Monday, November 1, 2010

Megan Fox

Bio Megan Fox is best known for her role in Transformers and, well, for being absolutely gorgeous. This is an actress on the rise. She often appears without a lot of clothing on, which makes us like this star even more. Fox stars in the sequel to the aforementioned blockbuster, Transformers: Revenge of the Fallen.
Fox is also working with Amanda Seyfried and Adam Brody in Diablo Cody's second feature film, Jennifer's Body, which was in the fall of 2009.
Fox went out and married Brian Austin Green in the summer of 2010. That makes us sad, but we wish the couple nothing but happiness.
In 2008, Fox was named by FHM as The Sexiest Woman in the World. No complaints from us on that honor. Congrats, Megan! You are absolutely gorgeous. She should clearly win that honor every year.
Fox is not afraid to speak her mind. Her quotes have ranged in topic from legalizing pot, to embracing her status as a sex symbol. It's refreshing change from many politically correct stars out there.

Kim Kardashian

Kim Kardashian is the ex-girlfriend of Nick Cannon, Reggie Bush and Ray J. She had intercourse on camera with the former, which is what made Kim a celebrity gossip favorite.
She stars in Keeping Up with the Kardashians. This ridiculous reality show has been on for two seasons and is centered around Kim and her attention-starved family, which includes former Olympian Bruce Jenner and an assortment of sisters with first names that begin with the letter K.
It's hard to say what makes Kim so popular, but you gotta admire how she's mastered the celebrity gossip game. Kardashian makes millions a year by simply appearing at clubs and blogging about random parties. She must love capitalism.
Kardashian had been seriously dating NFL star Reggie Bush for years. Following rumors of an engagement, the pair broke up in July 2009, only to get back together about a month later. And then break up again. She was then linked to wide receiver Miles Austin.
She appeared on season seven of Dancing with the Stars, partnered with Mark Ballas... and didn't do very well. In closing, Kim and her sisters own a clothing store. It's called "Dash" and they like to pretend as though they actually play a role in its daily operations.

Britney Spears

Wow. Britney Spears is ... just.... OMG. Wow. Just wow.
With this girl, that's about all we can say at this point.
Once the biggest star on Earth, Britney Spears has gone, in the span of just a few years, from a music standout and international sex symbol to a slow moving train wreck and a total catastrophe, then slowly back to normal. It's been a wild ride.
We love Britney Spears despite her two divorces, two little kids (Sean Preston and Jayden James), a career that looks worse by the day and her possible loss of marbles. How can you not stick by your girl 4 life, right? Right. We got your back, B.
Britney Spears has brought so much to our lives... a bunch of catchy hit songs as well as raw entertainment, and for awhile, some really, really hot photos and videos.
Come what may, good or bad times, slow or crazy news week, Britney Spears will be the leading lady of this celebrity gossip site ... 4-ever. Go Britney
The decline began when she married Kevin Federline in 2004 and pretty much ended her career, but it was not until late 2007 when Britney Spears' life hit bottom. Her MTV VMA performance (pictured) was a real low point for the girl.
Then, in the span of just a few months, she became friends with Sam Lutfi (also known as Osama Lutfi), denied pregnancy rumors (J.R. Rotem was said to have knocked her up on two different occasions), had romantic dalliances with a member of the paparazzi (dating Adnan), been hospitalized for two psychotic meltdowns (resulting in total loss of custody of Sean and Jayden) amid a sea of cops, medical personnel and mass hysteria.
Since the hospital stays in early 2008, Britney Spears has been doing a lot better the help of her father, Jamie Spears, who has stepped in to take over her legal and financial affairs and stabilize her existence in general.
It was long overdue. Let's hope it lasts.
Britney's brother, Bryan Spears, has also been by her side to help her through the tough times. He recently got married to Graciella Sanchez. Britney and Bryan also have a sister, of course, in unwed teen mom Jamie Lynn Spears. That's right, Jamie and Lynne Spears named a kid Jamie Lynn. Gotta love it.
In the summer of 2008, Jamie Lynn (who is engaged to baby daddy Casey Aldridge) cranked out a l'il girl named Maddie Briann. Britney's an aunt, y'all!!!
Despite the haters' and leeches' efforts to bring down his recovering daughter, Jamie Spears has done one hell of good job making sure Britney stays focused on her career - and stays out of the limelight whenever she can.
Instead of clubbing with no pants like she used to, she's content working out and shopping a lot, steering clear of the problematic places and people who ruined her life for the past few years.
In September 2008, Britney won three awards at the VMAs, signaling perhaps once and for all that she's back.
Her latest album, Circus, spawned a number of hits, including "Womanizer," the title track and the controversial "If U Seek Amy."
ritney's dating her longtime agent, Jason Trawick, as of mid-2009. He's a little bit older, totally mature and just the influence she needs. But Brit's life took another hit in September 2010 when ex-bodyguard Fernando Flores sued her for sexual harassment. He said Spears got naked against his wishes and even used his belt to beat her kids. Ouch.

Charlie Sheen and Brooke Mueller: It's Finally Over!

