World's most expensive white wine sold for £75,000

A 200 year-old bottle of Château d’Yquem has been bought by a collector for £75,000, setting a new world record for the most expensive bottle of white wine ever sold.

The bottle of 1811 Chateau d'Yquem was sold to French private collector Christian Vanneque at the Ritz in London amid tight security.
Mr Vanneque will only get to taste his expensive purchase in 2017, when he plans to drink it to celebrate what will be his 50-year career as a sommelier.
He will open it at the famous Paris restaurant La Tour d'Argent and share it with his wife, the vendor and the restaurant owner.
The diminutive wine connoisseur said he was in awe of his expensive purchase: "It is like getting acquainted with a lady who is 200 years old and I am quite shy. It is next to me and I just touched it earlier and it is quite humbling," he said.
"I knew I had Napoleon's height and now I have something from his reign and it is a bit humbling," he joked.
The majority of white wines are not meant to age. Most of them expire in the bottle after just a few years. The bottle of Chateau dYquem is an exception because it's a sweet wine. The high levels of sugar, combined with the grape's natural acidity have served as a preservative. There are only a few wines in the world with these qualities. Experts say the flavour is developed each year it ages.
The most expensive bottle of wine ever sold at auction was set last year with the £192,000 sale of a 1947 French Cheval-Blanc, a red wine sold by Christie's in Geneva.
Mr Vanneque plans to display the 1811 Chateau d'Yquem in his restaurant in Bali, Indonesia, when it launches in September 2011.

Product Review: HP TouchPad Custom Fit Case

Product Review: HP TouchPad Custom Fit Case: HP TouchPad Custom Fit Case by HP 4.3 out of 5 stars See all reviews ( 196 customer reviews ) List Price: $29.99 Price: $20.73 ...

7 Ways to Avoid Holiday Travel Stress




The hustle and bustle of the holiday season is upon us. And travel by air, which is never easy any time of the year, is especially hard during Thanksgiving and Christmas. 

Travelers can expect fewer flight options, crowded seating and higher fares.  Nationwide people are paying an average of 6 percent more for a round-trip airline ticket this Thanksgiving compared to a year ago, according to reports. And adding to the woes is bad weather: storms the Pacific Northwest, the threat of floods in the South, rain in the Northeast  --even the possibility of snow in parts of New England. 

But the high prices and threat of bad weather is not keeping people at home. AAA says some 42.5 million Americans will be on the move, traveling at least 50 miles during the Thanksgiving weekend.  This is a 4 percent increase from last year.

Fox News Traveler spoke with family travel expert Eileen Ogintz from Takingthekids.com and Priceline.com travel expert Brian Ek about how to avoid the some of the headaches of getting from point A to point B during this busy time. 

1. Plan for Padding: Plan to get to the airport at least three hours early – even for domestic flights. Check in and security lines could be especially long and you may experience unusual traffic on the way to the airport. There are countless reasons why you should plan on getting to the gate extra early. 

2. Cover Up: Some airlines charge $7 for a blanket or pillow. Especially in the winter, flights can be especially cold with the air conditioning running. Even if you’re heading somewhere like Hawaii, bring a coat to keep you warm on the flight to avoid paying for a blanket you won't need after you arrive at your destination. 

3. Hold Off On the Wrapping: Don’t wrap presents - unless they’re in a gift bag. TSA might need to open them early. 

4. Weigh Your Bags: Especially if you’re trying to squish presents into your suitcase, make sure your bag isn’t over 50 pounds. It may be much cheaper to mail presents or clothes ahead of time than to pay an overweight baggage fee which could be $49 to $100 per bag - each way. 

5. Pack Extra for the Kids: Don’t assume there will be food on the plane or you’ll have time to pick up some in the terminal before. Pack lunches for younger travelers – in case there isn’t food available or time to grab some. Also, bring extra diapers, clothes, snacks and formula for babies and kids who may get stuck on an airplane longer than you anticipated. 

