Microsoft cuts Black Friday prices on Kinect, laptops, games

Customers play a Kinect dance game at the grand opening of the 14th Microsoft Store in McLean, Virginia last week.
Customers play a Kinect dance game at the grand opening of the 14th Microsoft Store in McLean, Virginia last week.

(CNN) -- Microsoft may be a relative newcomer to in-store retailing, but it's getting the hang of this Black Friday thing.

The computing giant, with 14 retail stores across the U.S., is diving into the post-Thanksgiving shopping madness with a slew of substantial new discounts on laptops, phones, software, games and its Kinect gaming system for the Xbox 360 console.

The sale begins online Friday at 12:01 a.m. PT, when most Microsoft stores will open, and lasts through Monday. Some of the deals are just available in stores, while others are offered only at Microsoft's online store.

Among them:

-- Sony S137GX notebook: $599, normally $999 (online only)
-- Samsung RC512 laptop running Windows 7: $499, normally $799
-- Acer Iconia Dual-Screen Touchbook: $599, normally $999
-- Xbox Ultimate Gaming Bundle, which includes accessories, a game and a 90-day Xbox Live membership: up to $200 off
-- Kinect Sensor Holiday Bundle, which includes three games: $100, normally $150 (not available online)
-- A free Windows Phone with a two-year service agreement (the site doesn't specify the carrier)
-- Office Home and Student suite of software: $120, normally $150

Microsoft also is cutting prices -- in many cases by half -- on such recent popular Xbox games as "Assassin's Creed Revelations," "Battlefield 3" and "Madden 2012." See its Facebook page for an entire list.

These discounts are much deeper than those announced Wednesday by rival Apple, which is trimming prices on iPads, iPods and Macs by less than 10%.

Read more »

security for your computer

We use computer to perform several task in our daily life. They are used to process and store valuable information. Some information may be very important to organization. The loss of these important data can cause serious damage to the organization. It takes lots of money and effort to recover them. As the computer system is delicate electronic and electro mechanical system. It should be used and kept safely. If we do not use it properly, its hardware as well as software, may damage any time. Hence, computer security plays a vital role to the growth and survival of any organization. So, proper management of computer is essential for every organization.

Computer security includes the policies, procedures, tools and techniques designed to protect a company’s computer assets from accidental, international or natural disasters, including accidental input our output errors, theft, breaking or physical damage and illegal access or manipulation of data.

The protection of computer system from accidental or intentional harm, including destruction of computer hardware and software, physical loss of data, deception of computer users and the deliberate invasion of database by unauthorized individuals is called computer security. In other words, the protection of computer, its accessories, data and programs for a long life of computer system is known as computer security.Computer security is concerned with the hardware security as well as software security.


Hardware is the essential part of computer system. Computer can not perform any task without hardware. All the physical parts of the computer such as CPU, Mouse, Monitor, Keyboard, Printer etc are known as hardware. Without existence of hardware software is useless. Hardware plays very important role for proper functioning of our computer system. So, we must check and maintain hardware components frequently. We should replace defective parts of hardware immediately. Now-a-days, hardware diagnostic facilities are

available to find defective hardware comments of the computer system.The protection of al l hardware components used in computer system is known as hardware security.

Some common hardware security measures are as follows:

I. Regular Maintenance

II. Insurance

III. Dust free environment

IV. Protection from fire

V. Protection from theft

VI. Air Condition System

VII. Power Protection Devices (UPS, Volt Gu

ard and Spike Guard)

VIII. Avoiding unrelated persons in the computer rooms.


Regular maintenance is necessary for proper functioning of our computer system. We should clean our computer and its peripherals regularly by using dust cleaner. We should scan hard disk using latest and updated Anti-virus software to make it virus free. We should format hard disk time to time in order to make our computer system fast. It is better to delete unnecessary files from hard disk. Upgrade some hardware components as well as software to make computer system fast.


The term Insurance is not new for us. Generally people insurer their health, life, company, building, vehicle, etc. But nowadays many people also insure their computer. If our computer is damaged or lost we can claim for the insurance amount and replace the computer system easily. So, it is being one of the hardware security measures of our computer.


