Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Topics - Felburg

Pages: [1] 2 3
LandzDown Lounge / JDRF Walk 2010
« on: September 24, 2010, 10:41:13 PM »


I'm writing to you to ask for your support in a very special cause.

This year, I'll be taking part in the Juvenile Diabetes Research Foundation's Walk to Cure Diabetes along with a half-million other walkers across the country. Our goal: To raise $90 million to help fund research for a cure for type 1 diabetes and its complications.

Type 1, or juvenile, diabetes, is a devastating, often deadly disease that affects millions of people--a large and growing percentage of them children.

Many people think type 1 diabetes can be controlled by insulin. While insulin does keep people with type 1 diabetes alive, it is NOT a cure. Aside from the daily challenges of living with type 1 diabetes, there are many severe, often fatal, complications caused by the disease.

That's the bad news... and yes, it's pretty bad.

The good news, though, is that JDRF is making steady progress toward a cure. In fact, JDRF funding and leadership is associated with most major scientific breakthroughs in type 1 diabetes research to date. And JDRF funds more type 1 research than any other charity worldwide.

I'm writing to ask for your support because now more than ever, EACH of us can be a part of bringing about a cure. Each of us can make a real difference

Won't you please give to JDRF as generously as you're able?

Together, we can make the cure a reality.

Thank you,

Jeffrey Felburg

Please visit my Walk Web page if you would like to donate online or see how close I am to reaching my personal goal: 

LandzDown Lounge / Happy Thanksgiving!!!
« on: November 25, 2009, 07:27:34 PM »
Happy Thanksgiving Landzdown Members

Edited to re-size image to help those who are still on dial up.

GR@PH;<'S   :Hammys pint:

LandzDown Lounge / Juvenile Diabetes Walk 2009
« on: September 18, 2009, 01:41:56 AM »
Greetings!  I'm hoping you can help me for this really great cause.

I'm writing to you to ask for your support in a very special cause.

This year, on November 8, 2009 at Dodger Stadium. I'll be taking part in the Juvenile Diabetes Research Foundation's Walk to Cure Diabetes along with a half-million other walkers across the country. Our goal: To raise $105 million to help fund research for a cure for type 1 diabetes and its complications.

Type 1, or juvenile, diabetes, is a devastating, often deadly disease that affects millions of people--a large and growing percentage of them children.

Many people think type 1 diabetes can be controlled by insulin. While insulin does keep people with type 1 diabetes alive, it is NOT a cure. Aside from the daily challenges of living with type 1 diabetes, there are many severe, often fatal, complications caused by the disease.

That's the bad news... and yes, it's pretty bad.

The good news, though, is that a cure for type 1 diabetes is within reach. In fact, JDRF funding and leadership is associated with most major scientific breakthroughs in type 1 diabetes research to date. And JDRF funds a major portion of all type 1 diabetes research worldwide, more than any other charity.

I'm writing to ask for your support because now more than ever, EACH of us can be a part of bringing about a cure. Each of us can make a real difference

Won't you please give to JDRF as generously as you're able?

Together, we can make the cure a reality.

Thank you,

Jeffrey Felburg

Please visit my Walk Web page if you would like to donate online or see how close I am to reaching my personal goal: 

LandzDown Lounge / Juvenile Diabetes Walk
« on: October 11, 2008, 12:50:06 PM »
I normally don't post these types of messages to forums, but I need some help.

Next month, I will be participating in a walk to help find a cure for Juvenile Diabetes.

This walk will be on November 1st, at Dodger Stadium in Los Angeles, CA.

If anyone can help by making a donation to The Juvenile Diabetes Research Foundation, it will be greatly appreciated.


LandzDown Lounge / Spyware Rubbernecking
« on: December 03, 2006, 04:26:32 PM »
I found this video called Spyware Rubbernecking it shows the dangers of spyware.  I thought it would be appropriate for this forum:

Analysis and Malware Removal / Trojan.Adclicker and More
« on: November 02, 2006, 01:42:03 PM »
Hello guys, it's been a long time since I stopped by to say hello, but this time I really need your help.

I accidently downloaded something that contained Trojan.Adclicker. Norton AntiVirus 2007 keeps trying to delete it, but it keeps coming back.

I have also tried scanning with Ad-Aware SE, AVG Antispyware, Windows Defender, and SpyBot Search & Destroy. All seem to remove parts of it, which by research I found out was called "Smitfraud". I can't tell if I am clean or not.

