Your Ad Here
10:09 PM | Posted in



Year: 2009
Genre: RPG (Rogue / Action) / 3D / 3rd Person
Developer: Arise and KranX Productions
Platform: PC
Publication Type: License
Language: English



"Not the Time for Dragons" is a party Action-RPG, which the unfolding events in the universe of the same name book by Sergei Lukyanenko and Nick Perumova. The fateful hour has struck in the Mid-World, and now his fate depends on the Victor, the hero game. It will be the initiation of the magic of four elements, master the Force and fulfill his destiny. Led by a young magician Tel, the hero must understand the intrigue, to know yourself and accept their fate. Who is he, or his dragon killer?

FEATURES:
- Classic Party Action / RPG based on the book Lukyanenko and N. Perumova.
- The main character, wielding the magic of four elements, totem spells, weapons and firearms.
- A mysterious young magician Tel, experienced intrigante Clan Cats Loy Iberian and other famous characters to readers in a team player.
- The effectiveness of elemental magic depends on time of day - to choose the battle!
- Items-manipulators, turning into animals and other unique game elements.
- High-tech software based on the successful role-based project "Magic of Blood."


REQUIREMENTS
- Windows 2000/XR;
- Processor 2,4 Hz;
- 1 GB RAM;
- 2 GB of free hard disk space;
- Video-level GeForce FX 6800/Radeon 9800 with 128 MB of memory;
- DirectX - compatible sound card;
- DirectX 9.0c;
- Device for reading DVD-ROM drive;
- Keyboard;
- Mouse.




http://rapidshare.com/files/300869836/A.Farewell.to.Dragons-SKIDROW.part01.rar
http://rapidshare.com/files/300869840/A.Farewell.to.Dragons-SKIDROW.part02.rar
http://rapidshare.com/files/300869852/A.Farewell.to.Dragons-SKIDROW.part03.rar
http://rapidshare.com/files/300869770/A.Farewell.to.Dragons-SKIDROW.part04.rar
http://rapidshare.com/files/300869849/A.Farewell.to.Dragons-SKIDROW.part05.rar
http://rapidshare.com/files/300871855/A.Farewell.to.Dragons-SKIDROW.part06.rar
http://rapidshare.com/files/300871837/A.Farewell.to.Dragons-SKIDROW.part07.rar
http://rapidshare.com/files/300871839/A.Farewell.to.Dragons-SKIDROW.part08.rar
http://rapidshare.com/files/300871847/A.Farewell.to.Dragons-SKIDROW.part09.rar
http://rapidshare.com/files/300874952/A.Farewell.to.Dragons-SKIDROW.part10.rar
http://rapidshare.com/files/300874800/A.Farewell.to.Dragons-SKIDROW.part11.rar
http://rapidshare.com/files/300875016/A.Farewell.to.Dragons-SKIDROW.part12.rar
http://rapidshare.com/files/300874837/A.Farewell.to.Dragons-SKIDROW.part13.rar
http://rapidshare.com/files/300874826/A.Farewell.to.Dragons-SKIDROW.part14.rar







Category:
��
8:51 PM | Posted in


The Realm Crafter game engine is the heart of the MMORPG development system. The engine creates the virtual game world and the behavior of everything in it. It generates 3D images and handles the network communications. The Realm Crafter engine is designed to be modular, meaning it is broken down into smaller units thus making it easier for you to customize its operations.

