17 December, 2010

Unstoppable (2010) R5 350mb

0 comments

Movie Info

http://www.imdb.com/title/tt0477080/
Complete Name……………: Unstoppable

Format………………….: Matroska

File size……………….: 371 MB

Duration………………..: 1h 34mn

Overall bit rate…………: 549 Kbps

Resolution………………: 704 x 300 pixels

Frame rate………………: 25.000 fps

Audio…………………..: AAC 48000KHz

Audio Language…………..: English

Source………………….: Unstoppable 2010 R5 CaM-AUDIO-Xvid-Noir

Encoder…………………: ARNT
iMDB RATING:…………….: 7.2/10










Password : freezilla.in










Read More ->>

How Firewalls Work

0 comments
If you have been using Internet on a regular basis or working in a large company and surf the Internet while you are at work, you must have surely come across the term firewall. You might have also heard of people saying “firewalls protect their computer from web attacks and hackers” or “a certain website has been blocked by firewall in their work place”. If you have ever wondered to know what exactly is this firewall and how it works, here we go. In this post I will try to explain “How firewalls work” in a layman’s terms.

How Firewalls Work

Firewalls are basically a barrier between your computer (or a network) and the Internet (outside world). A firewall can be simply compared to a security guard who stands at the entrance of your house and filters the visitors coming to your place. He may allow some visitors to enter while denying others whom he suspects of being intruders. Similarly a firewall is a software program or a hardware device that filters the information (packets) coming through the Internet to your personal computer or a computer network.


Firewalls may decide to allow or block network traffic between devices based on the rules that are pre-configured or set by the firewall administrator. Most personal firewalls such as Windows firewall operate on a set of pre-configured rules that are most suitable under normal circumstances so that the user need not worry much about configuring the firewall.



Personal firewalls are easy to install and use and hence preferred by end-users for use on their personal computers.  However large networks and companies prefer those firewalls that have plenty of options to configure so as to meet their customized needs. For example, a company may set up different firewall rules for FTP servers, Telnet servers and Web servers. In addition the company can even control how the employees connect to the Internet by blocking access to certain websites or restricting the transfer of files to other networks. Thus in addition to security, a firewall can give the company a tremendous control over how people use the network.



Firewalls use one or more of the following methods to control the incoming and outgoing traffic in a network:



1. Packet Filtering: In this method packets (small chunks of data) are analyzed against a set of filters. Packet filters has a set of rules that come with accept and deny actions which are pre-configured or can be configured manually by the firewall administrator. If the packet manages to make it through these filters then it is allowed to reach the destination; otherwise it is discarded.



2. Stateful Inspection: This is a newer method that doesn’t analyze the contents of the packets. Instead it compares certain key aspects of each packet to a database of trusted source. Both incoming and outgoing packets are compared against this database and if the comparison yields a reasonable match, then the packets are allowed to travel further. Otherwise they are discarded.

 
Firewall Configuration


Firewalls can be configured by adding one or more filters based on several conditions as mentioned below:



1. IP addresses: In any case if an IP address outside the network is said to be unfavorable, then it is possible to set  filter to block all the traffic to and from that IP address. For example, if a cetain IP address is found to be making too many connections to a server, the administrator may decide to block traffic from this IP using the firewall.



2. Domain names: Since it is difficult to remember the IP addresses, it is an easier and smarter way to configure the firewalls by adding filters based on domain names. By setting up a domain filter, a company may decide to block all access to certain domain names, or may provide access only to a list of selected domain names.



3. Ports/Protocols: Every service running on a server is made available to the Internet using numbered ports, one for each service. In simple words, ports can be compared to virtual doors of the server through which services are made available. For example, if a server is running a Web (HTTP) service then it will be typically available on port 80. In order to avail this service, the client needs to connect to the server via port 80. Similarly different services such as Telnet (Port 23), FTP (port 21) and SMTP (port 25) services may be running on the server. If the services are intended for the public, they are usually kept open. Otherwise they are blocked using the firewall so as to prevent intruders from using the open ports for making unauthorized connections.



