Saturday, December 31, 2011

Ethiopia troops enter Somalia, control border town (AP)

NAIROBI, Kenya ? Hundreds of Ethiopian troops poured into a western Somalia border town on Saturday, opening a new front against the militant group al-Shabab, which now faces hostile militaries on three sides.

Resident Mohammed Abdi said hundreds of residents fled Beledweyne on Saturday after hundreds of Ethiopian and Somali troops moved in. Capt. Hashi Nor of the Somali military confirmed that Somali and Ethiopian troops had moved in.

"I saw Ethiopian troops standing at the doors of neighboring homes. Somali soldiers are also searching the homes," Abdi said. "Al-Shabab retreated back to Bulo Burte and also many of the residents fled, and those who remained are in their homes."

The military movement appears to be a third front against al-Shabab, Somalia's strongest militant group. Kenyan troops moved into Somalia in mid-October in a push against the militants in the country's south. African Union troops from Uganda, Burundi and most recently from Djibouti have mostly pushed al-Shabab fighters out of the capital, Mogadishu.

"We are in full control of Beledweyne now and our troops will move forward in the coming hours," Nor, the Somali military officer, said by phone from Beledweyne.

Abdi said the sound of gunfire could be heard in Beledweyne but that he did not believe actual battle was taking place. However, al-Shabab on its official Twitter feed said that a battle that began at 6 a.m. was still "raging" in the city as of midday.

Al-Shabab said that a "majority" of Beledweyne residents joined al-Shabab "to thwart the offensive." It claimed that dozens of Ethiopian troops had been killed, but that was impossible to verify and was likely an exaggerated claim. It later said on Twitter that al-Shabab was executing a planned withdrawal and would surround the city.

Somali Prime Minister Abdiweli Mohamed Ali said in a statement that Somalia's armed forces had taken over "strategic places" from al-Shabab in the central region of Hiran on Saturday. He did not make direct mention of involvement by Ethiopian troops.

"We are officially requesting the international community and the neighboring countries like Ethiopia to stand on our shoulders and help the Somali people and their government for the historic operation to liberate the country from this brutal terror group," he said. "We are also asking the humanitarian aid agencies to reach and help people living in the areas liberated from al-Shabab."

U.S.-backed Ethiopian troops moved into Somalia in 2006 at the invitation of the weak, U.N.-backed Somali government. But the incursion was seen by many Somalis as an unpopular invasion and actually helped give birth to the al-Shabab movement. Ethiopians pulled out in early 2009, and there are fears that a new push by Somalia could be a propaganda coup for al-Shabab.

Ethiopia in November said it was considering whether to contribute troops to the African Union force in Somalia. Kenya's parliament recently voted for its forces to join the AU force. That move is awaiting approval by the United Nations.

The central Somalia town of Beledweyne lies about 20 miles (30 kilometers) from the border with Ethiopia. A commercial hub, it lies on a key road that links Mogadishu with northern Somalia. Control of the town has changed hands frequently in recent months as different militias push to seize control of it.

___

A Somali employee of The Associated Press contributed to this report.

Source: http://us.rd.yahoo.com/dailynews/rss/africa/*http%3A//news.yahoo.com/s/ap/20111231/ap_on_re_af/af_somalia_ethiopia

rick perry v tech the three stooges top model all stars americas next top model mark buehrle mark buehrle

Romney tries to come across as a man of the people (Star Tribune)

Share With Friends: Share on FacebookTweet ThisPost to Google-BuzzSend on GmailPost to Linked-InSubscribe to This Feed | Rss To Twitter | Politics - Top Stories News, RSS and RSS Feed via Feedzilla.

Source: http://news.feedzilla.com/en_us/stories/politics/top-stories/180903485?client_source=feed&format=rss

mumia uss arizona memorial uss arizona memorial d day fun. words with friends words with friends

Friday, December 30, 2011

'Doomsday' minister mum on 2012 forecast

The year 2011 has flown by without a hitch ? or, at least, without Earth bursting into flames. Radio evangelist Harold Camping's famous pair of prophecies ? his prediction that true Christians would be safely evacuated to heaven on May 21, and that a series of global cataclysms would then climax in a grand, Earth-shattering finale on Oct. 21 ? seem to have flopped.

Yes, it looks as if we'll make it to 2012 after all. But what then?

Camping himself doesn't have much to say on the subject. After the crash-and-burn of his Oct. 21 endtimes prediction , the 90-year-old minister retired from Family Radio Network ? the Christian talk show he co-founded in 1958 ? and stepped away from the limelight. According to Susan Espinoza, a Family Radio spokeswoman, Camping "is not predicting any new dates for the end of the world."

Espinoza explained that Camping had been certain of the accuracy of his 2011 prophecies. "He believed the Bible taught very definitely that the Rapture would occur on May 21, 2011 , and the end of the world on October 21. Because that did not happen, he is rethinking what God is teaching us about those dates, and what we should be doing now," she told Life's Little Mysteries.

"He does not feel inclined to search for any new dates." [Doomsday Facts (or Fictions )]

One thing is guaranteed, however: Camping will not be jumping on the bandwagon with people who believe the world will end on Dec. 21, 2012 ? the date that supposedly marks the end of the Mayan calendar cycle. "Mr. Camping does not believe the Mayan calendar holds any significance at all," Espinoza said in an email.

Follow Life's Little Mysteries on Twitter @llmysteries, then join us on Facebook.

? 2011 LifesLittleMysteries.com. All rights reserved. More from LifesLittleMysteries.com.

Source: http://www.msnbc.msn.com/id/45810280/ns/technology_and_science/

conjoined twins justin bieber paternity justin bieber paternity denver news kym johnson how old is justin bieber how old is justin bieber

Google Redirect + TCP/IP Ping

OTL.Txt:

OTL logfile created on: 12/28/2011 12:27:17 AM - Run 1
OTL by OldTimer - Version 3.2.31.0 Folder = C:\Users\Don\Desktop
64bit-Windows Vista Home Premium Edition Service Pack 2 (Version = 6.0.6002) - Type = NTWorkstation
Internet Explorer (Version = 9.0.8112.16421)
Locale: 00000409 | Country: United States | Language: ENU | Date Format: M/d/yyyy

5.99 Gb Total Physical Memory | 3.70 Gb Available Physical Memory | 61.79% Memory free
12.17 Gb Paging File | 9.61 Gb Available in Paging File | 78.90% Paging File free
Paging file location(s): ?:\pagefile.sys [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\Windows | %ProgramFiles% = C:\Program Files (x86)
Drive C: | 450.68 Gb Total Space | 255.78 Gb Free Space | 56.75% Space Free | Partition Type: NTFS
Drive D: | 15.00 Gb Total Space | 5.71 Gb Free Space | 38.04% Space Free | Partition Type: NTFS

Computer Name: DON-PC | User Name: Don | Logged in as Administrator.
Boot Mode: Normal | Scan Mode: Current user | Include 64bit Scans
Company Name Whitelist: Off | Skip Microsoft Files: Off | No Company Name Whitelist: On | File Age = 30 Days

========== Processes (SafeList) ==========

PRC - C:\Users\Don\Desktop\OTL.exe (OldTimer Tools)
PRC - C:\Program Files (x86)\Microsoft\BingBar\SeaPort.EXE (Microsoft Corporation)
PRC - C:\Windows\SysWOW64\Macromed\Flash\FlashUtil10t_ActiveX.exe (Adobe Systems, Inc.)
PRC - C:\Program Files (x86)\Dell Support Center\gs_agent\dsc.exe (SupportSoft, Inc.)
PRC - C:\Program Files (x86)\Dell Support Center\bin\sprtsvc.exe (SupportSoft, Inc.)
PRC - C:\Program Files (x86)\Dell Support Center\bin\sprtcmd.exe (SupportSoft, Inc.)
PRC - C:\Program Files (x86)\Dell DataSafe Local Backup\SftService.exe (SoftThinks)
PRC - C:\Windows\SysWOW64\wbem\WmiPrvSE.exe (Microsoft Corporation)
PRC - C:\Program Files\CyberLink\PowerDVD DX\PDVDDXSrv.exe (CyberLink Corp.)
PRC - C:\Program Files (x86)\Dell Webcam\Dell Webcam Central\WebcamDell2.exe (Creative Technology Ltd)
PRC - C:\Program Files\Dell\DellDock\DockLogin.exe (Stardock Corporation)
PRC - C:\Windows\SysWOW64\PING.EXE (Microsoft Corporation)

========== Modules (No Company Name) ==========

MOD - C:\Users\Don\AppData\Local\tapiMapdll32\HandlerobjHelper.dll ()
MOD - C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\c1c06a392871267db27f7cbc40e1c4fb\System.Xml.ni.dll ()
MOD - C:\Windows\assembly\NativeImages_v2.0.50727_32\System\f9c36ea806e77872dce891c77b68fac3\System.ni.dll ()
MOD - C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\b6632a8b2f276a8e31f5b0f6b2006cd1\mscorlib.ni.dll ()
MOD - \\?\globalroot\systemroot\syswow64\mswsock.dll ()
MOD - \\.\globalroot\systemroot\syswow64\mswsock.dll ()

