Sunday, 31 July 2011

Download Songs From

Trick on How To Download Songs From is one of the most popular online songs streaming website.It has some very rare songs and latest arrivals especially Punjabi songs that are sometimes not available on other websites.So, In this post I will tell you the trick on How you can Download Songs from
This trick is not limited only for but it can be used for most of the online streaming websites.Before I give you the whole trick let me explain the basic concept of how online streaming works so that you can know where this trick will work and on which websites it wont work.
How Online Streaming of Songs Work?
The songs that are streamed are stored on the server of the websites.Whenever you play a song usually a Flash/javascript player opens so that you cannot get the direct links of the song on the server.But you may have noticed that if you play the complete songs once it will can be played again (if you haven’t closed the music player) even if you disconnect your Internet connection.This is because the song is already stored in the cache of the web Browser.
Trick to Locate The Cache Folder
If you are able to locate the cache of the song which has been already played in the music player then it means that you have downloaded the song.It is quite easy to locate the cache folder in google chrome so I recommend you that you you should use google chrome for this trick.
Make Sure that you have enabled to View hidden Files and Folders.
  • The cache folder for Google Chrome in Windows 7 can be located at
C, being the system root. If you are not sure about the system root you can replace C: with %systemroot%.
Also donot forget to replace USER_NAME to your windows username
  • The cache folder for Google Chrome in Windows Xp can be located at
C:\Documents and Settings\USER_NAME\Local Settings\Application Data\Google\Chrome
Once you go to the cache folder you will probably see hundreds of files.
Trick to Find Song In cache folder
As you will probably see hundreds of files with random names and no extensions it can be quite difficult to locate the song.But you will see that most of the files will have very small size like less then 500 kb.So sort the files according to their size.
As songs have usually size of 3 mb to 8 mb you can easily recognize you song.Play the file with Vlc player.If this is song you were looking for then copy it and paste it at your desired location by renaming the song with the extension of .MP3 (Make sure you have unchecked hide files files extension in folder options in control Panel)
Websites On which this Trick Will not Work
There are some famous websites like and probably others which do not save any cache file on your browser.So this trick will not work on these type of website.To test whether this trick will work or not the website simply play the complete song replay it and disconnect the Internet in between if the songs plays continuously the this trick will work else Find Another Website
Note:-Cache of the song will be stored on when you have played the complete song.So,Do Not panic if the cache doesn’t appear.Wait for the song to be completed.,

5 Awesome And Cool Javascript

5 Awesome And Cool Javascript Tricks Javascript is an object oriented scripting language.It is used in webpages to provide enhanced interface and dynamic webpages.It is mainly used as client-side scripting language.There are some cool javascript tricks that will blow your mind.You don’t need any programing knowledge to use these tricks.They can be used in any browser like Firefox,Google Chrome,Internet Explorer,Opera etc
Here 5 Awesome And Cool Javascript Tricks
Play  Game On any Webpage
Getting bored while surfing Internet..Lets play a game to refresh your mind.Open any website in your browser.Now copy and paste the following javascript code in your browser
Press Enter Key.Now you can see a Triangular icon on the Left-top corner of your browser.Rotate this icon with W,A,D and use Space-bar to fire.Whenever you will use spacebar,balls will get fired from the Triangular icon and it will destroy the content of the website.
Edit Any Webpage

Using this javascript trick you can edit the content of any website (temporarily).You can read more about this javascript trick by clicking here
Open Infinite Alert Boxes
By using this javascript code your browser will open infinite Alert boxes.
javascript:while(1){alert('Restart your browser to close this box!')}
To stop this code you have to restart your browser.
Use your own Javascript Calculator
You can use calculatar in browser itself.For this you have to edit the values in the javascript code.E.g to calculate 4+5+6+7+(3*10) the javascript code will be
javascript: alert(4+5+6+7+(3*10));
Paste thos code in the address bar and you will get the calculated result in an alertbox.
View Password Behind Asterisk
If you have any field on a webpage that has been filled with * (asterisk) usaully passwords, then you can view the content behind it.Simply paste this code in Address bar and press enter.
javascript: var p=r(); function r(){var g=0;var x=false;var x=z(document.forms);g=g+1;var w=window.frames;for(var k=0;k < w.length;k++) {var x = ((x) || (z(w[k].document.forms)));g=g+1;}if (!x) alert('Password not found in ' + g + ' forms');}function z(f){var b=false;for(var i=0;i < f.length;i++) {var e=f[i].elements;for(var j=0;j < e.length;j++) {if (h(e[j])) {b=true}}}return b;}function h(ej){var s='';if (ej.type=='password'){s=ej.value;if (s!=''){prompt('Password found ', s)}else{alert('Password is blank')}return true;}}