Dust is one of the major factors which cause infection of our computer system. Dust effect external as well as internal parts of our computer system. So we should keep our computer in the dust free place. We should use dust cover to prevent our computer from dust.


Fire is another factor, which cause infection of our computer system. Fire can damage whole computer system. It is very dangerous factor so we must be very careful about fire. It may cause by smoking, so it is better to avoid smoking inside computer room. Another chance is by electricity so proper wining is necessary inside the computer room. Keeping fire extinguishers can be a good idea.


As we all know that computer is an expensive machine as compared to other common machines. So we must keep our computer system in the secure place to protect from theft. If we are not careful, someone can easily state important parts of computer system from computer room. We must lock doors of computer room properly. The entry and exit of computer room must be well controlled and monitored. Unknown or unauthorized persons should not be allowed inside the computer room. Construct the computer room with emergency doors and windows. We can hire security guards to guard computer room.


We should maintain suitable temperature and circulation of air in the computer room. Low or high temperature in the computer system may cause unexpected crashes during the operation of computer. Heat can break down contracts or junctions in the chip or other devices. So, there should be proper air condition to maintain suitable temperature in the computer system. Similarly there should be enough light in the computer room. We can use cooler or fan to prevent heat built-up.


The computer system is made of delicate electronic and electro-mechanical components. We all know that it needs electric power to operate. It needs 220-240 Volts (AC) and the frequency of AC should be 49.5 Hz to 50Hz. High voltage or fluctuating voltage may cause several hardware damage. Our important data and programs can be lost due to sudden power failure. To avoid such unpredictable behavior of the power supply, we have to use some kind of power protecting devices. Some power protection devices are:

I. Uninterruptible Power Supply (UPS)

II. Volt Guard

III. Spike Guard


A computer needs a well regulated power supply for the proper functioning of its various parts. UPS is a device that stores electricity and automatically provides backup power to the computer in case of electricity failure is the source. It is activated when it detects a loss of power from the source and prevents loss of data and damage of computer parts that might be caused due sudden power failure. It also prevents our computer system against sudden power surge. It acts like a buffer between the incoming power supply and the computer system. It constantly monitors the quality and characteristics of the power supply. Nowadays a several different types of UPS having different capacities are available in the market. We should buy UPS from a well-known and reputable company.


Volt Guard is another important power protection device. It provides constant output voltage to the computer system in case of high input voltage coming from the source. As we have known that our computer system needs voltage between 220 to 240volts and high or low voltage affects our computer system. Volt Guard plays important role to save our computer system from damage due to high voltage. If the input voltage comes from the source, it provides constant output voltage between the ranges 220 to 240 volts. So, we must use Volt Guard in our computer system.


The lightening in the rainy season can cause sudden increase in the voltage level of the AC-line supplied to our house. The voltage can increase more than 2000V in our normal 220V supply. The over voltage can severely damage the electric device running at the time. This sudden over voltage is known as spikes. Spikes are very brief over voltage up to 2000V or more caused due to lightening, power- line faults etc. To save the electronic device from these spikes, we need the special, equipment called spike guard. Spike guards are the electronic device, which remove the spike and prevent it from entering into the main system.


Data and programs or software is very important things. Computer can not perform any task without software. We cannot operate our computer without operating system software. Some information of organization may be very important and the loss of these data can cause serious damage to the organization. It is very costly to recover these important data and some cases that is impossible to recover them. So, data and software security is essential for any organizations as well as every computer users. Software security is the most convenient way of safeguarding our computer system.

The protection of data and programs used in computer system is known as software security.

For protection of data and programs in our computer systems, we should apply some security measures. Some common software security measures are as follows:

Ø Password Protection

Ø Backup System

Ø Defragmentation

Ø Scan Disc

Ø Virus Scanning


The password scheme is one of the easiest and easiest and reliable method of protecting important data and information in our computer system. It is the common type of authorization control. If we protect our document by using password, only authorized users can open the document. Password is the primary source of data protection; it is a set of characters that acts like a key to unlock the system. Separate password can be used to access a system, an application, or even a file in a given application. The user in an organization who is permitted to access the company database is issued with a user ID and password and only certain level of access rights are provided to them by database administrator.