========== Win32 Services (SafeList) ==========

SRV:64bit: - (McODS) -- C:\Program Files\McAfee\VirusScan\mcods.exe (McAfee, Inc.)
SRV:64bit: - (mfefire) -- C:\Program Files\Common Files\McAfee\SystemCore\mfefire.exe (McAfee, Inc.)
SRV:64bit: - (McShield) -- C:\Program Files\Common Files\McAfee\SystemCore\\mcshield.exe ()
SRV:64bit: - (mfevtp) -- C:\Windows\SysNative\mfevtps.exe (McAfee, Inc.)
SRV:64bit: - (MSK80Service) -- C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe (McAfee, Inc.)
SRV:64bit: - (McProxy) -- C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe (McAfee, Inc.)
SRV:64bit: - (McNASvc) -- C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe (McAfee, Inc.)
SRV:64bit: - (McNaiAnn) -- C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe (McAfee, Inc.)
SRV:64bit: - (mcmscsvc) -- C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe (McAfee, Inc.)
SRV:64bit: - (McMPFSvc) -- C:\Program Files\Common Files\McAfee\McSvcHost\McSvHost.exe (McAfee, Inc.)
SRV:64bit: - (Ati External Event Utility) -- C:\Windows\SysNative\Ati2evxx.exe (ATI Technologies Inc.)
SRV:64bit: - (STacSV) -- C:\Windows\SysNative\DriverStore\FileRepository\stwrt64.inf_15f4e438\STacSV64.exe (IDT, Inc.)
SRV:64bit: - (AESTFilters) -- C:\Windows\SysNative\DriverStore\FileRepository\stwrt64.inf_15f4e438\AESTSr64.exe (Andrea Electronics Corporation)
SRV:64bit: - (DockLoginService) -- C:\Program Files\Dell\DellDock\DockLogin.exe (Stardock Corporation)
SRV - (Steam Client Service) -- C:\Program Files (x86)\Common Files\Steam\SteamService.exe (Valve Corporation)
SRV - (BBSvc) -- C:\Program Files (x86)\Microsoft\BingBar\BBSvc.EXE (Microsoft Corporation.)
SRV - (BBUpdate) -- C:\Program Files (x86)\Microsoft\BingBar\SeaPort.EXE (Microsoft Corporation)
SRV - (clr_optimization_v4.0.30319_32) -- C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe (Microsoft Corporation)
SRV - (sprtsvc_DellSupportCenter) SupportSoft Sprocket Service (DellSupportCenter) -- C:\Program Files (x86)\Dell Support Center\bin\sprtsvc.exe (SupportSoft, Inc.)
SRV - (SftService) -- C:\Program Files (x86)\Dell DataSafe Local Backup\sftservice.EXE (SoftThinks)
SRV - (clr_optimization_v2.0.50727_32) -- C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe (Microsoft Corporation)
SRV - (SBSDWSCService) -- C:\Program Files (x86)\Spybot - Search & Destroy\SDWinSec.exe (Safer Networking Ltd.)

========== Driver Services (SafeList) ==========

DRV:64bit: - (mfehidk) -- C:\Windows\SysNative\drivers\mfehidk.sys (McAfee, Inc.)
DRV:64bit: - (mfefirek) -- C:\Windows\SysNative\drivers\mfefirek.sys (McAfee, Inc.)
DRV:64bit: - (mfewfpk) -- C:\Windows\SysNative\drivers\mfewfpk.sys (McAfee, Inc.)
DRV:64bit: - (mfeavfk) -- C:\Windows\SysNative\drivers\mfeavfk.sys (McAfee, Inc.)
DRV:64bit: - (mfeapfk) -- C:\Windows\SysNative\drivers\mfeapfk.sys (McAfee, Inc.)
DRV:64bit: - (mferkdet) -- C:\Windows\SysNative\drivers\mferkdet.sys (McAfee, Inc.)
DRV:64bit: - (mfenlfk) -- C:\Windows\SysNative\DRIVERS\mfenlfk.sys (McAfee, Inc.)
DRV:64bit: - (cfwids) -- C:\Windows\SysNative\drivers\cfwids.sys (McAfee, Inc.)
DRV:64bit: - (R300) -- C:\Windows\SysNative\DRIVERS\atikmdag.sys (ATI Technologies Inc.)
DRV:64bit: - (atikmdag) -- C:\Windows\SysNative\DRIVERS\atikmdag.sys (ATI Technologies Inc.)
DRV:64bit: - (ApfiltrService) -- C:\Windows\SysNative\DRIVERS\Apfiltr.sys (Alps Electric Co., Ltd.)
DRV:64bit: - (sdbus) -- C:\Windows\SysNative\DRIVERS\sdbus.sys (Microsoft Corporation)
DRV:64bit: - (STHDA) -- C:\Windows\SysNative\DRIVERS\stwrt64.sys (IDT, Inc.)
DRV:64bit: - (OA001Vid) -- C:\Windows\SysNative\DRIVERS\OA001Vid.sys (Creative Technology Ltd.)
DRV:64bit: - (OA001Ufd) -- C:\Windows\SysNative\DRIVERS\OA001Ufd.sys (Creative Technology Ltd.)
DRV:64bit: - (CtClsFlt) -- C:\Windows\SysNative\DRIVERS\CtClsFlt.sys (Creative Technology Ltd.)
DRV:64bit: - (NETw5v64) Intel? -- C:\Windows\SysNative\DRIVERS\NETw5v64.sys (Intel Corporation)
DRV:64bit: - (itecir) -- C:\Windows\SysNative\DRIVERS\itecir.sys (ITE Tech. Inc. )
DRV:64bit: - (rismxdp) -- C:\Windows\SysNative\DRIVERS\rixdpx64.sys (REDC)
DRV:64bit: - (rimmptsk) -- C:\Windows\SysNative\DRIVERS\rimmpx64.sys (REDC)
DRV:64bit: - (rimsptsk) -- C:\Windows\SysNative\DRIVERS\rimspx64.sys (REDC)
DRV:64bit: - (k57nd60a) Broadcom NetLink ? -- C:\Windows\SysNative\DRIVERS\k57nd60a.sys (Broadcom Corporation)
DRV:64bit: - (e1express) Intel? -- C:\Windows\SysNative\DRIVERS\e1e6032e.sys (Intel Corporation)
DRV:64bit: - (PxHlpa64) -- C:\Windows\SysNative\Drivers\PxHlpa64.sys (Sonic Solutions)
DRV - (SASDIFSV) -- C:\Users\Don\AppData\Local\Temp\SAS_SelfExtract\sasdifsv64.sys (SUPERAdBlocker.com and SUPERAntiSpyware.com)
DRV - (SASKUTIL) -- C:\Users\Don\AppData\Local\Temp\SAS_SelfExtract\saskutil64.sys (SUPERAdBlocker.com and SUPERAntiSpyware.com)

========== Standard Registry (SafeList) ==========

========== Internet Explorer ==========

IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\SysWOW64\blank.htm

IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Page_URL = http://g.msn.com/USCON/1
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = http://g.msn.com/USCON/1
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,StartPageCache = 1
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,XMLHTTP_UUID_Default = D6 E3 8A 0C B9 26 39 44 B5 A9 2B 57 37 34 85 1F [binary data]
IE - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0

========== FireFox ==========

FF - prefs.js..extensions.enabledItems: calendar-timezones@mozilla.org:0.1.2008d
FF - prefs.js..extensions.enabledItems: inspector@mozilla.org:2.0.0

FF - HKLM\Software\MozillaPlugins\@java.com/JavaPlugin: C:\Program Files (x86)\Java\jre6\bin\new_plugin\npjp2.dll (Sun Microsystems, Inc.)
FF - HKLM\Software\MozillaPlugins\@Microsoft.com/NpCtrl,version=1.0: c:\Program Files (x86)\Microsoft Silverlight\4.0.60831.0\npctrl.dll ( Microsoft Corporation)
FF - HKLM\Software\MozillaPlugins\@microsoft.com/WLPG,version=14.0.8051.1204: C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll (Microsoft Corporation)
FF - HKLM\Software\MozillaPlugins\@microsoft.com/WPF,version=3.5: c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\NPWPF.dll (Microsoft Corporation)
FF - HKLM\Software\MozillaPlugins\Adobe Reader: C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\nppdf32.dll (Adobe Systems Inc.)
FF - HKCU\Software\MozillaPlugins\@talk.google.com/GoogleTalkPlugin: C:\Users\Don\AppData\Roaming\Mozilla\plugins\npgoogletalk.dll (Google)
FF - HKCU\Software\MozillaPlugins\@talk.google.com/O3DPlugin: C:\Users\Don\AppData\Roaming\Mozilla\plugins\npgtpo3dautoplugin.dll ()
FF - HKCU\Software\MozillaPlugins\@tools.google.com/Google Update;version=3: C:\Users\Don\AppData\Local\Google\Update\1.3.21.79\npGoogleUpdate3.dll (Google Inc.)
FF - HKCU\Software\MozillaPlugins\@tools.google.com/Google Update;version=9: C:\Users\Don\AppData\Local\Google\Update\1.3.21.79\npGoogleUpdate3.dll (Google Inc.)

[2009/10/10 13:06:49 | 000,000,000 | ---D | M] (No name found) -- C:\Users\Don\AppData\Roaming\Mozilla\Extensions
[2009/10/10 13:06:49 | 000,000,000 | ---D | M] (No name found) -- C:\Users\Don\AppData\Roaming\Mozilla\Extensions\celtx@celtx.com
[2009/10/10 13:06:19 | 000,000,000 | ---D | M] (Timezone Definitions for Mozilla Calendar) -- C:\PROGRAM FILES (X86)\CELTX\EXTENSIONS\CALENDAR-TIMEZONES@MOZILLA.ORG
[2009/10/10 13:06:21 | 000,000,000 | ---D | M] (DOM Inspector) -- C:\PROGRAM FILES (X86)\CELTX\EXTENSIONS\INSPECTOR@MOZILLA.ORG

