh with Jim Carrey

Top Gear - Lamborghini Gallardo

Are you going to say no to this babe?


Top Gear - Lamborghini Gallardo - video powered by Metacafe

July 24, 2006

How to use Hijackthis Tutorial

Download the tool here:

http://www.downloads.subratam.org/hijackthis.zip

Then set it up

Step 1

HijackThis downloads as a ZIP file that contains only the program itself, not an installer. When you unzip it, be sure to create a folder for the program to live in, such as C:\Program Files\HijackThis\, or it will simply unzip to your default downloads folder. To make running it even easier, you can right-click its program icon to create a shortcut on your desktop. Most versions of Windows let you drag the folder--or just the icon--to the Start menu and drop it where you want. Windows XP lets you right-click the icon and "pin" it to the Start menu. If you use the Quick Start toolbar, you can drag and drop the icon there.

Scan your system


Step 2

Regardless of how you launch the program, running HijackThis can be confusing. All you do is click the Scan button to bring up a list of all the questionable entries in your registry and on your computer. However, even a completely healthy computer that's been customized by, say, setting a new Internet Explorer home page can have dozens of entries. A scan on our test machine resulted in 44 entries, all of which we recognized as benign. (If you'd like more information on why the program flagged a benign entry, you can either select an individual check box and hit the Info on Selected Item button or consult the publisher's excellent log tutorial.) The best thing to do is save the log, preferably in the HijackThis folder, and look to the Internet for answers.

Identify problems


Step 3

Conveniently, after the program scans, the Scan button turns into the Save Log button. Once you press that, the log opens up in Notepad. At that point, the brave or foolhardy can look up entries on the Web to see whether they're benign. For example, we discovered that lsass.exe is a Mcft Windows process that helps authenticate user logins. Clearly this isn't something we want to delete, whereas the innocent-sounding rundll16.exe comes with the adware program BrowserAid.

However, you don't have to face the cleanup alone. Many anti-adware and tech-support online forums feature dedicated and smart people who will examine your HijackThis log file and tell you which entries to delete. SpywareInfo runs a good one, as do Computer Cops and TweakXP. For all three, registration is required, but it's free and quick. Read the forum rules before posting, and be patient.

Clean house

Step 4


Once you've done your research, check the box next to items you know are bad, then hit Fix Checked. After that, restart your computer and run an adware-removal program to see whether that took care of the problem. If you're still having problems, either repeat the process or return to the forums. The person who's helping you will tell you which files to remove, then probably ask you to restart, rescan, and post the new log. This process continues until your computer is once again deemed righteous. At that point, you can check items you know are good, such as those that reset the browser page to your chosen home page, and remove them from future flagging by hitting the Add Selected to Ignorelist button.

The thing with Hijackthis in the old days was that it was way to hard to analyze with.. but the good thing now is that you can scan it online with the logfile Hijackthis creates...


http://hijackthis.de/index.php?langselect=english


HijackThis lists the contents of key areas of the registry and hard drive--areas that are used by both legitimate programmers and hijackers. The program is continually updated to detect and remove new hijacks. It does not target specific programs and URLs, just the methods used by hijackers to force you onto their sites. As a result, false positives are imminent, and unless you're sure about what you're doing, you should always consult with knowledgable folks before deleting anything.

Hijackthis reviews...

http://www.download.com/HijackThis/3640-8022-10307556.html


[Like it? Digg it]