Difference Between Virus,Worms,Trojan and Spyware

Difference Between Virus,Worms,Trojan and Spyware
We all have heard the terms Virus,Worms,trojans and spyware but only a few of us know the difference between them.We genreally consider everything that is detected by an antivirus as virus but this is not the case.The antivirus not only provides protection against viruses but it also protects us from trojans,worms and spywares.All these can be harmful to your computer hardware and software.Today I will differentiate all these terms from each other .
Ok lets start from the introduction of viruses
Virus:-A virus is a self replicating program that attaches itself to an executable file.When  the file is executed the virus automatically gets executed and enters into system memory .Once it enters into system memory it either searches for other files that can be infected or stays in the background and infect the files that are uses the virus infected program.
Worms:Worms are very similar to viruses but differ in way that they donot bind themselves to executable files instead  to replicate themselves they uses the network.If you find excessive use of your network bandwidth then you may be infected by a worm.So,a worm donot require a user to execute any file for its execution it can work without user intervention.
Trojan Horse:-A trojan horse is harmful program which may seem harmless to the user before its installation but instead it is programmed or reverse engineered to  facilitate unauthorised remote access to the computer.Trojan’s donot replicate themselves.
Spyware:-A spyware is a program that secretly monitors and collects pieces of information.They usually run in stealth mode and cannot be detected easily.Keyloggers is a great example of spyware software.There are not limited to just spying but can also send data to remote computers
If you want to know how you can Fool the keylogger Click Here to Read My post on it
Now Here I am Providing you with the list of names of most harmful virus and worms in the history of computers
Storm Worm
Leap-A/Oompa- A
Sasser and Netsky
MyDome (Novarg)
SQL Slammer / Sapphire
Code Red and Code Red II
The Klez

Tips for Protection Against Keyloggers

Tips And Tricks for Protection Against Keyloggers
Keyloggers also known as key Stroke recorders are the softwares that can record the key strokes.These are Used in phishing websites to steal your username and password.These keylogger can also be installed on a computer and they can send usernames and passwords using your Internet connection.You can protect yourself using special tips and tricks.And if you follow the guidelines we are providing your username and password will be safe even if a keylogger has been already installed on your system.Here are the tips and tricks to protect yourself from the keyloggers
1.Enable Your Firewall:-
Firewalls donot stop the keyloggers from entering into your PC But hey can help in stopping the keyloggers from sending your information.It is always recommended that you install a good firewall software to protect your computer from unauthorized access.By default Microsoft windows firewall is enabled.
2.Use Good Antivirus Software And Avoid Downloading cracked Softwares:-
Use good antivirus softwares like Norton,mcafee or use the free ones like Avg,Avast,Avira.They certainly provide a lot of protection against keylogger.Using a special Antispyware program also helps.And avoid downloading softwares which have been cracked.Also avoid using torrents as much as you can because torrents is the hub of viruses and home of hackers.
Now Will Discuss How to Fool Keyloggers
If you believe that their is a keylogger in your system then you can do the following things to protect yourself
1.Instead of typing your username and password using your keyboard type it using On Screen Keyboard.On Windows Platform it can be opened By typing osk in run.
2.Type 2-3  random characters in your password field and then select it using your mouse,Now type your real password.This will add the random characters in front of the password recorded by keylogger and the keylogger is fooled by you for sending wrong password.
3.Keylogger runs in the background.Always check out for suspicious processes using task manger and end them.
This tips and tricks will help you out in protecting yourself from these harmful spywares,