========== Chrome ==========

CHR - default_search_provider: Bing (Enabled)
CHR - default_search_provider: search_url = http://www.bing.com/search?setmkt=en-US&q={searchTerms}
CHR - default_search_provider: suggest_url = http://api.bing.com/osjson.aspx?query={sea...uage={language}
CHR - plugin: Shockwave Flash (Enabled) = C:\Users\Don\AppData\Local\Google\Chrome\Application\14.0.835.202\gcswf32.dll
CHR - plugin: QuickTime Plug-in 7.6.8 (Enabled) = C:\Program Files (x86)\QuickTime\plugins\npqtplugin.dll
CHR - plugin: QuickTime Plug-in 7.6.8 (Enabled) = C:\Program Files (x86)\QuickTime\plugins\npqtplugin2.dll
CHR - plugin: QuickTime Plug-in 7.6.8 (Enabled) = C:\Program Files (x86)\QuickTime\plugins\npqtplugin3.dll
CHR - plugin: QuickTime Plug-in 7.6.8 (Enabled) = C:\Program Files (x86)\QuickTime\plugins\npqtplugin4.dll
CHR - plugin: QuickTime Plug-in 7.6.8 (Enabled) = C:\Program Files (x86)\QuickTime\plugins\npqtplugin5.dll
CHR - plugin: QuickTime Plug-in 7.6.8 (Enabled) = C:\Program Files (x86)\QuickTime\plugins\npqtplugin6.dll
CHR - plugin: QuickTime Plug-in 7.6.8 (Enabled) = C:\Program Files (x86)\QuickTime\plugins\npqtplugin7.dll
CHR - plugin: Java Deployment Toolkit 6.0.260.3 (Enabled) = C:\Program Files (x86)\Java\jre6\bin\new_plugin\npdeployJava1.dll
CHR - plugin: Java? Platform SE 6 U26 (Enabled) = C:\Program Files (x86)\Java\jre6\bin\new_plugin\npjp2.dll
CHR - plugin: Adobe Acrobat (Disabled) = C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\nppdf32.dll
CHR - plugin: Silverlight Plug-In (Enabled) = c:\Program Files (x86)\Microsoft Silverlight\4.0.60531.0\npctrl.dll
CHR - plugin: Remoting Viewer (Enabled) = internal-remoting-viewer
CHR - plugin: Native Client (Enabled) = C:\Users\Don\AppData\Local\Google\Chrome\Application\14.0.835.202\ppGoogleNaClPluginChrome.dll
CHR - plugin: Chrome PDF Viewer (Enabled) = C:\Users\Don\AppData\Local\Google\Chrome\Application\14.0.835.202\pdf.dll
CHR - plugin: Google Talk Plugin (Enabled) = C:\Users\Don\AppData\Roaming\Mozilla\plugins\npgoogletalk.dll
CHR - plugin: Google Talk Plugin Video Accelerator (Enabled) = C:\Users\Don\AppData\Roaming\Mozilla\plugins\npgtpo3dautoplugin.dll
CHR - plugin: Windows Live\u00AE Photo Gallery (Enabled) = C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll
CHR - plugin: Google Update (Enabled) = C:\Users\Don\AppData\Local\Google\Update\1.3.21.69\npGoogleUpdate3.dll
CHR - plugin: Windows Presentation Foundation (Enabled) = c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\NPWPF.dll
CHR - plugin: Default Plug-in (Enabled) = default_plugin
CHR - Extension: Entanglement = C:\Users\Don\AppData\Local\Google\Chrome\User Data\Default\Extensions\aciahcmjmecflokailenpkdchphgkefd\2.1.1_0\
CHR - Extension: Entanglement = C:\Users\Don\AppData\Local\Google\Chrome\User Data\Default\Extensions\aciahcmjmecflokailenpkdchphgkefd\2.5.7_0\
CHR - Extension: Poppit = C:\Users\Don\AppData\Local\Google\Chrome\User Data\Default\Extensions\mcbkbpnkkkipelfledbfocopglifcfmi\2.2_0\

Hosts file not found
O2:64bit: - BHO: (scriptproxy) - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - C:\Program Files\Common Files\McAfee\SystemCore\ScriptSn.20111012132917.dll (McAfee, Inc.)
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - No CLSID value found.
O2 - BHO: (scriptproxy) - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - C:\Program Files (x86)\Common Files\McAfee\SystemCore\ScriptSn.20111012132917.dll (McAfee, Inc.)
O2 - BHO: (Skype Browser Helper) - {AE805869-2E5C-4ED4-8F7B-F1F7851A4497} - C:\Program Files (x86)\Skype\Toolbars\Internet Explorer\skypeieplugin.dll (Skype Technologies S.A.)
O2 - BHO: (Bing Bar Helper) - {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - C:\Program Files (x86)\Microsoft\BingBar\BingExt.dll (Microsoft Corporation.)
O3 - HKLM\..\Toolbar: (Bing Bar) - {8dcb7100-df86-4384-8842-8fa844297b3f} - C:\Program Files (x86)\Microsoft\BingBar\BingExt.dll (Microsoft Corporation.)
O3 - HKCU\..\Toolbar\WebBrowser: (no name) - {21FA44EF-376D-4D53-9B0F-8A89D3229068} - No CLSID value found.
O4:64bit: - HKLM..\Run: [Apoint] C:\Program Files\DellTPad\Apoint.exe (Alps Electric Co., Ltd.)
O4:64bit: - HKLM..\Run: [SysTrayApp] C:\Program Files\IDT\WDM\sttray64.exe (IDT, Inc.)
O4 - HKLM..\Run: [Dell DataSafe Online] C:\Program Files (x86)\Dell DataSafe Online\DataSafeOnline.exe ()
O4 - HKLM..\Run: [Dell Webcam Central] C:\Program Files (x86)\Dell Webcam\Dell Webcam Central\WebcamDell2.exe (Creative Technology Ltd)
O4 - HKLM..\Run: [DellSupportCenter] C:\Program Files (x86)\Dell Support Center\bin\sprtcmd.exe (SupportSoft, Inc.)
O4 - HKLM..\Run: [mcui_exe] C:\Program Files\McAfee.com\Agent\mcagent.exe (McAfee, Inc.)
O4 - HKLM..\Run: [PDVDDXSrv] C:\Program Files\CyberLink\PowerDVD DX\PDVDDXSrv.exe (CyberLink Corp.)
O4 - HKLM..\Run: [StartCCC] C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe (Advanced Micro Devices, Inc.)
O4 - HKCU..\Run: [HandlerobjHelper] C:\Users\Don\AppData\Local\tapiMapdll32\HandlerobjHelper.dll ()
O4 - HKCU..\Run: [Stardock] C:\Users\Don\AppData\Local\DataSafeOnline\DataSafeOnlineUpdate\DataSafeOnlineupdt32.dll (Autodesk Inc.)
O4 - HKCU..\Run: [Steam] C:\STEAM\Steam.exe (Valve Corporation)
O4 - HKCU..\Run: [WMPNSCFG] C:\Program Files (x86)\Windows Media Player\WMPNSCFG.exe File not found
O4 - Startup: C:\Users\Don\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dell Dock.lnk = File not found
O4 - Startup: C:\Users\Don\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ImpulseNow.lnk = C:\Program Files (x86)\Stardock\Impulse\Now\ImpulseNow.exe (Stardock Corporation)
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoActiveDesktop = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoActiveDesktopChanges = 1
O9 - Extra Button: Skype Plug-In - {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - C:\Program Files (x86)\Skype\Toolbars\Internet Explorer\skypeieplugin.dll (Skype Technologies S.A.)
O9 - Extra 'Tools' menuitem : Skype Plug-In - {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - C:\Program Files (x86)\Skype\Toolbars\Internet Explorer\skypeieplugin.dll (Skype Technologies S.A.)
O10:64bit: - Protocol_Catalog9\Catalog_Entries64\000000000001 - mmswsock.dll File not found
O10:64bit: - Protocol_Catalog9\Catalog_Entries64\000000000002 - mmswsock.dll File not found
O10:64bit: - Protocol_Catalog9\Catalog_Entries64\000000000003 - mmswsock.dll File not found
O10:64bit: - Protocol_Catalog9\Catalog_Entries64\000000000004 - mmswsock.dll File not found
O10:64bit: - Protocol_Catalog9\Catalog_Entries64\000000000005 - mmswsock.dll File not found
O10:64bit: - Protocol_Catalog9\Catalog_Entries64\000000000006 - mmswsock.dll File not found
O10:64bit: - Protocol_Catalog9\Catalog_Entries64\000000000007 - mmswsock.dll File not found
O10:64bit: - Protocol_Catalog9\Catalog_Entries64\000000000008 - mmswsock.dll File not found
O10:64bit: - Protocol_Catalog9\Catalog_Entries64\000000000009 - mmswsock.dll File not found
O10:64bit: - Protocol_Catalog9\Catalog_Entries64\000000000010 - mmswsock.dll File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000001 - %SystemRoot%\System32\winrnr.dll File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000002 - %SystemRoot%\System32\winrnr.dll File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000003 - %SystemRoot%\System32\winrnr.dll File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000004 - %SystemRoot%\System32\winrnr.dll File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000005 - %SystemRoot%\System32\winrnr.dll File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000006 - %SystemRoot%\System32\winrnr.dll File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000007 - %SystemRoot%\System32\winrnr.dll File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000008 - %SystemRoot%\System32\winrnr.dll File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000009 - %SystemRoot%\System32\winrnr.dll File not found
O10 - Protocol_Catalog9\Catalog_Entries\000000000010 - %SystemRoot%\System32\winrnr.dll File not found
O1364bit: - gopher Prefix: missing
O13 - gopher Prefix: missing
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_13)
O16 - DPF: {CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_13)
O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_13)
O16 - DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} http://appldnld.apple.com.edgesuite.net/co...ex/qtplugin.cab (QuickTime Object)
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_26)
O16 - DPF: {CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA} Reg Error: Value error. (Java Plug-in 1.6.0_13)
O16 - DPF: {CAFEEFAC-0016-0000-0026-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_26)
O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-...indows-i586.cab (Java Plug-in 1.6.0_26)
O16 - DPF: {CF84DAC5-A4F5-419E-A0BA-C01FFD71112F} http://content.systemrequirementslab.com.s...el_4.4.24.0.cab (SysInfo Class)
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} http://fpdownload2.macromedia.com/get/shoc...ash/swflash.cab (Shockwave Flash Object)
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab (Reg Error: Key error.)
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 192.168.1.254
O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{94817593-74A8-481A-987B-EE348E02F746}: DhcpNameServer = 192.168.15.1
O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{A27A0950-6B05-4217-920C-01893AB7E4DB}: DhcpNameServer = 192.168.1.254
O18:64bit: - Protocol\Handler\livecall - No CLSID value found
O18:64bit: - Protocol\Handler\ms-help - No CLSID value found
O18:64bit: - Protocol\Handler\msnim - No CLSID value found
O18:64bit: - Protocol\Handler\skype-ie-addon-data - No CLSID value found
O18:64bit: - Protocol\Handler\wlmailhtml - No CLSID value found
O18:64bit: - Protocol\Handler\x-mem1 - No CLSID value found
O18 - Protocol\Handler\skype-ie-addon-data {91774881-D725-4E58-B298-07617B9B86A8} - C:\Program Files (x86)\Skype\Toolbars\Internet Explorer\skypeieplugin.dll (Skype Technologies S.A.)
O18 - Protocol\Handler\x-mem1 {C3719F83-7EF8-4BA0-89B0-3360C7AFB7CC} - C:\Matrix Games\PureSim Baseball 2007\wowctl2.dll (EzTools Software)
O20:64bit: - HKLM Winlogon: Shell - (explorer.exe) - C:\Windows\explorer.exe (Microsoft Corporation)
O20:64bit: - HKLM Winlogon: UserInit - (C:\Windows\system32\userinit.exe) - C:\Windows\SysNative\userinit.exe (Microsoft Corporation)
O20 - HKLM Winlogon: Shell - (explorer.exe) -C:\Windows\SysWow64\explorer.exe (Microsoft Corporation)
O20 - HKLM Winlogon: UserInit - (userinit.exe) -C:\Windows\SysWow64\userinit.exe (Microsoft Corporation)
O20:64bit: - Winlogon\Notify\GoToAssist: DllName - (C:\Program Files (x86)\Citrix\GoToAssist\514\G2AWinLogon_x64.dll) - File not found
O24 - Desktop WallPaper: C:\Windows\Web\Wallpaper\img24.jpg
O24 - Desktop BackupWallPaper: C:\Windows\Web\Wallpaper\img24.jpg
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2004/04/30 17:01:00 | 000,000,053 | -HS- | M] () - D:\AUTORUN.INF -- [ NTFS ]
O33 - MountPoints2\{d159cc56-4b29-11e0-aabc-002219f27ed2}\Shell - "" = AutoRun
O33 - MountPoints2\{d159cc56-4b29-11e0-aabc-002219f27ed2}\Shell\AutoRun\command - "" = G:\LaunchU3.exe -a
O34 - HKLM BootExecute: (autocheck autochk *)
O35:64bit: - HKLM\..comfile [open] -- "%1" %*
O35:64bit: - HKLM\..exefile [open] -- "%1" %*
O35 - HKLM\..comfile [open] -- "%1" %*
O35 - HKLM\..exefile [open] -- "%1" %*
O37:64bit: - HKLM\...com [@ = comfile] -- "%1" %*
O37:64bit: - HKLM\...exe [@ = exefile] -- "%1" %*
O37 - HKLM\...com [@ = comfile] -- "%1" %*
O37 - HKLM\...exe [@ = exefile] -- "%1" %*
O37 - HKCU\...exe [@ = exefile] -- Reg Error: Key error. File not found

