add widget ''networkedblogs_nwidget_container''

Google App Engine

Powered by Google App Engine

AddThisToAny.com/share_save

Share

My Blog List

Pages

blog2010ray2.blogspot.com

blog2010ray2.blogspot.com

Blog2010ray2

rl2socialnet.blogspot.com

//rayloke1-newblog.blogspot.com/

//rayloke1-newblog.blogspot.com/

//rayloke1-rl-usa2007.blogspot.com/

//rl-usa2007.blogspot@blogger.com

//Australia2008@blogger.com

//picasaweb.google.com/rayloke1

swiz

swiz
eu

EU EURO COUNTRIES

Sunday, June 24, 2012

BBC News - Anders Breivik trial: A 10-week ordeal

BBC News - Anders Breivik trial: A 10-week ordeal ;.. Words. The power of words. That's what I'll remember most about this trial.
Over 10 weeks, so many terrifying words have been spoken in Courtroom 250; the words of coroners in the 77 autopsy reports; detailed descriptions of how victims were hunted down and shot; words of pain from their families.
Words which journalists covering the trial have had to type, tweet, despatch and broadcast to the world.
It was often the simplest words which proved to be the most upsetting. Like the brief messages from victims' families which followed each coroner's report.
"Daddy, YOU were the best in the world."

Friday, June 8, 2012

Europe soccer tournament overshadowed by racism claims, boycott

Europe soccer tournament overshadowed by racism claims, boycott ;..  Yes, nothing to compare ...as Related Content is ''no longer the same'' ...  but ''probably'' goes beyond RELATIONSHIPS is truly WILD plus CRAZY; ... Evidently Poisonous and VIRAL, REALLY !

Friday, June 1, 2012

Was Flame virus written by cyberwarriors or gamers?

Was Flame virus written by cyberwarriors or gamers? ;..   super-secret spy software be written in a video game language?  As security researchers continue to unpack the digital mystery that is the Flame virus, that's just one question looming over perhaps the world's most intriguing digital whodunit.
With all the talk about Flame being the most powerful, ingenious and stealthy computer virus ever written, some properties of the mysterious malicious software are causing confusion.
For one thing, the program takes up 20 megabytes of space on infected machines. That's not stealthy; large files usually indicate sloppy programming.