6. Be Prepared for Delays: Check regularly to see if your flight is delayed before you get to the airport. You may show up to check in - only to find out you were rebooked hours earlier on a different itinerary. 

7. Bring a Sense of Humor: Everything from weather delays to crowded parking lots to long security lines will make traveling around the holidays difficult. If you have kids with you - they will sense your anxiety and might be difficult. The holidays are supposed to be a really fun experience. Don’t spoil it.

Hackers 'hit' US water treatment systems

Hackers are alleged to have destroyed a pump used to pipe water to thousands of homes in a US city in Illinois.
Hackers with access to the utility's network are thought to have broken the pump by turning it on and off quickly.
The FBI and Department for Homeland Security (DHS) are investigating the incident as details emerge of what could be a separate second attack.
Experts said the news revealed a growing interest in critical infrastructure by cyber criminals.
Information about the 8 November incident came to light via the blog of Joe Weiss who advises utilities on how to protect hardware against attack.
Mr Weiss quoted from a short report by the Illinois Statewide Terrorism and Intelligence Center which said hackers obtained access using stolen login names and passwords. These were taken from a company which writes control software for industrial systems.
The net address through which the attack was carried out was traced to Russia, according to Mr Weiss. The report said "glitches" in the remote access system for the pump had been noticed for months before the burn out, said Mr Weiss.
Peter Boogaard, A spokesman for the DHS, said it was gathering facts about the incident.
"At this time there is no credible corroborated data that indicates a risk to critical infrastructure entities or a threat to public safety," he said.
Industrial action
The comments by the DHS prompted a hacker using the handle "pr0f" to claim he had access to the control systems for a second US water utility.
He posted a document to the Pastebin website which purportedly contained links to screenshots of the internal control systems for a waste water treatment plant in South Houston.
The hacker's claims about their ability to penetrate the control systems have yet to be confirmed or denied by South Houston's Water and Sewer Department.
In an interview with the Threat Post website, Pr0f said the hack of the South Houston network barely deserved the name because only a three-character password had been used to protect the system.
The attacks are the latest in a series in which different hackers and groups have targeted so called Supervisory Control And Data Acquisition (SCADA) systems. These specialised computer systems are used to control equipment used to filter water, mix chemicals, distribute power and route trains and trams.
One of the best known SCADA attacks involved the Stuxnet worm which caused problems for Iran.
There were reports that the malware crippled centrifuges used in the nation's uranium enrichment program. Iran denied the claims saying that it had caught the worm before it reached its intended target.
Earlier this year, security researchers who investigated ways to attack SCADA systems were persuaded to cancel a public talk about their findings because of the "serious physical, financial impact these issues could have on a worldwide basis".
Lani Kass, a former advisor to the US Joint Chiefs of Staff on security issues, said America had to start doing more work to understand attacks on critical infrastructure.
"The going in hypothesis is always that it's just an incident or coincidence," she said. "And if every incident is seen in isolation, it's hard - if not impossible - to discern a pattern or connect the dots."
"Failure to connect the dots led us to be surprised on 9/11," she said.

25 Worst Internet Passwords



If  “password” is your password, chances are you’ve been the victim of a hack attack.
“Password” is the least successful, according to SplashData’s annual list of worst Internet passwords.
The list, notes Mashable.com, is somewhat predictable. Sequences of adjacent numbers or letters on the keyboard, such as “qwerty” and “123456,” and popular names, such as “ashley” and “michael,” all are common choices. Other common choices, such as “monkey” and “shadow,” are harder to explain.

As some websites have begun to require passwords to include both numbers and letters, it makes sense varied choices, such as “abc123″ and “trustno1,” have become popular choices.
SplashData created the rankings based on millions of stolen passwords posted online by hackers. Here is the complete list:
  • 1. password
  • 2. 123456
  • 3.12345678
  • 4. qwerty
  • 5. abc123
  • 6. monkey
  • 7. 1234567
  • 8. letmein
  • 9. trustno1
  • 10. dragon
  • 11. baseball
  • 12. 111111
  • 13. iloveyou
  • 14. master
  • 15. sunshine
  • 16. ashley
  • 17. bailey
  • 18. passw0rd
  • 19. shadow
  • 20. 123123
  • 21. 654321
  • 22. superman
  • 23. qazwsx
  • 24. michael
  • 25. football

SplashData CEO Morgan Slain urges businesses and consumers using any password on the list to change them immediately.

