Navigator
Facebook
Search
Ads & Recent Photos
Recent Images
Random images
Welcome To Roj Bash Kurdistan 

Internet security HA HA HA this will help protect you :)

Share information about Computer , Internet, Websites ,Programming and other new technologies

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Fri Nov 21, 2014 9:43 am

BBC News

DETEKT :ymparty:

Amnesty releases anti-spying program for activists

Amnesty International has released a program that can spot spying software used by governments to monitor activists and political opponents.

The Detekt software was needed as standard anti-virus programs often missed spying software, it said.

Amnesty said many governments used sophisticated spying tools that could grab images from webcams or listen via microphones to monitor people.

It wants to see more regulation of the spying software used by governments.

"These spying tools are marketed on their ability to get round your bog-standard anti-virus," said Tanya O'Carroll, an adviser on technology and human rights at Amnesty International.

The makers of spying software did extensive testing to ensure that the way they infected and lurked on a computer did not trigger security alerts, she added.

Free of charge

Detekt has been developed over the past two years to spot the few telltale signs spying programs do leave. The intense scan it carries out on a hard drive means a computer cannot be used while Detekt is running.

Four separate rights groups - Amnesty International, the Electronic Frontier Foundation, Privacy International and Digitale Gesellschaft - have worked together to create the spyware spotter, which is available free of charge.

The group is now looking for help to keep Detekt up to date and expand the range of spying programs it can catch.

The first version of Detekt has been written to run on Windows computers because the people most often being monitored use that software, said Ms O'Carroll.

Many repressive governments had been using spying software for some time and the programs were becoming increasingly popular with democratically elected governments too, said Ms Carroll. Spying software has been found on the computers of activists in Bahrain, Syria, Ethiopia, Vietnam, Germany, Tibet, North Korea and many other nations.

"It's easier to name the countries that are not using these spying tools than those that are," she said.

The trade in spyware used by governments is now a market worth about £3bn ($5bn) a year, said Ms O'Carroll, adding it was time for this trade to be better regulated.

Prof Alan Woodward from the University of Surrey, who advises governments on security issues, wondered how easy it would be for Amnesty and its partners to maintain Detekt.

"It's not really their core business," he said. "Are they going to keep updating the software because the spyware variants change daily?"

He also questioned how useful it would be against regimes that used specially written software rather than commercial versions that were well known and documented.

"If a technique is known about widely, those regimes will assume it's going to be ineffective and use another approach," he said.

Hidden code

Claudio Guarnieri, the German security researcher who created Detekt, said there was a growing roster of firms producing spying software.

"People think the uses of spyware by governments are isolated cases. They are not," Mr Guarnieri told the BBC. "Their discovery is isolated.

"Spyware is becoming the final solution for surveillance operations to overcome encryption.

"The real problem is nobody really asked the public whether that's acceptable and some countries are legitimising their use without considering the consequences and inherent issues."

'Strength in numbers'

The software is spread in booby-trapped attachments on email messages, by seeding malware on compromised sites or with fake messaging software, said Mr Guarnieri.

Karl Zetterlund, a senior researcher at security firm Sentor, said the needs of law enforcement were understandably different to those of the average cyberthief.

"Criminals are mainly interested in information that can somehow generate money. Law enforcement spyware may only need to collect a few pieces of identifying information, such as a net address, from the computer," he said.

"Generally, policeware may be better at hiding, as normal malware often aims for strength in numbers and spreading is more important than passing under the radar."

There had also been cases in the past, he said, when computer security companies collaborated with governments to ignore spyware they found planted on machines.

http://www.bbc.co.uk/news/technology-30115679
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

Sponsor

Sponsor
 

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Fri Nov 21, 2014 9:49 am

DETEKT :ymparty:

Detekt is a free tool that scans your Windows computer for traces of known surveillance spyware used to target and monitor human rights defenders and journalists around the world.

It has been well documented that governments are using surveillance technology to target human rights defenders, journalists, NGOs, political opponents, religious or ethnic minorities and to conduct countrywide surveillance.

If you suspect you are at risk of targeted surveillance you should always seek and follow security advice to ensure you protect yourself and others in your digital communications.


DETEKT's homepage:

https://resistsurveillance.org/
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Piling » Fri Nov 21, 2014 9:51 am

I see but it works only for windows, so it is stupid, i guess that most of activists are on linux.
User avatar
Piling
Shaswar
Shaswar
Donator
Donator
 
Posts: 8375
Images: 80
Joined: Sat Apr 09, 2005 11:57 am
Location: France
Highscores: 2
Arcade winning challenges: 3
Has thanked: 280 times
Been thanked: 3048 times
Nationality: European

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Fri Nov 21, 2014 9:56 am

Piling wrote:I see but it works only for windows, so it is stupid, i guess that most of activists are on linux.