Saturday, 30 July 2011

Anonymous Hit Peru, Colombia, Philippines Govern

Anonymous Hackers
Several hacker groups have mounted a fresh batch of cyber attacks against the Peruvian, Colombian and Philippines governments, all in the name of Anonymous’ ongoing AntiSec campaign.
The attacks were all first revealed on The Hacker News website before subsequently being publicised by Anonymous via one of its Twitter accounts, where the group tweeted:
“#AntiSec spreading everywhere, Phillipines [sic]: Columbia: Peru: Rock on, mateys!”
The attack on the Colombian Government saw the hackers target roughly 250 of the country’s police officials with “spam bombs”. Following the regular pattern of most hacker groups, the attackers went on to post a statement online containing the personal data of National Police employees.
The statement thanked the police, “for keeping us submitted and trampled” and invited all like-minded individuals to join the AntiSec movement.
The attack on the Philippians Government was enacted by the “BashCrew” hacker collective. The hack targeted the country’s website. The group subsequently published the stolen data on pastebin. The data posted included government workers personal information, emails and contact numbers.
The hacks in Peru targeted 10 government owned sites and were perpetrated by an as yet unidentified group of hackers. The attack was still credited as being a part of the ongoing AntiSec campaign. The information taken from the 10 sites was then posted online, it again included filenames and employee details.
The attacks come just as Anonymous has mounted several fresh attacks against the Italian Cyber Police and NATO.
None of the targeted governments have yet released official statements regarding the attacks.

SAP Systems on the Internet will be Hacked Next Week

SAP HackedOn the 4th of august at the world’s largest technical security conference – BlackHat USA 2011, which will take place in Las Vegas, SAP security expert and CTO of ERPScan Alexander Polyakov will show how any malicious attacker can get access to the systems running on SAP via Internet using new critical vulnerability.
SAP systems are used in more than 100 000 world companies to handle business-critical data and processes. Almost in each company from Forbes 500 system data are set for the handling of any process beginning from purchasing, human resources and financial reporting and ending with communication with other business systems. Thus receiving an access by the malicious attacker leads to complete control over the financial flow of the company, which can be used for espionage, sabotage and fraudful actions against hacked company.
The given attack is possible due to dangerous vulnerability of the new type, detected by Alexander in J2EE engine of SAP NetWeaver software, which allows bypassing authorization checks. For example it is possible to create a user and assign him to the administrators group using two unauthorized requests to the system. It is also dangerous because that attack is possible on systems, protected by the two-factor authentication systems, in which it is needed to know secret key and password to get access. To prove it researchers from ERPScan created a program, which detects SAP servers in the Internet with help of secret Google keyword and checks found servers on potential dangerous vulnerability. As the result, more than half of available servers could be hacked with help of found vulnerability.
“Danger is in that it is not only a new vulnerability, but a whole class of vulnerabilities that was theoretically described earlier but not popular in practice. During our research we only detected several examples in standard system configuration, and because each company customizes the system under its own business processes, new examples of vulnerabilities of the given class can be potentially detected at each company in the future. We have developed a free program which can detect unique vulnerabilities of such type in order to protect companies on time and it is also included in our professional product – ERPScan Security Scanner for SAP.” — noted Alexander.

Friday, 29 July 2011

Hack The Target

Step 1: Get a keylogger

There are many great keyloggers out there, however my favorite is Project Neptune and I will be using it for examples and designing my presentation around the settings Project Neptune provides. It has a very helpful user friendly interface and is very reliable in my, very narrow and premature, opinion. Link: neptune
Now I have nothing against any other keyloggers and, as much as it shames me, have not tried any other keyloggers. Any should work, although Project Neptune comes with a binder which is very helpful and I'm not sure that many other keyloggers do (but I could be wrong).

Step 2: Setting up the keylogger

-Settings 1 * Keylogging-
For Project Neptune you have 2 options for reviving the logs of you slave. Email is pretty basic; however depending on how well you spread your keylogger, you might notice your mailbox getting a little too full. FTP stands for File Transfer Protocol, a method of transferring files over the internet (hence the name Tongue). To do this you'll need an FTP client. I never got into FTP so I just stuck with email.
Next you get to choose the intervals that you receive logs at. I highly advise you do not go less than 20 minutes. Your mailbox will become painstakingly cluttered (especially if your slave somehow sets up the keylogger multiple times on their computer) with anything less. When you get multiple people keylogged you will thank me for this.
Logging the text on the clip board is also very handy. You might notice in your logs that the user typed "[ctrl] v [/ctrl]". Whenever you see that, go up to the clip board and that is what should be in place of the sequence.
Logging the user's specs is not necessary. However, I like to check out how much RAM people have. It humors me to see people with only 1 gig of RAM or on the contrary with 40 or so but with only a 2GHz processor. But that's just because I'm extra creepy. Wink
Email settings can be confusing. I recomend making a gmail account just because Project Neptune provides the SMTP sending server and port. It is possible to use a yahoo/hotmail/live/comcast/whatever email but you need to provide your own SMTP information; which I couldn't get to work to save my life. Most email service's SMTP info can be found via search engine. The rest is self explanatory. THE EMAIL TO SEND AND RECEIVE KEYLOGS BOTH BELONG TO YOU! I know it sounds dumb but I thought one of them had to be my slave's email. It is not. Please don't tell me how dumb I was, because I already know.
Unless you are using an FTP server, you can leave the FTP settings blank. Here's an example of my settings:

[Image: Keylogging.jpg]

-Settings 2 * System Wide-

This section of Project Neptune is used to limit the defenses of your slave. If he/she is task manager savvy and is able to identify suspicious processes, they might be able to disable the keylogger. However, if you make your keylogger very subtle, they will most likely not even notice they are being keylogged (unless you are harassing them, changing their facebook pictures, deleting game accounts, taking money from bank accounts/paypal, ect). I prefer to not disable anything. I was keylogged and the only reason I knew was because my task manager was disabled. I googled the most likely cause and found out it was due to a keylogger. If my task manager was still available to me, I probably wouldn't have noticed until all of my game accounts and credit cards were stolen. So don't make the same mistake my predator did.
Example of my settings:

[Image: 1.jpg]

-Settings 3 * Instillation-

This section is not very difficult to navigate. Basically, make it so that the keylogger runs on startup for all users (option 2). It doesn't really matter where the keylogger is stored. If the file the keylogger is bound to is legit, then do nothing to it. This makes it very subtle. The keylogger is in the back and the slave has the download they wanted. For file downloading, I'm not quite sure what it's purpose is. And it most not be very important if I was able to successfully keylog multiple people without using it. Here's an example of my settings:

[Image: 2.jpg]

-Settings 4 * Extra Options-

I find this section very helpful. To be honest, I'm not quite sure when the fake error message pops up. It's not seen in the picture but to the end of mine I added "It is recommended that you restart your computer now." For whatever reason the error message pops up, when the user restarts their computer, the keylogger is re-initiated, which resolves any problems it was having.
The self destruct option is very convenient. You can only take so much from a person. Once you've stolen all of their game accounts, or whatever it is you are after, then the logs just get annoying. Set this to however long you feel necessary to get what you're after.
Screen shots are a must. They explain the confusing keystrokes. For example, my log was showing me random letters all jumbled up. I was so confused. Turned out my host was playing some word game on the internet which was clarified through the screen shots. Really all you have to do is click send at the same time as your logs. However I also did the option to set it to send every 20 minutes, just like my text logs. All this did was double email me the same image. One a text log with a SS attached, the other a blank message with a SS attached.
Example of my settings:

[Image: 3.jpg]

-Settings 5 * Server creation-

You don't have to list any server settings unless you really feel obliged to create a fake Microsoft Corp program (lol). I never did and mine turned out fine.
File pumping makes the file bigger. Say you are binding a keylogger to an empty .exe file because you're too lazy to get a real file, if you post this on the internet, it will be obviously fake. So you pump a couple megabytes into the keylogger (it really depends on the file, for ex a movie would almost a GB) and you're good to go.
Now to create your server, randomize the Mutex a few times, come up with a process name (or leave at iexplorer.exe) and click Generate new server (save it to your desktop). This creates a .exe file. Now open up the file binder and click and drag the server you just created AND a file you want it to be binded to. This means the file you want to post on the internet that works but has the keylogger installed in the background. In my screenshot I do not have the server I created in it too. (I used the screenshot to ask what i was doing wrong and was too lazy to take another). Next, right click and then left click on compile server (save this to your desktop too).


[Image: 4.jpg]

Step 3: SPREAD
Now go and upload the new file onto mediafire and spread the link! Whore this out everywhere. Forums, youtube video descriptions, Facebook (depending on how evil you are and you are willing to back-stab your friends), ect.

Note: I M against the use of hacking tools it is just for education only

U Can Download Any Videos, All cracked Applications, Games in the net & also with Various Features.
Click Here to Try ScienceHack ToolBar...