“Hackers can easily break into many accounts just by repeatedly trying common passwords,” Slain says. “Even though people are encouraged to select secure, strong passwords, many people continue to choose weak, easy-to-guess ones, placing themselves at risk from fraud and identity theft.”

Android malware explodes, jumps five-fold since July

Malware targeting Google's Android mobile operating system exploded in the last several months, its volume quintupling since July, Juniper Networks said today.
The rash of infected apps aimed at Android owners shows no sign of abating, said Dan Hoffman, Juniper's chief mobile security analyst and a member of the company's global threat center.
"We're seeing a mix of the traditional hacking community [working] on malware very similar to organized efforts on the PC side, as well as people who are just a little smart, the '15-year-old kid crowd,' who are able to hide some malicious content in an app," said Hoffman in an interview today.
According to Juniper's research, the number of Android malware samples -- each defining a different piece of attack code, or a variant of one discovered earlier -- increased by 472% since July 2011. The bulk of that growth occurred in September and October.
"We've seen an exponential growth in Android malware over the last several months," Juniper said in a blog post that accompanied Juniper's recently-published mobile threat report.
The prime threat remains purposefully-malicious Android apps that are crafted by criminals, often pirated versions of legitimate applications, then planted in either Google's official Android Market or in one of the scores of alternate download sites, which are especially popular in Asia -- China in particular.
"That is very clearly the threat now," said Hoffman, who added that the hackers' strategy would likely continue indefinitely.
That's because Google doesn't control what apps can be installed on an Android mobile device, as Apple does with code-signing technologies for iOS apps, and so makes third-party app download centers possible. Nor does Google vet apps submitted to the Android Market.
Other security researchers have noted the same when they have found malicious apps in the Android Market or in unsanctioned e-stores.
At least three different waves of malware -- in March, June and finally July --infiltrated the Android Market this year. The malicious apps were removed by Google only after they had been downloaded by an unknown number of users.
Far more attack apps have appeared in Chinese app stores that distribute Android software.
Android malware chart
Android malware volume has almost quintupled since July. (Graphic: Juniper Networks)
Juniper speculated that the hackers now crafting Android malware are those who used to specialize in Symbian and Windows Mobile attack code. But as those operating systems' share plummeted -- Web metrics company Net Applications put their shares during October at 3.5% and 0.07%, respectively, down from 8% and 0.2% a year ago -- the criminals have abandoned those platforms and jumped on Android.

"Together, the Symbian and Microsoft Windows Mobile platforms are the oldest and most researched mobile platforms, and devices running those mobile operating systems have been the targets of the most prolific and effective malware known to affect mobile devices," said Juniper.
While Google's practice of not policing the Android Market, and its inability to restrict all apps to its own distribution channel, has been pegged as the primary reason for the OS's vulnerability, Hoffman argued that the policy also gave users the means to protect themselves.
"There may be a better vetting process on iOS, but a really critical point is that Android users have the benefit of a security marketplace," said Hoffman, referring to the large number of anti-malware programs available for Google-powered smartphones and tablets.
"In iOS, consumers and even enterprise don't have a choice," Hoffman said. "There's no benefit of competition because users are completely reliant on Apple for security."
Hoffman has a point: When Lookout Security, a leader in Android-based antivirus software, recently introduced a version for iOS it was unable to provide any malware scanning capabilities in the app.
Not surprisingly for someone who works for a security firm, Hoffman also argued that it wasn't up to the OS provider to guarantee a secure device; users have responsibilities, too.
"No matter what policies an app store may have, the real way is to protect a device is to protect it with security software," Hoffman said. "You have to protect your mobile devices just like you protect your PCs."