Engine Features:
No programming language skills required when using the Standard Edition.
Scripting language for you to customize your game further still.
Source code available for advanced users and coders (requires using BlitzPlus programming language) for the ultimate in game customization.
Easy to use editors to create and edit your game world.
Low server system requirements.
Server-side saving of player accounts.
Modular engine construction.
A MySQL Player Character Database: Allows you to read and process all character data with a multitude of languages (e.g. PHP, etc).
Automatic update system keeps your players up to date with changes to your world.
DM accounts allow players to become moderators without buying the engine.
Integrated particle system with editor, for a variety of special effects.
Comes with a large selection of animated models, textures, sounds and music to get started.
Many standard MMORPG features built in, such as animal riding, item crafting, and more.
Player vs. Player support: PvP can be turned on/off on a per-area basis.
Support for secure trading between players.
Up to 4,500 visual combinations per character with different genders, beards, hair, faces, clothes and add-on equipment.
Sixteen player character models each with 50 animations such as Karate fighting, magic, swimming, and more.
Players can have pets or henchmen.
Merchants buy and sell items.
Characters can walk, fly or swim around in your game world
A variety of built-in screen effects to use as you wish.
Players can buy houses to live in, and to store their items.
Players can buy a house with a salesman NPC, and set up a shop selling their items, even while they are offline.
Define your own attributes, skills, and damage types.
Create up to 65,535 items for players to find, trade and use.
Create virtual worlds with unlimited areas, allowing your world to be as large and detailed as you like.
Allow players to create their own guilds, and send their guild members on quests.
Completely change the look of your game GUI with the Interface Editor.
Import your own models and animations with the Media Manager.
MMORPG Chat system with typical chat commands and functions
Create classes and races, or use a skill based system instead
A robust monster and Non Player Character (NPC) Artificial Intelligence.

Realm Crafter Requirements
System requirements
Minimum Server: P2-600MHz, 128 MB RAM, internet connection with a static IP
Minimum Client: P4-1.3ghz, 512 MB RAM, sound card, GeForce 5500 / Radeon 9800 or higher (128MB video RAM), internet or Lan connection.
Windows 2000 / XP/ Vista and DirectX 9.0c or above.
Supported file formats: B3D, 3DS, X, JPG, BMP, PNG, TGA, DDS, WAV, OGG.




Category:
��
7:21 PM | Posted in




Avira AntiVir Premium Security Suite v9.0.0.446
Win App | 36.88mb

Surf on the Internet, make online purchases, communicate by email, or make bank transactions on your PC? The Avira Security Suite reliably protects you.

WHAT U GET:
AntiVir
AntiAd/Spyware
AntiPhishing
AntiRootkit
AntiDrive-by
AntiBot
EmailScanner
WebGuard
RescueSystem
BackupSystem
AntiSpam
FireWall

FEATURES & FUNCTIONS:
Protection against viruses, worms and Trojans
protection against expensive dialers
Detects and deletes rootkits
NEW: Raised scan speed
NEW: Redesigned visual appearance
Protection against phishing
Protection against spyware
Special protection against email viruses (POP 3)
Fast updates through Premium Server
Protection against annoying adware
NEW: System to create a Rescue-CD
WebGuard to surf and download safely
Firewall included
AntiSpam and proactive AntiPhishing
Game Mode
NEW: Function for Data BackUp







Category:
��
7:11 PM | Posted in



ESET NOD32 Antivirus System - Integrated, Real-Time Protection against viruses, worms, trojans, spyware, adware, phishing, and hackers. Best detection, fastest performance & smallest footprint.NOD32 Antivirus System provides well balanced, state-of-the-art protection against threats endangering your PC and enterprise systems running various platforms from Microsoft Windows, through a number of UNIX/Linux, Novell, MS DOS operating systems to Microsoft Exchange Server, Lotus Domino and other mail servers.

ESET solutions are built on ESET’s one-of-a-kind ThreatSense technology. This advanced heuristics engine enables proactive detection of malware not covered by even the most frequently updated signature-based products by decoding and analyzing executable code in real time, using an emulated environment.
By allowing malware to execute in a secure virtual world, ESET is able to clearly differentiate between benign files and even the most sophisticated and cleverly-disguised malware.

Users of Microsoft® Windows® can experience the power and elegance of NOD32's ThreatSense Technology with ease and comfort. Our single optimized engine offers the best protection from viruses, spyware, adware, phishing attacks, and more. Keep tomorrow's threats at bay with our proactivedetection technology.