4. Specific words or phrases: A firewall can be configured to filter one or more specific words or phrases so that, both the incoming and outgoing packets are scanned for the words in the filter. For example, you may set up a firewall rule to filter any packet that contains an offensive term or a phrase that you may decide to block from entering or leaving your network.

 
Hardware vs. Software Firewall


Hardware firewalls provide higher level of security and hence preferred for servers where security has the top most priority whereas, the software firewalls are less expensive and are most preferred in home computers and laptops. Hardware firewalls usually come as an in-built unit of a router and provide maximum security as it filters each packet in the hardware level itself even before it manages to enter your computer. A good example is the Linksys Cable/DSL router.

 
Why Firewall?


Firewalls provide security over a number of online threats such as Remote login, Trojan backdoors, Session hijacking, DOS & DDOS attacks, viruses, cookie stealing and many more. The effectiveness of the security depends on the way you configure the firewall and how you set up the filter rules. However major threats such as DOS and DDOS attacks may sometimes manage to bypass the firewalls and do the damage to the server. Even though firewall is not a complete answer to online threats, it can most effectively handle the attacks and provide security to the computer up to the maximum possible extent.
Read More ->>

10 Tips to Avoid Getting Adware

0 comments




Adware, malware, spyware and viruses can bring your system to its knees. They are detrimental, lowering the performance of your computer. You might need to replace data. You might lose unique files. Keep the nasties away from your computer using these ten simple tips.




1. Use Firefox: Internet Explorer is the most popular browser on the market, controlling over 50% of the market share. The virus and adware creators specifically look for exploitable vulnerabilities within IE because they know that they will receive the best return on investment. Your switch to Firefox prevents some adware from infecting your machine.


2. Scan your PC once a week: Sometimes adware programmers take a sneaky approach. They will set up their programs to run quietly in the background to spy upon your activities. This once a week scan is necessary to remove any of those sneaky bugs.







3. Download from known sites: New sites for installing adware are popping up all the time. If you find something that you want to download, make sure that it is from a known site. A company like Amazon will not steer you wrong, but Bob’s House of Wares might be a little less trustable. If you are not sure whether you can trust a site, perform a quick search.







4. Install Adaware: Ad-Aware is the most popular free adware removal program on the market. It detects, quarantines and removes adware. It searches for other programs which may have been installed, highlighting them in an easy to use interface. This program does not have an anti-virus attached.



5. Do not click on unsolicited email: You are constantly receiving offers to increase this or improve that through unsolicited email. Your curiosity may be killing you, but don’t click on these emails. They accept your click as permission to install adware, spyware and malware on your PC.



6. Install Antivirus software: Installing two programs for virus and adware protection is a smart idea. It caters to the strengths of each program, increasing the overall strength of your antiadware and antiviral campaign. Some of the best antivirus software is free, providing real time protection. Programs to look at would be Avast Antivir and AVG.







7. Don’t install toolbars: Even some reputable sites install custom toolbars. They slow your system down and collect information about your surfing habits. While a toolbar might offer some perks, it may also diminish your experience by dragging your system to a halt. Toolbars from less reputable places install adware and sometimes infect your system outright.



8. Look at your task manager: If anything seems out of place with your computer, take a look at your task manager. This tells you about all of the programs and processes which are running on your computer. Examine the processes tab for anything which you don’t immediately recognize. Perform a web search for unfamiliar processes.



9. Do not click on popups: Clicking on a popup usually spells certain doom for your computer. It opens the door for the viruses and adware that want to infect your machine, telling these malicious applications to make themselves at home. Stay away from those constantly advertised screensavers and icons.



10. Trust your gut: If you don’t feel right about a site, don’t go there. If you are receiving warnings from the antivirus and antiadware programs which you’ve installed, don’t go there. If you don’t like the layout of a site, don’t go there. Trust your instincts about sites.