This is new so I will check into it :D
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Fri Nov 21, 2014 10:11 am

Reminders:

Use a proxy - hacker site link below :ymdevil:

http://www.google.com/search?q=%2B%C3%A ... hQf7t4CQBg

Use Duck Duck Go search engine it does not keep your information :D

https://duckduckgo.com/

Use a live distro such as Linux Mint :-B

http://blog.linuxmint.com/?p=2702

Read the security guidelines in this thread

Never take your mobile phone to any meetings or place where it would be unwise for you to be discovered connected to

Have a throwaway phone that you NEVER use at your home/work/or any other location that could make you identifiable
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Fri Nov 21, 2014 5:40 pm

Webcams and Laptops can be affected by viruses so be wary of emails and social network messages from strangers

Make sure anti-virus and firewall protection is kept up to date

Avoid putting webcams in bedrooms or other private areas

Unplug the webcam, cover the lens or point it at a blank wall when it is not in use

Be sure you can trust the person you are chatting to and remember webcam footage can be recorded and potentially shared online

If you have been the victim of inappropriate sexual contact via webcam tell a trusted adult and report it to the police

Use at least 2 separate emails - 1 for close friends you trust - 1 for other information that you will be happy to stop using should you find strange unsolicited emails
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Tue Dec 16, 2014 10:17 pm

How to block unwanted IP addresses on Linux efficiently ;)

You may want to block IP addresses on your Linux box under various circumstances. For example, as an end user you may want to protect yourself from known spyware or tracker IP addresses. Or when you are running P2P software, you may want to filter out connections from networks associated with anti-P2P activity. If you are a sysadmin, you may want to ban access from spam IP addresses to your production mail server. Or you may wish to block web server access from certain countries for some reason. In many cases, however, your IP address block list can grow quickly to tens of thousands of IP addresses or IP address blocks. How can you deal with it?

PLEASE follow the link below to find out how:

http://xmodulo.com/block-unwanted-ip-ad ... linux.html
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Sun Dec 28, 2014 8:30 pm

BEWARE I HAVE NOT CHECKED THIS SITE:

This site is NOT for Linux users but I thought it might help microsoft and mac users

Image

Tips, Tools and How-tos for Safer Online Communications

Modern technology has given the powerful new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveillance by using secure technology and developing careful practices.

https://ssd.eff.org/
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Wed Jan 07, 2015 10:22 am

Freedom Press

Image

A way of sharing stories with us
Securely & Confidentially


SecureDrop is an open-source whistleblower submission system managed by Freedom of the Press Foundation that media organizations use to securely accept documents from anonymous sources. It was originally coded by the late Aaron Swartz.

Any organization can install SecureDrop for free and can make modifications if they so choose. Check out our project page on GitHub for detailed installation instructions. Freedom of the Press Foundation also offers technical assistance to news organizations wishing to install SecureDrop and train its journalists in security best practices. Please fill out the form below to request our help.

We are maintaining an official list of SecureDrop instances in the wild. Plus we have a crowd-funding campaign for those who want to obtain SecureDrop but can't afford the hardware.

Full Article/Details:

https://freedom.press/securedrop
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Wed Jan 07, 2015 10:27 am

Wanting more security when dealing with friends and contacts

Image

File encryption software that does more with less.

miniLock makes encrypting files and sharing them with friends easy. It's a modern standard for file encryption.
Easy to use

miniLock uses your email and secret passphrase to generate a miniLock ID. miniLock IDs are small and easy to share online — anyone can use your ID to encrypt files to you, and you can encrypt files to friends using their miniLock IDs.
Modern

Enter your miniLock passphrase on any computer, and you'll get access to your miniLock ID. No key storage or management — just a single passphrase to access your miniLock identity anywhere. miniLock uses modern cryptographic primitives to accomplish this securely.
Proven cryptography

miniLock is audited, peer-reviewed software. It's developed by experts, using proven cryptographic standards and under the scrutiny of the open source cryptography community.

Full Details:

https://minilock.io/
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Wed Jan 07, 2015 1:02 pm

Open Whisper Systems :-$

TextSecure Private Messenger

TextSecure is a messaging app that allows you to take back your privacy while easily communicating with friends.

Using TextSecure, you can communicate instantly while avoiding SMS fees, create groups so that you can chat in real time with all your friends at once, and share media or attachments all with complete privacy. The server never has access to any of your communication and never stores any of your data.

★ Private. TextSecure uses an advanced end to end encryption protocol that provides privacy for every message every time.

★ Open Source. TextSecure is Free and Open Source, enabling anyone to verify its security by auditing the code. TextSecure is the only private messenger that uses open source peer-reviewed cryptographic protocols to keep your messages safe.

