LINK 1 20+ mac
LINK 1
LINK 1

LINK 2
LINK 2

LINK 3
LINK 3

LINK 4
LINK 4

LINK 5
LINK 5

LINK 6
LINK 6

LINK 7
LINK 7

LINK 8
LINK 8

LINK 9
LINK 9

LINK 10
LINK 10

Sa mga di nakaksunod leave lang kayo comments, pipilitin kong masagot lahat nang mga tanong nyo.
LINK 1

LINK 2

With SS para di sabihing not working..
LINK 1

LINK 2

mac with SS
1. CCleaner 4.19.4

Probably the most popular freeware cleaner globally with over 1 billion download

2. Avast Free Antivirus 10.0.2208

Avast! Free Antivirus is an efficient and comprehensive antivirus program. It is one of the most popular antivirus programs available, thanks to the reliable and trustworthy brand that Avast have created. The key features that continue to make Avast! Free Antivirus so popular are the easy UI, optimized scanning options and continuously updated database of virus definitions.

3. Recuva 1.15.106

Recuva (pronounced "recover") is a freeware Windows utility to restore files that have been accidentally deleted from your computer. This includes files emptied from the Recycle bin as well as images and other files that have been deleted by user error from digital camera memory cards or MP3 players. It will even bring back files that have been deleted from your iPod, or by bugs, crashes and viruses!

4. DAEMON Tools 4.49.1

With DAEMON Tools you can back up your physical CD/DVD/HD DVD/Blu-ray discs into "virtual discs" or so called "disc image" files, which run directly on your hard drive. You can also work with images created by other burning programs! DAEMON Tools supports variety of image types. Use CD/DVD image converter to have one format images in your Image Catalog!
At this point it’s unlikely that readers will be unaware that Taylor Swift has removed her music from Spotify, complaining that the service fails to “fairly compensate” artists, writers and producers.
“We were both young when we first saw you, but now there’s more than 40 million of us who want you to stay, stay, stay,” Spotify said in a response. “It’s a love story, baby. Just say yes.”
Swift did not, despite claims from Spotify CEO Daniel Ek that the artist was on track to pull in $6 million from Spotify this year if she’d left her content online. Presumably she’ll still get few million dollars from the streaming service, but in a statement yesterday Ek said that reduced availability for fans will mean more turn to illegal services such as the world most notorious torrent site.
“And sure enough, if you looked at the top spot on The Pirate Bay last week, there was 1989,” he said.
While that revelation wasn’t too much of a surprise, nor the highlighting of YouTube as a potential magnet for fans who don’t want to pay, the decision by Ek to flag up a competitor as a pirate holdout has poured yet more fuel onto the Swift fire.
“[Swift's] songs are all over services and sites like YouTube and Soundcloud, where people can listen all they want for free,” said Ek. “To say nothing of the fans who will just turn back to pirate services like Grooveshark.”
groovesharkThe gibe drew an instant rebuttal from James A. Pearson, EVP Corporate Communications at Grooveshark.
“We would normally never comment on a competitive service and their dust-up with one of the world’s most popular artists. But as Spotify’s CEO — who it’s worth mentioning is the recent CEO of uTorrent — an app used by over 100M people, which had similar perception issues — called Grooveshark ‘a pirate service’ in his blog response to Taylor Swift today, we had to comment on that element,” Pearson said.
On the history, Pearson is correct. In the early days of uTorrent Ek worked with uTorrent creator Ludvig ‘Ludde’ Strigeus before the pair sold up to BitTorrent Inc. in late 2006 and disappeared into the moonlight to create Spotify. Strigeus is a Spotify developer to this very day.
Of course, mentioning uTorrent in retaliation to “pirate service” remarks doesn’t really help calm things down and only drags other third parties into the controversy. However, when looking at the spat from Ek’s perspective it’s not difficult to see why he’s irritated by Grooveshark.
Search Spotify today for Taylor Swift’s 1989 and the only results returned are for cover versions by former cruise ship musician Robert W. Weber, aka Molotov Cocktail Piano. Search Grooveshark for the same and it’s an entirely different story.
Swift
The odd situation here is that while Swift put her own music on Spotify and will get millions back this year as a result, she has now stopped that revenue stream by removing it entirely. On the other hand she didn’t put her music on Grooveshark but it’s there for anyone to stream, until she has someone pull it down with a DMCA complaint of course.
Why the Spotify retraction came before the Grooveshark deletion is anyone’s guess. In a 2013 interview, Grooveshark CEO Sam Tarantino reported that in 2009-2011 his service had 35 million users. Today Spotify has an estimated 50 million so calling the services ‘competitors’ is probably fairly accurate, despite the differences in their business models.
Spotify say they have paid $2 billion to artists while Grooveshark claims that licensing deals in place with thousands of artists has resulted in “million” in payments. However, up to now neither the company nor Swift have mentioned a specific licensing deal for the singer’s music. Until they do, Daniel Ek is unlikely to withdraw his statement.
source: Torrentfreak

