tag:blogger.com,1999:blog-15513791180148780942024-03-13T11:36:49.162-07:00Knight RidersKushan Senanayakahttp://www.blogger.com/profile/14850110614613801516noreply@blogger.comBlogger4125tag:blogger.com,1999:blog-1551379118014878094.post-29247229311073953962012-07-06T10:10:00.001-07:002017-11-08T00:05:47.679-08:00DotA - Defence of the Ancients<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-S4nhw2Y5RzQ/T_cbQnIOx7I/AAAAAAAAAB4/lGKwAucMZUA/s1600/soap.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="240" src="https://3.bp.blogspot.com/-S4nhw2Y5RzQ/T_cbQnIOx7I/AAAAAAAAAB4/lGKwAucMZUA/s320/soap.jpg" width="320" /></a></div>
<a href="http://playdota.com/"><span style="font-size: x-large;"><span style="color: red;">DotA</span></span></a> is set up as an epic, ten player battle that takes place over
the course of about an hour-long game. There are ten players at a time,
split into two teams of five. Each player takes control of one hero,
and the teams fight it out across the battlefield with the help of
computer controlled units and structures until one side destroys their
opponents' Ancient. The Ancients are heavily defended structures
situated in the middle of each base.
<br />
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/UHDSpfNsUHg?feature=player_embedded' frameborder='0'></iframe></div>
<br />
There are several places you can play the game with others.
Blizzard's Battle.net service is a good place to start; there are always
plenty of DotA games going on at all times which are open to everyone.
The second place is in private leagues and servers, which you can sign
up to participate in. The third popular place for playing DotA is LAN
cafes and other local gaming hotspots. A lot of cafes have very active
DotA communities, so if you want to have fun and meet some new people
you should definitely check them out. DotA is a team game, so if you
have friends who are interested in playing or already play, forming a
team of friends can be a lot of fun and take the game to a whole new
level.Kushan Senanayakahttp://www.blogger.com/profile/14850110614613801516noreply@blogger.com0tag:blogger.com,1999:blog-1551379118014878094.post-44603884345869211462010-06-02T02:33:00.000-07:002010-06-02T02:54:26.554-07:00Akon<p> <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_vCDxla-nqkI/TAYnbCNsROI/AAAAAAAAABQ/KkwOqNvkEVk/s1600/akon1.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 276px; height: 207px;" src="http://1.bp.blogspot.com/_vCDxla-nqkI/TAYnbCNsROI/AAAAAAAAABQ/KkwOqNvkEVk/s320/akon1.jpg" alt="" id="BLOGGER_PHOTO_ID_5478109342147036386" border="0" /></a>As the son of Senegalese percussionist <a href="http://en.wikipedia.org/wiki/Mor_Thiam" title="Mor Thiam">Mor Thiam</a>, Akon was raised in a musical setting and taught to play several instruments including the <a href="http://en.wikipedia.org/wiki/Djembe" title="Djembe">djembe</a>. He was born in <a href="http://en.wikipedia.org/wiki/St._Louis,_Missouri" title="St. Louis, Missouri">St. Louis</a>, Missouri, U.S., so that he would not have to go through the immigration process, but he lived in <a href="http://en.wikipedia.org/wiki/Dakar,_Senegal" title="Dakar, Senegal" class="mw-redirect">Dakar, Senegal</a> until the age of 7, split time between America and Senegal until he was 15, then he moved permanently to <a href="http://en.wikipedia.org/wiki/Jersey_City,_New_Jersey" title="Jersey City, New Jersey">Jersey City</a>, New Jersey.</p> <p>During Akon's alleged time in jail for three years, he began to understand his music abilities and developed an appreciation for his musical background. Akon's unique blend of West-African-style, skills and moves eventually caught the ears of executives at Universal. Akon began writing and recording tracks in his home studio. The tapes found their way to <a href="http://en.wikipedia.org/wiki/Street_Records_Corporation" title="Street Records Corporation" class="mw-redirect">SRC</a>/<a href="http://en.wikipedia.org/wiki/Universal_Motown_Records_Group" title="Universal Motown Records Group" class="mw-redirect">Universal</a>, which released Akon's debut LP <i><a href="http://en.wikipedia.org/wiki/Trouble_%28Akon_album%29" title="Trouble (Akon album)">Trouble</a></i> in June 2004. The album is a hybrid of Akon's silky, West African-styled vocals mixed with East Coast and Southern beats. Most of Akon's songs begin with the sound of the clank of a jail cell's door with him uttering the word "Konvict".