★ Group Chat. TextSecure allows you to create encrypted groups so you can have private conversations with all your friends at once. Not only are the messages encrypted, but the TextSecure server never has access to any group metadata such as the membership list, group title, or group icon.

★ Fast. The TextSecure protocol is designed to operate in the most constrained environment possible. Using TextSecure, messages are instantly delivered to friends.

TextSecure is not currently compatible with tablets, but support for larger screens is on our roadmap and will be included in a future release!

https://play.google.com/store/apps/deta ... .securesms
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Mon Jan 12, 2015 5:24 pm

It's Getting Easier for Hackers to Spy on Your Computer When It's Offline

One solution that Zajić and her colleagues are working on is a specialized frequency jammer that can be plugged into a laptop. For now, perhaps the easiest way to protect yourself is to keep an eye out for shady characters holding antennas under tables in coffee shops.

Make sure you log out of any and all sites you have visited before you turn off your computer

For laptops it is always best to COVER THE CAMERA
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Thu Jan 15, 2015 5:32 pm

Normally I write about internet security but what about psychically securing your PC :-?

How about a PC that can fit easily into a pocket/handbag/briefcase

Take it with you and just plug it into any monitor/keyboard/mouse

No need to worry that the information stored on your flash drive might not be compatible with someone else's computer

No expensive tablet to carry around from meeting to meeting risking damage and possible theft - who do you know who carries a tablet and is not tempted to take it out and have a play while travelling thereby shouting come and get me :))

The Linux Mint Project Announces the MintBox Mini PC

Please click to enlarge:
711

The Linux Mint project has announced the MintBox Mini, which is a mini PC that is basically small enough to almost fit into a pocket.

It looks like everyone is trying to build mini PCs and they are getting smaller each year. In fact, the MintBox Mini is five times smaller than the previous MintBox released back in 2012, so you can imagine its size and portability.

Some of you might have heard of the hardware projects made by The Linux Mint team and this is not their first endeavor. The fact that they are now releasing a new version means that the old one was successful. A lot of developers are betting on this kind of small PCs and much bigger companies are doing the same thing.

MintBox Mini is a powerful little device

The makers of the MintBox Mini, the guys from CompuLab, have made sure that users will have enough power to do pretty much anything that they want with it, with the exception of gaming, although some of the titles that have low system requirements will probably run without any problems.

"We're starting 2015 with exciting news. Linux Mint and CompuLab will be announcing a brand new unit called “MintBox Mini” in Q2 2015. With a volume of 0.22l and a thickness of 0.95″ the MintBox Mini is small enough to be pocketable. In terms of volume it’s 3 times smaller than the Intel NUC and 5 times smaller than the MintBox. Thanks to its passively cooled fanless design and its internal SSD storage, it’s also completely silent," is noted in the official announcement.

If we take a look at the previous MintBox, we'll see that it had an i3 Intel processor at 1.8 GHz, 4GB of RAM, Intel HD Graphics 4000, an internal 2.5” 500GB HDD, and all the trimmings.

On the other hand, MintBox Mini is powered by an AMD A4 6400T processor and a Radeon R3 GPU. It still features 4GB of RAM, but the internal storage is now just a 64GB SSD.

The price for this little jewel is $295 (€252) if you get it from CompuLab, but it will be also available through Amazon, in the US and the UK. The launch of the device is programmed for the Q2, 2015.

LINUX MINT - the best and easiest operating system in the entire world - in a little green box ready for immediate use :ymapplause:
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Wed Jan 28, 2015 4:32 am

ChatSecure

What is ChatSecure?

ChatSecure is a free and open source messaging app that features OTR encryption over XMPP. You can connect to your existing accounts on Facebook or Google, create new accounts on public XMPP servers (including via Tor), or even connect to your own server for extra security.

Unlike other apps that keep you stuck in their walled garden, ChatSecure is fully interoperable with other clients that support OTR and XMPP, such as Adium, Jitsi, and more.

ChatSecure only uses well-known open source cryptographic libraries to keep your conversations private. Other apps may make claims about "military grade" security but, without publicly auditable source code and verifiable end-to-end encryption, you cannot be truly safe.

Home Page:

https://chatsecure.org/
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

Re: Internet security HA HA HA this will help protect you :)

PostAuthor: Anthea » Wed Jan 28, 2015 4:41 am

Attending Protests (International)

With the proliferation of personal technologies, protesters of all political persuasions are increasingly documenting their protests—and encounters with the police—using electronic devices like cameras and mobile phones. In some cases, getting that one shot of the riot police coming right at you posted somewhere on the Internet is an exceptionally powerful act and can draw vital attention to your cause. The following are useful tips for you to remember if you find yourself at a protest and are concerned about protecting your electronic devices if or when you’re questioned, detained, or arrested by police. Remember that these tips are general guidelines, so if you have specific concerns, please talk to an attorney.