After the final guilty verdicts were handed down in the historic Pirate Bay trial, Fredrik Neij decided that life in a Swedish prison wasn’t for him.
Instead, Neij flew to the Asian country of Laos where he has been enjoying family life with this wife and three children. He made no secret of his whereabouts, with Facebook updates appearing to show a relaxed man enjoying life in the capital Vientiane, a city situated on the Mekong near the border with Thailand.
Vientiane’s location appears to have played a big part in both Neij’s life and his eventual downfall. Laos is somewhat lacking in facilities so being right on the border with Thailand was convenient when Neij’s family required things such as healthcare.
However, according to Thai authorities he crossed that border 27 times in recent years and Monday was to be his unlucky day. Neij was already the subject of Swedish and Interpol warrants so when he was spotted wearing the same shirt as he was wearing in his ‘wanted’ photo, Thai border police arrested him.
After being held in custody during Monday and Tuesday, Neij is now on his way to Bangkok pending his almost certain return to Sweden. While it is being reported that Neij will be extradited, Sweden and Thailand have signed no extradition treaty. That being said, removing him is not expected to be an issue.
Local media is reporting that Thai authorities have revoked Neij’s visa, meaning that he can now be deported. Most people being removed from the country are taken to Bangkok and Neij is now confirmed as being en route to the Thai capital.
“Three Thai policemen will escort him on the flight to Bangkok and Swedish police will help us whisk him to the immigration bureau before he is handed over to Swedish authorities,” Police Colonel Panlop Suriyakul na Ayutthaya told AFP.
That Swedish authorities are in Thailand ready for Neij was confirmed by his lawyer Jonas Nilsson.
“As I understood it, staff from the Swedish embassy are on their way to where he is. [Fredrik has] also been informed that he will be transported to Sweden,” Neij’s lawyer, Jonas Nilsson told SR.
The deportation procedure is relatively straightforward and an initial investigation could be completed within 48 hours but extended for seven days and beyond if necessary. [Update: Thai authorities say Neij will be sent to Sweden "within the next month"]
If earlier plans for Neij’s incarceration in Sweden play out, on his return he will be processed and taken to Kirseberg prison in Malmö. The prison first came into operation during 1914 and has a capacity of 131 inmates and around 170 staff. According to the decision of the court, Neij is set to spend a total of 10 months inside.
neij-prison
In addition to his prison sentence, Neij is required to pay his share of roughly $6.78m in damages owed to copyright holders.
Previous investigations by Swedish authorities turned up no assets in his name but yesterday Thai authorities revealed that the Swede has a house on the island of Phuket and five million baht ($153,000) in a local bank account. Whether this is within reach of copyright holders remains to be seen.
Source: Torrentfreak
With 2013 now behind us, which torrent sites are pulling in the most visitors at the start of 2014?
Traditionally, BitTorrent users are very loyal, which is reflected in the top 10 where most sites have had a consistent listing for more than half a decade. But in common with every year, 2014 sees a few movers and shakers, as well as several newcomers.
The top three slots remain intact compared to last year, with The Pirate Bay in the lead despite several domain name changes.
The most notable absentee this year is isoHunt. The site has been featured in the top 10 since 2006, but went offline in 2013 after it settled its legal dispute with the MPAA for $110 million.
Last year’s newcomer H33t also fell out of the top 10 after it lost its domain name. The site relaunched after two months downtime at H33t.to but has lost most of its traffic.
The first newcomer in the top 10 this year is YIFY-Torrents, which is also one of the youngest torrent sites after being founded in 2011. The site has grown tremendously over recent months, and by focusing on popular movie releases YIFY has evolved intoHollywood’s new nemesis.
Isohunt clone/replacement isoHunt.to is the second newcomer, which is quite an achievement since the site only launched two months ago. RARBG is the last ‘new’ name, the site has been around for many years but is listed in the top 10 for the first time.
Below is the full list of the top 10 most-visited torrent sites at the start of the new year. Only public and English language content sites are included. The list is based on various traffic reports and we display the Alexa and U.S. Compete rank for each. In addition, we include last year’s ranking for each of the 10 sites.
Did we miss anything? Feel free to join the discussion below. People who want to increase their privacy may wants to use a proxy or VPN service.

1. THE PIRATE BAY

To many people The Pirate Bay is synonymous with BitTorrent. The site was founded more than a decade ago and is still expanding, despite various legal troubles, domain hops and ISP blockades. The Pirate Bay currently has well over a billion page views a month.
ALEXA RANK: 79 (EST) / COMPETE RANK: NA / LAST YEAR #1

2. KICKASSTORRENTS

KickassTorrents was founded in 2009 and has quickly moved up in our top 10, settling into 2nd position this year. Responding to a looming domain seizure the site movedfrom its kat.ph domain to Kickass.to last August. Despite domain troubles and blockades by Internet providers in the UK and Italy, the site continues to grow.
ALEXA RANK: 103 / COMPETE RANK: 452 / LAST YEAR #2

3. TORRENTZ

Torrentz has been the leading BitTorrent meta-search engine for many years. Unlike the other sites featured in the list Torrentz does not host any torrent files, it merely redirects visitors to other places on the web. The site uses several domain names with .eu being the most popular.
ALEXA RANK: 153 / COMPETE RANK: 1.377 / LAST YEAR #3

4. EXTRATORRENT

ExtraTorrent continues to gain more traffic and has moved up again in the top 10, now placed as the 4th most-visited torrent site. This success didn’t go unnoticed by rightsholders groups such as the MPAA who recently called out ExtraTorrent as one of the top pirate sites. The site was forced to trade in its .com domain for .cc this year, after it was suspended by its domain registrar.
ALEXA RANK: 363 / COMPETE RANK: 2,286 / LAST YEAR #5

5. YIFY-TORRENTS

Roughly three years ago nobody had ever heard of YIFY but today the movie release group is one of the most recognizable movie piracy brands on the Internet. This reputation resulted in a court-ordered ISP blockade in the UK last year.
ALEXA RANK: 809 / COMPETE RANK: 6,245 / LAST YEAR #NA

6. EZTV

Unlike the other sites in the top 10, TV-torrent distribution group EZTV is a niche site specializing in TV content only. Because of its focus, EZTV’s traffic varies in line with the TV seasons.
ALEXA RANK: 1,050 / COMPETE RANK: 10,790 / LAST YEAR #7

7. 1337X

1337x focuses more on the community aspect than some competitors. The site’s owners say they launched 1337x to “fill an apparent void where it seemed there was a lack of quality conscience ad free torrent sites with public trackers.” In common with most other sites in the top 10, 1337x.org is currently blocked by the larger UK Internet providers.
ALEXA RANK: 1,382 / COMPETE RANK: 11,445 / LAST YEAR #6