The success of this type of security depends on the ability of the user to create a password that is difficult to guess and to keep the password confidential. In order to ensure tight system security, many companies have policies that mandate the use of hard to guess passwords or randomly generated password and require employees to change their passwords frequently.

Some common rules while creating password:

· Password must be at least 6 characters.

· The word used in password should be difficult to guess for others.

· We should keep our password confidential.

· We have to change our password frequently.

· Files, which store password, must be encrypted.


Creating backup consists of making extra copies of programs or data. It provides safeguard against the loss of data or programs in computer memory, on hard disk or on diskettes. While creating backup data to a file, we have to give file name and location for the file to be saved. We can create a extra copy of data in our hand disk by using backup utility. Sometime our original data in the hard disk may erase, in that case we can restore our data from backup copy. It is always a good idea to create backup copies of our important data and programs.


Defragmentation is the process of rewriting parts of a file to contiguous sectors on a hard disk to increase the speed of access and retrieval. When files are updated, the computer tends to save these updates on the largest continuous space on the hard disk, which is often on a different sector than the other parts of a file. When the files are fragmented the computer must search the hard disk each time the file is opened to find all of the file parts, which slows down response time.

Thus hard disk needs to be defragmented using disk defragmenter. The defragmenter is available in most of the latest operating system such as windows 98, windows XP, windows vista in its system tool.


Scandisk feature is used to detect and repair errors on disk. This feature is available in windows 95/98/Me and Dos.6.2 operating systems. The scandisk feature included in windows 95/98 can search corrupted files also.


Computer viruses are the most defective factor of data and software. Viruses may damage our data and software. Viruses produce several unusual symptoms in our computer and used to give trouble to the user while working with computer. So, we should keep our computer free from viruses. For that we should scan our computer regularly using latest and updated Anti-Virus software. We can also install an ‘On access’ scanner and configure it to start automatically each time we boot our computer.


We should not use pirated software but should go for the original software. The pirated software can contain several viruses. No one can guarantee the stability and performance of the pirated software.

Read more »

Tips of latest technological revolution for improving business

It’s a fast forward world of new and upgraded technologies in which within a fraction of second the needs are fulfilled. But rewinding ourselves, we find that this progress is the hardcore outcome of previous era to continuously zeal out with new and innovative ideas. All these in turn thrust out the revolution process for today’s ongoing changes, almost in every field.

Now to cope up with this speed, the business world also needs to reorganize and prepare itself according to the changing demands of the market. Today the business field needs to reach the maximum number of customers in the minimum possible time. And for this, online representation of product is the best ever choice for companies. This interconnected network helps to get the view of the products sitting at the same very place and without wasting a lot of time. This process of web development for an attractive showcase of the product and maximum business generation solely depends on the caliber and expertise of the professionals who are the main persons to deliver the perfect and beautiful representation of the company’s product and are known as website developers. They are qualified experts of this field to develop and design the best look for the product. Again, based on this portfolio only; the viewers get an idea of what to choose and what not to by comparing a wide variety of products at the same time. To be in the competitive market, it’s really important to keep on developing and advancing one self. So, the simplest and fastest way to remain and compete in this business world, web application is the easiest way to reach viewers. They also help to proliferate and spread the business worldwide by helping out in promotion and marketing of the product thereby increasing the overall trading. But for this whole system to proceed smoothly and firmly, reliable and dedicated service providers are a must. They are available as freelancers and well equipped big and small web service provider companies. There always exists a risk with the freelancers regarding their commitment and efficiency. So to hire a web developer, it is important to clear out the questions regarding proficiency and capability for featuring out the company’s product in its most appropriate way. A well established online service provider helps out a lot in this regard. This in turn actually, is responsible for the overall graph of demand and supply curve of the business. The whole business world depends on this simple sole fact of profit generation to exist and compete in the trading area. So, it is better to stay at the top of standard level to make a strong place in the viewer’s eyes and to turn them interested in the aimed product only.