Drivers32:64bit: msacm.l3acm - C:\Windows\System32\l3codeca.acm (Fraunhofer Institut Integrierte Schaltungen IIS)
Drivers32: msacm.l3acm - C:\Windows\SysWOW64\l3codeca.acm (Fraunhofer Institut Integrierte Schaltungen IIS)
Drivers32: msacm.l3codec - C:\Windows\SysWow64\l3codecp.acm (Fraunhofer Institut Integrierte Schaltungen IIS)
Drivers32: vidc.cvid - C:\Windows\SysWow64\iccvid.dll (Radius Inc.)
Drivers32: vidc.XVID - C:\Windows\SysWow64\xvidvfw.dll ()

CREATERESTOREPOINT
Restore point Set: OTL Restore Point

========== Files/Folders - Created Within 30 Days ==========

[2011/12/28 00:25:39 | 000,584,192 | ---- | C] (OldTimer Tools) -- C:\Users\Don\Desktop\OTL.exe
[2011/12/27 01:12:40 | 000,000,000 | ---D | C] -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\McAfee
[2011/12/23 15:16:24 | 000,000,000 | ---D | C] -- C:\Users\Don\AppData\Local\SWTOR
[2011/12/23 15:16:22 | 000,000,000 | ---D | C] -- C:\Users\Don\Documents\HeroBlade Logs
[2011/12/23 14:46:13 | 000,000,000 | ---D | C] -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\EA
[2011/12/23 14:01:40 | 000,000,000 | ---D | C] -- C:\Program Files (x86)\Electronic Arts
[2011/12/23 14:01:40 | 000,000,000 | ---D | C] -- C:\Program Files (x86)\Common Files\BioWare
[2011/12/19 14:28:58 | 000,000,000 | ---D | C] -- C:\Users\Don\AppData\Local\tapiMapdll32
[2011/12/18 01:22:32 | 000,000,000 | ---D | C] -- C:\Users\Don\AppData\Roaming\SUPERAntiSpyware.com
[2011/12/17 01:59:46 | 000,000,000 | ---D | C] -- C:\Windows\system64
[2011/12/15 01:44:43 | 000,096,256 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysNative\mshtmled.dll
[2011/12/15 01:44:43 | 000,072,704 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysWow64\mshtmled.dll
[2011/12/15 01:44:41 | 000,248,320 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysNative\ieui.dll
[2011/12/15 01:44:41 | 000,237,056 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysNative\url.dll
[2011/12/15 01:44:41 | 000,231,936 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysWow64\url.dll
[2011/12/15 01:44:41 | 000,176,640 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysWow64\ieui.dll
[2011/12/15 01:44:40 | 001,493,504 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysNative\inetcpl.cpl
[2011/12/15 01:44:40 | 001,427,456 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysWow64\inetcpl.cpl
[2011/12/15 01:44:39 | 002,309,120 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysNative\jscript9.dll
[2011/12/15 01:44:39 | 000,818,688 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysNative\jscript.dll
[2011/12/15 01:44:39 | 000,716,800 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysWow64\jscript.dll
[2011/12/14 22:23:21 | 000,085,504 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysNative\csrsrv.dll
[2011/12/14 22:23:14 | 000,559,616 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysNative\EncDec.dll
[2011/12/14 22:23:14 | 000,429,056 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysWow64\EncDec.dll
[1 C:\Users\Don\Documents\*.tmp files -> C:\Users\Don\Documents\*.tmp -> ]
[1 C:\Users\Don\Desktop\*.tmp files -> C:\Users\Don\Desktop\*.tmp -> ]