8. ISOHUNT.TO

Isohunt.to was launched last October, less than two weeks after isoHunt.com shut down. The site is not affiliated with the old isoHunt crew but copied the site’s design. This has not been without success, as the site now has millions of pageviews a day.
ALEXA RANK: 1,550 / COMPETE RANK: NA / LAST YEAR #NA

9. BITSNOOP

BitSnoop is one of the largest BitTorrent indexes, claiming to index a massive 21,437,061 torrent files at the time of writing. The site’s torrents list continues to grow steadily, as do the number of DMCA notices that it receives.
ALEXA RANK: 1,714 / COMPETE RANK: 5,633 / LAST YEAR #8

10. RARBG

RARBG, which started out as a Bulgarian tracker several years ago, is the third newcomer in the top 10. Together with isoHunt.to it is the only website in the list that hasn’t been blocked in the UK, which may in part explain its popularity.
ALEXA RANK: 1,867 / COMPETE RANK: 13,238 / LAST YEAR #NA

Source :Torrentfreak
Following the reports of a concerted effort to steal passwords and other sensitive information from people using iCloud in China, Apple has recently issued a new security warning for users of its popular online storage service.


Apple posted an announcement a few days ago on its support website, saying that the company is aware of intermittent organized network attacks that uses insecure certificates to obtain user data. Apple specialists claim to take it very seriously and assure that Apple’s own servers had not been compromised. In the meantime, this particular announcement didn’t mention China or give any details on the recent attacks. At the same time, the reports were that some Chinese Internet users saw warnings saying they had been diverted to an unauthorized website when they tried to sign into their own iCloud accounts.


Such attack, normally referred to as a “man in the middle”, may enable a 3rd party to copy and steal the passwords entered by the users when they believe they are signing into Apple’s service. The intruders could then use the data received to steal other information from the users’ accounts.



In respond, Chinese activists blamed the attacks on that country’s government. Local media reports suggested the campaign was spurred by the fact that the tech giant recently began selling its newest iPhone models in China, which have software with enhanced encryption features to protect users’ information.



screenshot_31.png



According to security specialists, the attacks hadn’t affected those users who signed into iCloud from their iPhones or iPads, or on Mac computers while using the latest Mac OS and Safari browser. However, Apple suggested that users should make sure they were connecting to a legitimate iCloud server. This can be done using the security features built into Safari and other browsers like Firefox and Chrome. Those browsers will display a message warning people they are connecting to the website lacking a digital certificate that verifies that it is authentic. In other words, if users visit www.icloud.com and get an invalid certificate warning in their browser, they are recommended to pay attention to the warning and not proceed.



Apple also pointed out that the attacks appear unrelated to a September incident, where hackers stole nude photos of a number of American female celebrities from the iCloud accounts. At the time, the company claimed that the hackers had obtained the users’ passwords via so-called “phishing attacks” or by guessing at the answers to security questions which allowed access. Apple maintained that its servers were not breached in that case.

Source: Extratorrent
The file-storage service has denied claims that 7 million usernames and passwords have been stolen by the hackers, who were then threatening to leak them online. The hackers posted a few hundred usernames and passwords on the text-sharing site Pastebin. The cyber attackers claimed that it was just a small portion of the 7 million logins stolen directly from the Dropbox servers. The Bitcoin “donations” were demanded from the netizens to release the rest of the stolen data.

However, the Dropbox’s security team pointed out that the usernames and passwords posted online were stolen from unrelated services and used to log in to various websites across the web, including Dropbox. The company employs measures to detect suspicious login activity and automatically resets passwords when such is detected. Moreover, the security experts found out that subsequent lists of usernames and passwords were not connected with Dropbox accounts.

Apparently, it was due to password reuse that some of the leaked details appeared seemingly coincidentally valid for Dropbox. It is unclear how many of them worked, but the service has since revoked any that were valid. Password reuse remains a common phenomenon, so there will always be a chance they could appear valid on unrelated services.

The security experts explain that other password leaks have been used by the hackers in a similar manner in the hopes to sell the data on. For example, the Russian hacking scare a few months ago, where security researchers claimed hackers obtained 1.2bn usernames and passwords, was questioned as a similar situation, i.e. a collation of previous leaks combined with other data. In some cases people looked for Bitcoin donations where the data didn’t exist at all, in others the data wasn’t for the services claimed and didn’t origin from the sources claimed.

Dropbox and other services recommend users to adopt two-factor authentication. In other words, to use another device like a number generator mobile app or USB key as a secondary login factor. Although this way might add an inconvenient step in the use of apps and services, it can prevent others from logging into the service from an unknown device or a suspicious location. Such method is used by Dropbox, Google, Facebook and other major services.
Screen_Hunter_02_Oct.jpg

Source: Extratorrent

Car-show model embroiled in PNP calling-card scandal issues apology

Yesterday, a reader sent us a screenshot of a controversial Facebook post by car-show model (and one-time Top Gear Philippines booth babe) Alyzza Agustin. In the said post, Agustin showed a calling card of PNP director for plans Alexander Ignacio, with the following dedication scribbled by the latter on the back of the card: "PLS ASSIST MY EA, ALYZZA AGUSTIN."
Agustin's caption was: "Nahuli na naman ako dahil coding but because of you Boss Alex wala ng huli-huli. Thank you so much sa napaka-useful mong card with matching dedication pa."
Translated in English: "I got apprehended again because of the number-coding scheme, but because of you Boss Alex, no more apprehension. Thank you so much for your very useful card with matching dedication at that."
We posted the screenshot, which immediately went viral (now with more than 6,100 likes, 3,600 shares and 2,300 comments). Several blogs and news websites even picked it up without proper attribution (Agustin had taken down her post before the buzz reached the aforementioned websites).