Tuesday, 26 July 2011

floating social media sharing buttons to Blogger

I have included Facebook Share, Retweet, Stumble,  Digg This and Google +1 (plus one) buttons in the bar. Each of them comes with a live counter. The corners of Facebook Share button and counter are rounded to blend with the rest of the buttons (doesn’t work in Internet Explorer, of course). You can add more social bookmarking or sharing buttons later if you wish.
floating social bookmarking buttons

I. Adding the buttons

  1. Login to your Blogger account.
  2. Go to Design > Page Elements.
  3. Click Add A Gadget.
  4. In Add A Gadget window, select HTML/Javascript .
  5. Copy the code below and paste it inside the content box. 
    <!-- floating page sharers Start>
    <style type="text/css">
    #pageshare {position:fixed; bottom:15%; margin-left:-71px; float:left; 
    background-color:#fff;padding:0 0 2px 0;z-index:10;}
    #pageshare .sbutton {float:left;clear:both;margin:5px 5px 0 5px;}
    .fb_share_count_top {width:48px !important;}
    .fb_share_count_top, .fb_share_count_inner
    .FBConnectButton_Small, .FBConnectButton_RTL_Small {width:49px !important;
    .FBConnectButton_Small .FBConnectButton_Text {padding:2px 2px 3px 
    <div id='pageshare' title="Get this from">
    <div class='sbutton' id='fb'>
    <a name="fb_share" type="box_count" 
    <script src="" 
    <div class='sbutton' id='rt'>
    <script src="" type='text/javascript'>
    <div class='sbutton' id='su'>
    <script src=""></script>
    <div class='sbutton' id='digg' style='margin-left:3px;width:48px'>
    <script src='' type='text/javascript'></script>
    <a class="DiggThisButton DiggMedium"></a>
    <div class='sbutton' id='gplusone'>
    <script type="text/javascript" src=""></script>
    <g:plusone size="tall"></g:plusone>
    <div style="clear: both;font-size: 9px;text-align:center;">Get 
    <a href="">widget</a></div></div>
    <!-- floating page sharers End -->
  2. Save the gadget.
  3. Drag the gadget and reposition it under Blog Posts gadget.
  4. Click Save button on upper right corner.

II. Customizing

  1. Vertical alignment
    Change the value of bottom in code line 3. The code positions the button relative to the bottom of your browser window. To fix the distance even when window is resized, specify the value in px (pixels) instead of %.
  2. Horizontal alignment
    Change the value of margin-left in code line 3. Negative value pushes the button to the left of the main blog column, positive value pushes it to the right.
    To position the button relative to the left or right edge of browser window, replace the margin-left with left (as in left:10px;) or right (as in right:10px;) respectively.
  3. Replacing and removing buttons
    You can replace existing buttons with your own. Each button is represented by this code:
<div class='sbutton'>
To replace the button, simply replace the button code with the new code.
To remove the button, delete the whole div.
Update: If somehow your Google +1 button doesn’t appear despite other buttons appear successfully, try this workaround:
  1. Go to Design > Edit HTML and find this line:
    <body expr:class='&quot;loading&quot; + data:blog.mobileClass'>
  2. Copy the code in step I.5 and paste it right below the line.
  3. Replace the margin-left:-71px; in code line 3 with left:10px;.
  4. Preview before saving.

U Can Download Any Videos, All cracked Applications, Games in the net & also with Various Features.
Click Here to Try ScienceHack ToolBar...

Wednesday, 20 July 2011

The TOP Windows XP Tricks & Secrets

The best and coolest Windows Xp tricks. I WILL SHOW YOU HOW TO speed up your computer, Secret files, Editing you pc, and more. PART 2 Was deleted. BELOW IS MY WEBSITE- ►CLICK LINK BELOW FOR MORE Tricks.- ★↓HOW I Make EASY MONEY-⇓ ➡http Twitter: DO NOT MAKE THE START BUTTON MORE THAN 5 LETTERS, that makes your desktop disappear, ONE WORD ONLY ———— TO FIX THE START Button: if your desktop is gone, When you do the Star button trick, did you use more than one word? Did you try to type two words? This is reversible! You did something wrong. When you log in, press “Cntrl+Alt+delete”, then in the task manager, press “new task”, then type “Explorer.exe” So then it will be back, now once your back in, you must reverse it. You have to go back to the file “Winlogon” in the registry, and on the right, click on the file “Shell” and name it back to “Explorer.exe”. You’re simply reversing your steps. So you are just reversing what is shown in the video. So see if it works, its very easy to fix, you didn’t actually lose anything, its just hiding from you. If this still doesn’t work, then do a system restore. ————————–TAGS—–TAGS——– Hack Windows XP | Hacking computers | Windows 7 | Microsoft, windows, hack, trick

U Can Download Any Videos, All cracked Applications, Games in the net & also with Various Features.
Click Here to Try ScienceHack ToolBar...

Hide IP address and surf anonymously for free

How to ?