Also, for some strange reason I cannot get into Safe Mode, it just goes black after the dialog box that opens after I log into my system. I can however get into Safe Mode with Networking.

I also noticed an item in my Add/Remove programs list called: VSAdd-in for Internet Explorer, which does nothing when I click on the remove button.

Please let me know which logs that you would like to see.

Web News / Anti-spyware guidelines get final version
« on: January 23, 2006, 02:48:15 PM »
Anti-spyware guidelines get final version

Last modified: January 12, 2006, 2:52 PM PST
By Alorie Gilbert
Staff Writer, CNET

A coalition of software companies have agreed on standard methods for identifying and combating spyware, those unwelcome downloads that have plagued Internet users with pop-up ads and other annoyances.

The Anti-Spyware Coalition, whose members include Microsoft, Symantec, Computer Associates, McAfee, AOL and Yahoo, said on Thursday that it has finalized its spyware detection guidelines. The final version takes into account public comments on a proposed version introduced in October.

Spyware and adware have become widely despised for their sneaky distribution tactics, unauthorized data gathering and tying-up of computer processing power. Although adware makers say there are legitimate uses for their programs, an entire anti-spyware market has been spawned to combat the stuff.

The Anti-Spyware Coalition's guidelines, or risk model description, aim to provide a common way to classify spyware, based on risks a piece of software poses to consumers. They also suggest ways to handle software, based on those risk levels.

Among the behaviors the group considers high-risk are programs that replicate themselves via mass e-mails, worms and viruses. Also, programs that install themselves without a user's permission or knowledge, via a security exploit, are also deemed high-risk, as are programs that intercept e-mail or instant messages without user consent, transmit personally identifiable data, or change security settings.

The coalition hopes the final guidelines, which have changed little from the proposed version, will lead to better anti-spyware products. To that end, Cybertrust, through its ICSA Labs unit, is planning to certify products that meet the guidelines. Consumers should see the first products with its anti-spyware seal of approval within the next few months, the IT security and risk management company said.

The guidelines should also make it clearer when companies cross the line of what's acceptable and legal and what's not when it comes to downloads, as Sony BMG did recently with its "rootkit" programs, said Ari Schwartz, a spokesman for the Anti-Spyware Coalition. Sony recently settled a class-action lawsuit over copy-restriction software hidden on customers' computers using a rootkit, which opened those PCs up to attack. The company also recalled the CDs after a public uproar.

Yet attempts to define spyware, create guidelines and certify products are controversial. Critics fear guidelines will legitimize spyware and enable distributors to dodge blocking tools while continuing bad behaviors.

The Anti-Spyware Coalition group plans to conduct a public workshop on Feb. 9 in Washington, D.C., and is currently working on tips for consumers, including teens and parents, and businesses, Schwartz said.

Original Link:

Anti-spyware guidelines get final version

Web News / The Eye
« on: December 18, 2005, 03:11:37 PM »
The latest edition of "The Eye" has been released.  You can read it here:

Here is a text version:


Movers, Shakers, and the Security Scenario:
A Summary on Spyware and Anti-spyware in 2005

Take just about any quantifiable parameter measuring the spyware landscape. Consider the turnover of cybercrime as well as number of software vulnerabilities reported, denial-of-service attacks, botnets, and phishing attempts. The same somber facts came up in survey after survey. Although the analyses for the year 2005 are not final yet, the trend is clear: the figures for the year 2005 will be higher than those of the preceding year.

Spyware is no longer a script kiddie hobby. It is a financially motivated, well-funded professional criminal activity and a full-blown industry. In fact, the turnover is difficult to accurately estimate but the figure is assumed to be in the billions of dollars, well exceeding that of anti-virus and anti-spyware companies, according to a Kaspersky Lab analysis in November 2005. The same source estimated there might be hundreds of criminal groups with thousands of members in the same line of business. Another analysis by Computer Economics estimated the damage of online crime to the global economy in 2005 to the tune of 23-25 billion dollars.

Computerworld spyware survey from October 2005 said 79% of surveyed companies with at least 1,000 employees had had”problems with spyware that required significant attention by” their IT organizations. The same companies voiced strong concerns about spyware’s growth, its potential for identity theft, and the chances that it can be used for industrial espionage. Interestingly for anti-spyware vendors, more than 50% of the surveyed companies said they are not using enterprise-class anti-spyware products.