Car-show model embroiled in PNP calling-card scandal issues apology

Earlier today, a common friend approached us on behalf of Agustin, inquiring about what could be done about the post. We told the guy that we couldn't take down the post but offered to give Agustin prominent space on the website should she desire to issue a formal statement. We then suggested to the friend that Agustin make a public apology and just admit that she committed a mistake. We said people would understand as Filipinos are known to be a forgiving lot.
We don't really know if the common friend communicated to Agustin our suggestion, but just an hour ago, she posted the following statement on her Facebook page: "I would like to apologize to everyone who was affected and offended by my post: fellow motorists, Director Alexander C. Ignacio and his family, and the PNP institution as a whole. I was just overwhelmed by that moment because I was caught in traffic for hours coming from work. I would like to make it a point that I do not know Director Alexander C. Ignacio personally. I mean no harm to anyone, and just like any Filipino motorist, I would like a little convenience on the road. Naniniwala po ako na ang bawat isa sa atin ay may pagkukulang din naman sa daan. Pasensya na po sa aking pagkakamali."
On second thought, we are somewhat convinced that the friend conveyed our message to Agustin because of her use of the word "convenience," which we kept mentioning to the friend.
Anyway, let this be the end of the issue. We commend Alyzza for admitting her error in judgment. Let this also be a lesson to everyone that the "calling card culture" prevalent in this country is something that has to stop now, because it corrupts our society today as well as our children tomorrow.




Car-show model embroiled in PNP calling-card scandal issues apology

source: topgear.com.ph
Waku-doki for the masses

Not everyone can afford a Toyota 86, let alone a Land Cruiser. Nor can too many people afford an Altis, or even a Vios. For the entry-level price point, which has been dominated by the value leader Mitsubishi Mirage, Toyota has just trotted out the Wigo, a mini car with a surprising amount of room for not a lot of money.
If the styling is rather reminiscent of an Avanza, the similarity has genetic roots and is happily functional as well, because the Wigo is largely a Daihatsu affair just like the Avanza. And just like the latter's functional sexy-box looks, so goes the Wigo with what's claimed to be class-leading passenger and cargo space. This shouldn't actually be a surprise, because Daihatsu (majority-owned by Toyota) has specialized in small cars for the longest time and knows how to get the most room out of limited sheet metal.

Manufactured and (mostly) designed by Daihatsu save for some aesthetic touches Toyota reserved for itself--like the front and rear--the Wigo (also known as the Daihatsu Ayla) will hit the streets for as little as P448,000 bare-bones and justP534,000 nicely spec'd. The silhouette is actually more micro-MPV in the same spirit as the Honda Jazz, and this yields big dividends in passenger space and cargo volume. The corporate face of Toyota is evidenced by the dual grille design with the oversized headlamps and arrowhead-type foglamps. If you squint your eyes and (maybe) take a certain type of mushroom, you might even see a hint of Lexus LFA there!

Kidding aside, this is bad news for competitors like the Mirage, the Suzuki Celerio, the Hyundai Eon, the Chevrolet Spark, and even the recently introduced Hyundai Grand i10, because none of them can match the Wigo's combination of size, price and features. At P534,000 for the four-speed automatic-equipped 1.0G, buyers get all power features, fog lamps, dual airbags, front and rear brake discs with ABS, antitheft system, and even a navigation-ready stereo with iPod, USB and video capabilities.

For the base 1.0E, you save a hundred grand but also lose out on most of said features, have to row yourself with a manual, but still retain both airbags. The 1.0G gets 175/65 R14 tires on cute six-spoke wheels, while the stripper gets by with 13-inch donuts on covered steel wheels. The stripper will look good to fleet managers, while the more kitted-out G should appeal to folks looking to buy their first car, or parents who need to get one for their kid who's going to college (or even as a second or third car for everybody else). Toyota even had one with a sporty TRD kit that was honestly quite desirable. A five-speed manual can also be had with the G (P499,000).

While most everybody at the Cebu launch was trying to find the engine (it's so tiny and cute it could fit in a small backpack), I was more impressed with the amount of room inside. Even with our technical editor Ferman Lao comfortably fixed in the driver's seat, I had a surprising amount of legroom in the back; my knees didn't even touch the back of the driver's seat. The tall roof has a scalloped headliner to really get the max amount of headroom so even six-footers won't bump their heads against it. The one-piece rear seatback also folds down. Configured like so, Toyota claims that two largebalikbayan boxes and two smaller boxes (like you'd use for fruits) easily fit inside. With the rear seatback up, there is still a decent amount of space for a small cooler and several soft bags. I could even sit back there, actually.
The engine itself is the 998cc 1KR-FE, a three-cylinder design with 12 valves and twin cams that, according to Wikipedia, meets Euro 5 standards and has won the International Engine of the Year awards for 2007, 2008, 2009 and 2010 (sub 1.0-liter class). It weighs just 69kg with all the accessories attached, and makes 64hp at 6,000rpm and 85Nm of torque at 3,600rpm.

The Toyota brochure doesn't say how much the Philippine-spec Wigo weighs, but Wikipedia says it has a curb weight of 800kg for a 12.5kg/hp ratio. So, no, do not expect this car to do anything more than get you from Point A to Point B in at least the same day. Don't even expect a lot of fabric inside except on the seats, as the dashboard, center console, and door panels are all hard plastic. The speedometer tops out at 200kph, which should be a source of amusement if you ever find yourself going downhill with a 40kph tailwind. You can at least expect something so small to be thrifty at the pump, and to be similarly cheap to maintain (three spark plugs, not too much oil to replace). The fuel tank holds 33L. Toyota has yet to give out official fuel consumption figures, but expect it to go into the high teens. The suspension uses the standard front strut-rear torsion beam layout, adding a stabilizer bar for the G. Unfortunately, the launch was strictly an unveiling so no driving impressions yet.