Pentagon tests long-range hypersonic weapon

The US has test-fired a new weapon which can travel at five times the speed of sound, the Pentagon says.
The missile was launched from Hawaii and reached its target on a Pacific atoll 2,300 miles (3,700km) away in less than half an hour.
The Advanced Hypersonic Weapon is part of a programme to build new high-speed long-range missiles.
Its aim is to allow the US military to strike targets anywhere in the world within an hour.
A statement from the Pentagon said the weapon had been launched using a three-stage booster system, which had successfully sent it into the upper atmosphere over the Pacific Ocean.
It reached hypersonic speeds before hitting its target on Kwajalein atoll, part of the Marshall Islands.
New munitions
The term hypersonic is defined as exceeding Mach 5 - five times the speed of sound, or 3,700 mph (6,000km/h).
"The objective of the test is to collect data on hypersonic boost-glide technologies and test range performance for long-range atmospheric flight," said the Pentagon statement.
The US defence department gave no details of the top speed achieved by the weapon.
However, defence analysts Global Security.org say the aim of the programme is to be able to strike a target 3,700 miles (6,000km) away in 35 minutes, with an accuracy of 10m.
They say the Advanced Hypersonic Weapon is one of a number of alternatives the Pentagon is considering to allow a conventional weapon to strike "fleeting targets around the globe faster than today's munitions".
Earlier this year a congressional report said the programme was part of a project to develop a "prompt global strike" system that can deliver long-range weapons anywhere in the world while avoiding flying over third-party nations.

Call of Duty enjoys record sales despite retail woes

Activision says Call of Duty: Modern Warfare 3 has broken the global sales record for a videogame, grossing $775m (£490m) in its first five days on sale.
The Elder Scrolls V: Skyrim, released soon after, was close behind. Its publisher said it shipped seven million launch units, worth $450m (£320m).
The strong demand offers some respite to retailers in the gaming sector.
Earlier this week, the UK's Game Group cuts its revenue forecast and said sales were down 8.6% on 2010.
Modern Warfare 3 beat last year's release COD: Black Ops, which grossed $650m (£412m) worldwide over its first five days. Modern Warfare 2 earned $550m (£350m) over a similar period the previous year.
Economy
Modern Warfare 3 is the first title in two years to be developed by Infinity Ward, the creator of the Call of Duty series.
It follows on from events in Modern Warfare 2. Players take on the role of special forces resisting a Russian invasion of the United States and Europe.
However, while revenues were up on last year, the number of copies sold has remained static.
John Pinder, managing director of market analysis firm Gfk Chart-Track, said a lack of discounting this year had boosted gross takings.
"In terms of the number of units sold, it's pretty much the same as last year's version," he said.
"Given the fact that people have less money in their pockets and are spending less due, in part, to fears about the economy, to achieve the same numbers of copies sold is quite a feat," he added.

Patrick Garratt, editor of gaming website VG24/7, said that the sales figures were expected but wondered if they would continue.
"There was a lot of discussion before it shipped about whether it would break the record and, surprise surprise, it did," he said. "However, it remains to be seen how long the phenomenon can last."
Glitches
There was some good news for Bethesda, whose massive role-playing game The Elder Scrolls V: Skyrim - sold more than seven million copies since it launched on 11 November.
The open world game - with an estimated 300 hours of gameplay - allows players to explore a vast mythical landscape, battling creatures, solving quests and turning a weak character into a powerful hero.
However, problems within the code surfaced after a few days and users report the game slows down with prolonged play.
Pete Hines, vice-president of marketing at Bethesda, updated disgruntled players via Twitter, and stressed that the firm was working on a fix.
"We're working on all the issues we can. Updates coming as soon as we can," he wrote.
Mr Garratt said the problems would not hurt the title's prospects.
"Bethesda has a history of launching games with bugs. I don't think it will have any effect on the fan base at all, people just love it."
There has also been strong demand for other new titles including Batman: Arkham City and Battlefield 3.
However, shares in the retailer, Game, tumbled earlier this week after it said revenues across software, hardware and accessories were all down on the year.
Analysts say High Street videogame retailers are struggling because of competition from stores on the internet and a lack of new hardware releases.