The economic losses to the economy and security worries of the companies are backed by some compelling statistics:

• The CERT Coordination Center (CERT/CC) says the number of vulnerabilities reported during the three first quarters of 2005 is 4,268, which exceeds the total number of vulnerabilities for the year 2004.
• The National Infrastructure Security Co-ordination Centre (NISCC) in Britain, referring to botnets, estimates that there could be in excess of 1,000,000 compromised hosts under the control of malicious world-wide”. More alarmingly, Kaspersky Labs estimates that the number of zombie computers in botnets increases by 300,000 to 350,000 every month.
• According to the Anti-Phishing Working Group, the number of reported phishing attempts rose from 6,957 in October 2004 to 15,050 in June 2005. Phishers have shown remarkable readiness to exploit the various natural catastrophes during 2005 ranging from the tsunami to a series of hurricanes.

Some analysts have seen a shift in attack trends. Kaspersky Lab, for instance, says there have been fewer major, wide-ranging epidemics and more targeted attacks. This is confirmed by InformationWeek who now sees applications and network devices operating systems having become the primary targets, as opposed to operating systems and Internet services on Web servers and E-mail servers, which were targeted between 1999 and 2004. InformationWeek attributes this development to Microsoft since Windows has become less vulnerable and network administrators, who have been more diligent about patching.

Another trend is the increasing professionalism of cybercrime. Attackers use professionally written malicious programs. They have the technical sophistication to exploit the ever shortening time between published vulnerabilities and the patches to fix them as well as the boldness to launch DDoS attacks against enterprises to extort money. True, as SANS puts it, many of these online enterprises are of the more unsavory kind, less willing to report the attacks and more liable to pay, but this, of course, does not make it any less criminal. According to Infoworld, the criminal groups command vast botnets, which they hire for attacks using, unbelievably, slogans such as “The First Hour Is Free”.

There is also some indication that consumer awareness of the Internet risks is on the rise. A recent survey commissioned by Sun Microsystems said that about two thirds of those surveyed said they would stop shopping online if they felt their personal information was compromised.

One catch phrase that certainly gained currency during 2005 is rootkits. A recent eWeek article, for instance, said that more than 20 percent of all malware removed from Windows XP SP2 (Service Pack 2) systems are stealth rootkits. The year 2005 also saw the first commercial rootkit scanners.

What does the future has on store? The British National Infrastructure Security Co-ordination Centre (NISCC) sees much greater homogeneity of networks as the current telephone, computer and TV networks, now separate, will gradually merge and adopt the same underlying protocols. In other words, the world will become IP based, which will provide new opportunities for attackers to exploit. Another contributing trend is the growth of the always-on high-speed Internet connections, which means people have static IP addresses, which in turn makes it possible to create massive zombie networks.



Lavasoft Christmas Offer

Give Your Loved Ones Superior Internet Protection

Take Advantage of the Lavasoft Christmas Offer!

Add the award-winning Ad-Aware products to Santa's gift bag - now with discounted prices

Get 15% off the retail price for all versions of Ad-Aware SE Plus and Pro

For further information, please visit


Customer Services

Lavasoft Partner Center Serves Resellers Worldwide

Lavasoft launched the Partner Center in November 2005 to give real-time updates about Lavasoft product and services to expanding customers worldwide through selected resellers. Lavasoft resellers can now access the Partner Center at
By logging in to the Partner Center, resellers are provided with a number of useful resources such as:

• Lavasoft product information
• Pricing and discount policies
• On-line order tools, including order history
• Marketing tools
• Technical documentation and resources to assist resellers with the installation and maintenance of Lavasoft products
Benefits of Lavasoft Partner Center
• Assists resellers in the delivery of the right message to Lavasoft customers
We do this by providing resellers the important elements to increase sales and assist actively through the delivery of marketing programs, content, and communications.
• Accessible, interactive, and dynamic link within resellers’ organization
All sales and technical persons within resellers’ organization can have access to the Partner Center.
• Gives resellers the latest Lavasoft updates
Resellers can easily find out about the latest discounts, campaigns, and services.

“Once resellers have logged into the Partner Center , they can download the Partner Pack containing links for Resellers (NFRs), Product Data Sheets, and Price Lists as well as information that will help them sell and promote Lavasoft products,” notes Merja Turpeinen, Marketing & PR Coordinator. “ Lavasoft Reseller Team is available to answer resellers’ questions concerning sales, marketing and order issues.”