With six rather serious colors to choose from (white, silver, gray, blue, light blue and black; no candy colors for Toyota), a decent amount of standard features, impressive space, a certain level of styling pluck, and the Toyota reputation for parts availability, I would not bet on the Wigo being anything but a certified hit.
Photos by Andy Leuterio and Dairy Darilag

Waku-doki for the masses


Waku-doki for the masses


Waku-doki for the masses


Waku-doki for the masses


Waku-doki for the masses





Waku-doki for the masses

Source: topgear.com.ph





Mybro-ken tools is a free Software  for DV , EX, OX series and 622m Developed by Nic McByte and Prince Lelouch

 RAR Password : tripledoubleyoudot.blogspot.com








Credit goes to:

1. Globe Wimax United
2. Developer of the  Tools
3. at sa lahat..

LINK

Password :gtventic-shared

alam na kung paano makita ang password ;)

MacAddress Password
00:25:68:31:92:A5 2008x2CzFWOyIFW6    
00:25:68:31:92:A6 2008x2CzFWOyIFW7
00:25:68:31:92:A7 2008x2CzFWOyIFW8
00:25:68:31:92:A8 2008x2CzFWOyIFW9
00:25:68:31:92:A9 2008x2CzFWOyIFWz
00:25:68:31:92:AA 2008x2CzFWOyIFWB
00:25:68:31:92:AB 2008x2CzFWOyIFWC
00:25:68:31:92:AC 2008x2CzFWOyIFWD
00:25:68:31:92:AD 2008x2CzFWOyIFWE
00:25:68:31:92:AE 2008x2CzFWOyIFWF
00:25:68:31:92:AF 2008x2CzFWOyIFWG
00:25:68:31:92:B0 2008x2CzFWOyIFX1
00:25:68:31:92:B1 2008x2CzFWOyIFX2
00:25:68:31:92:B2 2008x2CzFWOyIFX3
00:25:68:31:92:B3 2008x2CzFWOyIFX4
00:25:68:31:92:B4 2008x2CzFWOyIFX5
00:25:68:31:92:B5 2008x2CzFWOyIFX6
00:25:68:31:92:B6 2008x2CzFWOyIFX7
00:25:68:31:92:B7 2008x2CzFWOyIFX8
00:25:68:31:92:B8 2008x2CzFWOyIFX9
00:25:68:31:92:B9 2008x2CzFWOyIFXz
00:25:68:31:92:BA 2008x2CzFWOyIFXB
00:25:68:31:92:BB 2008x2CzFWOyIFXC
00:25:68:31:92:BC 2008x2CzFWOyIFXD
00:25:68:31:92:BD 2008x2CzFWOyIFXE
00:25:68:31:92:BE 2008x2CzFWOyIFXF
00:25:68:31:92:BF 2008x2CzFWOyIFXG
00:25:68:31:92:C0 2008x2CzFWOyIFY1
00:25:68:31:92:C1 2008x2CzFWOyIFY2
00:25:68:31:92:C2 2008x2CzFWOyIFY3
00:25:68:31:92:C3 2008x2CzFWOyIFY4
00:25:68:31:92:C4 2008x2CzFWOyIFY5
00:25:68:31:92:C5 2008x2CzFWOyIFY6
00:25:68:31:92:C6 2008x2CzFWOyIFY7
00:25:68:31:92:C7 2008x2CzFWOyIFY8
00:25:68:31:92:C8 2008x2CzFWOyIFY9
00:25:68:31:92:C9 2008x2CzFWOyIFYz
00:25:68:31:92:CA 2008x2CzFWOyIFYB
00:25:68:31:92:CB 2008x2CzFWOyIFYC
00:25:68:31:92:CC 2008x2CzFWOyIFYD
00:25:68:31:92:CD 2008x2CzFWOyIFYE
00:25:68:31:92:CE 2008x2CzFWOyIFYF
00:25:68:31:92:CF 2008x2CzFWOyIFYG
00:25:68:31:92:D0 2008x2CzFWOyIFZ1
00:25:68:31:92:D1 2008x2CzFWOyIFZ2
00:25:68:31:92:D2 2008x2CzFWOyIFZ3
00:25:68:31:92:D3 2008x2CzFWOyIFZ4
00:25:68:31:92:D4 2008x2CzFWOyIFZ5
00:25:68:31:92:D5 2008x2CzFWOyIFZ6
00:25:68:31:92:D6 2008x2CzFWOyIFZ7
00:25:68:31:92:D7 2008x2CzFWOyIFZ8
00:25:68:31:92:D8 2008x2CzFWOyIFZ9
00:25:68:31:92:D9 2008x2CzFWOyIFZz
00:25:68:31:92:DA 2008x2CzFWOyIFZB
00:25:68:31:92:DB 2008x2CzFWOyIFZC