It's finally over for Brooke Mueller and Charlie Sheen.
The couple filed for divorce from one another this afternoon, as TMZ has obtained the divorce documents - which are the same documents signed by the pair in May. Among other issues settled in the papers:
  • Mueller and Sheen receive joint legal custody of their twin sons. Brooke gets primary physical custody, while Charlie gets visitation rights.
  • Brooke will receive $55,000/month in child support, and the document ensures that she'll never receive less money than Charlie doles out to Denise Richards to support her and their daughters.
Brooke and Charlie Photo
  • Mueller will receive a lump sum of $757,689.70.
  • Sheen gets the family home, but must pay Brooke around $1 million for it.
  • Sheen will keep his $5.45 million watch collection. Yes, Charlie Sheen has a $5.45 million watch collection.
This official split comes a week after Sheen was discovered passed out in a NYC hotel room, supposedly high on cocaine and definitely in the presence of Capri Anderson, a porn star/call girl.

Lily Allen Suffers Another Miscarriage

Very sad news this week for Lily Allen: the singer has suffered her second miscarriage, this time after six months of pregnancy.
"It is with great sadness that we have to confirm that Lily Allen and Sam Cooper have lost their baby," the British singer's rep said in a statement today. "The couple ask that their privacy be respected and that they be left alone at this deeply distressing time. No further comment will be made."
Lily
In early August, Allen and Sam Cooper announced they were expecting a boy in January.
Tragically, this marks the artist's second such heartbreak, arriving almost three years after she went through a miscarriage during her relationship with musician Ed Simons. We wish her all the best.

Laptop Crime is on the Increase: How to protect yourself from Laptop Theft

For most people owning a laptop is all about convenience. Being able to sit where your want to work, wander around from office to office, sit in front of the television or even browse the web in bed are the reasons why laptops

have become so popular.

It has also become much more than a work tool. For many people it is the place where you keep all the things that are important to you: your email and financial information, business secrets, personal writings, even

irreplaceable media like photos, film, and writings.

So if your laptop were stolen from you tomorrow, what would it do to your life?

Even worse, if a laptop belonging to your business were stolen that contained the personal data of customers or clients, it could put all of them at risk of identity theft and you could be held liable.

This crime draws both the common thief and the more sophisticated identity thief alike, and it's on the rise in England. Last year, a laptop belonging to the Nationwide and containing the personal information of over 11 million

customers was stolen and never recovered. In London, laptop theft is up 15 increase, and a 15% increase in Manchester.

Having a laptop stolen is personal nightmare if it is your own machine, but so much worse if you lose information that compromises your friends, co-workers, and clients. At Marks & Spencer's, a laptop lost in 2007 contained

sensitive data about 26,000 employees, including their national insurance numbers and other personal identifying information. That cost Marks & Spencer's free credit checks for all employees and a promise to cover them for

any damages if their identities were compromised. In the Nationwide case above, the company was fined just under a million pounds.

And even if you get the laptop back, even if the laptop was only "borrowed" its data can be copied off in minutes, putting any data on it at risk even after the machine is returned.

Two simple steps protect yourself against losing your personal computer?

The First Step: Protect Yourself

Laptops are at risk due to the very portability that makes them useful. It takes only seconds for someone to carry off your unguarded laptop, along with all its precious contents. The first thing to do is not leave it unprotected,

even for a minute; keep it in sight. Get good security on your wireless connections while you're at it, and carefully choose the places where you use that connection.

You can also get physical barriers against using a stolen laptop. For instance, biometrics including fingerprint scanners has become increasingly popular with laptops, and key cards that you keep in your wallet or luggage

separate from the laptop can been used to secure it. Computers with hard drives mated to internal workings prevent your hard drive from being removed and copied. And if your laptop is used to access the Internet after it is

stolen, there are subscription services that can trace it remotely and render it unuseable whilst it connects to the web.

The Second Step: Consider Laptop Insurance

Laptop insurance is becoming one of the fastest growing specialist insurances. With low-cost monthly premiums having some form of insurance policy could be the one thing between you and financial ruin. Laptop insurance

is cheap, and if you have used other protections for your laptop, it gets even cheaper. Many providers offer worldwide cover, accidental damage protection and a 48 hour replacement service.

Protect yourself physically with laptop security and financially with good laptop insurance. With luck, you'll never have to depend on either. But if the worst comes about, you'll be glad you did.

cannot be spread without a human action, (such as running an infected program) to keep it going.

Difference between Virus-Worms-Trojan Horses and Spy Ware
The most of peoples make blunder when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus. While the words Trojan, worm and virus are often used interchangeably, they are not the same.

Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three, and knowing those differences can help you to better protect your computer

from their often damaging effects.

Computer virus

(1) Attaches itself to a program or file so it can spread from one computer to another, leaving infections as it travels. Much like human viruses

(2) Computer viruses can range in severity: Some viruses cause only mildly annoying effects while others can damage your hardware, software or files.

(3) Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it cannot infect your computer unless you run or open the malicious program. It is important to note that a virus



(4) People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in the e-mail.

Worm

(1) A worm is similar to a virus by its design, and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any help from a person. A worm

takes advantage of file or information transport features on your system, which allows it to travel unaided.

(2) The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge

devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address

book, and the manifest continues on down the line.

(3) Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network

servers and individual computers to stop responding. In more recent worm attacks such as the much-talked-about Blaster Worm the worm has been designed to tunnel into your system and allow malicious users to control

your computer remotely.

Trojan Horse

(1) Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your

computer.

(2) Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer,

the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying

information on your system.