With proper vigilance, you can keep aggravating adware, spyware and malware from your machine. Trust your instincts. Install Ad-Aware and an antivirus program. Play it safe. The care you spend in preventing adware from infecting your machine can save money and time.
Read More ->>

Pirates of Silicon Valley DVDRip

0 comments


This film is the semi humorous documentary about the men who made the world of technology what it is today, their struggles during college, the founding of their companies, and the ingenious actions they took to build up the global corporate empires of Apple Computer Corporation and Microsoft Inc.





Biographical look at the men who founded Apple and Microsoft and a look at the early days of the companies. Noah Wyle and Joey Slotnick portray Apple founders Steve Job and Steve Wozniak. Anthony Michael Hall and John DiMaggio play Microsoft s Bill Gates and Steve Ballmer. The film attempts to compare the two firm s operations and differences in the founder s operations.







  
Password : freezilla.in








Read More ->>

Rakht Charitra - 2 DvsScr

0 comments
Released : Dec 3, 2010


Genre : Biography, Crime, Drama
Starcast : Suriya,Vivek Oberoi
Desc :
Rakta Charitra is a biographical tale of Paritala Ravi from Andhra Pradesh, a prime accused in a number of murder cases. It is the story of a man`s phenomenal rise to power and a story of the most intense blood curdling conflict ever heard of between two individuals. Moreover, the story is also the ultimate statement on the often heard disastrous consequences of a fatal mixture of caste, crime, family feuds and politics.


Duration : 2:22

























  
Password : freezilla.in








Read More ->>

Ice Age: Dawn of The Dinosaurs (2009) DVDRip

0 comments

Movie Info

http://www.imdb.com/title/tt1080016/

[Movie Title ]………[ Ice Age: Dawn of the Dinosaurs

[Release Year ]……..[ 2009

[iMDb Rating ]………[ 7.2/10

[Genre ]……………[ Animation | Action | Adventure | Comedy | Family | Romance

[Runtime ]………….[ 01:34:03

[File Size ]………..[ 450 MB

[Resolution ]……….[ 1280 x 688

[Aspect Ratio ]……..[ 1.86:1

[Container]…………[ Matroska (.mkv)
  
Password : freezilla.in








Read More ->>

Ice Age 2: The Meltdown

0 comments

Movie Info

http://www.imdb.com/title/tt0438097/


[Movie Title ]………[ Ice Age: The Meltdown
[Release Year ]……..[ 2006
[iMDb Rating ]………[ 6.9/10
[Genre ]……………[ Animation | Adventure | Comedy | Family
[Runtime ]………….[ 01:30:36
[File Size ]………..[ 400 MB
[Resolution ]……….[ 1280x688
[Aspect Ratio ]……..[ 1.86:1
[Subtitle ]…………[ None
[Container]…………[ Matroska (.mkv)
  
Password : freezilla.in








Read More ->>

Ice Age (2002) 720p

0 comments
[Movie Title ]………[ Ice Age

[Release Year ]……..[ 2002

[iMDb Rating ]………[ 7.4/10

[Genre ]……………[ Animation | Adventure | Comedy | Family

[Runtime ]………….[ 01:21:04

[File Size ]………..[ 400 MB

[Resolution ]……….[ 1280*696

[Aspect Ratio ]……..[ 1.83:1

[Subtitle ]…………[ English

[Container]…………[ Matroska (.mkv)
  
Password : freezilla.in
Rar Password: lucky




Read More ->>

No Problem (2010) DVDscr

0 comments


[FORMAT]:…………………..[ Matroska
[GENRE]:……………………[ Comedy| Drama |
[FILE SIZE]:………………..[ 703MB
[NO OF CDs]:………………..[ 1
[RESOLUTION]:……………….[ 848 x 432
[FRAME RATE]:……………….[ 25
[AUDIO]:……………………[ 2ch AAC 24000Hz stereo
[LANGUAGE ]:………………..[ Hindi
[SUBTITLES]:………………..[ None
[RUNTIME]:………………….[ 02:38:15
[ENCODER]:………………….[ RKJ
[SOURCE]:…………………..[ DVDSCR [DDR]
 







 