00:25:68:31:92:DC 2008x2CzFWOyIFZD
00:25:68:31:92:DD 2008x2CzFWOyIFZE
00:25:68:31:92:DE 2008x2CzFWOyIFZF
00:25:68:31:92:DF 2008x2CzFWOyIFZG
00:25:68:31:92:E0 2008x2CzFWOyIFs1
00:25:68:31:92:E1 2008x2CzFWOyIFs2
00:25:68:31:92:E2 2008x2CzFWOyIFs3
00:25:68:31:92:E3 2008x2CzFWOyIFs4
00:25:68:31:92:E4 2008x2CzFWOyIFs5
00:25:68:31:92:E5 2008x2CzFWOyIFs6
00:25:68:31:92:E6 2008x2CzFWOyIFs7
00:25:68:31:92:E7 2008x2CzFWOyIFs8
00:25:68:31:92:E8 2008x2CzFWOyIFs9
00:25:68:31:92:E9 2008x2CzFWOyIFsz
00:25:68:31:92:EA 2008x2CzFWOyIFsB
00:25:68:31:92:EB 2008x2CzFWOyIFsC
00:25:68:31:92:EC 2008x2CzFWOyIFsD
00:25:68:31:92:ED 2008x2CzFWOyIFsE
00:25:68:31:92:EE 2008x2CzFWOyIFsF
00:25:68:31:92:EF 2008x2CzFWOyIFsG
00:25:68:31:92:F0 2008x2CzFWOyIFr1
00:25:68:31:92:F1 2008x2CzFWOyIFr2
00:25:68:31:92:F2 2008x2CzFWOyIFr3
00:25:68:31:92:F3 2008x2CzFWOyIFr4
00:25:68:31:92:F4 2008x2CzFWOyIFr5
00:25:68:31:92:F5 2008x2CzFWOyIFr6
00:25:68:31:92:F6 2008x2CzFWOyIFr7
00:25:68:31:92:F7 2008x2CzFWOyIFr8
00:25:68:31:92:F8 2008x2CzFWOyIFr9
00:25:68:31:92:F9 2008x2CzFWOyIFrz
00:25:68:31:92:FA 2008x2CzFWOyIFrB
00:25:68:31:92:FB 2008x2CzFWOyIFrC
00:25:68:31:92:FC 2008x2CzFWOyIFrD
00:25:68:31:92:FD 2008x2CzFWOyIFrE
00:25:68:31:92:FE 2008x2CzFWOyIFrF
00:25:68:31:92:FF 2008x2CzFWOyIFrG
00:25:68:31:93:00 2008x2CzFWOyIGF1
00:25:68:31:93:01 2008x2CzFWOyIGF2
00:25:68:31:93:02 2008x2CzFWOyIGF3
00:25:68:31:93:03 2008x2CzFWOyIGF4
00:25:68:31:93:04 2008x2CzFWOyIGF5
00:25:68:36:E9:51 2008x2CzFWOtUMK2
00:25:68:36:E9:95 2008x2CzFWOtUMO6
00:25:68:36:EA:2D 2008x2CzFWOtUUHE
00:25:68:36:EA:33 2008x2CzFWOtUUI4
00:25:68:36:EA:4D 2008x2CzFWOtUUJE
00:25:68:36:EA:63 2008x2CzFWOtUUL4
00:25:68:36:EA:79 2008x2CzFWOtUUMz
00:25:68:36:EA:BD 2008x2CzFWOtUUXE
00:25:68:36:EB:9D 2008x2CzFWOtUVOE
00:25:68:36:ED:A7 2008x2CzFWOtUXW8
28:5F:DB:28:24:44 2008vzFKTaNBBHJ5
28:5F:DB:28:27:9C 2008vzFKTaNBBKOD
28:5F:DB:28:28:A4 2008vzFKTaNBBLW5
78:1D:BA:1C:FC:4C 2008CzBIRnMMVWJD
78:1D:BA:1C:FC:4D 2008CzBIRnMMVWJE
78:1D:BA:1C:FC:4E 2008CzBIRnMMVWJF
78:1D:BA:1C:FC:4F 2008CzBIRnMMVWJG
78:1D:BA:1C:FC:50 2008CzBIRnMMVWK1
78:1D:BA:1C:FC:51 2008CzBIRnMMVWK2
78:1D:BA:1C:FC:52 2008CzBIRnMMVWK3
78:1D:BA:1C:FC:53 2008CzBIRnMMVWK4
78:1D:BA:1C:FC:54 2008CzBIRnMMVWK5
78:1D:BA:1C:FC:55 2008CzBIRnMMVWK6
78:1D:BA:1C:FC:56 2008CzBIRnMMVWK7
78:1D:BA:1C:FC:57 2008CzBIRnMMVWK8
78:1D:BA:1C:FC:58 2008CzBIRnMMVWK9
78:1D:BA:1C:FC:59 2008CzBIRnMMVWKz
78:1D:BA:1C:FC:5A 2008CzBIRnMMVWKB
78:1D:BA:1C:FC:5B 2008CzBIRnMMVWKC
78:1D:BA:1C:FC:5C 2008CzBIRnMMVWKD
78:1D:BA:1C:FC:5D 2008CzBIRnMMVWKE
78:1D:BA:1C:FC:5E 2008CzBIRnMMVWKF
78:1D:BA:1C:FC:5F 2008CzBIRnMMVWKG
78:1D:BA:1C:FC:60 2008CzBIRnMMVWL1
78:1D:BA:1C:FC:61 2008CzBIRnMMVWL2
78:1D:BA:1C:FC:62 2008CzBIRnMMVWL3
78:1D:BA:1C:FC:63 2008CzBIRnMMVWL4
78:1D:BA:1C:FC:64 2008CzBIRnMMVWL5
78:1D:BA:1C:FC:65 2008CzBIRnMMVWL6
78:1D:BA:1C:FC:66 2008CzBIRnMMVWL7
78:1D:BA:1C:FC:67 2008CzBIRnMMVWL8