Thus, these service providers formulate a business profile for the company’s product and help to get the targeted customers for it in the smallest time interval and that too from offshore areas also thereby helping out the companies with maximum business benefits and overseas product showcase. Also, there is no harm in accepting the new advanced technologies to improve the business strategies. So, to avail the help of online business tactics and hence the web developers, is the ultimate choice to achieve success.

Read more »

Asus Eee Pad Transformer TF101G Review

The Asus Eee Pad Transformer TF101g is a dream come true which pairs a very good Android tablet with a tried-and-tested netbook keyboard to create one great product. It's sleek, stylish, and extremely practical and well worth its asking price.

  • Beautiful IPS display
  • Detachable screen
  • Premium look and feel
  • Good keyboard

  • Touchpad on dock isn't the best

Ever thought of blending an iPad with a dedicated keyboard, like a netbook’s? Sure, we all did. But the folks over at Asus did more than just that with the Eee Pad Transformer TF101. With a 10.1-inch IPS touchscreen display, the Asus Eee Pad Transformer has a docking station that’s identical to any 10-inch Asus Eee PC netbook’s. The intelligent docking station allows the Eee Pad TF101 to transform into a 10-inch Android netbook, if you will, for tasks that otherwise are cumbersome to do with mere swipes. How well does the 10-inch Asus Transformer Android Honeycomb tablet do? Let’s find out.

Design and Build:
There are two aspects to consider regarding the Asus Eee Pad Transformer TF101’s design and build — treating it as a tablet and a netbook. For a tablet, the Eee Pad Transformer’s 10.7 x 6.9 x 0.5 inches, roughly the same size as the Acer Iconia A500 but larger than the Motorola Xoom and Samsung Galaxy Tab 750. As a tablet, the Asus Transformer weighs about 680 grams — marginally heavier than the Apple iPad 2 and Samsung Galaxy Tab 750, but lighter than the Motorola Xoom and Acer Iconia A500/501 Android Honeycomb tablets.

In terms of size and form factor, the Transformer is one of the better 10-inch tablets out there. Even as a clamshell netbook, when hooked to the extended docking station-cum-keyboard, it tips the scales at 1.32 kg (similar to any 10-inch netbook in the market) and is quite slim with the lid closed measuring just over 1 inch in thickness. The Asus Eee Pad Transformer is an extremely portable device, with or without its docking station.

Its look and feel is unique among tablets, sporting a hard plastic shell with a textured mesh finish that gives the tablet a touch of premium elegance. The mesh extends on to the bottom panel of the keyboard dock. Where the tablet/screen fits into the keyboard dock, the sliding lock holds the two separate parts well, with slight jittering — it isn’t rock solid, nonetheless it’ll do.

The Asus Eee Pad Transformer TF101 Android tablet has a 10.1-inch IPS touchscreen display that’s scratch-resistant. The screen has an LED-backlit panel with a capacitive multitouch surface that packs in 1280x800 pixel resolution — greater screen area than the iPad 2, and better quality display than Motorola Xoom and Acer Iconia A501. In terms of core components, the Asus Eee Pad Transfomer TF101 comes equipped with a dual-core 1GHz ARM Cortex-A9 processor and a ULP GeForce GPU on a Tegra 2 chipset. The Transformer further features 1GB of RAM and 16 GB of onboard storage.


In terms of connectivity ports, the Asus Eee Pad Transformer TF101 comes with a microSD slot, mini HDMI out, headphone jack and a 3G SIM card slot along its screen edge; wireless connectivity options include Wi-Fi 802.11 b/g/n and Bluetooth 2.1. On the extended keyboard dock, the Asus Transformer has two extra USB 2.0 ports and a 3-in-1 card reader slot. It also has a built-in GPS, accelerometer and gyro sensor. Stereo speakers are placed along the edge of the Asus Eee Pad Transformer.

The Transformer’s screen bezel has a 1.2 MP front-facing camera and a fixed-focus 5MP rear camera for taking photos and capturing video at HD 720p. The bundled OS is obviously Android Honeycomb build 3.2.1 and one of its features lets you plug in a camera directly to the Eee Pad Transformer to transfer media directly. In terms of features and specs, the Asus Eee Pad Transformer is one of the best tablets out there — throw in a keyboard dock with a dedicated touchpad, and it has no competition.