Fake Doctor Injected Cement Into Woman's Rear



A woman who wanted to work at a nightclub started searching for someone who could perform plastic surgery at a cheap price to give her a curvier body. Police say what she found was a woman posing as a doctor who filled her buttocks with cement, mineral oil and flat-tire sealant.

The suspect -- who police say was born a man and identifies as a woman -- apparently performed the surgery on herself, and investigators say she may have victimized others. Oneal Ron Morris, 30, was arrested.

Friday after a year on the lam and has been charged with practicing medicine without a license with serious bodily injury.
Police photos show Morris as a small-framed woman with bee-stung pouty lips, arched eyebrows, oversized hoop earrings -- and a large backside. She was released from jail on bond. A phone listing for Morris could not be found, and it's unclear if she has an attorney.

Miami Gardens Police Sgt. Bill Bamford said Sunday that Morris bounced from house to house for a year, driving a black Mercedes and staying out of investigators' sight "like a ghost." An officer drove by one of those possible houses nearly every day on his way to work and saw the car outside on Friday, and he arrested Morris soon after.
The victim, who is not being named due to medical privacy laws, paid $700 for a series of injections in May 2010. She was referred to Morris by a friend.

Morris injected some type of tube in several sites around her bottom, pumping it full of a toxic concoction. Morris reassured the woman when the pain became too intense, police said.

Bamford said Morris told the woman, "`Oh don't worry, you'll be fine. We just keep injecting you with the stuff and it all works itself out."'
Bamford said the victim was reluctant to come forward. She quickly went to two South Florida hospitals due to severe abdominal pain and infected sores on her buttocks accompanied by flu-like symptoms. But she left each time, too embarrassed to tell doctors what she'd done.

Her mother eventually took her to a hospital on Florida's west coast, where alarmed doctors pressed her for information. They alerted the Department of Health.

"The doctors knew no licensed physician in his right mind would ever do this," Bamford said.
The victim is still recovering from the surgery and says it's too painful to work. She also has racked up numerous medical bills.

Authorities believe there are other victims who may be too embarrassed to come forward.
"(Morris) was readily introduced to our victim as someone who could help improve her shape, so we believe (she's) done this to other people," Bamford said.



Quick Pics








Be Careful with Facebook Status

This is what happened :


Google Music: 5 Things You Need to Know

Google recently unveiled its long-awaited music store that will offer more than 13 million tracks, instant access to purchased music in your online storage locker and several free music promotions. The search giant also announced that Google Music has graduated from its beta testing period and is now available for public sign-ups in the United States.
Similar to online music offerings from Amazon and Apple, Google Music includes an online storage locker where you can upload up to 20,000 songs for free. You can also purchase music through the Android Market either through your mobile device or PC -- an updated Android Market should be rolling out to your Android devices soon. Any music you buy from Google shows up in your online storage locker and does not count against your 20,000 song limit.
Google Music's public launch means the service is now competing against Amazon's Cloud Drive and Cloud Player and Apple's recently launched iTunes Match. All three services offer online access to your music and easy integration with an online music store. The biggest thing Google has going for it right now is that it's the cheapest option, although Amazon and Apple won't exactly break the bank at their current costs of $20 and $25 per year, respectively.
If you're thinking about getting started with Google Music here are five things you need to know about the new online music service.

Google+: Purchased sharing only

Google Music: 5 Things You Need to Know As previous reports had claimed, you can now share complete Google Music tracks with your friends on Google+, but only for songs purchased from the music store in Android Market. Any music you've uploaded to Google's servers does not qualify for Google Music's share feature. As an alternative, you can share a short clip from songs in Google's music store in Google+.

No Warner music

Google's new music store has more than 13 million tracks, but the company has yet to cut a deal with Warner Music Group. That means artists such as Bruno Mars, Christina Perri and Death Cab for Cutie are not available. But artists from the other major music labels including Sony Music Entertainment, Universal Music Group, and EMI Music are available.