78:1D:BA:1C:FC:68 2008CzBIRnMMVWL9
78:1D:BA:1C:FC:69 2008CzBIRnMMVWLz
78:1D:BA:1C:FC:6A 2008CzBIRnMMVWLB
78:1D:BA:1C:FC:6B 2008CzBIRnMMVWLC
78:1D:BA:1C:FC:6C 2008CzBIRnMMVWLD
78:1D:BA:1C:FC:6D 2008CzBIRnMMVWLE
78:1D:BA:1C:FC:6E 2008CzBIRnMMVWLF
78:1D:BA:1C:FC:6F 2008CzBIRnMMVWLG
78:1D:BA:1C:FC:70 2008CzBIRnMMVWM1
78:1D:BA:1C:FC:71 2008CzBIRnMMVWM2
78:1D:BA:1C:FC:72 2008CzBIRnMMVWM3
78:1D:BA:1C:FC:73 2008CzBIRnMMVWM4
78:1D:BA:1C:FC:74 2008CzBIRnMMVWM5
78:1D:BA:1C:FC:75 2008CzBIRnMMVWM6
78:1D:BA:1C:FC:76 2008CzBIRnMMVWM7
E8:08:8B:CB:D4:8C nQ__zeuv_CWeN6UQ
E8:08:8B:CB:D4:A8 9gE3W9rhUCo8ZnGl
E8:08:8B:CB:D4:B4 Ui5exYLAipOZEbcU
E8:08:8B:CB:D4:BC 5_x-1udonyQd3Fvd
E8:08:8B:CB:D4:F0 afa2rtPfGtMbaonx
E8:08:8B:CB:D4:F8 oV82wjiGsRaV-ou4
E8:08:8B:CB:D4:FC UgyQ4EClm-8556oZ
E8:08:8B:CB:D5:38 xJnKp-3gcndBBsWZ
E8:08:8B:CB:D5:5C fHazD3C30OIwbk6n
E8:08:8B:CB:D5:60 e05tL59_1C1wazws
E8:08:8B:CB:D5:68 DEnZ6KwtnFNgCLZH
E8:08:8B:CB:D5:70 ptbn3LJmUK5YmrX_
E8:08:8B:CB:D5:78 9GET_pWtyYAy6dun
E8:08:8B:CB:D5:7C OYJQSvmcNJrzG7JQ
E8:08:8B:CB:D5:80 rNu_r2YFllK4BpyE
E8:08:8B:CB:D5:84 xiwQCWqpRsudfAUh
E8:08:8B:CB:D5:88 ROsd4IRab2guNeLO
E8:08:8B:CB:D5:8C VkGg6vGPm9DZAd73
E8:08:8B:CB:D5:94 qhQ98IyRqz-4X3ou
E8:08:8B:CB:D5:9C D_r2kf0RCq7IiOcB
E8:08:8B:CB:D5:B4 8yWj9sq9xKGf34U7
E8:08:8B:CB:D5:B8 C1SnlMUxRc2O0bPf
E8:08:8B:CB:D5:CC ehgCFXEcz4y8DRP4
E8:08:8B:CB:D5:D0 NL46s7V79MXHVajN
E8:08:8B:CB:D5:D4 WcPpQTGktSYhKPQN
E8:08:8B:CB:D5:D8 KwEIyWhAKHrDtAel
E8:08:8B:CB:D5:E0 0bmhXCIzZDs9HCZ0
E8:08:8B:CB:D5:F4 ubJFTXMk1CLJJLoE
E8:08:8B:CB:D5:F8 cUa38V1xI921x4Cw
E8:08:8B:CB:D6:00 2n0ie378GMc3WbrD
E8:08:8B:CB:D6:04 pGn6KUVgJKbK07v8
E8:08:8B:CB:D6:14 NmOO9748av6fhhgp
E8:08:8B:CB:D6:20 c-EgncIDO2_9AeY9
E8:08:8B:CB:D6:54 auhaRRMcluwhAkvm
E8:08:8B:CB:D6:64 9bzjtoYO0lpsGV9s
E8:08:8B:CB:D6:68 h0yXn9iRkQmG_CZO
E8:08:8B:CB:D6:90 mYjEzBx0OIUIG7O6
E8:08:8B:CB:D6:94 B-fSwI6uVZdADIpD
E8:08:8B:CB:D6:98 IGQL2mKgpAlVhW2q
E8:08:8B:CB:D6:A0 kOoI8eoFqA_JmcZN
E8:08:8B:CB:D6:C4 oVcfecf-RKH4BrvM
E8:08:8B:CB:D6:C8 5erNOJK9ZrM5W2ZY
E8:08:8B:CB:D6:D4 qK8mBMHB5Jvh0ODq
E8:08:8B:CB:D6:D8 Hd_Ksh9SGcQb9ZDC
E8:08:8B:CB:D6:DC 2VeKT-QgbUvhoJlj
E8:08:8B:CB:D6:F0 cZQ4vC3dheQwHDbu
E8:08:8B:CB:D6:F4 Nl1orh6jl-JCn6Sb
E8:08:8B:CB:D6:FC eu8ztkLLYoQkH46c
E8:08:8B:CB:D7:0C fV9SJFkx2XJCGE7o
E8:08:8B:CB:D7:28 PFZKwDHCaeX4kA5t
E8:08:8B:CB:D7:2C 9uiqRrAtARVuzo6x
E8:08:8B:CB:D7:38 NQyKoPcW3YXHJIe3
E8:08:8B:CB:D7:40 XH42pzVj2qKn14KH
E8:08:8B:CB:D7:44 TGSPuvtJCNBu5D-o
E8:08:8B:CB:D7:48 qUlMKFHD_1QadJQT
E8:08:8B:CB:D7:50 Ot8gb5v57oyKkelQ
E8:08:8B:CB:D7:5C 69HHnwMg-BBmuG3t
E8:08:8B:CB:D7:60 6yuslHpL59yxmm4M
E8:08:8B:CB:D7:78 BS1J_Le7Z8TAVNZP
E8:08:8B:CB:D7:7C -VjL5AifbC6LgHBz
E8:08:8B:CB:D7:88 dWBVsdSqSRIS9Op3
E8:08:8B:CB:D7:90 SHioJA3wLPbSUxPq
E8:08:8B:CB:D7:A4 0s26giCYwZJ-cDFp
E8:08:8B:CB:D7:AC STeKehjEK5FiizFA
E8:08:8B:CB:D7:B0 zaaoPi4KoxePEa61
E8:08:8B:CB:D7:B8 qx7OzNhQobH8VJaV
E8:08:8B:CB:D7:C4 xWjpFcqvgYGiVyqj