For further information, please contact:

Merja Turpeinen
Marketing & PR Coordinator
Lavasoft | Sweden | Finland | USA
Tel. +358 9 6932220 | Fax +358 9 6932227



Lavasoft Announces ARIES Remover Beta for Sony Rootkit

During autumn 2005, a large quantity of CDs containing rootkit style software has been distributed globally by Sony BMG. The XCP rootkit designed for Sony by First4Internet, was found in over 50 CD titles, spreading through the globe in massive numbers. The current reported figure reaches over 50 million copies.

The unpleasant consequence from inserting and activating a CD containing a rootkit to a CD-ROM drive, is that the PC is opened to a security hole, and hence to malicious content gaining access to the network. Unfortunately, the consumer doesn’t have a chance to say no to the rootkit as the EULA, while claiming the software is necessary to run the CD, fails to mention the rootkit. When trying to uninstall the program by yourself, the worse case scenario is that you are left with a broken CD-ROM drive.

The issue has received large scale media attention, and only a portion of antispyware companies have managed to introduce a solution for the software. Although Sony BMG has already provided an uninstaller for the software, we at Lavasoft find it crucially important to introduce an optional solution-the Sony Rootkit Remover, which is currently at its beta phase.

The Remover is a standalone tool and is designed remove the rootkit, not the DRM software from Sony. The rootkit remover detects its components and removes them. After run through and reboot, the system should be clean of the rootkit.

Beta Testers for ARIES Remover are invited

To register as a beta tester, please visit

There are no special qualifications for testers. Both users that are infected with the root-kit and uninfected testers are encouraged to test the application. However, the testers need to run 2000 through 2003 (or even Vista) and should report back their OS version upon encountering problems.

For further information, please contact:

Merja Turpeinen
Marketing & PR Coordinator
Lavasoft | Sweden | Finland | USA
Tel. +358 9 6932220 | Fax +358 9 6932227

Lavasoft Research Lab in Sweden seeks an experienced Malware/Spyware Analyst

Be at the forefront of antispyware development and interact with an international and dynamic Spyware Research Team at Lavasoft.

Candidate Profile

As a Malware / Spyware Analyst, you will be helping the most popular and successful anti-spyware company, to develop and maintain its detection database. You will be responsible not only for investigating new threats, but also updating known content while maintaining accurate records and reports. We are looking for “Windows experts” for our Analysis lab. These positions offer excellent opportunities for career and skill growth.

Application deadline

How to Apply
Please send your application by email to

For more information, see

Living and Working in Sweden

Sweden , where Lavasoft is headquartered, is rich in archipelagos, forests, mountains, and lakes. Foreign expatriates like the friendly population and energetic activities come summer or winter time. Gothenburg is charming and cosmopolitan with its network of streets separated by canals, picturesque and within easy reach from the Stockholm archipelago. Of course, Sweden is a great nation of inventors—every year the Nobel Prize award is held here. The Scandinavians have effectively combined a feasible way of mixing business with nature and pleasure! See more at Official Gateway to Sweden.

Newsbits - Who’s been Naughty and Nice?

Media giant Sony BMG nominated in ‘Internet Villain 2005’ category

One of the largest consumer electronics manufacturers and record labels in the world, Sony BMG, has managed to receive excruciating attention in the media during the past few months. In the beginning of November 2005, Sony made an appalling decision to include rootkit style content protection software to a large number of CD titles, exposing consumer PCs to security holes. The DRM (Digital Rights Management) software called XCP, developed by First4Internet, was placed to approximately 4.7 million CD’s of over 50 artists worldwide. Needless to say what comes to ones mind: could have this strategy needed some additional thinking?

The XCP software installs itself without the user’s knowledge and consent when a CD is inserted and activated in a CD-ROM drive. The consequences can be disastrous, as the PCs get exposed to security holes, and hence to various forms of malicious content gaining access to PCs. This has been exactly the case within a large group of people worldwide who have purchased the CDs. Sony BMG has been confronted by a number of parties and sued by Texas State and California, among others. The verdicts remain to be seen.