If you are interested in computer security and would like to get a chance to influence the development of ESET's security systems, we invite you to join our Early Access program. Gain early access to the latesttechnology in beta and release candidate stages.

Size: 76.7 MB






Category:
��
6:52 PM | Posted in




Kaspersky Internet Security 9.0 – is a new line of Kaspersky Labs products, which is designed for the multi-tiered protection of personal computers. This product is based on in-house protection components, which are based on variety of technologies for maximum levels of user protection regardless of technical competencies.

This product utilizes several technologies, which were jointly developed by Kaspersky Labs and other companies; part of them is implemented via online-services.
Our products for home and home office are specifically designed to provide hassle-free and quality protection against viruses, worms and other malicious programs, as well as hacker attacks, spam and spyware.

During product preparation several competitor offerings were considered and analyzed - firewalls, security suites systems, which position themselves as proactive in defence and HIPS systems. Combination of in-hosue innovative developments and results from analysis gathered through the industry allowed to jump onto a new level of protection for personal users, whereby offering even more hardened and less annoying computer protection from all types of electronic threats – malicious programs of different types, hacker attacks, spam mailings, program-root kits, phishing emails, advertisement popup windows etc.

Kaspersky Internet Security 2010 All Features:

Essential Protection:
* Protects from viruses, Trojans and worms
* Blocks spyware and adware
* Scans files in real time (on access) and on demand
* Scans email messages (regardless of email client)
* Scans Internet traffic (regardless of browser)
* Protects instant messengers (ICQ, MSN)
* Provides proactive protection from unknown threats
* Scans Java and Visual Basic scripts

Extended Protection:
* Two-way personal firewall
* Safe Wi-Fi and VPN connections
* Intrusion prevention system
* Intelligent application management and control
o automatically configured application rules
o security rating is assigned to unknown applications
o access to the user’s resources and data is restricted for unknown applications

Preventive Protection:
* Scans operating system and installed applications for vulnerabilities
* Analyzes and closes Internet Explorer vulnerabilities
* Disables links to malware sites
* Detects viruses based on the packers used to compress code
* Global threat monitoring (Kaspersky Security Network)

Advanced Protection & Recovery:
* The program can be installed on infected computers
* Self-protection from being disabled or stopped
* Restores correct system settings after removing malicious software
* Tools for creating a rescue disk

Data & Identity Theft Protection:
* Disables links to fake (phishing) websites
* Blocks all types of keyloggers
* Virtual keyboard is provided for safely entering logins and passwords
* Prevents the theft of data exchanged via secure connections (HTTPS / SSL)
* Blocks unauthorized dial-up connections
* Cleans up any traces of user activity (deletes temporary files, cookies etc.)

Content Filtering:
* Parental control
* Improved antispam protection (plugins for Microsoft Outlook, Microsoft Outlook Express, The Bat!, Thunderbird)
* Blocks banners on web pages

Usability:
* Automatic configuration during installation
* Wizards for common tasks
* Visual reports with charts and diagrams
* Alerts provide all the information necessary for informed user decisions
* Automatic or interactive mode
* Round-the-clock technical support
* Automatic database updates









Category:
��
6:39 PM | Posted in


Get complete protection from the most dangerous threats on the internet - worms, viruses, trojans, spyware, and adware.
Antivirus and antispyware protection for Windows from the world's most trusted security company. Use the Internet with confidence in your home or small office.

* Easy to install and use
* Protection against viruses, spyware, adware, worms and trojans
* Real-time security while you surf and chat online
* Top-quality protection that does not slow your system down
* Free support and service around the clock and across the globe
* Compatible with Windows Vista and Windows XP.