 
Password : freezilla.in




Read More ->>

Ramayana: The Epic (2010) DVDRip

0 comments

Movie Info

http://www.imdb.com/title/tt1744641/

[FORMAT]:…………………..[ Matroska

[GENRE]:……………………[ Animation

[FILE SIZE]:………………..[ 400 MiB

[NO OF CDs]:………………..[ 1

[RESOLUTION]:……………….[ 720 x 416 pixels

[ASPECT RATIO]:……………..[ 16:9

[FRAME RATE]:……………….[ 24.975 fps

[LANGUAGE ]:………………..[ Hindi

[SUBTITLES]:………………..[ None

[RELEASE RUNTIME]:…………..[ 01:37:00

[SOURCE]:…………………..[ DVD9 [IcTv] & DDR

[iMDB RATING]:………………[ 6.9/10
  
Password : freezilla.in




Read More ->>

The Godfather: Part 3 (1990) BRRip 650mb

0 comments


 In the final instalment of the Godfather Trilogy, an aging Don Michael Corleone seeks to legitimize his crime family’s interests and remove himself from the violent underworld but is kept back by the ambitions of the young. While he attempts to link the Corleone’s finances with the Vatican, Michael must deal with the machinations of a hungrier gangster seeking to upset the existing Mafioso order and a young protoge’s love affair with his daughter.


[Movie Title ]….[ The Godfather: Part 3



[Release Year ]…[ 1990



[iMDb Rating ]….[ 7.5/10



[Genre ]……….[ Drama / Thriller



[Runtime ]……..[ 02:50:15



[File Size ]……[ 650 MB



[Resolution ]…..[ 912*512



[Aspect Ratio ]…[ 1.778:1



[Subtitle ]…….[ English







  
Password : freezilla.in








Read More ->>

The Godfather: Part 2 (1974) BRRip 750mb

0 comments


The continuing saga of the Corleone crime family tells the story of a young Vito Corleone growing up in Sicily and in 1910s New York; and follows Michael Corleone in the 1950s as he attempts to expand the family business into Las Vegas, Hollywood and Cuba.


[Movie Title ]….[ The Godfather: Part 2



[Release Year ]…[ 1974



[iMDb Rating ]….[ 9.0/10



[Genre ]……….[ Drama / Thriller



[Runtime ]……..[ 03:22:06



[File Size ]……[ 750 MB



[Resolution ]…..[ 912*512



[Aspect Ratio ]…[ 1.778:1



[Subtitle ]…….[ English









  
Password : freezilla.in








Read More ->>

The Godfather (1972) BRRip 600mb

0 comments


Vito Corleone is the aging don (head) of the Corleone Mafia Family. His youngest son Michael has returned from WWII just in time to see the wedding of Connie Corleone (Michael’s sister) to Carlo Rizzi. All of Michael’s family is involved with the Mafia, but Michael just wants to live a normal life. Drug dealer Virgil Sollozzo is looking for Mafia Families to offer him protection in exchange for a profit of the drug money. He approaches Don Corleone about it, but, much against the advice of the Don’s lawyer Tom Hagen, the Don is morally against the use of drugs, and turns down the offer. This does not please Sollozzo, who has the Don shot down by some of his hit men. The Don barely survives, which leads his son Michael to begin a violent mob war against Sollozzo and tears the Corleone family apart.


[Movie Title ]……..[ The Godfather



[Release Year ]………….[ 1972



[iMDb Rating ]…………..[ 9.1/10



[Genre ]………………..[ Drama / Thriller



[Runtime ]………………[ 02:57:09



[File Size ]…………….[ 600 MB



[Resolution ]……………[ 912*512



[Aspect Ratio ]………….[ 1.778:1



[Subtitle ]……………..[ English











  
Password : freezilla.in








Read More ->>

Search FREEZILLA

Original Look

FREEZILLA UPDATES

Blog Archive

 

Contributors

Recent Comments

| IGNITED MIND--VTU © 2009. All Rights Reserved | Template Style by My Blogger Tricks .com | Design by Brian Gardner | Back To Top |