========== Files - Modified Within 30 Days ==========

[2011/12/28 00:35:16 | 000,000,900 | ---- | M] () -- C:\Windows\tasks\GoogleUpdateTaskUserS-1-5-21-2785736246-1828795547-2981138639-1000UA.job
[2011/12/28 00:35:07 | 000,000,848 | ---- | M] () -- C:\Windows\tasks\GoogleUpdateTaskUserS-1-5-21-2785736246-1828795547-2981138639-1000Core.job
[2011/12/28 00:25:40 | 000,584,192 | ---- | M] (OldTimer Tools) -- C:\Users\Don\Desktop\OTL.exe
[2011/12/28 00:22:40 | 000,000,348 | ---- | M] () -- C:\Windows\tasks\At48.job
[2011/12/28 00:22:40 | 000,000,348 | ---- | M] () -- C:\Windows\tasks\At46.job
[2011/12/28 00:22:40 | 000,000,348 | ---- | M] () -- C:\Windows\tasks\At44.job
[2011/12/28 00:22:40 | 000,000,348 | ---- | M] () -- C:\Windows\tasks\At42.job
[2011/12/28 00:22:40 | 000,000,348 | ---- | M] () -- C:\Windows\tasks\At40.job
[2011/12/28 00:22:40 | 000,000,348 | ---- | M] () -- C:\Windows\tasks\At38.job
[2011/12/28 00:22:40 | 000,000,348 | ---- | M] () -- C:\Windows\tasks\At36.job
[2011/12/28 00:22:40 | 000,000,348 | ---- | M] () -- C:\Windows\tasks\At34.job
[2011/12/28 00:22:40 | 000,000,346 | ---- | M] () -- C:\Windows\tasks\At47.job
[2011/12/28 00:22:40 | 000,000,346 | ---- | M] () -- C:\Windows\tasks\At45.job
[2011/12/28 00:22:40 | 000,000,346 | ---- | M] () -- C:\Windows\tasks\At43.job
[2011/12/28 00:22:40 | 000,000,346 | ---- | M] () -- C:\Windows\tasks\At41.job
[2011/12/28 00:22:40 | 000,000,346 | ---- | M] () -- C:\Windows\tasks\At39.job
[2011/12/28 00:22:40 | 000,000,346 | ---- | M] () -- C:\Windows\tasks\At37.job
[2011/12/28 00:22:40 | 000,000,346 | ---- | M] () -- C:\Windows\tasks\At35.job
[2011/12/28 00:22:40 | 000,000,346 | ---- | M] () -- C:\Windows\tasks\At33.job
[2011/12/28 00:22:07 | 000,067,584 | --S- | M] () -- C:\Windows\bootstat.dat
[2011/12/27 16:48:36 | 000,000,348 | ---- | M] () -- C:\Windows\tasks\At32.job
[2011/12/27 16:48:36 | 000,000,348 | ---- | M] () -- C:\Windows\tasks\At30.job
[2011/12/27 16:48:36 | 000,000,346 | ---- | M] () -- C:\Windows\tasks\At31.job
[2011/12/27 16:48:36 | 000,000,346 | ---- | M] () -- C:\Windows\tasks\At29.job
[2011/12/27 13:57:59 | 000,000,348 | ---- | M] () -- C:\Windows\tasks\At28.job
[2011/12/27 13:57:59 | 000,000,346 | ---- | M] () -- C:\Windows\tasks\At27.job
[2011/12/27 13:25:07 | 000,003,616 | -H-- | M] () -- C:\Windows\SysNative\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0
[2011/12/27 13:25:07 | 000,003,616 | -H-- | M] () -- C:\Windows\SysNative\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0
[2011/12/27 13:14:04 | 000,192,865 | ---- | M] () -- C:\Users\Don\Documents\Master of Stones - Full.fdx
[2011/12/27 12:58:00 | 000,000,348 | ---- | M] () -- C:\Windows\tasks\At26.job
[2011/12/27 12:58:00 | 000,000,346 | ---- | M] () -- C:\Windows\tasks\At25.job
[2011/12/27 11:58:00 | 000,000,348 | ---- | M] () -- C:\Windows\tasks\At24.job
[2011/12/27 11:58:00 | 000,000,346 | ---- | M] () -- C:\Windows\tasks\At23.job
[2011/12/27 11:25:14 | 000,000,348 | ---- | M] () -- C:\Windows\tasks\At22.job
[2011/12/27 11:25:14 | 000,000,348 | ---- | M] () -- C:\Windows\tasks\At20.job
[2011/12/27 11:25:14 | 000,000,348 | ---- | M] () -- C:\Windows\tasks\At18.job
[2011/12/27 11:25:14 | 000,000,348 | ---- | M] () -- C:\Windows\tasks\At16.job
[2011/12/27 11:25:14 | 000,000,348 | ---- | M] () -- C:\Windows\tasks\At14.job
[2011/12/27 11:25:14 | 000,000,348 | ---- | M] () -- C:\Windows\tasks\At12.job
[2011/12/27 11:25:14 | 000,000,348 | ---- | M] () -- C:\Windows\tasks\At10.job
[2011/12/27 11:25:14 | 000,000,346 | ---- | M] () -- C:\Windows\tasks\At9.job
[2011/12/27 11:25:14 | 000,000,346 | ---- | M] () -- C:\Windows\tasks\At21.job
[2011/12/27 11:25:14 | 000,000,346 | ---- | M] () -- C:\Windows\tasks\At19.job
[2011/12/27 11:25:14 | 000,000,346 | ---- | M] () -- C:\Windows\tasks\At17.job
[2011/12/27 11:25:14 | 000,000,346 | ---- | M] () -- C:\Windows\tasks\At15.job
[2011/12/27 11:25:14 | 000,000,346 | ---- | M] () -- C:\Windows\tasks\At13.job
[2011/12/27 11:25:14 | 000,000,346 | ---- | M] () -- C:\Windows\tasks\At11.job
[2011/12/27 03:58:00 | 000,000,348 | ---- | M] () -- C:\Windows\tasks\At8.job
[2011/12/27 03:58:00 | 000,000,346 | ---- | M] () -- C:\Windows\tasks\At7.job
[2011/12/27 02:58:00 | 000,000,348 | ---- | M] () -- C:\Windows\tasks\At6.job
[2011/12/27 02:58:00 | 000,000,346 | ---- | M] () -- C:\Windows\tasks\At5.job
[2011/12/27 01:58:00 | 000,000,348 | ---- | M] () -- C:\Windows\tasks\At4.job
[2011/12/27 01:58:00 | 000,000,346 | ---- | M] () -- C:\Windows\tasks\At3.job
[2011/12/27 01:15:04 | 000,703,388 | ---- | M] () -- C:\Windows\SysNative\PerfStringBackup.INI
[2011/12/27 01:15:04 | 000,604,502 | ---- | M] () -- C:\Windows\SysNative\perfh009.dat
[2011/12/27 01:15:04 | 000,104,170 | ---- | M] () -- C:\Windows\SysNative\perfc009.dat
[2011/12/27 01:08:23 | 2142,130,175 | -HS- | M] () -- C:\hiberfil.sys
[2011/12/27 00:58:00 | 000,000,348 | ---- | M] () -- C:\Windows\tasks\At2.job
[2011/12/27 00:58:00 | 000,000,346 | ---- | M] () -- C:\Windows\tasks\At1.job
[2011/12/26 23:36:41 | 000,088,064 | ---- | M] () -- C:\Users\Don\AppData\Local\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
[2011/12/24 13:27:05 | 000,000,000 | ---- | M] () -- C:\ProgramData\4ScS50I.dat
[2011/12/24 13:25:53 | 000,029,184 | ---- | M] () -- C:\Windows\SysWow64\ew6Yy3.com
[2011/12/23 14:48:28 | 000,001,282 | ---- | M] () -- C:\Users\Public\Desktop\Star Wars - The Old Republic.lnk
[2011/12/18 23:03:30 | 000,154,374 | ---- | M] () -- C:\Users\Don\Documents\Master of Stones - Full.pdf
[2011/12/17 22:58:51 | 000,002,556 | -HS- | M] () -- C:\Users\Don\AppData\Local\rljpre3t3lkp4gxq3pvr3x844p3r
[2011/12/17 22:58:51 | 000,002,556 | -HS- | M] () -- C:\ProgramData\rljpre3t3lkp4gxq3pvr3x844p3r
[2011/12/15 11:39:17 | 000,272,672 | ---- | M] () -- C:\Windows\SysNative\FNTCACHE.DAT
[2011/12/13 22:37:29 | 000,002,034 | ---- | M] () -- C:\Users\Don\Desktop\Google Chrome.lnk
[2011/12/13 22:37:29 | 000,001,996 | ---- | M] () -- C:\Users\Don\Application Data\Microsoft\Internet Explorer\Quick Launch\Google Chrome.lnk
[2011/12/06 13:32:37 | 000,105,381 | ---- | M] () -- C:\Users\Don\Documents\Cookie Police.pdf
[2011/12/06 13:32:32 | 000,063,920 | ---- | M] () -- C:\Users\Don\Documents\Cookie Police.fdx
[2011/12/02 12:13:16 | 000,049,411 | ---- | M] () -- C:\Users\Don\Documents\Trailer - Shack and Exterior bits.pdf
[2011/12/02 12:12:38 | 000,051,150 | ---- | M] () -- C:\Users\Don\Documents\Trailer - Shack and Exterior bits.fdx
[2011/12/02 11:32:52 | 000,100,943 | ---- | M] () -- C:\Users\Don\Documents\Trailer - Apartment bits.pdf
[2011/12/02 11:30:48 | 000,055,800 | ---- | M] () -- C:\Users\Don\Documents\Trailer - Apartment bits.fdx
[2011/12/01 15:05:37 | 000,049,097 | ---- | M] () -- C:\Users\Don\Documents\Audition Scene 2 - Rick, Johnny, and Emerald.fdx
[2 C:\Users\Don\Documents\*.tmp files -> C:\Users\Don\Documents\*.tmp -> ]
[1 C:\Users\Don\Desktop\*.tmp files -> C:\Users\Don\Desktop\*.tmp -> ]

end pt 1...

Source: http://forums.whatthetech.com/index.php?showtopic=121772

conrad murray sentencing conrad murray sentencing urban meyer adam shulman adam shulman nfl power rankings week 13 nfl power rankings week 13

Thursday, December 29, 2011

Southern Fried Chicken (Harlesden, London, by Melinita)

Sorry, Readability was unable to parse this page for content.

Source: http://www.qype.co.uk/review/2616307

phish stephen curry girl with the dragon tattoo hes just not that into you hes just not that into you monta ellis kawasaki disease

Swap MP3s in Google Music, Amazon Cloud, and iTunes

Right now, it's a great time to be a music lover with a digital collection, but it may not be so great if you haven't committed to a single device.

I'm a great lover of gadgets, so I have a few iOS devices, a few Android devices, and a Kindle Fire, which uses a version of Android restricted to Amazon. If I want to listen to my music collection, I've got three different options, and some of those options won't work on other devices. I also really like a good bargain, and this year both Amazon and Google are eager to win customer loyalty with fantastic sales and even giveaways on music. That means I've got a pastiche of music sources and cloud storage options, and I've yet to commit to one place to listen to it all. Are you in the same boat? If so, this tutorial is for you.

The best solution is to duplicate the collection in iCloud/iTunes, the Amazon Cloud, and Google Music. All three places offer some free storage of purchased music, and if one source fills up or decides to start charging, you can still rely on the other two. One caveat: They don't work in every country.? I can only guarantee that these services work in the US.

I started with my iPod many years ago. I'd used iTunes to rip all my CDs, and I had a few songs I purchased. Apple and other companies stopped selling music with DRM restrictions years ago, but I still have some earlier DRM-restricted purchases in my collection. I can't move songs with DRM to other cloud players, but there are ways around that problem.? I think that's a common starting point, so let's go from there. If you're using Mac OSX Lion or an iOS 5 device, you can take advantage of iCloud, which is a lot like iTunes only the syncing is stored online, but you can't use it with other devices. You could use an app like DoubleTwist, but I like the idea of just having my music where I need it .

Getting Your iTunes Music to Google Music

  1. Google Music is on the Web at music.google.com.?
  2. You'll need to sign up for an account.
  3. Next, you can download the Google Music Manager to run on your Windows or Mac desktop. This handy little app can be set to upload all your non-DRM iTunes music. It may take a few (or several) hours to upload your collection, but once you've done that step, you can also set it to upload all future non-DRM MP3 and AAC files that end up in your iTunes library. That's important for future purchases. It means any songs you buy from Apple or download from Amazon or any other source are going to end up in your Google Music library without you having to think about it.

Getting Your Google Music Back to iTunes

You can use that same Google Music Manager on your desktop to download your music.

  1. Go to the preferences and pick Download.
  2. Choose the check mark next to "Only include songs since last download."
  3. Choose your iTunes music library for the download location.
  4. That means you'll download any new songs you purchase and make it a two-way street for syncing.