Features:

Integrated protection
* Anti-Virus: protection against viruses, worms and trojans
* Anti-Spyware: protection against spyware, adware and identity-theft
* Anti-Rootkit: protection against hidden threats (rootkits)
* Web Shield & LinkScanner: protection against malicious websites

Easy-to-use, automated protection
Real-time protection, automatic updates, low-impact background scanning for on-line threats, and instant quarantining or removal of infected files ensures maximum protection. Every interaction between your computer and the Internet is monitored, so nothing can get onto your system without your knowledge. AVG scans in real time:
* All files including documents, pictures and applications
* E-mails (all major email clients supported)
* Instant messaging and P2P communications
* File downloads and online transactions such as shopping and banking
* Search results and any other links you click on

Internet use with peace of mind
The new web shield checks every web page at the moment you click on the link to ensure you’re not hit by a stealthy drive-by download or any other exploits. All links on search results pages in Google, Yahoo, and MSN are analyzed and their current threat level is reported in real time before you click on the link and visit the site.

The best Windows protection - trusted by millions of users
AVG's award-winning antivirus technology protects millions of users and is certified by major antivirus testing organizations (VB100%, ICSA, West Coast Labs Checkmark). View all AVG awards & certifications







Category:
��
9:59 AM | Posted in

Metallica - All Nightmare Long [2009]



Track List:

1. All Nightmare Long
2. Master Of Puppets (Live)
3. Blackened Live (Live)
4. Seek & Destroy (Live)

Category:
��
Category:
��
2:09 AM | Posted in

Angels and Demons (2009) DVDRip


Plot:What terrifying discovery would make the Vatican turn to Robert Langdon, the man who cracked history’s most controversial code? When Langdon discovers evidence of the resurgence of an ancient secret brotherhood known as the Illuminati “the most powerful underground organization in history”





Category:
��
11:37 AM | Posted in
Sebuah alat pemalsu keperawanan yang dirancang khusus untuk mengelabui pria menuai banyak kontroversi. Alat buatan China yang ditujukan khusus bagi wanita yang sudah tidak perawan tapi ingin tampak seperti perawan itu pun diprotes oleh negara-negara Arab.

Produk yang bernama Artificial Virginity Hymen itu dibuat oleh perusahaan Gigimo di China. Dengan harga 30 dolar AS, alat itu menjanjikan efek berhubungan seksual seperti layaknya saat berhubungan dengan seorang wanita perawan.

Alat itu juga diklaim untuk membantu para wanita yang sudah tidak perawan dan baru menikah untuk mengelabui suaminya agar dikira masih perawan.

Di dalam website alat tersebut disebutkan instruksi pemakaiannya, antara lain yaitu:
  1. Masukkan hymen (selaput dara) buatan ke dalam vagina secara perlahan
  2. Ketika pasangan melakukan penetrasi, hymen buatan akan rusak dan kemudian mengeluarkan sedikit cairan yang mirip dengan darah
  3. Tambahkan sedikit suara erangan, dan Anda pun akan terlihat seperti seorang perawan

Begitulah kira-kira instruksi yang disarankan oleh pembuat produk pada para wanita yang ingin dikira masih perawan oleh pasangannya.

Beredarnya alat yang banyak dipasarkan di Timur Tengah itu langsung memunculkan kontroversi. Para pengamat di negara yang masih tabu soal seks sebelum menikah itu mengkhawatirkan adanya penyimpangan seksual dengan dibuatnya alat tersebut.

Para konservatif dan pembuat undang-undang di Mesir pun langsung melarang peredaran alat tersebut, bahkan akan mengancam akan mengasingkan wanita di negerinya jika ketahuan menggunakan alat tersebut.

"Akan sangat memalukan jika alat tersebut sampai diimpor dan dipasarkan oleh negara yang beradab. Produk ini akan memicu seseorang melakukan hubungan seksual terlarang. Alat ini lebih banyak mendatangkan keburukan daripada kebaikan," ujar Sayed Askar, seorang anggota Egypt's Muslim Brotherhood seperti dikutip dari Glamour, Selasa (13/10/2009).

Meskipun sebagian orang percaya bahwa keluarnya darah dari selaput dara adalah pertanda seorang wanita perawan, namun hal itu tidak sepenuhnya benar. "Pendarahan bukan satu-satunya tanda untuk mengetahui wanita itu perawan atau tidak," ujar Heba Kotb, seorang pengamat wanita muslim di Mesir.