</p> <p>He has also been rumored to have three wives, however he has since revealed that he only has one, named Tomeka. Akon claims he has six children with three different women in an interview with <i><a href="http://en.wikipedia.org/wiki/Blender_%28magazine%29" title="Blender (magazine)">Blender</a></i>. Akon claims to have great relationships with all his children, and that he wishes to keep his family protected from the public eye. He also states that his religion made him a better person, and provides guidance to how he acts among others in life.</p> <p>He also has his own charity for underprivileged children in Africa called Konfidence Foundation.Akon owns a diamond mine in South Africa and denies the existence of <a href="http://en.wikipedia.org/wiki/Blood_diamond" title="Blood diamond">blood diamonds</a> (also known as "conflict diamonds") saying, "I don't believe in conflict diamonds. That's just a movie. Think about it. Nobody thought or cared about conflict diamonds until "Blood Diamond" was released. "However, he has since stated that he does accept that blood diamonds exist, and that he is partial-owner of an African mine that is dedicated to avoiding use of blood diamonds while also donating profits to local communities.</p> <p>"<a href="http://en.wikipedia.org/wiki/The_Smoking_Gun" title="The Smoking Gun">The Smoking Gun</a>" reported in April 2008 that much of Akon's purported criminal and incarceration history has been dramatically embellished. In particular, Akon's claims to be part of an auto-theft ring and his claim to have spent three years in prison were challenged with court records and interviews with detectives involved in Akon's case.<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_vCDxla-nqkI/TAYn3NiF1_I/AAAAAAAAABY/1kJDFr-5nr4/s1600/Akon_0.jpg"><img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 320px; height: 240px;" src="http://2.bp.blogspot.com/_vCDxla-nqkI/TAYn3NiF1_I/AAAAAAAAABY/1kJDFr-5nr4/s320/Akon_0.jpg" alt="" id="BLOGGER_PHOTO_ID_5478109826221725682" border="0" /></a></p> <p>According to "The Smoking Gun's" article, Akon was not convicted of any crime and did not serve any time in prison from 1999 to 2002 as previously claimed. He stated that "The Smoking Gun's" attempt to “discredit” him “makes no sense as it is something he is trying to forget.” Akon retorted that he never spent 3 years in prison consecutively, but many shorter sentences that add up to three years, and cites that as the mis-understanding by The Smoking Gun's article<span style="text-decoration: underline;"></span><sup id="cite_ref-19" class="reference"><a href="http://en.wikipedia.org/wiki/Akon#cite_note-19"><span></span></a></sup></p>Kushan Senanayakahttp://www.blogger.com/profile/14850110614613801516noreply@blogger.com0tag:blogger.com,1999:blog-1551379118014878094.post-28777533288823208472009-06-10T00:49:00.000-07:002009-06-10T00:53:09.546-07:00What Are Anti-Virus Softwares????....<p style="font-family: arial; font-weight: bold; color: rgb(51, 255, 51); font-style: italic;">Antivirus <a href="http://en.wikipedia.org/wiki/Software" title="Software" class="mw-redirect">software</a> (alternate spelling anti-virus) mainly prevent and remove <a href="http://en.wikipedia.org/wiki/Computer_virus" title="Computer virus">computer viruses</a>, including <a href="http://en.wikipedia.org/wiki/Computer_worm" title="Computer worm">worms</a> and <a href="http://en.wikipedia.org/wiki/Trojan_horse_%28computing%29" title="Trojan horse (computing)">trojan horses</a>. Such programs may also detect and remove <a href="http://en.wikipedia.org/wiki/Adware" title="Adware">adware</a>, <a href="http://en.wikipedia.org/wiki/Spyware" title="Spyware">spyware</a>, and other forms of <a href="http://en.wikipedia.org/wiki/Malware" title="Malware">malware</a>.