Although Sony recalled the CDs containing the XCP software, and introduced an uninstaller for the rootkit, it didn’t take long before Sony BMG reached the headlines again. On 7 th December the Electronic Frontier Foundation (EFF) made an announcement of SunnComm’s security update of its MediaMax Version 5 content protection software. EFF stated that: “This new security vulnerability -- different than the one reported in early November regarding Sony BMG CDs sold with software called XCP -- affects all Sony BMG CDs that contain version 5 of SunnComm MediaMax software. According to Sony BMG, about six million CDs have this software.” A list of the affected titles can be viewed here.

The antispyware industry has been buzzing due to Sony BMG’s actions. It is a pity that companies as reputable as Sony BMG stumble in their own measures of trying protect the artists’ rights, at the same time violating consumers’ right by revealing millions of PCs to security holes. Thomas Hesse’s (Sony BMG’s president of global digital business division) statement in National Public Radio hardly eases their situation: "Most people, I think, don't even know what a rootkit is, so why should they care about it?”

On top off all, ISPA announced its annual Internet hero and villain awards on December 13, where Sony BMG, alongside Russia and EC (European Commission), was nominated in the ‘Internet Villain’ category. It will be intriguing to see what year 2006 will bring for the company...


Redemption is possible

Lavasoft Research announced that after a period of probation, they have decided to remove WhenU.Save / SaveNow from TAC detection database. WhenU.Save /SaveNow was earlier placed in a probationary period public commentary was solicited. No negative reports unfavourable practices were received. As with all removed software, Lavasoft continues to monitor these, and take appropriate action when and where necessary.


Role of public sector

The World Summit on the Information Society that culminated on November 18 started a committee Internet Governance Forum to tackle the issue of governmental control over the Internet via an international body managing the root servers.

Another aspect of the World Summit was the introduction at the conference of the new and inexpensive PC. The idea was to make the Internet available to sub-Saharan Africa and developing countries. Now if this works out, it will expand the Internet and possibly create new untapped potential for malicious code writers. In this case, Lavasoft and all advocates of antispyware will have bigger challenges ahead.
As a sign of the changing times, the Federal Trade Commission has started filing complaints this year against companies that design and offer “spyware”, something that has not escaped unnoticed by the Internet community.

The last in the series of FTC crackdowns against suspect software spreaders is the one against two California-based companies, Enternet Media, Inc. and Conspy & Co. Inc., their Ohio-based affiliate Iwebtunes, and a number of individuals associated with these companies. A U.S. District Court has temporarily halted the operations of the companies, and FTC will seek to bar the practices permanently.

It seems the there is an international consensus amongst local governments and international organizations to take a tougher stance on the fight against spyware.


Continuous vigilance

In summary, protecting privacy is everyone’s own business and it is not a fine art. It is a bar brawl. It is mud wrestling. We have compiled a list of helpful hints to enable you to face the New Year with more confidence.
• Know your enemy . Make sure you understand the difference between computer viruses, spyware, browser hijackers, adware and cookies. Get hints and constant updates from the Lavasoft Research site at
• Stay protected against virus attacks. Viruses do harm your software and data files; spyware does not.
• Stop unauthorized network traffic. Is anybody trying to access your PC? You should know and block those who shouldn’t. What applications are trying to access the Internet from your PC? You should know, and you should know those who shouldn’t. In other words, get a personal firewall to do the job for you.
• Stay protected against spyware. Third in importance, block spyware, adware, Trojans, and what not. Needless to say, this takes an anti- spyware application. In fact, run multiple anti-spyware applications! It might even be a good idea to burn your anti-spyware utility to CD, just in case you get your PC really screwed up.
• Know what you download. Tempted to download free software? Better watch out. You might want to download software from the better known, established sites such as, but if a pop-up ad is sweet-talking you into downloading, turn around and run!
• Backup your files. Regular backups are a must, but how many of us really back up files onto external devices such as network hard drives or CDs?
• Create restore points. If you are using Windows XP, learn how to create restore points.
• Use a secure web browser. Exploits taking advantage of browser vulnerabilities tend to be geared toward Microsoft Internet Explorer with its dominant market share. Users that use unpatched versions are especially vulnerable. One remedy is to change to another browser such as Firefox or Opera.
• Encrypt your e-mail. E-mail is about as safe as a postcard in regular mail. Once sent, an e-mail message passes via a number of servers, each of which can be used to intercept and read the message. Not so if you encrypt your e-mail messages using programs made for this purpose.
• Encrypt your IRC session. Unencrypted IRC traffic is not any safer than unencrypted e-mail traffic. Just like for e-mail, there are encryption programs available for IRC. Get one.