Category:
��
11:27 AM | Posted in

Sekujur tubuh bagian belakang Li Xiaoyuan ditumbuhi rambut seperti rambut babi hutan. Menurut dokter, penyakit yang dialami Xiaoyuan dipicu oleh perkembangan tahi lalat yang tak terkontrol.
ZHAOQING CITY — Pada enam bulan silam, Li Xiaoyuan tak merasakan apa-apa terhadap tanda lahir di punggungnya. Ukurannya pun kecil.


Namun sekarang, dokter yang menanganinya dibuat tercengang. Soalnya, di seluruh bagian belakang tubuh bocah berusia enam tahun itu tumbuh rambut seperti rambut babi hutan. Sikut kanannya pun mengalami hal yang sama. Tanda lahir berbentuk tahi lalat di bagian tubuh tersebut pun ikut-ikutan melebar pertumbuhannya.

Bagian yang ditumbuhi rambut itu seperti kerak kulit keras berwarna abu-abu. Penyebaran itu kini bahkan sudah mulai kelihatan di wajahnya. "Memilukan sekali melihat kondisinya yang seperti itu," kata sang ibu, Li Jiang, Rabu (21/10).

Sementara itu, dokter bedah Lou Zhongquan dari Rumah Sakit Dermatologi Zhaoqing City mengatakan bahwa penyakit yang dialami pasiennya itu bisa jadi jarang sekali dialami oleh kebanyakan orang. "Pemicunya adalah perkembangan tahi lalat yang tidak terkontrol," katanya.

Sampai sekarang, pihak rumah sakit tengah mengupayakan pengobatan bagi Xiaoyuan. "Sebetulnya, kalau tahi lalatnya masih berukuran kecil, kami bisa melakukan penyembuhan dengan terapi laser," demikian Lou Zhongquan.



___



Category:
��
11:13 AM | Posted in
Presiden Susilo Bambang Yudhoyono akhirnya mengumumkan susunan menteri Kabinet Indonesia Bersatu II di Istana Negara, Jakarta, Rabu (21/10) pukul 22.00. Berikut ini daftar menteri dan pejabat negara dalam kabinet baru yang akan menjabat pada periode tahun 2009-2014.



1. Menko Politik, Hukum, dan Keamanan: Marsekal TNI Purn Djoko Suyanto
2. Menko Perekonomian: Hatta Rajasa
3. Menko Kesra: Agung Laksono
4. Menteri Sekretaris Negara: Sudi Silalahi
5. Menteri Dalam Negeri: Gamawan Fauzi
6. Menteri Luar Negeri: Marty Natalegawa
7. Menteri Pertahanan: Purnomo Yusgiantoro
8. Menteri Hukum dan HAM: Patrialis Akbar
9. Menteri Keuangan: Sri Mulyani
10. Menteri Energi dan Sumber Daya Mineral: Darwin Zahedy Saleh
11. Menteri Perindustrian: MS Hidayat
12. Menteri Perdagangan: Mari Elka Pangestu
13. Menteri Pertanian: Suswono
14. Menteri Kehutanan: Zulkifli Hasan
15. Menteri Perhubungan: Freddy Numberi
16. Menteri Kelautan dan Perikanan: Fadel Muhammad
17. Menteri Tenaga Kerja dan Transmigrasi: Muhaimin Iskandar
18. Menteri Pekerjaan Umum: Djoko Kirmanto
19. Menteri Kesehatan: Endang Rahayu Sedyaningsih
20. Menteri Pendidikan Nasional: M Nuh
21. Menteri Sosial: Salim Assegaf Aljufrie
22. Menteri Agama: Suryadharma Ali
23. Menteri Kebudayaan dan Pariwisata: Jero Wacik
24. Menteri Komunikasi dan Informatika: Tifatul Sembiring
25. Menneg Riset dan Teknologi: Suharna Surapranata
26. Menteri Negara Urusan Koperasi dan UKM: Syarifudin Hasan
27. Menneg Lingkungan Hidup: Gusti Moh Hatta
28. Menneg Pemberdayaan Perempuan dan Perlindungan Anak: Linda Agum Gumelar
29. Menneg Pendayagunaan Aparatur Negara dan Reformasi Birokrasi: EE Mangindaan
29. Menneg Pembangunan Daerah Tertinggal: Helmy Faisal Zaini
31. Menneg PPN/Kepala Bappenas: Armida Alisjahbana
32. Menneg BUMN: Mustafa Abubakar
33. Menneg Perumahan Rakyat: Suharso Manoarfa
34. Menneg Pemuda dan Olahraga: Andi Mallarangeng