Getting Your Music to Amazon Cloud Player

Amazon can do the same thing with their Cloud Drive and Cloud Player, but it's a slightly more manual process. The good news is that you currently have unlimited space for music.

  1. You'll need to download two desktop apps. There's a downloader and an uploader.
  2. Use the uploader to upload your non-DRM iTunes files into Amazon's Cloud Player. Just point it to your iTunes library.
  3. Set Amazon to automatically download new purchases as well as adding them to Cloud Player.
  4. Drag the songs into iTunes. This will both add them to iTunes and trigger Google Music to upload them.
  5. Run the uploader again whenever you add more music to iTunes. It won't duplicate existing songs in your Cloud Drive.?

It doesn't take much effort to keep your music stored in all three places, but if you only use two services, you can skip whichever service you don't use. Use a generic folder instead of your iTunes library, for example.

Source: http://google.about.com/od/androidOS/a/Keep-All-Your-Mp3-Songs-In-Amazon-Cloud-Itunes-Icloud-And-Google-Music.htm

giants vs jets ny giants tony romo 49ers chargers ny jets ny jets

Wednesday, December 28, 2011

Cold-blooded cognition: Tortoises quick on the uptake

Continue reading page |1 |2

Tortoises aren?t noted for their speed but they are surprisingly quick-witted

"IT ALL stems from Moses," says Anna Wilkinson. Moses is her pet red-footed tortoise and a bit of a celebrity in the science world. Why? First, he outsmarted rats in a maze. Then he was the inspiration for a new lab studying reptile intelligence and the evolutionary origins of cognition. Now he has helped Wilkinson win an Ig Nobel prize. Victory for slow and steady.

This fruitful partnership began in 2004, after Wilkinson, now at the University of Lincoln, UK, started graduate school at the University of York, also in the UK. She was studying bird cognition but had earlier become fascinated by tortoises while employed in education and research at Flamingo Land zoo in North Yorkshire, UK. Although working with primates, she found herself drawn to the tortoise enclosure. Even when most of the group was basking in the sun, she recalls, at least one tortoise was exploring or feeding, and when a person walked in they all perked up, sensing that food was likely to follow. "They were always just fascinating," she says. So, a tortoise was the obvious choice as a pet.

Moses's first big academic break came in 2006. Wilkinson was attending a lecture on how rats remember their paths through a maze, when she started thinking: "Moses can do that." Afterwards, she asked the lecturer, Geoffrey Hall, if anyone had tried putting tortoises in such mazes. A literature search indicated that reptiles in general have proved pretty dim when subjected to cognitive tests. Undeterred, Hall and Wilkinson decided to see what Moses was capable of.

The pair set up a tortoise-sized test maze similar to the eight-armed radial structure used for rats and mice, then put Moses through his paces. As with the rodents he was placed in the centre of the maze and given eight chances to retrieve food from the arms - each of which had a morsel at its end. Moses quickly learned to find his way around so that he didn't revisit arms where he had already eaten the food. Like the rodents, he seemed to create a "cognitive map" from the objects he could see in the world beyond the maze. However, when Wilkinson and Hall obscured these landmarks, Moses took up a different strategy - he systematically visited the arm next to the one he had just left, allowing him to retrieve all eight food scraps (Journal of Comparative Psychology, vol 121, p 412). This flexibility of behaviour has never been seen in mammals, which seek new landmarks when old ones are removed. Clever Moses.

Ready to conquer a maze

Wilkinson and Hall were now interested in why reptiles had performed so poorly in previous cognitive studies. Taking a closer look at the reports, they found the problem. The earlier research had been done at cool temperatures, which left the cold-blooded animals feeling sluggish. Moses, by contrast, had performed at 29 ?C, near the average temperature of the red-footed tortoise's native habitat in Central and South America. The warmer temperatures boosted Moses's metabolism, making him alert, lively and ready to conquer a maze.

Having finished her dissertation, Wilkinson started postdoctoral research at the University of Vienna, Austria. There, her supervisor Ludwig Huber encouraged her to pursue her interest in reptiles. In 2007 they set up the cold-blooded cognition lab. With seven more red-footed tortoises - as well as some jewelled lizards - they were ready to find out just how smart reptiles are.

One skill Wilkinson and Huber were keen to explore was gaze-following. The ability to look where another individual is looking is important because it can alert you to potential predators, or food. It is also a complex behaviour, which requires understanding that another animal's gaze can convey useful information, working out where it is looking and turning to focus on the same spot. Gaze-following has long been thought of as a talent exclusive to primates, but recently it has been found in goats and a few birds. It turns out that red-footed tortoises can do it too.

When Huber and Wilkinson shone a laser pointer at an overhead screen to attract the attention of one tortoise, they found that another individual, behind the screen, also looked up (Animal Cognition, vol 13, p 765).

Gaze-following had never been tested in reptiles before. The fact that red-footed tortoises can do it was surprising, given that they are usually solitary in the wild so may not be expected to evolve the ability to take cues from others.

Their performance on a second task was even more intriguing. The researchers found tortoises can learn to find hidden food by watching another tortoise walk around a wall to collect a treat (Biology Letters, vol 6, p 614). This indicates that tortoises are capable of social learning, a trait thought to have evolved as a special cognitive adaptation in social animals. The discovery raises the possibility that social learning may simply be an extension of general learning capabilities rather than a specialist skill.

Continue reading page |1 |2

If you would like to reuse any content from New Scientist, either in print or online, please contact the syndication department first for permission. New Scientist does not own rights to photos, but there are a variety of licensing options available for use of articles and graphics we own the copyright to.

Have your say

Only subscribers may leave comments on this article. Please log in.

Only personal subscribers may leave comments on this article

Subscribe now to comment.

All comments should respect the New Scientist House Rules. If you think a particular comment breaks these rules then please use the "Report" link in that comment to report it to us.

If you are having a technical problem posting a comment, please contact technical support.

Source: http://feeds.newscientist.com/c/749/f/10897/s/1b44eefa/l/0L0Snewscientist0N0Carticle0Cmg21228440A0B50A0A0Ecoldblooded0Ecognition0Etortoises0Equick0Eon0Ethe0Euptake0Bhtml0DDCMP0FOTC0Erss0Gnsref0Fonline0Enews/story01.htm

warren jeffs phaedra parks oklahoma earthquake new madrid fault current time earthquake today earthquake today

Monday, December 19, 2011

Berenson says she was barred from leaving Peru (AP)

LIMA, Peru ? Paroled U.S. activist Lori Berenson said Saturday that she and her toddler son were not permitted to leave Peru despite being granted permission in court to spend the holidays in New York with her family.

"They didn't let me leave and they're putting out this version that I arrived late," she said in a brief phone conversation with The Associated Press, referring to media reports citing unnamed airport officials.

Her lawyer, Anibal Apari, accused the government of making an arbitrary political decision to halt her departure. He said it had provided no official explanation for not allowing Berenson to board a New York-bound flight the previous night.

"An abuse of authority has been committed," Apari told the AP. "Administratively, you can't block a court order."

An Interior Ministry press offical reached by the AP said he could not immediately offer a response.

Berenson, 42, was paroled last year after serving 15 years for aiding leftist rebels. She was given permission to leave the country beginning Friday with the stipulation that she return by Jan. 11.

She had been denied such permission in October, but a three-judge appeals court on Wednesday overturned the lower court judge's ruling.

Peru's anti-terrorism prosecutor, Julio Galindo, told the AP that he had on Friday asked the court that approved Berenson's leave to nullify the decision because it violated a law prohibiting paroled prisoners from leaving the country.

He said he did not know if the court had acted on his appeal and Peru's courts spokesman, Guillermo Gonzalez, said he had no information on the matter.

Galindo's move was precisely the kind of action feared by Berenson's parents, who did not respond to phone calls seeking comment on Saturday.

The prosecutor had opposed letting Berenson out of prison before her 20-year sentence for aiding terrorism ends in 2015, arguing that it would set a bad precedent for the early release of others convicted of terrorism-related crimes.

Berenson's father Mark told the AP on Friday that he was "petrified" that negative local reaction could prevent the trip, including celebrating his 70th birthday Dec. 29.

"My worry is that there's going to be screaming to stop this," he said. Some Peruvians consider his daughter a terrorist and have publicly insulted her on the street.

Mark Berenson said his daughter had every intention of returning to Peru.

"As Lori says, if she doesn't come home, let Interpol arrest her," Mark Berenson said.

Peru could seek her extradition and return her to prison if she doesn't return in the allotted time, Gonzalez said.

A local TV station displayed video on Friday night of Berenson pacing nervously in front of a ticket counter, wearing a bulky black backpack, with Salvador in a stroller beside her. She wore pants and a brown polo shirt.

On Saturday, she left her apartment around midday to take Salvador for a walk and did not comment to new crews other than to ask them to leave her in peace.

Berenson has been repeatedly hounded and mobbed by Peruvian news media, which has occasionally frightened young Salvador. Last month, one TV channel obtained her new address and showed video of her home.

"It was very dangerous," Mark Berenson said. "The (U.S.) Embassy complained."

"It's just not fair to Salvador or to her," he said. "They used her like she's a celebrity and she just wants to be a low-profile person and get on with her life and be a good citizen."

He said he would appeal to President Ollanta Humala to send his daughter home.

Humala could by law commute her sentence but has not indicated whether he might do so. The AP sought presidential palace comment but its calls were not returned.

Lori Berenson is separated from Salvador's father, Anibal Apari, whom she met in prison and who serves as her lawyer.

Mark Berenson said his daughter is looking forward to seeing relatives she hasn't met since her 20s, including his 96-year-old aunt, and that he wants his grandson, who loves trees, see the New York Botanical Garden's holiday display.

Since her initial parole in May 2010, Lori Berenson repeatedly expressed regret for aiding the rebel Tupac Amaru Revolutionary Movement.