About Lavasoft

Lavasoft, headquartered in Gothenburg, Sweden, is the pioneer and worldwide leader in anti-spyware solutions, providing software and services designed to help secure computer systems at every level from individuals to large corporation.

For further information please visit


Top Ten Signs You've Eaten Too Much at Thanksgiving Dinner

10. Hundreds of volunteers have started to stack sandbags around you.

9. Doctor tells you your weight would be perfect for a man 17 feet tall.

8. You are responsible for a slight but measurable shift in the earth's axis.

7. Right this minute you're laughing up pie on the carpet.

6. You decide to take a little nap and wake up in mid-July.

5. World's fattest man sends you a telegram, warning you to "back off!"

4. CBS tells you to lose weight or else.

3. Getting off your couch requires help from the fire department.

2. Every escalator you step on immediately grinds to a halt.

1. You're sweatin' gravy.

Hope everyone is having a good Thanksgiving!!!

Web News / Noise from your keyboard a security risk
« on: September 21, 2005, 03:49:50 AM »
Keyboard clicks can lead to security hacks

A new security vulnerability has been discovered: the clickety clack of the keyboard.

An audio recording of an individual's typing can be transposed into a transcript of what was typed, according to researchers with the University of California, Berkeley. The technique works because each key makes a distinct sound when hit, and users, who typically type about 300 characters a minute, leave enough time between keystrokes for a computer to isolate the individual sounds.

The researchers were able to take several 10-minute sound recordings of users typing at a keyboard, feed the audio into a computer, and use an algorithm to recover up to 96 percent of the characters entered.

The technique worked when music or cell phone ringing jangled in the background--and even on so-called quiet keyboards with off-the-shelf recording equipment.

While any sort of typed documents could be pilfered through this technique, the study underscores the vulnerability of passwords, said Doug Tygar, a UC Berkeley professor of computer science and information management, and a principal investigator of the study.

"Passwords are a mechanism for authentication that really need to be rethought," he said. "This is not an esoteric attack. It requires some knowledge of computer science, but it can be done using many components that are freely available...We used $10 microphones."

The work builds on research conducted by IBM's Dmitri Asonov and Rakesh Agrawal that showed how 80 percent of text typed could be recovered from keyboard recordings. Those experiments, however, were tightly controlled.

The results of their findings will be presented Nov. 10 at the Association for Computing Machinery Conference in Alexandria, Va.

The UC Berkeley technique relies on probabilistic computing techniques that underlie search engines. The computer categorizes the sound of each key and takes an educated guess about the character or word that was written. The computer uses both the sound of the keystroke and linguistic conventions to interpret a keystroke as an E after TH rather than a Q when the sound is similar--to come to a conclusion.

The first pass is right about 60 percent of the time for characters and 20 percent of the time for entire words. The transcript is then run through spelling and grammar checks, which increased character accuracy to 70 percent and the word accuracy to 50 percent.

The results are then fed back through the computer to refine future results. After three feedback cycles, the accuracy rate rose to 88 percent for words and 96 percent for characters.

Further experiments will take place. The researchers didn't examine what happens when the Shift, Control, Delete or Caps Lock keys are hit. Mouse actions also raise a major problem.

Source of information:

Jokes / Life Before Technology
« on: September 15, 2005, 06:06:08 PM »
Life Before Technology

An application - was for employment.

A program - was a TV show.

A cursor - used profanity.

A keyboard - was a piano!

Memory - was something that you lost with age.

A CD - was a bank account!

And if you had a broken disk, It would hurt when you found out!

Compress was something you did to garbage, Not something you did to a file!

If you unzipped anything in public you'd be in jail for a while!

Log on - was adding wood to a fire.

Hard drive - was a long trip on the road.

A mouse pad - was where a mouse lived.

Cut - you did with a pocket knife.

Paste - you did with glue.

A web was a spider's home.

And a virus was the flu!

LandzDown Lounge / Just Pitching Golf
« on: September 10, 2005, 02:49:23 AM »
Just Pitching Golf

Just a note, this game seems harder than Mini-Putt.

LandzDown Lounge / 3D Frogger
« on: September 10, 2005, 02:20:51 AM »
3D Frogger

Edited to change a broken link.