Preparing Your Personal Devices for a Protest

Think carefully about what’s on your phone before bringing it to a protest. Your phone contains a wealth of private data, which can include your list of contacts, the people you have recently called, your text messages and email, photos and video, GPS location data, your web browsing history and passwords, and the contents of your social media accounts. Through stored passwords or active logins, access to the device can allow someone to obtain yet even more information on remote servers. (You can log out of these services).

In many countries, people are required to register their SIM cards when they purchase a mobile phone. If you take your mobile phone with you to a protest, it makes it easy for the government to figure out that you are there. If you need to keep your participation in a protest secret from governments or law enforcement, cover your face so that it is harder to identify you from photos. However, do note that masks may get you into trouble in some locations due to anti-mask laws. Also, do not take your mobile phone with you. If you absolutely must bring a mobile phone with you, try to bring one that is not registered in your name.

To protect your rights, you may want to harden your existing phone against searches. You should also consider bringing a throwaway or alternate phone to the protest that does not contain sensitive data, which you’ve never used to log in to your communications or social media accounts, and which you would not mind losing or parting with for a while. If you have a lot of sensitive or personal information on your phone, the latter might be a better option.

Password-protection and encryption options: Always password-protect your phone. But while password-protecting your phone is a small barrier to access, please be aware that merely password-protecting or locking your phone is not an effective barrier to expert forensic analysis. Android and iPhone both provide options for full-disk encryption on their operating systems, and you should use them, though the safest option remains leaving the phone elsewhere.

One problem with mobile phone encryption is that on Android the same password is used for disk encryption and screen unlocking. This was a bad design, because it forces the user to either select a too-weak password for the encryption, or to type a too-long and inconvenient password for the screen. The best compromise may be 8-12 fairly random characters that are nonetheless easy to type quickly on your particular device. Or if you have root access to your Android phone and know how to use a shell, read here for instructions on how to set up a separate (longer) password for full-disk encryption. (See also "Communicating with Others” for details on how to encrypt text and voice calls.)

Back up your data: It’s important that you frequently back up the data stored on your phone, especially if your device lands into the hands of a police officer. You may not get your phone back for a while (if at all) and it is possible that its contents may be deleted, whether intentionally or not.

For similar reasons, consider writing one important, but non-incriminating phone number on your body with a permanent marker in case you lose your phone, but are permitted to make a call.

Cell site location information: If you take your mobile phone with you to a protest, it makes it easy for the government to figure out that you are there by seeking the information from your provider. (We believe that governments should obtain an individualized warrant to obtain location information, but governments often disagree). If you need to keep the fact of your participation in a protest from the government, do not take your mobile phone with you. If you absolutely must bring a mobile phone with you, try to bring one that is not registered in your name.

If you are concerned about being arrested at the protest, it’s best practice to pre-arrange a message to a trusted friend who is in a safe place. Write your text message to that person in advance and queue it up so that you can send it quickly in case of an emergency to let them know you have been arrested. Similarly, you may want to plan a pre-arranged call after the protest with a friend—if they don’t hear from you, they can assume you’ve been arrested.

In addition to being made aware that your phone has been seized and you have been arrested, that trusted friend might be able to change the passwords to your email and social media accounts in case you are coerced into giving up your passwords to the authorities.

Be sure you and your friend understand the law and the risks before engaging in this plan. For instance, if you are protesting in a country with a strong tradition of the rule of law and where protesting in itself is not a crime, it may be that conspiring to lock out law enforcement from your accounts may lead to you breaking the law when previously you would be able to leave without charge. On the other hand, if you are concerned for the physical safety of you and your colleagues at the hands of a unchecked militia, protecting your friends’ identities and your own data from them may be a greater priority than complying with an investigation.

You’re at the Protest—Now What?

Once you are at the protest, keep in mind that law enforcement may be monitoring communications in the area. You may wish to encrypt your text messages using TextSecure, your chats using ChatSecure, or your phone conversations using RedPhone, or Signal.

If you want to keep your identity and location secret, make sure to strip all metadata off of your photos before you post them.

In other circumstances, metadata can be useful for demonstrating the credibility of evidence collected at a protest. The Guardian Project makes a tool called InformaCam that allows you to store metadata along with including information about the user’s current GPS coordinates, altitude, compass bearing, light meter readings, the signatures of neighboring devices, cell towers, and WiFi networks; and serves to shed light on the exact circumstances and contexts under which the digital image was taken.
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31601
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 746 times
Nationality: Kurd by heart

PreviousNext

Return to Computer & Technology

Who is online

Registered users: Bing [Bot], Majestic-12 [Bot]

x

#{title}

#{text}