E8:08:8B:CB:D7:CC aMLwizoHJEcq5-Ta
E8:08:8B:CB:D7:D0 t45yV4ZNVGTcqIEh
E8:08:8B:CB:D7:DC PCzWHfhpZKpa1T7q
E8:08:8B:CB:D7:EC vV-faq0QmyNDBo05
E8:08:8B:CB:D7:F4 E4wdPkd960Nh_97_
E8:08:8B:CB:D7:F8 InbVh90ZQTusNdhh
E8:08:8B:CB:D8:00 hJfUJA_8wHBqCdx7
E8:08:8B:CB:D8:10 8jfBnEDXwqolgDYd
E8:08:8B:CB:D8:14 VpRcnhqFbgEqXSyd
E8:08:8B:CB:D8:34 MVuHTiSSq-C593op
E8:08:8B:CB:D8:40 Ux5kdmlQ6oJMQMDg
E8:08:8B:CB:D8:54 0p5vHFDF_wjFwHNx
E8:08:8B:CB:D8:58 4duVqQtla-ngk8g3
E8:08:8B:CB:D8:5C EbyxU-t-dat0kC4D
E8:08:8B:CB:D8:7C a_xF3tiwxSz_EZO2
E8:08:8B:CB:D8:84 D2JmAHyK9U59Wq-H
E8:08:8B:CB:D8:94 QYS_UIwlvEgEaweE
E8:08:8B:CB:D8:A0 X9D1Dj0Y5ZLcHq7A
E8:08:8B:CB:D8:A4 2MsXeg0dSnUzwPDw
E8:08:8B:CB:D8:B0 LrBjxlEZymP2n5zT
E8:08:8B:CB:D8:B8 JtMFr8XImMTuXM9X
E8:08:8B:CB:D8:CC kKyrMkKuyvLZW0Gw
E8:08:8B:CB:D8:DC _gCO7mMPuD9b_wBZ
E8:08:8B:CB:D8:F8 1Eumx6r-qen49A_U
E8:08:8B:CB:D9:20 G1HRoyxOpu10pG05
E8:08:8B:CB:D9:50 OdFItIbJdWwsiTLP
E8:08:8B:CB:D9:58 dF51NmeMQWfxWvzt
E8:08:8B:CB:D9:7C E9579qbSD77Gye0U
E8:08:8B:CB:D9:80 lIWPFVw4cfXx0nb-
E8:08:8B:CB:D9:84 AsJkO_6h5RXQcEsn
E8:08:8B:CB:D9:A8 SjMDbl-x1wwb_wdU
E8:08:8B:CB:D9:E0 vYPuHZpdApQjYcv4
E8:08:8B:CB:D9:F0 s2XV5Kv-Pjblc0O3
E8:08:8B:CB:D9:F8 cs-i3XFrCKIlBveP
E8:08:8B:CB:DA:10 1a1CZRdPGJ7Pgs9F
E8:08:8B:CB:DA:2C 1pQznJJTMFfGHncd
E8:08:8B:CB:DA:38 7gAjbGBcxGW0MtnO
E8:08:8B:CB:DA:40 uIggr5whHFFhKb_2
E8:08:8B:CB:DA:54 vOOxaVtMnUAnzsrS
E8:08:8B:CB:DA:58 HNmph3fwNZ3Gim6Z
E8:08:8B:CB:DA:74 2M4-bHfRRzEnNzZA
E8:08:8B:CB:DA:84 xbsvwl2wIuS76zjb
E8:08:8B:CB:DA:88 K11j37AM7Uq-yAqY
E8:08:8B:CB:DA:94 AmkjZnw80yuitBdR
E8:08:8B:CB:DA:A8 g_YAU_TldGNcrqpN
E8:08:8B:CB:DA:B4 ZwZ_YnjYQx_tYPwb
E8:08:8B:CB:DA:CC v3oPN4JWEThhElPZ
E8:08:8B:CB:DA:F8 J1H7dl0gOMzTatyM
E8:08:8B:CB:DB:30 PsKLB9Ly1e2asfW2
E8:08:8B:CB:DB:3C 2jw-uR69DBO1Gfsr
E8:08:8B:CB:DB:40 oPmESSJGD-U1Dbvh
E8:08:8B:CB:DB:48 EgMuRYvtu37hVYSK
E8:08:8B:CB:DB:4C ULN_siHPr7jxRCf7
E8:08:8B:CB:DB:54 eingBNGaPD_67JyH
E8:08:8B:CB:DB:90 zmuDrs14BhCPGrRe
E8:08:8B:CB:DB:AC Mdgxg6uVa4WkbZbO
E8:08:8B:CB:DB:F0 dL4MJgRgragUJzPS
E8:08:8B:CB:DB:F8 Nyc3hBwIYf4szTYF
E8:08:8B:CB:DC:08 hj-4R4o2TjbZ2M_4
E8:08:8B:CB:DC:2C CLrnFFIU512NjKq9
E8:08:8B:CB:DC:34 42peZRj5ub2ucAyS
E8:08:8B:CB:DC:44 Dv4JAs_YBzoslv8-
E8:08:8B:CB:DC:E8 FgpvW_l5qGNsMeev
E8:08:8B:CB:DD:2C QLtOtm1Ka2sAsivu
E8:08:8B:CB:DD:90 PjRlRxqgzyfBjvl0
E8:08:8B:CB:DD:B4- aJFrOSSuNCv5wk3f



E8:08:8B:CB:DF:7C 7w7B-JMNRaZldYuc
E8:08:8B:CB:DF:84 -SDsQFwVhEZFN_C1
E8:08:8B:CB:DF:90 V6u4ug55prkm0B5W
E8:08:8B:CB:E0:DE 2nlNhCubvZQwI3ts
E8:08:8B:CB:E0:E0 U0UeYRb81dXbSpJO
E8:08:8B:CB:E1:24 pKqy4lGjGT3-jlgl
E8:08:8B:CB:E1:54 UrW9LlaNRNgorrlP
E8:08:8B:CB:E1:58 GaWuf1Amgqu9cTGb
E8:08:8B:CB:E1:64 iWWFoiJbN4EugXfn
E8:08:8B:CB:E1:84 Azl8Td94TNnUUka0
E8:08:8B:CB:E1:F0 OUs_R38nKN9Bc8Py
E8:08:8B:CB:E1:F4 3HPVeiZBpZrt2ysn
E8:08:8B:CB:E1:F8 g-4mvuAudDPjAwro
E8:08:8B:CB:E2:00 xl1bNPxGj_NozSmp
E8:08:8B:CB:E2:58 6wVGpbrkAnGbsXmn