Arrested in 1995, the former MIT student was accused of helping the rebels plan an armed takeover of Congress, an attack that never happened.

A military court convicted her the following year and sentenced her to life in prison for sedition. But after intense U.S. government pressure, she was retried in civil courts in 2001 and sentenced to 20 years for terrorist collaboration.

Berenson was unrepentant at the time of her arrest, but softened during years of sometimes harsh prison conditions, eventually being praised as a model prisoner.

Yet she is viewed by many as a symbol of the 1980-2000 rebel conflict that claimed some 70,000 lives. The fanatical Maoist Shining Path movement did most of the killing, while Tupac Amaru was a lesser player.

Berenson has acknowledged helping the rebels rent a safe house, where authorities seized a cache of weapons. But she insists she didn't know guns were being stored there. She denies ever belonging to Tupac Amaru or engaging in violent acts.

In an interview with the AP last year, Berenson said she was deeply troubled at having become Peru's "face of terrorism."

Its most famous prisoner, she also became a politically convenient scapegoat, she said.

___

Associated Press writer Franklin Briceno contributed to this report.

Source: http://us.rd.yahoo.com/dailynews/rss/topstories/*http%3A//news.yahoo.com/s/ap/20111217/ap_on_re_la_am_ca/lt_peru_lori_berenson

bo jackson ibogaine michigan football michigan football weather houston weather houston small business saturday

Sunday, December 18, 2011

Storm, floods in south Philippines kill nearly 60

Flash floods triggered by a tropical storm have killed nearly 60 people in the southern Philippines, with many more missing across vast regions, officials said Saturday.

Lemuel Gunda, head of a rescue team in Cagayan de Oro city, told The Associated Press that at least 40 bodies were recovered there.

Mayor Lawrence Cruz of nearby Iligan said that at least 15 people were killed in his city alone and that many more were missing.

Those missing included a radio broadcaster who was swept away while trying to save his neighbors, Cruz said.

The chief of the national disaster rescue agency, Benito Ramos, said that officials were still getting reports from the field and that casualties would likely rise.

The floods were triggered by Tropical Storm Washi, which dumped heavy rains over the southern Mindanao region overnight.

Ramos said the dead included at least nine people in a single village in Lanao del Norte province, with floodwaters surging in the middle of the night and quickly reaching rooftops, trapping many residents and causing them to drown.

"Massive flooding had been reported over the region, especially in Iligan city and Cagayan de Oro city," Ramos said, adding that tens of thousands of people sought shelter on high ground.

Back-to-back typhoons in September left more than 100 people dead in the northern Philippines.

Copyright 2011 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

Source: http://www.msnbc.msn.com/id/45704765/ns/weather/

chelsea handler alexander the great act alabama football 21 jump street 19 kids and counting 2011 election results

Saturday, December 17, 2011

Christopher Hitchens: Always on the Mark

I scoured the floor below the studio where the staff?s offices were located. I checked the bathrooms on both floors. I asked the make-up artist. No Christopher. Then it hit me; he was probably outside smoking a cigarette. The quickest outdoor access from CNN?s Washington, D.C., bureau was via the other studio, which had an outdoor patio. As I pulled back the curtain, there he was. Not smoking, not drinking, but half-naked playing darts with the camera crew.

Source: http://feeds.slate.com/click.phdo?i=cd24ec706e1c07e3a077131d4aa0f225

bérénice marlohe bérénice marlohe google offers tim gunn tim gunn death clock death clock

NASA Developing Comet Harpoon For Sample Return

An anonymous reader writes "NASA appears to have decided that the best way to grab a sample of a rotating comet that is racing through the inner solar system at up to 150,000 miles per hour while spewing chunks of ice, rock and dust may be to avoid the risky business of landing on it. Instead, researchers want to send a spacecraft to rendezvous with a comet, then fire a harpoon to rapidly acquire samples from specific locations with surgical precision while hovering above the target."

Source: http://rss.slashdot.org/~r/Slashdot/slashdotScience/~3/xSJ2gI-lX5k/nasa-developing-comet-harpoon-for-sample-return

gmcr ohio news caracal beef wellington beef wellington ronnie brown man up

Friday, December 16, 2011

George Clooney Reveals How He Earned His Dog's Love

It's no secret that George Clooney knows how to win over a lady's heart. But apparently he's also a master at how to earn a dog's love, as well.

Source: http://www.ivillage.com/george-clooney-reveals-strange-way-he-earned-his-dogs-love/1-a-411194?dst=iv%3AiVillage%3Ageorge-clooney-reveals-strange-way-he-earned-his-dogs-love-411194

dippin dots triumph the insult comic dog tucson weather tucson weather peyton hillis cl p cl p

Northern Pike in New Mexico-No limits for anglers?

Read?more: Local, National, Community, Environment, Outdoors, Tourism, Science, Consumer, News, Fishing, Fish, Pike, Northern Pike, Eagle Nest, New Mexico, Rainbow Trout, Trout, Predator, State Game Commission

AMARILLO, TX -- Here's some potential good news for all you anglers who want to go after a hard fighting fish.

Over in New Mexico, the State Game Commission will be voting later this week, to remove all the limits from Eagle Nest Lake for Northern Pike.

State fisheries managers are wanting to allow all those fish to be caught and not released back into the lake, in hopes of saving the Rainbow Trout. Their numbers have been decimated by the more aggressive Pikes.

Public comments show there is strong support for letting anglers help keep their numbers in check. They are notoriously strong fighters when hooked, can grow past two feet in length, weigh close to 40 pounds and live up to 30 years in the wild.

Source: http://www.connectamarillo.com/news/story.aspx?id=697307

ohio ohio john beck john beck mariska hargitay gmcr ohio news

Wednesday, December 7, 2011

Computer mimics human ability to match images

Thibault Camus / AP

In this file photo, tourists pose in front of the Eiffel Tower in Paris. A computer can match up photos and paintings based on the uniqueness of features such as the Eiffel Tower.

By John Roach

Every year, thousands of tourists stand in front of Paris' Eiffel Tower to have their picture taken, painted, or sketched. Though every image is different, each contains the sky piercing tower. Now, a computer can match up all those images based on that one identifying feature.

This could be useful, for example, to someone who is wondering how the Eiffel Tower and its surroundings have changed since their grandparents had their picture painted in front of it on their honeymoon. In this case, the computer could find a match to the painting by searching online for a modern match.

The technique differs from photo-matching methods that focus on similarities in shapes, colors, or composition, which work well when searching for exact or very close matches but fail when applied across domains, such as a picture taken in different seasons or a painting and a picture.


"The language of a painting is different than the language of a photograph," Alexei Efros, an associate professor of computer science and robotics at Carnegie Mellon University in Pittsburgh, Penn., said in a news release. "Most computers latch onto the language, not what's being said."

In the video below that explains how this all works, for example, a standard computer algorithm tasked to find images similar to a painting of a temple returns images of clouds and the ground that most closely match the image, not the temple that's of most interest to humans.

The goal of this work is to find visually similar images even if they appear quite different at the raw pixel level. This task is particularly important for matching images across visual domains, such as photos taken over different seasons or lighting conditions, paintings, hand-drawn sketches,

Efros and his colleagues programmed a computer to find the unique element that sets an image apart from others in a sample and then uses that uniqueness to match it with similar images.?

The uniqueness is computed based on a dataset of randomly selected images. So, to use the Eiffel Tower example, the person standing in front of the tower is likely similar to other people in other photos and thus given little weight, but the tower itself is unlike anything else in the other photos.

Efros said the approach is the "best approximation" yet achieved to how humans compare images.

The technique can be used for automated image searches, for example, or combined with a GPS-tagged photo collection to determine where a particular painting of a landmark such as the Eiffel Tower was painted.

In the following video, the team shows off how the program can also be used to assemble what they call a "visual memex" ? a dataset that explores the visual similarities and contexts of a set of photos. It shows a graph of 200 images of Medici Fountain, another Paris landmark, from various distances.?

This video demonstrates Visual-Memex graph traversal. Graph is built using our similarity metric.

More on photo matching technology:


Efros and colleagues will present their findings Dec. 14 at SIGGRAPH Asia, a computer graphics and interactive techniques conference in Hong Kong.

John Roach is a contributing writer for msnbc.com. To learn more about him, check out his website. For more of our Future of Technology series, watch the featured video below.

Kids' play has moved to tablets and PCs. In this new age, toy makers and researchers alike are sorting out the benefits ? and detriments ? of playful educational interaction in virtual space.

?

Source: http://futureoftech.msnbc.msn.com/_news/2011/12/06/9252228-computer-mimics-human-ability-to-match-images

occupy san francisco occupy san francisco top chef just desserts jamarcus russell sister wives st louis weather jack the cat

Tuesday, December 6, 2011

Oil price wavers as Europe responds to S&P warning

(AP) ? Oil prices are wavering after Standard & Poor's expanded its warning about European debt to include a bailout fund for cash-strapped eurozone members.

Benchmark crude on Tuesday rose 30 cents to $101.29 per barrel in after noon trading in New York. It went down to $100.19 earlier in the session.

In London, Brent crude rose 38 cents to $109.91 a barrel.

S&P warned on Monday that it may downgrade 15 European countries, including Germany, because of the region's ongoing problems with massive government debts. On Tuesday the credit ratings agency added Europe's bailout fund for countries with the worst debt, saying it could drop from S&P's top AAA rating if other top-rated European countries are downgraded.

German Chancellor Angela Merkel downplayed S&P's warnings. But a downgrade would make it more expensive for European nations to raise money, hampering efforts to pay down those huge debts. Many analysts predict that Europe will slide back into recession, and the concern is how far the banking crisis will spread.

Further weakening in the European economy will reverberate through the world economy, hurting demand for foreign goods and cutting energy consumption by major manufacturers in the U.S. and China.

In other energy trading, heating oil rose 2.75 cents to $3.0199 per gallon, and gasoline futures rose 2.72 cents to $2.6409 per gallon. Natural gas rose 4.3 cents to $3.5040 per 1,000 cubic feet.