Pejabat Negara:
1. Ketua Unit Kerja Presiden Pengawasan dan Pengendalian Pembangunan: Kuntoro Mangkusubroto
2. Kepala BIN (Badan Intelijen Negara): Jenderal Pol Purn Sutanto
3. Kepala BKPM (Badan Koordinasi Penanaman Modal): Gita Wirjawan



KOMPAS.com



Category:
��
10:47 AM | Posted in
Bila tidak mendung, langit malam ini akan berhias cahaya yang berasal dari hujan meteor Orionid. Pertunjukan alam tersebut akan tampak jelas menjelang Matahari terbit.

Adapun hujan meteor tahunan Orionid tercipta saat Bumi melintasi jalur yang dilalui Komet Halley. Di jalur itu terdapat serpihan-serpihan material komet yang berpijar dan tampak seperti hujan cahaya ketika masuk atmosfer Bumi. Sebagian material yang tersisa berukuran sebesar kacang, meski kebanyakan sebesar butir pasir.

"Butiran debu komet yang bertabrakan dengan atmosfer akan memberikan lusinan hujan meteor tiap jam," ujar Bill Coke dari pusat penelitian meteorid NASA, Selasa (20/10).

Namun begitu, masyarakat yang tinggal di kota akan melihat sedikit saja meteor karena cahaya "bintang-bintang jatuh" itu kalah oleh cahaya lampu kota. Lokasi terbaik menyaksikan hujan meteor adalah di daerah yang tidak terpolusi cahaya dengan cuaca cerah.

Waktu terbaik untuk menyaksikannya antara pukul 01.00 dini hari hingga menjelang subuh. Saat itulah sisi Bumi tempat kita berpijak berada tepat pada jalur orbit sehingga material di langit akan "tertangkap" atmosfer kita. Walau demikian, beberapa meteor mungkin tampak menjelang tengah malam.

Hujan meteor Orionid yang menjadi latar depan gugus bintang Orion, termasuk yang paling indah menghias langit malam. "Sejak 2006, Orionid menjadi tontonan menakjubkan dengan 60 atau lebih meteor tiap jam," kata Cooke.



Sumber : SPACE.COM



Category:
��
12:18 AM | Posted in


1. The Brazen Bull




The Brazen Bull, sometimes known as one of the most cruel methods of torture and execution out there. Designed in ancient Greece, in the form of a bull, with a door on the side of the open and locked. To start the execution, the victim was placed in a brass bull and a fire lit beneath it. metal is heated until really hot, causing the victim to "bake until death". Bull's designed so that the screams of the victims will be heard the music for the enjoyment of the executioner.


2. Crucifixion



method of execution is one of the most popular method, obviously mainly caused by the execution of Jesus Christ. The crucifixion of victims of the hands and feet are nailed to the cross and then be lifted into the air. Victim then left to hang there until death, which is usually up to days and days, and often die of thirst before anything else.




3. Republican Marriage



not yet clear is one of the most interesting. Originating in France, the form of execution is common in the French Revolution. Involves the binding together of two naked men, a men and women are usually of the same age, and drowned them. In some cases, usually where water is not available, couples will be punished with the sword.