Storage remains free

When Google launched Music Beta it suggested its free music locker service would only be free for a limited time. That, however, does not appear to be the case. You will still get to store 20,000 songs for free, and music purchased from the Android Market will not count against your 20,000 limit. Apple has a similar policy for its 25,000 song limit with iTunes Match, which costs $25 per year. Amazon's Cloud Drive is currently offering unlimited music storage for MP3 files uploaded to Amazon along with 20GB of cloud storage for other files for $20 per year.

Free stuff

Google Music has been offering free music to users since its beta period, but the company plans to get more aggressive with free music offerings in the coming weeks. Free music plans include tracks from The Rolling Stones, Coldplay, Busta Rhymes, Shakira, Pearl Jam, Dave Matthews Band and Tiesto. T-Mobile customers are also getting some exclusive free music from Google Music including songs from Busta Rhymes, Drake and Maroon 5. It's not clear whether these free songs will eventually roll out to other Google Music users.

Downloads

Google Music: 5 Things You Need to Know If you want to download music to your PC that you've purchased through the Android Market, you can either download them through your Web browser or use Google's music manager desktop application. To download via the Web click on the dropdown menu for the track you want to download and select "Save to computer" under "Purchased Options." Google will only let you download a particular track through your Web browser twice. You can get around this limit by using the Google Music Manager desktop application to download tracks to your computer. But in my tests Music Manager did not yet have the option to download tracks directly from Google Music and could only upload your music to Google's servers.

Facebook to Porn Spammers: We Know Who You Are


Facebook says it knows who was behind the massive spam attack on the social network this week--although it isn't naming them--and it intends to take legal action against them.
In a statement released to media outlets, Facebook said that its dedicated enforcement team "has already identified those responsible and is working with our legal team to ensure appropriate consequences follow."
Those familiar with Facebook's history with spammers know that the socnet doesn't make idle threats when it comes to junco artists. It pursued one spam king, Sanford Wallace, for two years before winning an indictment against him earlier this year.

The indictment accused Wallace of flooding Facebook with 27 million spam messages in 2008 and 2009. It also said that the junk czar used phishing attacks to steal usernames and passwords from victims and used the stolen credentials to post spam to victims' walls.
Because a threat to take down Facebook was made earlier this year by some members of the hacker collective Anonymous, its name initially surfaced as a possible perpetrator of the attack. That's unlikely, however, not only because the group called off its action against Facebook scheduled for Nov. 5, but using shock spam in an attack just isn't its style.

This Week's Spam Attack

The spam attack on Facebook began early this week when many Facebook users began seeing pornographic and shock spam appearing in their news feeds without any knowledge of how they got there. After some delay, Facebook finally acknowledged that the attacks had taken place.
The social network has an impressive security scheme in place. The Facebook Immunity System (FIS), which analyzes 650,000 actions a second, has done a good job of protecting social networkers from malicious and annoying activity directed at their accounts, but it has its flaws.
For example, earlier this month, researchers showed how botnets could be created to harvest information from members without being detected by FIS. And, obviously, the latest spam deluge dodged detection.
That deluge was based on tricking members into pasting JavaScript code into the address bar of their browsers. The code caused a member to share offensive material with their friends.
While praising Facebook's action in cleaning up the mess, one secure browser maker added thatproblems with self-inflicted JavaScript infections persist on the network. "Facebook has cleaned up most of the offensive content from in the recent campaign," noted Mike Geide at the Zscaler blog. "But doing some specific searches I was able to find some examples of this self-inflicted JS injection technique being used on Facebook."
"The most common case, are Facebook groups that ask you to join and then enter in some JS into your URL bar," he added.
For Facebook members, the lesson here should be axiomatic: don't paste computer code in your browser's address bar.
 

About Me

My photo
I'm a 27 years old guy who's trying to expand my blog that contain useful and how-to information for everyone.