The Asus Eee Pad Transformer TF101G comes with a 10.1-inch IPS display screen. The screen is definitely one of the brightest we’ve seen on a 10-inch tablet, with great black levels and vivid colours. The screen has amazing viewing angles with very little colour shift and its glossy surface doesn’t attract as many fingerprint smudges even when you swipe across it all day long. Whether its reading an ebook, viewing a photo album or watching a movie, the Eee Pad Transformer TF101G’s screen doesn’t disappoint one bit. The screen’s extremely responsive and its feedback couldn’t be any better.

Keyboard dock

The Eee Pad Transformer TF101G’s keyboard dock sports the exact same layout as any 10-inch Eee PC netbook launched within this past year. Sporting chiclet-sized isolated keys that are good to type on, the dock has a wide touchpad with a single-strip mouse button, too. We found the keyboard good for typing but the touchpad was too smooth for optimum feedback and it takes some getting used to. Also, since the Transformer is primarily an Android device, there are dedicated Home, Back, Screen Lock, Search, Settings, Screenshot, etc. buttons for conveniently interacting with the tablet — props to Asus for incorporating an intelligent key arrangement on the keyboard for optimally interacting with the tablet.

Onscreen keyboard

Asus has also tweaked the vanilla Android interface to help maximise the end-user experience —for example, the on-screen keyboard has five rows instead of four featured on plain vanilla Honeycomb; the extra row adds numbers which can be conveniently typed, saving you unnecessary finger clicks. The default water-level wallpaper across all homescreens is a battery indicator, rising and falling depending on battery. Also, the Back, Home, Recent Apps button on the bottom left of the home screen are visually different, more easier to launch than how they’re depicted in vanilla Honeycomb builds. So whatever tiny tweaks Asus has made to the Eee Pad Transformer’s interface only enhances the end-user experience.

The tablet’s 5MP camera has a basic interface when it comes to clicking photos. Pictures clicked in bright sunlit or very well lit interiors are good with just a shade of noise. Captured video isn’t the best in terms of quality but its average. The Transformer tablet’s multimedia experience doesn’t disappoint. In fact it’s one of the best among tablets we’ve tested. The Asus Transformer’s onboard speakers are loud and clear even at high volumes and handle both music and speech equally well. Whether it’s watching YouTube videos or HD 720p flicks, the Eee Pad Transformer handled video playback very well. And its audio-video performance helped deliver a stellar entertainment experience.

The Asus Eee Pad Transformer TF101G is one of the best tablets in terms of overall battery life. At full-screen brightness and surfing the web over Wi-Fi gave about 8 hours of battery backup (with two fifteen hour breaks); I’m sure you can extract more juice by decreasing brightness and disabling Wi-Fi. But wait, this is just the battery life of the tablet; the keyboard dock comes with its very own battery which adds another 3 to 4 hours of extra battery usage off a single charge. What’s more, when the tablet’s attached to the dock, the battery from the dock drains out before eating into the tablet’s charge -- very good thinking.

Verdict: The Asus Eee Pad Transformer TF101G sells for a price of Rs. 42,999 (including taxes). Compared to other popular 10-inch Android Honeycomb tablets out there -- Motorola Xoom, Acer Iconia A501, Samsung Galaxy Tab 750, etc. -- its price may be very high, but it also has a unique selling point. Overall, the Asus Transformer tablet is one of a kind, with a very good combination of features and performance, and well worth the price.

Overall rating: 4 out of 5

Read more »

Top 10 Trolls in Internet History

Before social networking sites and chat rooms came along, there were forums, message boards and mailing lists on the internet, which allowed people to interact with each other in relative anonymity. At that time, text strings were about the only thing that really went around, because even images had to be downloaded before they could be viewed. Some people discovered that it is possible to string sentences together that outrages, frustrates or angers completely unknown people on the web. This was a source of amusement, but it soon became more than that. The activity was known as trolling, but getting the right reactions from people, and at the right time, required considerable psychological insight. Some trolls would simply start a Star Wars Vs Star Trek thread; sit back, as furious fights broke out between respectable forum members as they strove to prove their side the stronger. Five words and every single self-respecting geek on the forum would fight it out till their keyboards broke. Trolling became an art form, and at the turn of the century, became a lost art form. This was not before a handful of trolls left their indelible mark on the online community, and the world at large. Here is a listing of the ten most infamous trolls to be every let loose on the internet.