</p><span style="font-family: arial; font-weight: bold; color: rgb(51, 255, 51); font-style: italic;"> A variety of strategies are typically employed. Signatures involve searching for known malicious patterns in </span><a style="font-family: arial; font-weight: bold; color: rgb(51, 255, 51); font-style: italic;" href="http://en.wikipedia.org/wiki/Executable_code" title="Executable code" class="mw-redirect">executable code</a><span style="font-family: arial; font-weight: bold; color: rgb(51, 255, 51); font-style: italic;">. However, signatures can only be updated as viruses are created; users can be infected in the time it takes to create and distribute a signature. To counter such </span><a style="font-family: arial; font-weight: bold; color: rgb(51, 255, 51); font-style: italic;" href="http://en.wikipedia.org/wiki/Zero-day_virus" title="Zero-day virus">zero-day viruses</a><span style="font-family: arial; font-weight: bold; color: rgb(51, 255, 51); font-style: italic;">, </span><a style="font-family: arial; font-weight: bold; color: rgb(51, 255, 51); font-style: italic;" href="http://en.wikipedia.org/wiki/Heuristics" title="Heuristics" class="mw-redirect">heuristics</a><span style="font-family: arial; font-weight: bold; color: rgb(51, 255, 51); font-style: italic;"> may be used to essentially guess if the file is truly malicious. Generic signatures look for known malicious code and use </span><a style="font-family: arial; font-weight: bold; color: rgb(51, 255, 51); font-style: italic;" href="http://en.wikipedia.org/wiki/Wild_cards" title="Wild cards" class="mw-redirect">wild cards</a><span style="font-family: arial; font-weight: bold; color: rgb(51, 255, 51); font-style: italic;"> to identify variants of a single virus. An antivirus may also emulate a program in a </span><a style="font-family: arial; font-weight: bold; color: rgb(51, 255, 51); font-style: italic;" href="http://en.wikipedia.org/wiki/Sandbox" title="Sandbox">sandbox</a><span style="font-family: arial; font-weight: bold; color: rgb(51, 255, 51); font-style: italic;">, monitoring for malicious behavior. Success depends on striking a balance between </span><a style="font-family: arial; font-weight: bold; color: rgb(51, 255, 51); font-style: italic;" href="http://en.wikipedia.org/wiki/False_positive" title="False positive" class="mw-redirect">false positive</a><span style="font-family: arial; font-weight: bold; color: rgb(51, 255, 51); font-style: italic;"> and </span><a style="font-family: arial; font-weight: bold; color: rgb(51, 255, 51); font-style: italic;" href="http://en.wikipedia.org/wiki/False_negative" title="False negative" class="mw-redirect">false negatives</a><span style="font-family: arial; font-weight: bold; color: rgb(51, 255, 51); font-style: italic;">. False positives can be as destructive as false negatives. In one case a faulty virus signature issued by </span><a style="font-family: arial; font-weight: bold; color: rgb(51, 255, 51); font-style: italic;" href="http://en.wikipedia.org/wiki/Symantec" title="Symantec">Symantec</a><span style="font-family: arial; font-weight: bold; color: rgb(51, 255, 51); font-style: italic;"> mistakenly removed essential </span><a style="font-family: arial; font-weight: bold; color: rgb(51, 255, 51); font-style: italic;" href="http://en.wikipedia.org/wiki/Operating_system" title="Operating system">operating system</a><span style="font-family: arial; font-weight: bold; color: rgb(51, 255, 51); font-style: italic;"> files, leaving thousands of PCs unable to </span><a style="font-family: arial; font-weight: bold; color: rgb(51, 255, 51); font-style: italic;" href="http://en.wikipedia.org/wiki/Boot" title="Boot">boot</a><span style="font-family: arial; font-weight: bold; color: rgb(51, 255, 51); font-style: italic;">. </span>Kushan Senanayakahttp://www.blogger.com/profile/14850110614613801516noreply@blogger.com1tag:blogger.com,1999:blog-1551379118014878094.post-46614359748119862232009-06-08T01:29:00.000-07:002017-11-07T23:59:30.679-08:00Royal College<span style="color: rgb(255 , 0 , 0); font-family: "arial"; font-style: italic; font-weight: bold;"><a href="http://royalcollege.lk/">Royal College</a> is one of the foremost schools in Sri Lanka. Established in 1835, it has stood around for more than 175 years or excellence.</span><br />
<span style="color: rgb(255 , 0 , 0); font-family: "arial"; font-style: italic; font-weight: bold;"><br /></span>
<span style="color: rgb(255 , 0 , 0); font-family: "arial"; font-style: italic; font-weight: bold;">The history of this wonderful school can be found <a href="http://royalcollege.lk/pages/about-royal/history-and-traditions/a-brief-history/">here</a>.</span>Kushan Senanayakahttp://www.blogger.com/profile/14850110614613801516noreply@blogger.com1