GR@PH;<'S   :Hammys pint:

LandzDown Lounge / The Hypnotic Experiment
« on: September 07, 2005, 03:30:15 AM »
The Hypnotic Experiment

The Hypnotic Experiment 2

LandzDown Lounge / More Useless Facts
« on: September 01, 2005, 02:27:46 AM »
Funny Useless Facts

111,111,111 x 111,111,111 = 12,345,678,987,654,321

The phrase "rule of thumb" is derived from and old English law which stated that you couldn't beat your wife with anything wider than your thumb.

Stewardesses is the longest word typed with only the left hand.

Shakespeare invented the word "assassination" and "bump."

Marilyn Monroe had six toes on one foot.

If you keep a Goldfish in the dark room, it will eventually turn white.

Women blink nearly twice as much as men.

Right handed people live, on average, nine years longer than left handed people do.

The average chocolate bar has 8 insects' legs in it.

The average human eats 8 spiders in their lifetime at night.

A rhinoceros horn is made of compacted hair.

It is impossible to sneeze with your eyes open.

The giant squid has the largest eyes in the world.

Who's that playing the piano on the "Mad About You" theme? Paul Reiser himself.

In England, the Speaker of the House is not allowed to speak.

The longest one-syllable word in the English language is "screeched."

On a Canadian two dollar bill, the flag flying over the Parliament Building is an American flag.

All of the clocks in the movie Pulp Fiction are stuck on 4:20.

No word in the English language rhymes with month, orange, silver or purple.

"Dreamt" is the only English word that ends in the letters "mt".

All 50 states are listed across the top of the Lincoln Memorial on the back of the $5 bill.

Almonds are members of the peach family.

Winston Churchill was born in a ladies' room during a dance.

Maine is the only state whose name is just one syllable.

The youngest pope was 11 years old.

The world's youngest parents were 8 and 9 and lived in China in 1910.

A snail can sleep for 3 years.

American Airlines saved $40,000 in 1987 by eliminating one olive from each salad served in first-class.
China has more English speakers than the United States.

The shortest war in history was between Zanzibar and England in 1896. Zanzibar surrendered after 38 minutes.

A polar bear's skin is black. Its fur is not white, but actually clear.

Elvis had a twin brother named Garon, who died at birth, which is why Elvis' middle name was spelled Aron; in honor of his brother.

The electric chair was invented by a dentist.

Did you know you share your birthday with at least 9 other million people in the world?

The human heart creates enough pressure when it pumps out to the body to squirt blood 30 feet.

Banging your head against a wall uses 150 calories an hour.

On average, people fear spiders more than they do death.

The strongest muscle in the body is the TONGUE.

"I am." is the shortest complete sentence in the English language.

The longest word in the English language is 1909 letters long and it refers to a distinct part of DNA.

It's impossible to sneeze with your eyes open.

You can't kill yourself by holding your breath.

Americans on the average eat 18 acres of pizza every day.

Every time you lick a stamp, you're consuming 1/10 of a calorie.

You know that you are more likely to be killed by a champagne cork than by a poisonous spider.

The cruise liner, Queen Elizabeth II, moves only six inches for each gallon of diesel that it burns.

There are two credit cards for every person in the United States.

Leonardo Da Vinci invented the scissors.

In the last 4000 years, no new animals have been domesticated.

Babies are born without knee caps. They don't appear until the child reaches 2-6 years of age.

Nutmeg is extremely poisonous if injected intravenously.

The most common name in the world is Mohammed.

Michael Jordan makes more money from Nike annually than all of the Nike factory workers in Malaysia combined.

One of the reasons marijuana is illegal today is because cotton growers in the 30s lobbied against hemp farmers-they saw it as competition.

Only one person in two billion will live to be 116 or older.

The name Wendy was made up for the book "Peter Pan."

If you yelled for 8 years, 7 months and 6 days, you would have produced enough sound energy to heat one cup of coffee. If you fart consistently for 6 years and 9 months, enough gas is produced to create the energy of an atomic bomb.

Our eyes are always the same size from birth, but our nose and ears never stop growing.

In every episode of Seinfeld there is a Superman somewhere.

If Barbie were life-size her measurements would be 39-23-33. She would stand seven feet, two inches tall and have a neck twice the length of a normal human's neck.

The Pentagon, in Arlington, Virginia, has twice as many bathrooms as is necessary. 

There are only four words in the English language which end in "- dous": tremendous, horrendous, stupendous, and hazardous.

Pages: [1] 2 3