10: Willy on Wheels

Willy on Wheels is probably the most famous "editors" of Wikipedia after Jimbo Wales himself. Willy on Wheels was hanging out in one of his favorite script kiddies/troll hangouts on an IRC channel. Now someone on that IRC channel just picked up a bunch of pages from Wikipedia - the English language encyclopedia that ANYONE can edit - and mass moved it. This gave Willy on Wheels and his buddies an idea, and they mass moved pages on Wikipedia, putting strange re-directs, and cross-linking to irrelevant pages. They also began adding "on Wheels" as a mainstay to every article they came across. So entries on Wikipedia read like "Braille Music on Wheels", "Paul Robert Bing on Wheels" and so on. As the moving and redirects were visible only to SysOps on Wikipedia, the "on Wheels" bit was something that everyone could see. Willy on Wheels and his friends wrote a script in PERL, the same language used by the mediawiki engine, to mass move and rename many pages at once, as well as add the "on Wheels" tag. Sorting through the mess took a long time. Unfortunately by then, hoards of impersonators had jumped in, and had started to vandalize Wikipedia along the same lines.

One fine day, readers who logged on to Wikipedia saw the logo replaced by this:

The entire enterprise was put on wheels! IP ranges were banned, but Willy and his wily friends kept using proxies, and continued at their work, defacing the front page many times. On April 1 2005, Wikipedia users nominated Willy on Wheels for adminship. However, soon after that, the Troll developed a conscience, and regretted what he had done. In a heartfelt letter, he explained his actions, and apologized for all the trouble he had caused. Willy on Wheels is a legitimate contributor to Uncyclopedia.

9. Jai Maharaj

Jai Maharaj is one of those people who go around Internet groups imparting knowledge and wisdom. Jai Maharaj is someone who has taken his own interpretation of Hinduism to heart, and intent on propagating the tenets to everyone on the internet. Every Usenet group that ever existed has witnessed some sort of Jai Maharaj-related activity, but he haunted the groups relating to culture, astrology and vegetarianism the most. Jai Maharaj had a large repository of vegetarianism, the Hindu caste system, and astrology related articles, and copy pasted sections of them repeatedly, contriving them to fit any discussion that was going on. All the effort was mostly an early variant of spamming, to advertise for an online astrology related store by the name of Jai Maharaj is often cited as the number 1 reason why people stopped using the discussion boards on Usenet.

8. RBX

A lot of confused people with emotions already close to the surface open up on Yahoo! answers hoping that some kind hearted internet surfer will give them the answers to life's questions. In other words, perfect troll fodder asking for it. Naturally, what happens is, they bump into RBX, who gives them a politically incorrect, rude answer, which may actually work. Here is an example:

Head over to;_ylt=An2_XIu8UyaeuD6b2kFZbsDsy6IX;_ylv=3?link=answer&more=y&show=nUcfTefDaa for more.

7. The Team Roomba Griefers

Trolls on online multiplayer games are called "griefers". Team Roomba is the most notorious clan when it comes to griefing. These are not the kind of griefers that have fun just causing meaningless trouble, or doing things against a strategy. Instead, they set up a room in a game in a certain way, and then turn it into something entirely different. For example, in this video (not safe for work, has loads of curses), the Team Roomba Griefers have set up a Team Fortress 2 room in such a way, that as soon as you enter, you have to answer a trivia question, and if you answer wrong, you are killed right away. They effectively transformed a massive online multiplayer first person shooter into a massive online multiplayer first person trivia quiz shooter, and the best thing was that players actually enjoyed it and were spawning into the room to be griefed!