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/f70471f764144b2fab526d39972d37b3/Article_2011-12-06-Oil%20Prices/id-c2e51b10771b4c14990182b4720fcd93

shonn greene oklahoma state plane crash syracuse university best buy black friday 2011 ads broncos jets jessie james clayton kershaw

Was Jane Austen Poisoned by Arsenic? Science May Soon Find Out

News | Health

Modern techniques could reveal whether the celebrated English novelist's surviving hair contains unusually high levels of arsenic


FAMOUS FOLLICLES: Scientists have the technology to test Jane Austen's hair for lethal levels of arsenic. Image: Wikimedia Commons

On April 27, 1817, Jane Austen sat down and wrote her will, leaving almost all of her assets?valued at less than 800 pounds sterling?to her sister Cassandra. In May, the sisters moved to Winchester, England, so the bedridden Jane would be near her doctor. On July 18, only a few days after dictating 24 lines of comic verse to Cassandra, Jane died.

Since at least the 1960s Austen scholars, doctors and fans have tried to retrospectively identify the curious illness that killed the 41-year-old English author. Crime novelist Lindsay Ashford thinks she has finally solved the mystery. Austen, she proposes, died of arsenic poisoning. And scientists have the tools to find out if she is right.

Ashford came to this conclusion after living in Austen's village of Chawton, England, where she had been researching a new book. While reading Austen's letters, Ashford noticed a particularly telling passage in a letter to Austen's niece Fanny Knight in March 1817: "I have had a good deal of fever at times and indifferent nights, but am considerably better now and recovering my looks a little, which have been bad enough, black and white and every wrong color."

Thanks to a background in forensics and years of research for her own novels, Ashford knew that one of the symptoms of arsenic poisoning is hyperpigmentation, or "raindrop pigmentation," in which the skin turns into a patchwork of dark and light areas with unusually high or low levels of melanin. Chronic arsenic poisoning, in fact, can warp and mottle the skin in all kinds of ways, and even cause skin cancers.

In Austen's time, as Ashford also knew, many medications included arsenic. Potassium arsenite was the main ingredient in the immensely popular Fowler's Solution, which was prescribed for diseases like syphilis and for more minor ailments like the joint pain of which Austen complained in her final letters. Ashford thinks Austen was unintentionally poisoned by arsenic-based medication.

Unlike all the other theories about Austen's death, the arsenic hypothesis can be easily confirmed or refuted by science. All that's needed is a little piece of Jane Austen herself?say, a piece of her hair. After Jane died, Cassandra cut off much of her sister's hair and distributed the locks among relatives and friends, as was customary. One lock found its way to Austen collectors Alberta and Henry Burke, who, for reasons that remain unclear, reportedly had the hair tested for arsenic. The results came back positive. Perhaps the couple, like Ashford, suspected that arsenic killed Austen and wanted evidence. Later, the Burkes donated the hair to the Jane Austen House Museum in Chawton, where it remains to this day.

Scholars had largely overlooked the Burke test, but Ashford heard about it from Elsa Solender, former president of the Jane Austen Society of North America. Ashford asked librarians at Goucher College in Baltimore, which holds the Burkes's vast Jane Austen collection, to search for records of the arsenic test. They found none.

Louise West, curator of the Jane Austen House Museum, says she and the trustees are aware of Lindsay Ashford's hypothesis, but have not yet reached any decisions about testing the Austen's hair for arsenic. If they decide to proceed, the analysis should not be too difficult to arrange.

Scientists have at least three sophisticated techniques that could detect arsenic in Austen's hair, two of which would not damage her faded follicles. The most sensitive test is probably neutron activation analysis, says analytical chemist Brian Jackson of Dartmouth College. In this technique, a few milligrams of hair are bombarded with neutrons, forcing stable elements in the hair to radioactively decay and emit gamma rays, which are unique to each chemical element in the follicles. One study notes that a single strand of human hair 12 centimeters long weighs on average 0.62 milligrams, so neutron activation might require only five or fewer strands. However, only a few facilities around the world have a neutron bombarder. Oak Ridge National Laboratory in Tennessee is one: It houses the Spallation Neutron Source and High Flux Isotope Reactor.

Source: http://rss.sciam.com/click.phdo?i=4a21a399394458b020e51cff16a37c91

charlie and the chocolate factory ou football ryan torain ryan torain world series game 3 sign language alphabet texas tech

Monday, December 5, 2011

Gingrich's unpredictability raises concerns

Republican presidential hopeful former House Speaker Newt Gingrich speaks at the annual meeting of the Iowa Association of Electric Cooperatives, Thursday, Dec. 1, 2011, in West Des Moines, Iowa. (AP Photo/Charlie Neibergall)

Republican presidential hopeful former House Speaker Newt Gingrich speaks at the annual meeting of the Iowa Association of Electric Cooperatives, Thursday, Dec. 1, 2011, in West Des Moines, Iowa. (AP Photo/Charlie Neibergall)

(AP) ? At last, Rep. Phil Gingrey thought as he watched the most recent presidential debate. His candidate, Newt Gingrich, had moved beyond scolding journalists to talking ideas and looking like a contender. But then Gingrich seemed to embrace a form of amnesty for illegal immigrants. And Gingrey, who opposes amnesty like most conservatives, froze.

"I thought, 'Aw, I hope he's not really saying that," recalled Gingrey, R-Ga.

Unpredictability is as much a part of Gingrich as his signature snowy mane, a quality that has vexed anyone who has supported him for anything ? be it speaker of the House or president of the United States. The history professor from Georgia may have, as he claims, matured over three dramatic decades in public life. But one constant is a mercurial personality.

For many Republicans, it's a source of inspiration, charm and excitement in a year when conservatives are still looking for an alternative to former Massachusetts Gov. Mitt Romney and have driven Gingrich into the top tier of contenders for the GOP nomination.

Gingrich won a place in the history books as the force behind the 1994 Republican takeover of Congress. As speaker, he racked up some bipartisan trophies by working with President Bill Clinton to balance the budget and change the welfare system.

But melodrama has followed Gingrich up and down and back up the ladder of success, enough to raise the question in 2012: How steadily would Gingrich, a 68-year-old grandfather and Catholic convert on his third marriage, guide a nation hungry for confidence in its leaders and jittery over the stuttering economy?

"I don't claim to be the perfect candidate," Gingrich told WSC-FM this week. "I just claim to be a lot more conservative than Mitt Romney and a lot more electable than anyone else."

Gingrey agrees. But Gingrich's remarks on immigration left him with questions.

"I don't see how the party that says it's the party of the family is going to adopt an immigration policy which destroys families which have been here a quarter-century," Gingrich said in the Republican debate. "I'm prepared to take the heat for saying let's be humane in enforcing the law."

On the one hand, Gingrey suggested, if that's the way Gingrich really feels about the issue, then saying so, rather than avoiding it, was "gutsy." And it may have drawn a useful contrast with Romney.

On the other, there's uncertainty: What is his position on the issue? After all, he has flip-flopped on other issues ? Medicare, Libya, health care reform and global warming.

"I hope he set the stage for us looking very hard at making sure we have a temporary worker program that's viable and has absolutely no hint of amnesty," Gingrey said in a telephone interview this week. "I need to have a conversation with him about that."

Gingrich has since said he was calling for a path toward legal residency ? not citizenship ? for illegal immigrants who have lived here peacefully for generations.

By any measure, stability is scarce on Gingrich's resume. During his speakership there were two government shutdowns, a well-publicized snit over his seating on Air Force One, his push for Clinton's impeachment while in an extramarital affair of his own, and lieutenants plotting his overthrow.

In 1998, shortly after winning re-election, Gingrich announced in a closed GOP caucus meeting that he would "bench" himself, and left Congress.

Throughout, there's been petulance, policy wobbles, and a tendency to cast himself in outsized terms.

This year alone, while painting himself an everyman and Washington outsider at heart, he's been forced to defend a six-figure shopping spree at Tiffany's and the $1.6 million he earned over the past decade as a history adviser ? not a lobbyist, he insists ? to mortgage giant Freddie Mac.

He irked conservatives by harshly criticizing Rep. Paul Ryan's plan to overhaul Medicare as "right-wing social engineering," then apologized but has since sent mixed signals on where he stands on the matter.

His senior campaign staff quit on him, en masse.

The drama has Democrats licking their chops at the prospect of Gingrich as the GOP nominee.

"I did not think I had lived a good enough life to be rewarded by Newt Gingrich being the Republican nominee," retiring liberal Rep. Barney Frank, D-Mass., said this week. "It still is unlikely, but I have hopes."

The misfortunes of other Republican candidates ? Rep. Michele Bachmann, Texas Gov. Rick Perry, businessman Herman Cain ? left an opening for Gingrich's resurgence. Longtime politicos aren't making the argument that Gingrich's leadership is a neat or pretty thing to behold. But they're not counting him out of the wide-open nominating contest, either.

"I think he's got a pretty good argument to make about his time as speaker, in terms of results," said Sen. Lindsey Graham, R-S.C., who served with Gingrich in the House and has not endorsed a presidential candidate. "The real purpose of a president, I think, is to find common ground with Congress to solve our problems. Newt has been in that mix."

Rep. Tom Price, another Georgia Republican who has endorsed Gingrich, suggested the former speaker has acquired the self-awareness to compete in the presidential arena.

"Newt has always been an idea machine, and I think he clearly appreciates the gravity of the situation before us," Price said. "There isn't any sense that this (nomination) is a fait accompli. There's an appreciation that there's a long road to go yet."

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/89ae8247abe8493fae24405546e9a1aa/Article_2011-12-02-Gingrich-Chaos%20Factor/id-9590d2c083a14d81895e90689dcee99b

big ten championship game big ten championship game ultimate fighter 14 ultimate fighter 14 2011 bowl projections michigan state michigan state