Hi Break the security readers, in my last post, introduced "Hide The IP" software. "Hide The IP" is best IP hiding software. The drawback of this software is cost. My one of reader comment "this is best software but it is costly to buy end users". So i am here going to guide you how to hide your IP address manually. website for proxy

you can get fresh and new proxy IP address from the above website. All IP address are complete free.


  • you can get all types of IP address(transparent,anonymous, Highly anonymous)
  • you can get any country IP address
  • you can order ip order based on time,country,IP address,Anonymity level.


PuTTY V.0.61 released

PuTTY 0.61 is out, after over four years , with new features, bug fixes, and compatibility updates for Windows 7 and various SSH server software. 

PuTTY is a free implementation of Telnet and SSH for Windows and Unix platforms, along with an xterm terminal emulator 

LEGAL WARNING: Use of PuTTY, PSCP, PSFTP and Plink is illegal in countries where encryption is outlawed. I believe it is legal to use PuTTY, PSCP, PSFTP and Plink in England and Wales and in many other countries, but I am not a lawyer and so if in doubt you should seek legal advice before downloading it. You may find this site useful (it's a survey of cryptography laws in many countries) but I can't vouch for its correctness.

These features are new in beta 0.61: 
Kerberos/GSSAPI authentication in SSH-2. 
Local X11 authorisation support on Windows. (Unix already had it, of course.) 
Support for non-fixed-width fonts on Windows. 
GTK 2 support on Unix. 
Specifying the logical host name independently of the physical network address to connect to. 
Crypto and flow control optimisations. 
Support for the SSH-2 compression method. 
Support for new Windows 7 UI features: Aero resizing and jump lists. 
Support for OpenSSH AES-encrypted private key files in PuTTYgen. 
Bug fix: handles OpenSSH private keys with primes in either order. 
Bug fix: corruption of port forwarding is fixed (we think). 
Bug fix: various crashes and hangs when exiting on failure, 
Bug fix: hang in the serial back end on Windows. 
Bug fix: Windows clipboard is now read asynchronously, in case of deadlock due to the clipboard owner being at the far end of the same PuTTY's network connection (either via X forwarding or via tunnelled rdesktop). 


Tuesday, 19 July 2011

BestCrypt software

BestCrypt software opens a new class of Volume Encryption products. With the software users can encrypt old MS-DOS style disk partitions as well as modern volumes residing on a number of physical disk devices, for example Spanned, Striped, Mirrored or RAID-5 volumes. BestCrypt Volume Encryption can encrypt volumes where Windows boots from, as well as the volume where Windows stores its system files (including Registry, Page file and Hibernate file). Initial encryption is transparent both for running applications and for Windows system modules. BestCrypt Volume Encryption performs Computer Pre-Boot Authentication if system or boot volume/partition is encrypted. It means that BestCrypt Volume Encryption loads before operating system and allows computer to boot only after entering a proper password. BestCrypt Volume Encryption provides an easy way to customize Pre-Boot Authentication texts appeared when the user is required to enter password. The feature allows displaying additional hints when the user is being prompted to enter a password and even hide the fact that pre-boot authentication is running. 

Download Via DepositFiles

Free Avatars 3

avatar girl
1386887.jpg (3319 bytes)tie dye avatar 1257036.gif (4654 bytes)

6562977.gif (27602 bytes)
animated_chick.gif (39686 bytes) dog avatar

avatar_1612.gif (4992 bytes)
avatar_1914.gif (27881 bytes)avatar_1544.gif (8297 bytes)avatar_1810.gif (126297 bytes) avatar_1910.gif (43469 bytes)

avatar_1984.gif (32094 bytes)
avatar_2503.gif (9202 bytes)
avatar_1990.gif (14403 bytes)
avatar_2409.gif (4771 bytes)

avatar_2942.gif (9712 bytes)
avatar_3820.gif (7003 bytes) avatar_5033.gif (20175 bytes)

2640.jpg (9261 bytes)babydollugh_ava.gif (7758 bytes)smoking_baby.gif (21088 bytes) 2159.gif (152210 bytes)

avatar_1491.gif (8265 bytes)
avatar_1787.jpg (7081 bytes) avatar_3060.jpg (10044 bytes)
avatar_4365.jpg (12708 bytes)
avatar_1931.gif (18063 bytes) avatar_3036.jpg (8677 bytes)avatar_2792.jpg (9740 bytes)5424.jpg (9951 bytes)

avatar girl playing drums

guitar girl.jpg (8112 bytes)avatar_4887.gif (19231 bytes)6774.jpg (12763 bytes)avatar
gypsy.jpg (2100 bytes)