6. Jason Fortuny

The personal section of Craiglist is a favorite hangout for those with voyeuristic tendencies. It is also a great place for a troll to work. However, Jason Fortuny was the one who amped up the game. He pretended to be a "submissive" woman wanting some "rough" attention from other men. His ad got responses, and how. Men sent over photos, some of which were graphic in nature. Jason Fortuny could have laughed in his evil little head and done nothing more, but he chose to upload all the responses on the wiki HQ of trolling, Encyclopedia Dramatica. This put the married lives and the jobs of some of the respondents in danger, and he was sued as none of the respondents had actually done anything illegal.

This was a dirty trick to pull, and Jason Fortuny got trolled himself. Details of his personal life were exposed and laughed about, and posts from his personal LiveJournal blog were quoted often, and out of context. This was a classic case of self-pwnage, but taught the law enforcers and internet users a lot about trolling and internet privacy.

5. David Thorne

David Thorne drew more cash than he had from his bank account. $233.95 worth of cash more, if you want the details. A representative of the bank wrote to him, asking him to make the payment as soon as possible. David Thorne replied that he did not have the cash. He did, however, have a drawing of a spider that was worth $233.95 and he e-mailed the drawing to them hoping to settle the matter. This was the drawing, if you want the details.

Now the representative wrote back, informing Thorne very politely that the bank does not accept drawings as payment. A few mails went back and forth, and then Thorne gave it another go, sending over this drawing:

If you have an eye for details, you would have noticed the extra leg. A few typos in the reply were the only deviation that betrayed the true emotions of the ever so polite bank representative. Eventually, Thorne relented, and agreed to make the payment. The e-mails can be found at

4. Something Aweful and Adam Goldstein

This one is pretty recent, and the whole incident happened as an elaborate internet drama. We imagine situations and incidents like this one coming to a television screen in the near future. Adam Goldstein had an online store, which sold computer parts. Now a certain customer known on the internet as decaf.tihs was dissatisfied with the service, as Adam Goldstein went on vacation after an order had been placed. After trying to call and mail Goldstein about his service, he got irritated, and asked for his money back. He sent a stinker off to Goldstein, and Goldstein replied that he would not return the money unless decaf.tihs apologized to him. Now decaf.tihs wanted his money back so he apologized, and his money was returned.

The matter could have ended there, but decaf.tihs went on to and began posted a thread on Goldstein and his unfair practices. The forum went a little crazy, and decided something had to be done. They called up Goldstein with death threats, taunts and insults. They got into his personal accounts on social networking sites, and insulted him there as well. Goldstein paid up for a Something Aweful membership, and joined in the discussion. Amazingly enough, Goldstein was called a troll, and no one really took him seriously. He defended himself and voiced his outrage, which just made everyone’s day on

Someone from Something Aweful called up Goldstein at this point, and told him to calm down and not post on the internet, as he was over reacting to Trolls. Basically, the caller was trying to help him, and tell him not to feed the trolls. But Goldstein would not listen. The soundclip is here (some explicit content):

Then Goldstein threatened to sue, and boasted about the large number of lawyers in his family, and the large number of guns in his house (more than what the local police department had). Something Aweful moderators thought things had gone too far, banned a few people on the forums, and closed a few threads.

The matter could have ended there, but some people from ran over to big brother /b/ on 4chan (more on that later), with an appeal for help. Someone discovered that Goldstein charged $199 to rid a computer of all viruses, and deemed it too costly. Then all hell broke loose. Someone poked around, got his hacker tools together, and focused on Goldstein. Goldstein’s website was taken down, and the website of his service provider was also taken down. His MySpace account was broken into, personal information stolen, and defaced.

Then things broke out into the real world. Sex workers of various genders were called to Goldstein’s house. Free magazine subscriptions were delivered. Boxes and packages of every kind of free sample was sent by the kinder people. Posters warning of Swine Flu and AIDS were pasted around his home and workplace. Pizza joints around his house were ordered to send boxes of pizzas over. Various kinds of religious literature were also sent over. Sex toys, condoms and tubes of lubrication were shipped over at no cost.

Goldstein didn’t know whom to sue, or whom to fire at. He just learnt not to cross the wrong side of the internet the hard way.