4. Guillotine



Guillotine is one of the most popular form of execution. Consists of a sharp knife tied to a rope, the victim's head is placed in the middle of the frame and then the knife fell with a crash, causing people to die almost instantly severed.





5. Cement shoes




Introduced by the American Mafia, this execution method involves placing the victim in the foot block and then fill it with wet cement and then threw him into the water. Form of execution is still practiced today, and even coined the term "a person who sleeps with the fishes" as a euphemism for the dead.



6. Hanged, Drawn, and quartered



The punishment for high treason in England, which will be hanged, drawn and quartered is common during the Middle Ages. Although abolished in 1814, this form of execution is responsible for hundreds, perhaps thousands, of death. The process is as follows. First, the victim was dragged on a wooden frame, called the obstacle to the execution ground. Second, the victim was hanged by the neck for a short time until almost dead (hanged). Third, castration occurs, where after that, the contents of the stomach and genitals were burned in front of the victim. Finally, the body is divided into four separate sections and beheaded.




7. Colombian Necktie



This execution method is one of the sadistic gan. Victim's throat was slashed, often times with a knife, but there really sharp objects that will be done, and then their tongues pulled out through an open wound. As time La Violencia, a period of Colombian history is full of murder, this is the most common form of execution. It is used mainly to intimidate others who find the facts.


8. The Five Pains



one of china death penalty is relatively easy to understand. Starting with the victim's nose is cut off, then one arm and one leg, and finally, the victim was castrated and cut in half at the waist. Inventor of this punishment Li Si, a Prime Minister of China, finally tortured and then sentenced to death in this way.




9. Execution by Elephant



in South and Southeast Asia, elephants have become the method of capital punishment for millennia. Animals were trained to execute two ways. Slowly tortured in ways that berkepanjanganh or killing the victim almost immediately.



10. Necklacing



Common practice in South Africa, Necklacing consists of a rubber tire, filled with gasoline, forced around the victim's chest and arms, and then be burned. Necklacing essentially causes the body will turn into fire melted.





11. Burning at the Stake



Death by burning has been used as a form of capital punishment over the centuries, often associated with crimes such as treason and witchcraft. This is now regarded as a punishment cruel and unusual, but before the 18th century, who was burned at the stake was common practice. Victims tied to a big stake, often at the center of the city or anywhere with the audience and then lit a fire. This is regarded as one of the slowest way to die.



12. Slow slicing



Ling Chi, translated as "slow slicing" or "death of the remaining" was described as death by a thousand cuts. forms of torture and execution that are similar to the Five Pains, but drawn on a much longer period of time. Tormentors slowly wound and removed some parts of the body, prolong life and the victims of torture as long as possible. According to Confucian principles, the body cut can not be whole in the spiritual afterlife, a form of execution victims who were tortured in the afterlife.





13. The Spanish Tickler



This torture device is commonly used in Europe during the Middle Ages. Used for skin tear victims, this weapon could tear anything, including muscle and bone. Victims tied up naked, sometimes in public, and then the torturers began to torture them. Usually begins in the legs and work in, neck and face are always saved for last.


14. Snake Pit




One of the oldest forms of torture and punishment Dead, hole (space) is very common snake is a form of capital punishment. Prisoners were thrown into the deep hole with a rattlesnake.


15. Buried Alive




death penalty has been used for individuals or groups. Victims usually tied and then placed in a hole and buried. Once the Nanjing Massacre during World War II, when Japanese troops bury alive Chinese civilians in the so-called "Ten Thousand Corpse Ditch".








Category:
��
8:46 AM | Posted in
Susilo Bambang Yudhoyono dan Boediono resmi dilantik oleh MPR sebagai Presiden dan Wakil Presiden RI untuk masa jabatan 2009-2014 terhitung sejak 20 Oktober 2009.semoga beliau beliau ini bisa membawa Indonesia lebih maju gemah ripah lohjinawi rakyat makmur adil & sejahteraamiiiiiiiiin.....












Category:
��

ShoutMix chat widget