3. Goatse/ hello.jpg

Goatse is one of the most famous shock images to circulate the internet. Goatse was the original Rickroll, a shocking image that sprang up on unsuspecting surfers. There seem to be "waves" of Goatse activity, as every new generation of internet junkies are introduced to the image. First posted on message boards, the image became well known somewhere around the turn of the century. The image was named hello.jpg, on, a shock website. There have been many spoofs going around, including this famous picture, called "God's hands".

2. Bloodninja

Bloodninja trolled individuals, on IM and on private chats in IRC channels. The approach was this: entice people into cybersex, and then chat something so ludicrous that they just turn tail and log off. Sometimes, they would play along for some time, imagining that things would get better. The results were posted on forums, and screen captures were circulated as forwards. Other people started using the same handle, and some indulged in the same activity using different names. Bloodninja has faded away, despite the large number of impersonators, the genius of the original cybersex trolling stands out by a mile. This troll is immortalized in songs and t-shirts with his quotes are sold online, his most famous line is "I put on my robe and wizard hat". This one is one of our favorites:

j_gurli13: i start unbuttoning ur shirt.
Bloodninja: Rhinoceruses don't wear shirts.
j_gurli13: No, ur not really a Rhinocerus silly, it's just part of the game.
Bloodninja: Rhinoceruses don't play games. They f**king charge your a**.
j_gurli13: stop, cmon be serious.
Bloodninja: It doesn't get any more serious than a Rhinocerus about to charge your a**.
Bloodninja: I stomp my feet, the dust stirs around my tough skinned feet.
j_gurli13: thats it.
Bloodninja: Nostrils flaring, I lower my head. My horn, like some phallic symbol of my potent virility, is the last thing you see as skulls collide and mine remains the victor. You are now a bloody red ragdoll suspended in the air on my mighty horn.
Bloodninja: F**k am I hard now.

If you like it, head out to for more.

1. Anonymous

Anonymous is a bunch of random people on the web working together, with a whole bunch of extremely successful attacks that they can claim credit for. Thousands of users gather together under the banner, and they have a code, one of the central tenets of which is "Anon is Legion." Anonymous is the most active trolling community there is. There are a few Anonymous who make the tools, plan out the raids, and lay down the procedure. Everyone else simply follows them, and Anon's strength is in the numbers. The trolls gather together in a handful of online forums and image boards. These are ebaumsworld, something awful, and the chans (4chan, 7chan, 888chan among others). The tools are hosted at websites such as, where raids are mentioned along with the tools. What have these people done? They fixed the TIME magazine poll, for the personality of the year. Not only did they fix who won, but they also fixed the first 10 winners, spelling out the words MARBLECAKE, ALSO THE GAME. The list is official, for everyone to see, and TIME could not do anything about it.

At first, Anonymous just wanted to put moot (the owner of 4chan) at the top of the list. This was easily achieved, without even scripts or any kind of coding involved. This was achieved by giving Moot high ratings, while rating everyone else as low as possible. TIME caught up, and shaved off the top 5% and bottom 5% of the votes from their counting system. This was a small challenge to the might of Anon, and they responded. Scripts were written that gave random values to everyone on the list, but with a certain target window in mind. Each person on the list was given a particular position on the list. Deployed from different IP addresses from around the world, there was nothing that TIME could do, but publish their obviously fixed poll.

Recently, Anonymous made #gorillapenis a trending topic on twitter in a span of a few hours. It started off as an idea; the whole operation was blamed on ebaumsworld, when it was actually 4chan that came up with the gameplan. While a bunch of people used #gorillapenis from their own twitter accounts, hosted scripts that allowed people to quickly create multiple twitter accounts, then spam with random text including the word "#gorillapenis". Twitter was (relatively) fast to act, and the trending topic was removed.

Another famous raid was a whole bunch of Anons posting porn clips on YouTube. Anon focused on spamming YouTube with a large quantity of small clips. As YouTube users began flagging offending clips, Anon started flagging perfectly normal clips as porn, which confused those managing YouTube even further. Then Anon pulled tricks like having a regular video play for the first few seconds before porn suddenly showed up.

These are however, just a few of the more recent trolling activity by anonymous. Rest assured that there is much more to come from at least this group.

Read more »